Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security of data (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/441)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Black-box separations and their adaptability to the non-uniform model
Buldas, Ahto
;
Niitsoo, Margus
Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings
2013
/
p. 152-167
https://doi.org/10.1007/978-3-642-39059-3_11
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
2
book article
A security verification template to assess cache architecture vulnerabilities
Ghasempouri, Tara
;
Raik, Jaan
;
Paul, Kolin
;
Reinbrecht, Cezar
;
Hamdioui, Said
;
Taouil, M.
2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), April 22nd – 24th 2020 Novi Sad, Serbia : Proceedings
2020
/
art. 9095707, 6 p
https://doi.org/10.1109/DDECS50862.2020.9095707
book article
Number of records 2, displaying
1 - 2
keyword
437
1.
security of data
2.
data and information security
3.
data security
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security strategies
17.
cyber-security
18.
development of security cameras
19.
digital security practices
20.
drinking water security
21.
economic security
22.
economic security of enterprise
23.
emotional security
24.
energy security
25.
energy security indicator
26.
Estonian information security standard
27.
graded security
28.
hardware security
29.
hardware security primitive
30.
human security
31.
information security
32.
information security and privacy
33.
internal security
34.
international security
35.
investment and innovation security
36.
IPv6 security
37.
IT security
38.
IT security management
39.
job security
40.
long-term security
41.
metadata model for security measures
42.
Middle Eastern security
43.
Mobile security
44.
national cyber security strategy
45.
national security
46.
NATO. Science for Peace and Security Program
47.
network security
48.
network security monitoring
49.
OSCE (Organization for Security and Co-operation in Europe)
50.
passenger’s security
51.
policy-based routing security
52.
political and security cultures
53.
post-quantum security
54.
power system security
55.
quantitative security
56.
regional security
57.
RISC-V Security Verification
58.
Safety and Security in Sea Transportation
59.
safety and security testing
60.
security
61.
security adaptation
62.
security alert prioritization
63.
security analysis
64.
security and justice (AFSJ)
65.
Security and political science
66.
security and privacy
67.
security and privacy in smart grids
68.
Security Assertion Mining
69.
security closure
70.
Security Coverage
71.
security dataset
72.
security dilemma
73.
Security evaluation
74.
security evaluation instruments
75.
Security limitations
76.
security log analysis
77.
security management
78.
security model
79.
security monitoring
80.
security notion
81.
security objectives
82.
security of supply
83.
security operation center
84.
security operations center
85.
security patterns
86.
security policy
87.
security problem definition
88.
security proof
89.
security protocols
90.
security requirements
91.
security requirements engineering
92.
security risk assessment
93.
security risk management
94.
security risks
95.
security science and technology
96.
security strategies
97.
security systems for military objects
98.
security testing
99.
security training
100.
security verification
101.
security-by-design
102.
social security planning
103.
societal security
104.
system of economic security
105.
system security
106.
terrorism security
107.
transmission System Security
108.
voting privacy and security
109.
accident data
110.
adversarial data perturbation
111.
AI-based data curation
112.
AIS data
113.
Aligned data
114.
ALS data enhancements
115.
Amazon Kinesis Data Analytics
116.
application data
117.
audio and visual data
118.
big data
119.
big data analysis
120.
big data analytics
121.
big data science
122.
big geo-data
123.
borehole data
124.
building lifecycle data
125.
call data record
126.
catalogue of data sources
127.
cellular phone data
128.
clinical data capture
129.
clinical data exchange
130.
compositional data
131.
conceptual data model
132.
construction data management
133.
control and data path tests
134.
critical data studies
135.
cross-border data exchange
136.
data
137.
data assimilation
138.
data protection
139.
data acquisition
140.
data acquisition system
141.
data acquisition systems
142.
data aggregation
143.
data alignment
144.
data analysis
145.
data analytics
146.
data analytics and machine learning
147.
data anisotropy
148.
data annotation
149.
data assimilation
150.
data attacks
151.
data augmentation
152.
data breach handling
153.
data capabilities
154.
data capture
155.
data center
156.
data center (DC)
157.
data center applications
158.
data centers
159.
data centre
160.
data centres
161.
data classification
162.
data clustering
163.
data collection
164.
data commons
165.
data compression
166.
data conversion
167.
data copy
168.
data curation
169.
data dictionaries
170.
data discovery
171.
Data dissemination
172.
Data distribution structure
173.
data donation
174.
Data drift
175.
data driven planning
176.
data dropouts
177.
data embassy
178.
data engineering
179.
data enrichment
180.
data envelopment analysis
181.
data ethnography
182.
data exchange
183.
data exchange framework
184.
Data exchange layers
185.
data exchange platform
186.
data experts
187.
data filtering
188.
data fitting approach
189.
data flow languages
190.
data flow visualization
191.
data flows
192.
data fusion
193.
data generative model
194.
data governance
195.
data governance act
196.
data harmonization
197.
data hiding
198.
data integration
199.
data integrity
200.
data intermediary
201.
data Interoperability
202.
data justice
203.
data labeling
204.
data limitations in public sector
205.
data lineage
206.
data logger
207.
data logistics
208.
data management
209.
data mappings
210.
Data Mart
211.
Data Mart (DM)
212.
data mesh
213.
data migration
214.
data mining
215.
data mining and knowledge discovery
216.
data modeling
217.
data models
218.
data modem
219.
data movements
220.
data noise
221.
data offloading
222.
data ownership
223.
data platform
224.
data privacy
225.
data processing
226.
data product
227.
data protection
228.
data publishing
229.
data quality
230.
data quality management
231.
data quality maturity model
232.
data rate
233.
data reuse
234.
data re-use
235.
data routing
236.
data science
237.
data scraping
238.
data set
239.
data set generation
240.
data sets
241.
data sharing
242.
data simulation
243.
data simultaneity
244.
data sort
245.
data sources
246.
data spaces
247.
data storage
248.
data storage systems
249.
data stream mining
250.
data streams
251.
data structures
252.
data studies
253.
data subject
254.
data subjects
255.
data synthesis
256.
data to decision
257.
data types
258.
data validity
259.
data valorization
260.
data warehouse
261.
data warenhouse
262.
data visualization
263.
data-augmentation
264.
data-based computational psychiatry
265.
data-centric construction
266.
data-centric systems
267.
data-controlled circuit partition
268.
data-controlled segmentation
269.
data-driven
270.
data-driven characterization
271.
data-driven condition monitoring
272.
data-driven control
273.
Data-driven decision-making
274.
data-driven imputation
275.
Data-driven method
276.
data-driven model
277.
data-driven modeling
278.
data-driven optimization
279.
data-driven policy
280.
data-driven public services
281.
data-driven techniques
282.
data-exchange infrastructures
283.
data-exchange solutions
284.
data-flow architecture
285.
data‐fusion
286.
data-independent acquisition
287.
Data-information-knowledgewisdom (DIKW)
288.
data-intelligence
289.
data-mining
290.
data-science
291.
diagnostic data
292.
digital data exchange
293.
discrete data
294.
distributed data aggregation
295.
distributed data fusion
296.
distributed data mining
297.
distributed data mining (DDM)
298.
distributional data
299.
DNA microarray data
300.
educational data mining
301.
educational data-mining
302.
enterprise data analysis
303.
European Health Data Space
304.
European Health Data Space (EHDS)
305.
eventdriven data
306.
event-driven data
307.
experimental data
308.
exploratory data analysis
309.
false data injection attack
310.
field data
311.
financial data
312.
floating car data (FCD)
313.
flood data platform
314.
FMI open data
315.
functional data analysis
316.
GDPR (General Data Protection Regulation)
317.
general data protection regulation
318.
genome data
319.
global data hub
320.
GNSS-levelling data
321.
GNSS-RO data
322.
GRUAN data
323.
health data
324.
health data accessibility
325.
Health data anonymization
326.
health data custodianship
327.
health data governance
328.
health data integrity and transparency
329.
health data interoperability
330.
health data policy
331.
health data stewardship
332.
healthcare data
333.
heterogeneous sensor data
334.
high-dimensional data
335.
high-frequency data
336.
high-level test data generation
337.
historical data
338.
hyperspectral data
339.
imbalanced data
340.
implications of energy data
341.
initial data
342.
initial data for AI
343.
initial data model
344.
in-network data processing
345.
insurance data
346.
knowledge discovery and data mining
347.
linked data
348.
linked open data
349.
linked open statistical data
350.
linked data
351.
lossless data compression
352.
low-pass data filtering
353.
Master Data Management
354.
medical claims data
355.
medical data
356.
Medical Data Reuse
357.
meta-data
358.
metered data
359.
methods: data analysis
360.
microplastic data uncertainty
361.
mobile data
362.
mobile phone big data
363.
mobile phone data
364.
mobile phone usage data
365.
mobile positioning data
366.
multisource data fusion
367.
multivariate data analysis
368.
Nigeria's National data protection regulation
369.
open data
370.
open data ecosystem
371.
open data format
372.
open data policies
373.
open government data
374.
open government data (OGD)
375.
open-data
376.
open-data platform
377.
OSM data
378.
oversharing personal data
379.
panel data
380.
parallel data processing
381.
passenger data
382.
patient-generated health data (PGHD)
383.
personal data
384.
personal data disclosure
385.
personal data processing
386.
personal data protection
387.
Personal Data Protection Act
388.
plan data
389.
point cloud data
390.
pollen data
391.
process and data modelling
392.
Product Data Management (PDM)
393.
public data-set
394.
random data
395.
real-time data
396.
real-time data collection
397.
reconstruction of gap-free data
398.
reference architecture for global health data space
399.
remote data transmission
400.
satellite data
401.
semantic data modelling
402.
semantic health data
403.
sequential data
404.
small data machine learning
405.
small training data set
406.
smart data analytics
407.
smart meter data
408.
social media data
409.
Spatial data
410.
spatial data analysis
411.
statistical data
412.
stochastic image data
413.
structured data
414.
student data analysis
415.
supervised learning data
416.
supervisory control and data acquisition (SCADA)
417.
surrogate data
418.
sustainable data governance
419.
symbolic data
420.
symbolic data analysis
421.
synthetic data
422.
temperature historical data series
423.
three-way data
424.
time-selective data fusion
425.
training data
426.
Transcriptome data
427.
tree-like data structures
428.
underwater data center
429.
urban data
430.
urban data acquisition
431.
weather data
432.
web traffic data
433.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
434.
virtual data embassy
435.
Virtual Data Explorer
436.
18O data
437.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT