Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
data security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
3
Look more..
(2/342)
Export
export all inquiry results
(3)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
3
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 3, displaying
1 - 3
keyword
339
1.
data security
2.
security of data
3.
metadata model for security measures
4.
security dataset
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security strategies
17.
cyber-security
18.
development of security cameras
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
graded security
26.
hardware security
27.
hardware security primitive
28.
human security
29.
information security
30.
internal security
31.
international security
32.
investment and innovation security
33.
IPv6 security
34.
IT security
35.
job security
36.
long-term security
37.
Middle Eastern security
38.
Mobile security
39.
national cyber security strategy
40.
national security
41.
NATO. Science for Peace and Security Program
42.
network security
43.
network security monitoring
44.
OSCE (Organization for Security and Co-operation in Europe)
45.
passenger’s security
46.
policy-based routing security
47.
political and security cultures
48.
post-quantum security
49.
power system security
50.
quantitative security
51.
regional security
52.
RISC-V Security Verification
53.
security
54.
security and privacy
55.
security and privacy in smart grids
56.
Security Assertion Mining
57.
security closure
58.
Security Coverage
59.
security dilemma
60.
Security evaluation
61.
security log analysis
62.
security management
63.
security model
64.
security monitoring
65.
security notion
66.
security objectives
67.
security of supply
68.
security operation center
69.
security patterns
70.
security problem definition
71.
security proof
72.
security protocols
73.
security requirements
74.
security requirements engineering
75.
security risk assessment
76.
security risk management
77.
security strategies
78.
security systems for military objects
79.
security testing
80.
security training
81.
security verification
82.
social security planning
83.
societal security
84.
system of economic security
85.
system security
86.
terrorism security
87.
transmission System Security
88.
voting privacy and security
89.
accident data
90.
adversarial data perturbation
91.
AIS data
92.
Aligned data
93.
ALS data enhancements
94.
application data
95.
audio and visual data
96.
big data
97.
big data analysis
98.
big data analytics
99.
borehole data
100.
building lifecycle data
101.
call data record
102.
clinical data capture
103.
conceptual data model
104.
control and data path tests
105.
critical data studies
106.
cross-border data exchange
107.
data
108.
data assimilation
109.
data protection
110.
data acquisition
111.
data acquisition system
112.
data aggregation
113.
data alignment
114.
data analysis
115.
data analytics
116.
data anisotropy
117.
data annotation
118.
data assimilation
119.
data attacks
120.
data augmentation
121.
data capture
122.
data center
123.
data center (DC)
124.
data centers
125.
data centre
126.
data centres
127.
data classification
128.
data clustering
129.
data collection
130.
data commons
131.
data compression
132.
data conversion
133.
data copy
134.
data dictionaries
135.
data discovery
136.
Data dissemination
137.
Data distribution structure
138.
Data drift
139.
data driven planning
140.
data embassy
141.
data engineering
142.
data envelopment analysis
143.
data ethnography
144.
data exchange
145.
data exchange framework
146.
Data exchange layers
147.
data exchange platform
148.
data experts
149.
data filtering
150.
data flow languages
151.
data flow visualization
152.
data fusion
153.
data generative model
154.
data governance
155.
data integration
156.
data integrity
157.
data justice
158.
data lineage
159.
data logger
160.
data logistics
161.
data management
162.
data mappings
163.
Data Mart
164.
data mesh
165.
data mining
166.
data modeling
167.
data models
168.
data modem
169.
data noise
170.
data offloading
171.
data ownership
172.
data platform
173.
data privacy
174.
data processing
175.
data product
176.
data protection
177.
data quality
178.
data quality management
179.
data quality maturity model
180.
data rate
181.
data reuse
182.
data re-use
183.
data routing
184.
data science
185.
data scraping
186.
data sets
187.
data sharing
188.
data simulation
189.
data simultaneity
190.
data sort
191.
data sources
192.
data storage
193.
data storage systems
194.
data stream mining
195.
data streams
196.
data studies
197.
data subject
198.
data synthesis
199.
data to decision
200.
data types
201.
data validity
202.
data valorization
203.
data warehouse
204.
data warenhouse
205.
data visualization
206.
data-based computational psychiatry
207.
data-centric construction
208.
data-centric systems
209.
data-controlled circuit partition
210.
data-controlled segmentation
211.
data-driven
212.
data-driven characterization
213.
Data-driven method
214.
data-driven modeling
215.
data-exchange infrastructures
216.
data-exchange solutions
217.
data‐fusion
218.
data-independent acquisition
219.
Data-information-knowledgewisdom (DIKW)
220.
data-intelligence
221.
data-mining
222.
data-science
223.
diagnostic data
224.
digital data exchange
225.
discrete data
226.
distributed data aggregation
227.
distributed data fusion
228.
distributed data mining
229.
distributed data mining (DDM)
230.
DNA microarray data
231.
educational data mining
232.
eventdriven data
233.
event-driven data
234.
experimental data
235.
exploratory data analysis
236.
false data injection attack
237.
False data injection attack; Machine learning; Matlab; Python; State estimation; Sudden load change
238.
field data
239.
financial data
240.
floating car data (FCD)
241.
FMI open data
242.
functional data analysis
243.
GDPR (General Data Protection Regulation)
244.
general data protection regulation
245.
global data hub
246.
GNSS-levelling data
247.
health data
248.
Health data anonymization
249.
health data interoperability
250.
healthcare data
251.
heterogeneous sensor data
252.
high-dimensional data
253.
high-frequency data
254.
high-level test data generation
255.
historical data
256.
hyperspectral data
257.
imbalanced data
258.
implications of energy data
259.
initial data
260.
in-network data processing
261.
insurance data
262.
knowledge discovery and data mining
263.
linked data
264.
linked open data
265.
linked open statistical data
266.
linked data
267.
lossless data compression
268.
low-pass data filtering
269.
Master Data Management
270.
medical claims data
271.
medical data
272.
Medical Data Reuse
273.
meta-data
274.
microplastic data uncertainty
275.
mobile data
276.
mobile phone big data
277.
mobile phone data
278.
mobile phone usage data
279.
mobile positioning data
280.
multisource data fusion
281.
multivariate data analysis
282.
Nigeria's National data protection regulation
283.
open data
284.
open data ecosystem
285.
open data format
286.
open data policies
287.
open government data
288.
open government data (OGD)
289.
OSM data
290.
oversharing personal data
291.
panel data
292.
parallel data processing
293.
passenger data
294.
personal data
295.
personal data disclosure
296.
personal data processing
297.
personal data protection
298.
Personal Data Protection Act
299.
plan data
300.
point cloud data
301.
pollen data
302.
process and data modelling
303.
public data-set
304.
real-time data
305.
reconstruction of gap-free data
306.
remote data transmission
307.
satellite data
308.
semantic health data
309.
sequential data
310.
small data machine learning
311.
smart data analytics
312.
smart meter data
313.
social media data
314.
Spatial data
315.
spatial data analysis
316.
statistical data
317.
stochastic image data
318.
structured data
319.
student data analysis
320.
supervised learning data
321.
supervisory control and data acquisition (SCADA)
322.
surrogate data
323.
sustainable data governance
324.
symbolic data
325.
symbolic data analysis
326.
synthetic data
327.
time-selective data fusion
328.
training data
329.
Transcriptome data
330.
tree-like data structures
331.
urban data
332.
urban data acquisition
333.
weather data
334.
web traffic data
335.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
336.
virtual data embassy
337.
Virtual Data Explorer
338.
18O data
339.
(big) data
subject term
3
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Greenergy Data Centers
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT