Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security of data (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/396)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Black-box separations and their adaptability to the non-uniform model
Buldas, Ahto
;
Niitsoo, Margus
Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings
2013
/
p. 152-167
https://doi.org/10.1007/978-3-642-39059-3_11
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
2
book article
A security verification template to assess cache architecture vulnerabilities
Ghasempouri, Tara
;
Raik, Jaan
;
Paul, Kolin
;
Reinbrecht, Cezar
;
Hamdioui, Said
;
Taouil, M.
2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), April 22nd – 24th 2020 Novi Sad, Serbia : Proceedings
2020
/
art. 9095707, 6 p
https://doi.org/10.1109/DDECS50862.2020.9095707
book article
Number of records 2, displaying
1 - 2
keyword
392
1.
security of data
2.
data security
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security strategies
15.
cyber-security
16.
development of security cameras
17.
drinking water security
18.
economic security
19.
economic security of enterprise
20.
emotional security
21.
energy security
22.
energy security indicator
23.
Estonian information security standard
24.
graded security
25.
hardware security
26.
hardware security primitive
27.
human security
28.
information security
29.
internal security
30.
international security
31.
investment and innovation security
32.
IPv6 security
33.
IT security
34.
IT security management
35.
job security
36.
long-term security
37.
metadata model for security measures
38.
Middle Eastern security
39.
Mobile security
40.
national cyber security strategy
41.
national security
42.
NATO. Science for Peace and Security Program
43.
network security
44.
network security monitoring
45.
OSCE (Organization for Security and Co-operation in Europe)
46.
passenger’s security
47.
policy-based routing security
48.
political and security cultures
49.
post-quantum security
50.
power system security
51.
quantitative security
52.
regional security
53.
RISC-V Security Verification
54.
safety and security testing
55.
security
56.
security adaptation
57.
security alert prioritization
58.
security analysis
59.
security and justice (AFSJ)
60.
security and privacy
61.
security and privacy in smart grids
62.
Security Assertion Mining
63.
security closure
64.
Security Coverage
65.
security dataset
66.
security dilemma
67.
Security evaluation
68.
security evaluation instruments
69.
security log analysis
70.
security management
71.
security model
72.
security monitoring
73.
security notion
74.
security objectives
75.
security of supply
76.
security operation center
77.
security operations center
78.
security patterns
79.
security policy
80.
security problem definition
81.
security proof
82.
security protocols
83.
security requirements
84.
security requirements engineering
85.
security risk assessment
86.
security risk management
87.
security strategies
88.
security systems for military objects
89.
security testing
90.
security training
91.
security verification
92.
security-by-design
93.
social security planning
94.
societal security
95.
system of economic security
96.
system security
97.
terrorism security
98.
transmission System Security
99.
voting privacy and security
100.
accident data
101.
adversarial data perturbation
102.
AI-based data curation
103.
AIS data
104.
Aligned data
105.
ALS data enhancements
106.
Amazon Kinesis Data Analytics
107.
application data
108.
audio and visual data
109.
big data
110.
big data analysis
111.
big data analytics
112.
big data science
113.
big geo-data
114.
borehole data
115.
building lifecycle data
116.
call data record
117.
catalogue of data sources
118.
cellular phone data
119.
clinical data capture
120.
clinical data exchange
121.
compositional data
122.
conceptual data model
123.
control and data path tests
124.
critical data studies
125.
cross-border data exchange
126.
data
127.
data assimilation
128.
data protection
129.
data acquisition
130.
data acquisition system
131.
data acquisition systems
132.
data aggregation
133.
data alignment
134.
data analysis
135.
data analytics
136.
data anisotropy
137.
data annotation
138.
data assimilation
139.
data attacks
140.
data augmentation
141.
data breach handling
142.
data capabilities
143.
data capture
144.
data center
145.
data center (DC)
146.
data centers
147.
data centre
148.
data centres
149.
data classification
150.
data clustering
151.
data collection
152.
data commons
153.
data compression
154.
data conversion
155.
data copy
156.
data dictionaries
157.
data discovery
158.
Data dissemination
159.
Data distribution structure
160.
Data drift
161.
data driven planning
162.
data embassy
163.
data engineering
164.
data envelopment analysis
165.
data ethnography
166.
data exchange
167.
data exchange framework
168.
Data exchange layers
169.
data exchange platform
170.
data experts
171.
data filtering
172.
data fitting approach
173.
data flow languages
174.
data flow visualization
175.
data fusion
176.
data generative model
177.
data governance
178.
data hiding
179.
data integration
180.
data integrity
181.
data intermediary
182.
data Interoperability
183.
data justice
184.
data labeling
185.
data lineage
186.
data logger
187.
data logistics
188.
data management
189.
data mappings
190.
Data Mart
191.
Data Mart (DM)
192.
data mesh
193.
data mining
194.
data modeling
195.
data models
196.
data modem
197.
data noise
198.
data offloading
199.
data ownership
200.
data platform
201.
data privacy
202.
data processing
203.
data product
204.
data protection
205.
data quality
206.
data quality management
207.
data quality maturity model
208.
data rate
209.
data reuse
210.
data re-use
211.
data routing
212.
data science
213.
data scraping
214.
data set
215.
data set generation
216.
data sets
217.
data sharing
218.
data simulation
219.
data simultaneity
220.
data sort
221.
data sources
222.
data storage
223.
data storage systems
224.
data stream mining
225.
data streams
226.
data studies
227.
data subject
228.
data synthesis
229.
data to decision
230.
data types
231.
data validity
232.
data valorization
233.
data warehouse
234.
data warenhouse
235.
data visualization
236.
data-based computational psychiatry
237.
data-centric construction
238.
data-centric systems
239.
data-controlled circuit partition
240.
data-controlled segmentation
241.
data-driven
242.
data-driven characterization
243.
data-driven condition monitoring
244.
Data-driven method
245.
data-driven modeling
246.
data-driven optimization
247.
data-exchange infrastructures
248.
data-exchange solutions
249.
data‐fusion
250.
data-independent acquisition
251.
Data-information-knowledgewisdom (DIKW)
252.
data-intelligence
253.
data-mining
254.
data-science
255.
diagnostic data
256.
digital data exchange
257.
discrete data
258.
distributed data aggregation
259.
distributed data fusion
260.
distributed data mining
261.
distributed data mining (DDM)
262.
DNA microarray data
263.
educational data mining
264.
enterprise data analysis
265.
European Health Data Space
266.
European Health Data Space (EHDS)
267.
eventdriven data
268.
event-driven data
269.
experimental data
270.
exploratory data analysis
271.
false data injection attack
272.
field data
273.
financial data
274.
floating car data (FCD)
275.
flood data platform
276.
FMI open data
277.
functional data analysis
278.
GDPR (General Data Protection Regulation)
279.
general data protection regulation
280.
genome data
281.
global data hub
282.
GNSS-levelling data
283.
health data
284.
health data accessibility
285.
Health data anonymization
286.
health data custodianship
287.
health data governance
288.
health data interoperability
289.
health data policy
290.
health data stewardship
291.
healthcare data
292.
heterogeneous sensor data
293.
high-dimensional data
294.
high-frequency data
295.
high-level test data generation
296.
historical data
297.
hyperspectral data
298.
imbalanced data
299.
implications of energy data
300.
initial data
301.
initial data for AI
302.
initial data model
303.
in-network data processing
304.
insurance data
305.
knowledge discovery and data mining
306.
linked data
307.
linked open data
308.
linked open statistical data
309.
linked data
310.
lossless data compression
311.
low-pass data filtering
312.
Master Data Management
313.
medical claims data
314.
medical data
315.
Medical Data Reuse
316.
meta-data
317.
metered data
318.
methods: data analysis
319.
microplastic data uncertainty
320.
mobile data
321.
mobile phone big data
322.
mobile phone data
323.
mobile phone usage data
324.
mobile positioning data
325.
multisource data fusion
326.
multivariate data analysis
327.
Nigeria's National data protection regulation
328.
open data
329.
open data ecosystem
330.
open data format
331.
open data policies
332.
open government data
333.
open government data (OGD)
334.
OSM data
335.
oversharing personal data
336.
panel data
337.
parallel data processing
338.
passenger data
339.
patient-generated health data (PGHD)
340.
personal data
341.
personal data disclosure
342.
personal data processing
343.
personal data protection
344.
Personal Data Protection Act
345.
plan data
346.
point cloud data
347.
pollen data
348.
process and data modelling
349.
Product Data Management (PDM)
350.
public data-set
351.
random data
352.
real-time data
353.
reconstruction of gap-free data
354.
reference architecture for global health data space
355.
remote data transmission
356.
satellite data
357.
semantic data modelling
358.
semantic health data
359.
sequential data
360.
small data machine learning
361.
small training data set
362.
smart data analytics
363.
smart meter data
364.
social media data
365.
Spatial data
366.
spatial data analysis
367.
statistical data
368.
stochastic image data
369.
structured data
370.
student data analysis
371.
supervised learning data
372.
supervisory control and data acquisition (SCADA)
373.
surrogate data
374.
sustainable data governance
375.
symbolic data
376.
symbolic data analysis
377.
synthetic data
378.
temperature historical data series
379.
time-selective data fusion
380.
training data
381.
Transcriptome data
382.
tree-like data structures
383.
underwater data center
384.
urban data
385.
urban data acquisition
386.
weather data
387.
web traffic data
388.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
389.
virtual data embassy
390.
Virtual Data Explorer
391.
18O data
392.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT