Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security of data (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/448)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Black-box separations and their adaptability to the non-uniform model
Buldas, Ahto
;
Niitsoo, Margus
Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings
2013
/
p. 152-167
https://doi.org/10.1007/978-3-642-39059-3_11
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
2
book article
A security verification template to assess cache architecture vulnerabilities
Ghasempouri, Tara
;
Raik, Jaan
;
Paul, Kolin
;
Reinbrecht, Cezar
;
Hamdioui, Said
;
Taouil, M.
2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), April 22nd – 24th 2020 Novi Sad, Serbia : Proceedings
2020
/
art. 9095707, 6 p
https://doi.org/10.1109/DDECS50862.2020.9095707
book article
Number of records 2, displaying
1 - 2
keyword
444
1.
security of data
2.
data and information security
3.
data security
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security strategies
17.
cyber-security
18.
development of security cameras
19.
digital security practices
20.
drinking water security
21.
economic security
22.
economic security of enterprise
23.
emotional security
24.
energy security
25.
energy security indicator
26.
Estonian information security standard
27.
graded security
28.
hardware security
29.
hardware security primitive
30.
Homeland security
31.
human security
32.
information security
33.
information security and privacy
34.
internal security
35.
international security
36.
investment and innovation security
37.
IPv6 security
38.
IT security
39.
IT security management
40.
job security
41.
long-term security
42.
metadata model for security measures
43.
Middle Eastern security
44.
Mobile security
45.
national cyber security strategy
46.
national security
47.
NATO. Science for Peace and Security Program
48.
network security
49.
network security monitoring
50.
OSCE (Organization for Security and Co-operation in Europe)
51.
passenger’s security
52.
policy-based routing security
53.
political and security cultures
54.
post-quantum security
55.
power system security
56.
quantitative security
57.
regional security
58.
RISC-V Security Verification
59.
Safety and Security in Sea Transportation
60.
safety and security testing
61.
security
62.
security adaptation
63.
security alert prioritization
64.
security analysis
65.
security and justice (AFSJ)
66.
Security and political science
67.
security and privacy
68.
security and privacy in smart grids
69.
Security Assertion Mining
70.
security closure
71.
Security Coverage
72.
security dataset
73.
security dilemma
74.
Security evaluation
75.
security evaluation instruments
76.
Security limitations
77.
security log analysis
78.
security management
79.
security model
80.
security monitoring
81.
security notion
82.
security objectives
83.
security of supply
84.
security operation center
85.
security operations center
86.
security patterns
87.
security policy
88.
security problem definition
89.
security proof
90.
security protocols
91.
security requirements
92.
security requirements engineering
93.
security risk assessment
94.
security risk management
95.
security risks
96.
security science and technology
97.
security strategies
98.
security systems for military objects
99.
security testing
100.
security training
101.
security verification
102.
security-by-design
103.
social security planning
104.
societal security
105.
system of economic security
106.
system security
107.
terrorism security
108.
transmission System Security
109.
voting privacy and security
110.
accident data
111.
adversarial data perturbation
112.
AI-based data curation
113.
AIS data
114.
Aligned data
115.
ALS data enhancements
116.
Amazon Kinesis Data Analytics
117.
application data
118.
audio and visual data
119.
big data
120.
big data analysis
121.
big data analytics
122.
big data science
123.
big geo-data
124.
borehole data
125.
building lifecycle data
126.
call data record
127.
catalogue of data sources
128.
cellular phone data
129.
clinical data capture
130.
clinical data exchange
131.
compositional data
132.
conceptual data model
133.
construction data management
134.
control and data path tests
135.
critical data studies
136.
cross-border data exchange
137.
data
138.
data assimilation
139.
data protection
140.
data acquisition
141.
data acquisition system
142.
data acquisition systems
143.
data aggregation
144.
data alignment
145.
Data Altruism
146.
Data Altruism Consent
147.
data analysis
148.
data analytics
149.
data analytics and machine learning
150.
data anisotropy
151.
data annotation
152.
data assimilation
153.
data attacks
154.
data augmentation
155.
data breach handling
156.
data capabilities
157.
data capture
158.
data center
159.
data center (DC)
160.
data center applications
161.
data centers
162.
data centre
163.
data centres
164.
data classification
165.
data clustering
166.
data collection
167.
data commons
168.
data compression
169.
data conversion
170.
data copy
171.
data curation
172.
data dictionaries
173.
data discovery
174.
Data dissemination
175.
Data distribution structure
176.
data donation
177.
Data drift
178.
data driven planning
179.
data dropouts
180.
Data Ecosystem
181.
data embassy
182.
data engineering
183.
data enrichment
184.
data envelopment analysis
185.
data ethnography
186.
data exchange
187.
data exchange framework
188.
Data exchange layers
189.
data exchange platform
190.
data experts
191.
data filtering
192.
data fitting approach
193.
data flow languages
194.
data flow visualization
195.
data flows
196.
data fusion
197.
data generative model
198.
data governance
199.
data governance act
200.
data harmonization
201.
data hiding
202.
data integration
203.
data integrity
204.
data intermediary
205.
data Interoperability
206.
data justice
207.
data labeling
208.
data limitations in public sector
209.
data lineage
210.
data literacy
211.
data logger
212.
data logistics
213.
data management
214.
data mappings
215.
Data Mart
216.
Data Mart (DM)
217.
data mesh
218.
data migration
219.
data mining
220.
data mining and knowledge discovery
221.
data modeling
222.
data models
223.
data modem
224.
data movements
225.
data noise
226.
data offloading
227.
data ownership
228.
data platform
229.
data privacy
230.
data processing
231.
data product
232.
data protection
233.
data publishing
234.
data quality
235.
data quality management
236.
data quality maturity model
237.
data rate
238.
data representativeness
239.
data reuse
240.
data re-use
241.
data routing
242.
data scarce environments
243.
data science
244.
data scraping
245.
data set
246.
data set generation
247.
data sets
248.
data sharing
249.
data simulation
250.
data simultaneity
251.
data sort
252.
data sources
253.
data spaces
254.
data storage
255.
data storage systems
256.
data stream mining
257.
data streams
258.
data structures
259.
data studies
260.
data subject
261.
data subjects
262.
data synthesis
263.
data to decision
264.
data types
265.
data validity
266.
data valorization
267.
data warehouse
268.
data warenhouse
269.
data visualization
270.
data-augmentation
271.
data-based computational psychiatry
272.
data-centric construction
273.
data-centric systems
274.
data-controlled circuit partition
275.
data-controlled segmentation
276.
data-driven
277.
data-driven characterization
278.
data-driven condition monitoring
279.
data-driven control
280.
Data-driven decision-making
281.
data-driven imputation
282.
Data-driven method
283.
data-driven model
284.
data-driven modeling
285.
data-driven optimization
286.
data-driven policy
287.
data-driven public services
288.
data-driven techniques
289.
data-exchange infrastructures
290.
data-exchange solutions
291.
data-flow architecture
292.
data‐fusion
293.
data-independent acquisition
294.
Data-information-knowledgewisdom (DIKW)
295.
data-intelligence
296.
data-mining
297.
data-science
298.
diagnostic data
299.
digital data exchange
300.
discrete data
301.
distributed data aggregation
302.
distributed data fusion
303.
distributed data mining
304.
distributed data mining (DDM)
305.
distributional data
306.
DNA microarray data
307.
educational data mining
308.
educational data-mining
309.
enterprise data analysis
310.
European Health Data Space
311.
European Health Data Space (EHDS)
312.
eventdriven data
313.
event-driven data
314.
experimental data
315.
exploratory data analysis
316.
false data injection attack
317.
field data
318.
financial data
319.
floating car data (FCD)
320.
flood data platform
321.
FMI open data
322.
functional data analysis
323.
GDPR (General Data Protection Regulation)
324.
general data protection regulation
325.
genome data
326.
global data hub
327.
GNSS-levelling data
328.
GNSS-RO data
329.
GRUAN data
330.
health data
331.
health data accessibility
332.
Health data anonymization
333.
health data custodianship
334.
health data governance
335.
health data integrity and transparency
336.
health data interoperability
337.
health data policy
338.
health data stewardship
339.
healthcare data
340.
heterogeneous sensor data
341.
high-dimensional data
342.
high-frequency data
343.
high-level test data generation
344.
historical data
345.
hyperspectral data
346.
imbalanced data
347.
implications of energy data
348.
initial data
349.
initial data for AI
350.
initial data model
351.
in-network data processing
352.
insurance data
353.
knowledge discovery and data mining
354.
linked data
355.
linked open data
356.
linked open statistical data
357.
linked data
358.
lossless data compression
359.
low-pass data filtering
360.
Master Data Management
361.
medical claims data
362.
medical data
363.
Medical Data Reuse
364.
meta-data
365.
metered data
366.
methods: data analysis
367.
microplastic data uncertainty
368.
mobile data
369.
mobile phone big data
370.
mobile phone data
371.
mobile phone usage data
372.
mobile positioning data
373.
multisource data fusion
374.
multivariate data analysis
375.
Nigeria's National data protection regulation
376.
open data
377.
open data ecosystem
378.
open data format
379.
open data policies
380.
open government data
381.
open government data (OGD)
382.
open-data
383.
open-data platform
384.
OSM data
385.
oversharing personal data
386.
panel data
387.
parallel data processing
388.
passenger data
389.
patient-generated health data (PGHD)
390.
personal data
391.
personal data disclosure
392.
personal data processing
393.
personal data protection
394.
Personal Data Protection Act
395.
plan data
396.
point cloud data
397.
pollen data
398.
process and data modelling
399.
Product Data Management (PDM)
400.
public data-set
401.
random data
402.
real-time data
403.
real-time data collection
404.
reconstruction of gap-free data
405.
reference architecture for global health data space
406.
remote data transmission
407.
satellite data
408.
semantic data modelling
409.
semantic health data
410.
sequential data
411.
small data machine learning
412.
small training data set
413.
smart data analytics
414.
smart meter data
415.
social media data
416.
Spatial data
417.
spatial data analysis
418.
statistical data
419.
stochastic image data
420.
structured data
421.
student data analysis
422.
supervised learning data
423.
supervisory control and data acquisition (SCADA)
424.
surrogate data
425.
sustainable data governance
426.
symbolic data
427.
symbolic data analysis
428.
synthetic data
429.
temperature historical data series
430.
three-way data
431.
time-selective data fusion
432.
training data
433.
Transcriptome data
434.
tree-like data structures
435.
underwater data center
436.
urban data
437.
urban data acquisition
438.
weather data
439.
web traffic data
440.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
441.
virtual data embassy
442.
Virtual Data Explorer
443.
18O data
444.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT