Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
data security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/418)
Export
export all inquiry results
(4)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book article EST
/
book article ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
3
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
4
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 4, displaying
1 - 4
keyword
414
1.
data security
2.
security of data
3.
metadata model for security measures
4.
security dataset
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security monitoring
17.
cyber security strategies
18.
cyber-security
19.
development of security cameras
20.
drinking water security
21.
economic security
22.
economic security of enterprise
23.
emotional security
24.
energy security
25.
energy security indicator
26.
Estonian information security standard
27.
graded security
28.
hardware security
29.
hardware security primitive
30.
human security
31.
information security
32.
internal security
33.
international security
34.
investment and innovation security
35.
IPv6 security
36.
IT security
37.
IT security management
38.
job security
39.
long-term security
40.
Middle Eastern security
41.
Mobile security
42.
national cyber security strategy
43.
national security
44.
NATO. Science for Peace and Security Program
45.
network security
46.
network security monitoring
47.
OSCE (Organization for Security and Co-operation in Europe)
48.
passenger’s security
49.
policy-based routing security
50.
political and security cultures
51.
post-quantum security
52.
power system security
53.
quantitative security
54.
regional security
55.
RISC-V Security Verification
56.
safety and security testing
57.
security
58.
security adaptation
59.
security alert prioritization
60.
security analysis
61.
security and justice (AFSJ)
62.
Security and political science
63.
security and privacy
64.
security and privacy in smart grids
65.
Security Assertion Mining
66.
security closure
67.
Security Coverage
68.
security dilemma
69.
Security evaluation
70.
security evaluation instruments
71.
Security limitations
72.
security log analysis
73.
security management
74.
security model
75.
security monitoring
76.
security notion
77.
security objectives
78.
security of supply
79.
security operation center
80.
security operations center
81.
security patterns
82.
security policy
83.
security problem definition
84.
security proof
85.
security protocols
86.
security requirements
87.
security requirements engineering
88.
security risk assessment
89.
security risk management
90.
security risks
91.
security strategies
92.
security systems for military objects
93.
security testing
94.
security training
95.
security verification
96.
security-by-design
97.
social security planning
98.
societal security
99.
system of economic security
100.
system security
101.
terrorism security
102.
transmission System Security
103.
voting privacy and security
104.
accident data
105.
adversarial data perturbation
106.
AI-based data curation
107.
AIS data
108.
Aligned data
109.
ALS data enhancements
110.
Amazon Kinesis Data Analytics
111.
application data
112.
audio and visual data
113.
big data
114.
big data analysis
115.
big data analytics
116.
big data science
117.
big geo-data
118.
borehole data
119.
building lifecycle data
120.
call data record
121.
catalogue of data sources
122.
cellular phone data
123.
clinical data capture
124.
clinical data exchange
125.
compositional data
126.
conceptual data model
127.
construction data management
128.
control and data path tests
129.
critical data studies
130.
cross-border data exchange
131.
data
132.
data assimilation
133.
data protection
134.
data acquisition
135.
data acquisition system
136.
data acquisition systems
137.
data aggregation
138.
data alignment
139.
data analysis
140.
data analytics
141.
data anisotropy
142.
data annotation
143.
data assimilation
144.
data attacks
145.
data augmentation
146.
data breach handling
147.
data capabilities
148.
data capture
149.
data center
150.
data center (DC)
151.
data centers
152.
data centre
153.
data centres
154.
data classification
155.
data clustering
156.
data collection
157.
data commons
158.
data compression
159.
data conversion
160.
data copy
161.
data dictionaries
162.
data discovery
163.
Data dissemination
164.
Data distribution structure
165.
data donation
166.
Data drift
167.
data driven planning
168.
data embassy
169.
data engineering
170.
data enrichment
171.
data envelopment analysis
172.
data ethnography
173.
data exchange
174.
data exchange framework
175.
Data exchange layers
176.
data exchange platform
177.
data experts
178.
data filtering
179.
data fitting approach
180.
data flow languages
181.
data flow visualization
182.
data flows
183.
data fusion
184.
data generative model
185.
data governance
186.
data governance act
187.
data hiding
188.
data integration
189.
data integrity
190.
data intermediary
191.
data Interoperability
192.
data justice
193.
data labeling
194.
data lineage
195.
data logger
196.
data logistics
197.
data management
198.
data mappings
199.
Data Mart
200.
Data Mart (DM)
201.
data mesh
202.
data migration
203.
data mining
204.
data modeling
205.
data models
206.
data modem
207.
data movements
208.
data noise
209.
data offloading
210.
data ownership
211.
data platform
212.
data privacy
213.
data processing
214.
data product
215.
data protection
216.
data quality
217.
data quality management
218.
data quality maturity model
219.
data rate
220.
data reuse
221.
data re-use
222.
data routing
223.
data science
224.
data scraping
225.
data set
226.
data set generation
227.
data sets
228.
data sharing
229.
data simulation
230.
data simultaneity
231.
data sort
232.
data sources
233.
data spaces
234.
data storage
235.
data storage systems
236.
data stream mining
237.
data streams
238.
data studies
239.
data subject
240.
data subjects
241.
data synthesis
242.
data to decision
243.
data types
244.
data validity
245.
data valorization
246.
data warehouse
247.
data warenhouse
248.
data visualization
249.
data-augmentation
250.
data-based computational psychiatry
251.
data-centric construction
252.
data-centric systems
253.
data-controlled circuit partition
254.
data-controlled segmentation
255.
data-driven
256.
data-driven characterization
257.
data-driven condition monitoring
258.
data-driven control
259.
Data-driven decision-making
260.
Data-driven method
261.
data-driven model
262.
data-driven modeling
263.
data-driven optimization
264.
data-driven techniques
265.
data-exchange infrastructures
266.
data-exchange solutions
267.
data-flow architecture
268.
data‐fusion
269.
data-independent acquisition
270.
Data-information-knowledgewisdom (DIKW)
271.
data-intelligence
272.
data-mining
273.
data-science
274.
diagnostic data
275.
digital data exchange
276.
discrete data
277.
distributed data aggregation
278.
distributed data fusion
279.
distributed data mining
280.
distributed data mining (DDM)
281.
DNA microarray data
282.
educational data mining
283.
enterprise data analysis
284.
European Health Data Space
285.
European Health Data Space (EHDS)
286.
eventdriven data
287.
event-driven data
288.
experimental data
289.
exploratory data analysis
290.
false data injection attack
291.
field data
292.
financial data
293.
floating car data (FCD)
294.
flood data platform
295.
FMI open data
296.
functional data analysis
297.
GDPR (General Data Protection Regulation)
298.
general data protection regulation
299.
genome data
300.
global data hub
301.
GNSS-levelling data
302.
GNSS-RO data
303.
GRUAN data
304.
health data
305.
health data accessibility
306.
Health data anonymization
307.
health data custodianship
308.
health data governance
309.
health data interoperability
310.
health data policy
311.
health data stewardship
312.
healthcare data
313.
heterogeneous sensor data
314.
high-dimensional data
315.
high-frequency data
316.
high-level test data generation
317.
historical data
318.
hyperspectral data
319.
imbalanced data
320.
implications of energy data
321.
initial data
322.
initial data for AI
323.
initial data model
324.
in-network data processing
325.
insurance data
326.
knowledge discovery and data mining
327.
linked data
328.
linked open data
329.
linked open statistical data
330.
linked data
331.
lossless data compression
332.
low-pass data filtering
333.
Master Data Management
334.
medical claims data
335.
medical data
336.
Medical Data Reuse
337.
meta-data
338.
metered data
339.
methods: data analysis
340.
microplastic data uncertainty
341.
mobile data
342.
mobile phone big data
343.
mobile phone data
344.
mobile phone usage data
345.
mobile positioning data
346.
multisource data fusion
347.
multivariate data analysis
348.
Nigeria's National data protection regulation
349.
open data
350.
open data ecosystem
351.
open data format
352.
open data policies
353.
open government data
354.
open government data (OGD)
355.
OSM data
356.
oversharing personal data
357.
panel data
358.
parallel data processing
359.
passenger data
360.
patient-generated health data (PGHD)
361.
personal data
362.
personal data disclosure
363.
personal data processing
364.
personal data protection
365.
Personal Data Protection Act
366.
plan data
367.
point cloud data
368.
pollen data
369.
process and data modelling
370.
Product Data Management (PDM)
371.
public data-set
372.
random data
373.
real-time data
374.
real-time data collection
375.
reconstruction of gap-free data
376.
reference architecture for global health data space
377.
remote data transmission
378.
satellite data
379.
semantic data modelling
380.
semantic health data
381.
sequential data
382.
small data machine learning
383.
small training data set
384.
smart data analytics
385.
smart meter data
386.
social media data
387.
Spatial data
388.
spatial data analysis
389.
statistical data
390.
stochastic image data
391.
structured data
392.
student data analysis
393.
supervised learning data
394.
supervisory control and data acquisition (SCADA)
395.
surrogate data
396.
sustainable data governance
397.
symbolic data
398.
symbolic data analysis
399.
synthetic data
400.
temperature historical data series
401.
time-selective data fusion
402.
training data
403.
Transcriptome data
404.
tree-like data structures
405.
underwater data center
406.
urban data
407.
urban data acquisition
408.
weather data
409.
web traffic data
410.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
411.
virtual data embassy
412.
Virtual Data Explorer
413.
18O data
414.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT