Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security of data (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/415)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Black-box separations and their adaptability to the non-uniform model
Buldas, Ahto
;
Niitsoo, Margus
Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings
2013
/
p. 152-167
https://doi.org/10.1007/978-3-642-39059-3_11
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
2
book article
A security verification template to assess cache architecture vulnerabilities
Ghasempouri, Tara
;
Raik, Jaan
;
Paul, Kolin
;
Reinbrecht, Cezar
;
Hamdioui, Said
;
Taouil, M.
2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), April 22nd – 24th 2020 Novi Sad, Serbia : Proceedings
2020
/
art. 9095707, 6 p
https://doi.org/10.1109/DDECS50862.2020.9095707
book article
Number of records 2, displaying
1 - 2
keyword
411
1.
security of data
2.
data security
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security monitoring
15.
cyber security strategies
16.
cyber-security
17.
development of security cameras
18.
drinking water security
19.
economic security
20.
economic security of enterprise
21.
emotional security
22.
energy security
23.
energy security indicator
24.
Estonian information security standard
25.
graded security
26.
hardware security
27.
hardware security primitive
28.
human security
29.
information security
30.
internal security
31.
international security
32.
investment and innovation security
33.
IPv6 security
34.
IT security
35.
IT security management
36.
job security
37.
long-term security
38.
metadata model for security measures
39.
Middle Eastern security
40.
Mobile security
41.
national cyber security strategy
42.
national security
43.
NATO. Science for Peace and Security Program
44.
network security
45.
network security monitoring
46.
OSCE (Organization for Security and Co-operation in Europe)
47.
passenger’s security
48.
policy-based routing security
49.
political and security cultures
50.
post-quantum security
51.
power system security
52.
quantitative security
53.
regional security
54.
RISC-V Security Verification
55.
safety and security testing
56.
security
57.
security adaptation
58.
security alert prioritization
59.
security analysis
60.
security and justice (AFSJ)
61.
Security and political science
62.
security and privacy
63.
security and privacy in smart grids
64.
Security Assertion Mining
65.
security closure
66.
Security Coverage
67.
security dataset
68.
security dilemma
69.
Security evaluation
70.
security evaluation instruments
71.
security log analysis
72.
security management
73.
security model
74.
security monitoring
75.
security notion
76.
security objectives
77.
security of supply
78.
security operation center
79.
security operations center
80.
security patterns
81.
security policy
82.
security problem definition
83.
security proof
84.
security protocols
85.
security requirements
86.
security requirements engineering
87.
security risk assessment
88.
security risk management
89.
security risks
90.
security strategies
91.
security systems for military objects
92.
security testing
93.
security training
94.
security verification
95.
security-by-design
96.
social security planning
97.
societal security
98.
system of economic security
99.
system security
100.
terrorism security
101.
transmission System Security
102.
voting privacy and security
103.
accident data
104.
adversarial data perturbation
105.
AI-based data curation
106.
AIS data
107.
Aligned data
108.
ALS data enhancements
109.
Amazon Kinesis Data Analytics
110.
application data
111.
audio and visual data
112.
big data
113.
big data analysis
114.
big data analytics
115.
big data science
116.
big geo-data
117.
borehole data
118.
building lifecycle data
119.
call data record
120.
catalogue of data sources
121.
cellular phone data
122.
clinical data capture
123.
clinical data exchange
124.
compositional data
125.
conceptual data model
126.
construction data management
127.
control and data path tests
128.
critical data studies
129.
cross-border data exchange
130.
data
131.
data assimilation
132.
data protection
133.
data acquisition
134.
data acquisition system
135.
data acquisition systems
136.
data aggregation
137.
data alignment
138.
data analysis
139.
data analytics
140.
data anisotropy
141.
data annotation
142.
data assimilation
143.
data attacks
144.
data augmentation
145.
data breach handling
146.
data capabilities
147.
data capture
148.
data center
149.
data center (DC)
150.
data centers
151.
data centre
152.
data centres
153.
data classification
154.
data clustering
155.
data collection
156.
data commons
157.
data compression
158.
data conversion
159.
data copy
160.
data dictionaries
161.
data discovery
162.
Data dissemination
163.
Data distribution structure
164.
data donation
165.
Data drift
166.
data driven planning
167.
data embassy
168.
data engineering
169.
data enrichment
170.
data envelopment analysis
171.
data ethnography
172.
data exchange
173.
data exchange framework
174.
Data exchange layers
175.
data exchange platform
176.
data experts
177.
data filtering
178.
data fitting approach
179.
data flow languages
180.
data flow visualization
181.
data flows
182.
data fusion
183.
data generative model
184.
data governance
185.
data governance act
186.
data hiding
187.
data integration
188.
data integrity
189.
data intermediary
190.
data Interoperability
191.
data justice
192.
data labeling
193.
data lineage
194.
data logger
195.
data logistics
196.
data management
197.
data mappings
198.
Data Mart
199.
Data Mart (DM)
200.
data mesh
201.
data migration
202.
data mining
203.
data modeling
204.
data models
205.
data modem
206.
data movements
207.
data noise
208.
data offloading
209.
data ownership
210.
data platform
211.
data privacy
212.
data processing
213.
data product
214.
data protection
215.
data quality
216.
data quality management
217.
data quality maturity model
218.
data rate
219.
data reuse
220.
data re-use
221.
data routing
222.
data science
223.
data scraping
224.
data set
225.
data set generation
226.
data sets
227.
data sharing
228.
data simulation
229.
data simultaneity
230.
data sort
231.
data sources
232.
data spaces
233.
data storage
234.
data storage systems
235.
data stream mining
236.
data streams
237.
data studies
238.
data subject
239.
data subjects
240.
data synthesis
241.
data to decision
242.
data types
243.
data validity
244.
data valorization
245.
data warehouse
246.
data warenhouse
247.
data visualization
248.
data-based computational psychiatry
249.
data-centric construction
250.
data-centric systems
251.
data-controlled circuit partition
252.
data-controlled segmentation
253.
data-driven
254.
data-driven characterization
255.
data-driven condition monitoring
256.
Data-driven decision-making
257.
Data-driven method
258.
data-driven model
259.
data-driven modeling
260.
data-driven optimization
261.
data-driven techniques
262.
data-exchange infrastructures
263.
data-exchange solutions
264.
data-flow architecture
265.
data‐fusion
266.
data-independent acquisition
267.
Data-information-knowledgewisdom (DIKW)
268.
data-intelligence
269.
data-mining
270.
data-science
271.
diagnostic data
272.
digital data exchange
273.
discrete data
274.
distributed data aggregation
275.
distributed data fusion
276.
distributed data mining
277.
distributed data mining (DDM)
278.
DNA microarray data
279.
educational data mining
280.
enterprise data analysis
281.
European Health Data Space
282.
European Health Data Space (EHDS)
283.
eventdriven data
284.
event-driven data
285.
experimental data
286.
exploratory data analysis
287.
false data injection attack
288.
field data
289.
financial data
290.
floating car data (FCD)
291.
flood data platform
292.
FMI open data
293.
functional data analysis
294.
GDPR (General Data Protection Regulation)
295.
general data protection regulation
296.
genome data
297.
global data hub
298.
GNSS-levelling data
299.
GNSS-RO data
300.
GRUAN data
301.
health data
302.
health data accessibility
303.
Health data anonymization
304.
health data custodianship
305.
health data governance
306.
health data interoperability
307.
health data policy
308.
health data stewardship
309.
healthcare data
310.
heterogeneous sensor data
311.
high-dimensional data
312.
high-frequency data
313.
high-level test data generation
314.
historical data
315.
hyperspectral data
316.
imbalanced data
317.
implications of energy data
318.
initial data
319.
initial data for AI
320.
initial data model
321.
in-network data processing
322.
insurance data
323.
knowledge discovery and data mining
324.
linked data
325.
linked open data
326.
linked open statistical data
327.
linked data
328.
lossless data compression
329.
low-pass data filtering
330.
Master Data Management
331.
medical claims data
332.
medical data
333.
Medical Data Reuse
334.
meta-data
335.
metered data
336.
methods: data analysis
337.
microplastic data uncertainty
338.
mobile data
339.
mobile phone big data
340.
mobile phone data
341.
mobile phone usage data
342.
mobile positioning data
343.
multisource data fusion
344.
multivariate data analysis
345.
Nigeria's National data protection regulation
346.
open data
347.
open data ecosystem
348.
open data format
349.
open data policies
350.
open government data
351.
open government data (OGD)
352.
OSM data
353.
oversharing personal data
354.
panel data
355.
parallel data processing
356.
passenger data
357.
patient-generated health data (PGHD)
358.
personal data
359.
personal data disclosure
360.
personal data processing
361.
personal data protection
362.
Personal Data Protection Act
363.
plan data
364.
point cloud data
365.
pollen data
366.
process and data modelling
367.
Product Data Management (PDM)
368.
public data-set
369.
random data
370.
real-time data
371.
real-time data collection
372.
reconstruction of gap-free data
373.
reference architecture for global health data space
374.
remote data transmission
375.
satellite data
376.
semantic data modelling
377.
semantic health data
378.
sequential data
379.
small data machine learning
380.
small training data set
381.
smart data analytics
382.
smart meter data
383.
social media data
384.
Spatial data
385.
spatial data analysis
386.
statistical data
387.
stochastic image data
388.
structured data
389.
student data analysis
390.
supervised learning data
391.
supervisory control and data acquisition (SCADA)
392.
surrogate data
393.
sustainable data governance
394.
symbolic data
395.
symbolic data analysis
396.
synthetic data
397.
temperature historical data series
398.
time-selective data fusion
399.
training data
400.
Transcriptome data
401.
tree-like data structures
402.
underwater data center
403.
urban data
404.
urban data acquisition
405.
weather data
406.
web traffic data
407.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
408.
virtual data embassy
409.
Virtual Data Explorer
410.
18O data
411.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT