Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
data security (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/493)
Export
export all inquiry results
(4)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book article EST
/
book article ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
3
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
4
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 4, displaying
1 - 4
keyword
489
1.
data security
2.
data and information security
3.
security of data
4.
metadata model for security measures
5.
security dataset
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
cloud security
11.
communication system security
12.
comprehensive system of economic security
13.
computer security
14.
cooperative security dilemma
15.
cyber security
16.
cyber security education
17.
cyber security exercises
18.
cyber security monitoring
19.
cyber security monitoring in maritime
20.
cyber security strategies
21.
cyber-physical system security
22.
cyber-security
23.
development of security cameras
24.
digital security practices
25.
drinking water security
26.
economic security
27.
economic security of enterprise
28.
emotional security
29.
energy security
30.
energy security indicator
31.
Estonian information security standard
32.
graded security
33.
hardware security
34.
hardware security primitive
35.
high level of security
36.
Homeland security
37.
human security
38.
information security
39.
information security and privacy
40.
initial level of security
41.
internal security
42.
international security
43.
investment and innovation security
44.
IPv6 security
45.
IT security
46.
IT security management
47.
job security
48.
long-term security
49.
maritime cyber security
50.
maritime cyber security operations centers
51.
Maritime Security Operations Center (M-SOC)
52.
medium level of security
53.
Middle Eastern security
54.
Mobile security
55.
national cyber security strategy
56.
national security
57.
NATO. Science for Peace and Security Program
58.
network security
59.
network security monitoring
60.
OSCE (Organization for Security and Co-operation in Europe)
61.
passenger’s security
62.
policy-based routing security
63.
political and security cultures
64.
post-quantum security
65.
power system security
66.
quantitative security
67.
regional security
68.
RISC-V Security Verification
69.
safety and security in sea transportation
70.
safety and security testing
71.
security
72.
security adaptation
73.
security alert prioritization
74.
security analysis
75.
security and justice (AFSJ)
76.
Security and political science
77.
security and privacy
78.
security and privacy in smart grids
79.
Security Assertion
80.
Security Assertion Mining
81.
security closure
82.
Security Coverage
83.
security dilemma
84.
Security evaluation
85.
security evaluation instruments
86.
Security Level Evaluation
87.
Security limitations
88.
security log analysis
89.
security management
90.
security model
91.
security monitoring
92.
security notion
93.
security objectives
94.
security of supply
95.
security operation center
96.
security operations center
97.
security patterns
98.
security policy
99.
security problem definition
100.
security proof
101.
security protocols
102.
security requirements
103.
security requirements engineering
104.
security research
105.
security risk assessment
106.
security risk management
107.
security risks
108.
security science and technology
109.
security strategies
110.
security systems
111.
security systems for military objects
112.
security testing
113.
security training
114.
security verification
115.
security-by-design
116.
social security planning
117.
societal security
118.
software security
119.
software security level
120.
software security subcharacteristics
121.
sufficient level of security
122.
system of economic security
123.
system security
124.
terrorism security
125.
transmission System Security
126.
voting privacy and security
127.
accident data
128.
adversarial data perturbation
129.
AI data centers
130.
AI-based data curation
131.
AIS data
132.
AIS data format optimization
133.
Aligned data
134.
ALS data enhancements
135.
Amazon Kinesis Data Analytics
136.
application data
137.
audio and visual data
138.
automated data processing
139.
big data
140.
big data analysis
141.
big data analytics
142.
big data science
143.
big geo-data
144.
borehole data
145.
building data quality
146.
building lifecycle data
147.
call data record
148.
catalogue of data sources
149.
cellular phone data
150.
clinical data capture
151.
clinical data exchange
152.
compositional data
153.
conceptual data model
154.
construction data management
155.
consumption data
156.
control and data path tests
157.
critical data studies
158.
cross-border data exchange
159.
data
160.
data assimilation
161.
data protection
162.
data acquisition
163.
data acquisition efficiency
164.
data acquisition system
165.
data acquisition systems
166.
data aggregation
167.
data alignment
168.
Data Altruism
169.
Data Altruism Consent
170.
data analysis
171.
data analytics
172.
data analytics and machine learning
173.
data anisotropy
174.
data annotation
175.
data assimilation
176.
data attacks
177.
data augmentation
178.
Data biases
179.
data breach handling
180.
data capabilities
181.
data capture
182.
data center
183.
data center (DC)
184.
data center applications
185.
data centers
186.
data centre
187.
data centres
188.
data classification
189.
data clustering
190.
data collection
191.
data commons
192.
data compression
193.
data compression and normalization
194.
data conversion
195.
data copy
196.
data curation
197.
data curing
198.
data dictionaries
199.
data discovery
200.
Data dissemination
201.
Data distribution structure
202.
data donation
203.
Data drift
204.
data driven planning
205.
data dropouts
206.
Data Ecosystem
207.
data embassy
208.
data engineering
209.
data enrichment
210.
data envelopment analysis
211.
data ethics
212.
data ethnography
213.
data exchange
214.
data exchange framework
215.
Data exchange layers
216.
data exchange platform
217.
data experts
218.
data filtering
219.
data fitting approach
220.
data flow diagram
221.
data flow languages
222.
data flow visualization
223.
data flows
224.
data fusion
225.
data generative model
226.
data governance
227.
data governance act
228.
data harmonization
229.
data hiding
230.
data integration
231.
data integrity
232.
data intermediary
233.
data Interoperability
234.
data justice
235.
data labeling
236.
data limitations in public sector
237.
data lineage
238.
data literacy
239.
data logger
240.
data logistics
241.
data management
242.
data mappings
243.
Data Mart
244.
Data Mart (DM)
245.
data mesh
246.
data migration
247.
data mining
248.
data mining and knowledge discovery
249.
data modeling
250.
data models
251.
data modem
252.
data movements
253.
data noise
254.
data offloading
255.
data ownership
256.
data platform
257.
data privacy
258.
data processing
259.
data product
260.
data protection
261.
data publishing
262.
data quality
263.
data quality management
264.
data quality maturity model
265.
data rate
266.
data representativeness
267.
data reuse
268.
data re-use
269.
data routing
270.
data scarce environments
271.
data science
272.
data scraping
273.
data set
274.
data set generation
275.
data sets
276.
data sharing
277.
data simulation
278.
data simultaneity
279.
data sort
280.
data sources
281.
data spaces
282.
data storage
283.
data storage systems
284.
data stream mining
285.
data streams
286.
data structures
287.
data studies
288.
data subject
289.
data subjects
290.
data synthesis
291.
data to decision
292.
data types
293.
data validity
294.
data valorization
295.
data warehouse
296.
data warenhouse
297.
data visualization
298.
data-augmentation
299.
data-based computational psychiatry
300.
data-centric construction
301.
data-centric systems
302.
data-controlled circuit partition
303.
data-controlled segmentation
304.
data-driven
305.
data-driven characterization
306.
data-driven condition monitoring
307.
data-driven control
308.
Data-driven decision-making
309.
data-driven diagnostics
310.
data-driven imputation
311.
Data-driven method
312.
data-driven model
313.
data-driven modeling
314.
data-driven optimization
315.
data-driven policy
316.
data-driven public services
317.
data-driven strategic planning
318.
data-driven techniques
319.
data-exchange infrastructures
320.
data-exchange solutions
321.
data-flow architecture
322.
data‐fusion
323.
data-independent acquisition
324.
Data-information-knowledgewisdom (DIKW)
325.
data-intelligence
326.
data-mining
327.
data-science
328.
data-sharing
329.
diagnostic data
330.
digital data exchange
331.
discrete data
332.
distributed data aggregation
333.
distributed data fusion
334.
distributed data mining
335.
distributed data mining (DDM)
336.
distributional data
337.
DNA microarray data
338.
easy data augmentation
339.
educational data mining
340.
educational data-mining
341.
empirical data
342.
enterprise data analysis
343.
European Health Data Space
344.
European Health Data Space (EHDS)
345.
eventdriven data
346.
event-driven data
347.
experimental data
348.
exploratory data analysis
349.
fair data
350.
false data injection attack
351.
field data
352.
financial data
353.
floating car data (FCD)
354.
flood data platform
355.
FMI open data
356.
functional data analysis
357.
GDPR (General Data Protection Regulation)
358.
general data protection regulation
359.
general data protection regulation (GDPR)
360.
genome data
361.
global data hub
362.
global navigation data
363.
GNSS-levelling data
364.
GNSS-RO data
365.
GRUAN data
366.
health data
367.
health data accessibility
368.
Health data anonymization
369.
health data custodianship
370.
health data governance
371.
health data integrity and transparency
372.
health data interoperability
373.
health data policy
374.
health data semantic interoperability
375.
health data stewardship
376.
healthcare data
377.
heat meter data
378.
heterogeneous data
379.
heterogeneous sensor data
380.
high-dimensional data
381.
high-frequency data
382.
high-level test data generation
383.
historical data
384.
hyperspectral data
385.
imbalanced data
386.
implications of energy data
387.
initial data
388.
initial data for AI
389.
initial data model
390.
in-network data processing
391.
insurance data
392.
knowledge discovery and data mining
393.
linked data
394.
linked open data
395.
linked open statistical data
396.
linked data
397.
lossless data compression
398.
low-pass data filtering
399.
Master Data Management
400.
medical claims data
401.
medical data
402.
Medical Data Reuse
403.
meta-data
404.
metered data
405.
methods: data analysis
406.
microplastic data uncertainty
407.
mobile data
408.
mobile phone big data
409.
mobile phone data
410.
mobile phone usage data
411.
mobile positioning data
412.
multisource data fusion
413.
multivariate data analysis
414.
Nigeria's National data protection regulation
415.
on/off-chain data storages
416.
open data
417.
open data ecosystem
418.
open data format
419.
open data policies
420.
open government data
421.
open government data (OGD)
422.
open-data
423.
open-data platform
424.
OSM data
425.
oversharing personal data
426.
panel data
427.
parallel data processing
428.
passenger data
429.
patient-generated health data (PGHD)
430.
personal data
431.
personal data disclosure
432.
personal data processing
433.
personal data protection
434.
Personal Data Protection Act
435.
personal health data space
436.
plan data
437.
point cloud data
438.
pollen data
439.
process and data modelling
440.
Product Data Management (PDM)
441.
public data-set
442.
random data
443.
real-time data
444.
real-time data collection
445.
reconstruction of gap-free data
446.
reference architecture for global health data space
447.
remote data transmission
448.
sampled-data control
449.
satellite data
450.
semantic data modelling
451.
semantic health data
452.
sensitive data
453.
sequential data
454.
small data
455.
small data machine learning
456.
small training data set
457.
smart data analytics
458.
smart meter data
459.
social media data
460.
Spatial data
461.
spatial data analysis
462.
statistical data
463.
stochastic image data
464.
structured data
465.
student data analysis
466.
supervised learning data
467.
supervisory control and data acquisition (SCADA)
468.
surrogate data
469.
sustainable data governance
470.
sustainable data storage
471.
symbolic data
472.
symbolic data analysis
473.
synthetic data
474.
temperature historical data series
475.
three-way data
476.
time-selective data fusion
477.
training data
478.
Transcriptome data
479.
tree-like data structures
480.
underwater data center
481.
urban data
482.
urban data acquisition
483.
weather data
484.
web traffic data
485.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
486.
virtual data embassy
487.
Virtual Data Explorer
488.
18O data
489.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT