Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
data security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/383)
Export
export all inquiry results
(4)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book article EST
/
book article ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
3
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
4
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 4, displaying
1 - 4
keyword
379
1.
data security
2.
security of data
3.
metadata model for security measures
4.
security dataset
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security strategies
17.
cyber-security
18.
development of security cameras
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
Estonian information security standard
26.
graded security
27.
hardware security
28.
hardware security primitive
29.
human security
30.
information security
31.
internal security
32.
international security
33.
investment and innovation security
34.
IPv6 security
35.
IT security
36.
IT security management
37.
job security
38.
long-term security
39.
Middle Eastern security
40.
Mobile security
41.
national cyber security strategy
42.
national security
43.
NATO. Science for Peace and Security Program
44.
network security
45.
network security monitoring
46.
OSCE (Organization for Security and Co-operation in Europe)
47.
passenger’s security
48.
policy-based routing security
49.
political and security cultures
50.
post-quantum security
51.
power system security
52.
quantitative security
53.
regional security
54.
RISC-V Security Verification
55.
safety and security testing
56.
security
57.
security adaptation
58.
security alert prioritization
59.
security analysis
60.
security and justice (AFSJ)
61.
security and privacy
62.
security and privacy in smart grids
63.
Security Assertion Mining
64.
security closure
65.
Security Coverage
66.
security dilemma
67.
Security evaluation
68.
security evaluation instruments
69.
security log analysis
70.
security management
71.
security model
72.
security monitoring
73.
security notion
74.
security objectives
75.
security of supply
76.
security operation center
77.
security operations center
78.
security patterns
79.
security policy
80.
security problem definition
81.
security proof
82.
security protocols
83.
security requirements
84.
security requirements engineering
85.
security risk assessment
86.
security risk management
87.
security strategies
88.
security systems for military objects
89.
security testing
90.
security training
91.
security verification
92.
security-by-design
93.
social security planning
94.
societal security
95.
system of economic security
96.
system security
97.
terrorism security
98.
transmission System Security
99.
voting privacy and security
100.
accident data
101.
adversarial data perturbation
102.
AI-based data curation
103.
AIS data
104.
Aligned data
105.
ALS data enhancements
106.
Amazon Kinesis Data Analytics
107.
application data
108.
audio and visual data
109.
big data
110.
big data analysis
111.
big data analytics
112.
big data science
113.
borehole data
114.
building lifecycle data
115.
call data record
116.
catalogue of data sources
117.
clinical data capture
118.
clinical data exchange
119.
compositional data
120.
conceptual data model
121.
control and data path tests
122.
critical data studies
123.
cross-border data exchange
124.
data
125.
data assimilation
126.
data protection
127.
data acquisition
128.
data acquisition system
129.
data acquisition systems
130.
data aggregation
131.
data alignment
132.
data analysis
133.
data analytics
134.
data anisotropy
135.
data annotation
136.
data assimilation
137.
data attacks
138.
data augmentation
139.
data breach handling
140.
data capabilities
141.
data capture
142.
data center
143.
data center (DC)
144.
data centers
145.
data centre
146.
data centres
147.
data classification
148.
data clustering
149.
data collection
150.
data commons
151.
data compression
152.
data conversion
153.
data copy
154.
data dictionaries
155.
data discovery
156.
Data dissemination
157.
Data distribution structure
158.
Data drift
159.
data driven planning
160.
data embassy
161.
data engineering
162.
data envelopment analysis
163.
data ethnography
164.
data exchange
165.
data exchange framework
166.
Data exchange layers
167.
data exchange platform
168.
data experts
169.
data filtering
170.
data fitting approach
171.
data flow languages
172.
data flow visualization
173.
data fusion
174.
data generative model
175.
data governance
176.
data integration
177.
data integrity
178.
data intermediary
179.
data justice
180.
data labeling
181.
data lineage
182.
data logger
183.
data logistics
184.
data management
185.
data mappings
186.
Data Mart
187.
data mesh
188.
data mining
189.
data modeling
190.
data models
191.
data modem
192.
data noise
193.
data offloading
194.
data ownership
195.
data platform
196.
data privacy
197.
data processing
198.
data product
199.
data protection
200.
data quality
201.
data quality management
202.
data quality maturity model
203.
data rate
204.
data reuse
205.
data re-use
206.
data routing
207.
data science
208.
data scraping
209.
data set
210.
data set generation
211.
data sets
212.
data sharing
213.
data simulation
214.
data simultaneity
215.
data sort
216.
data sources
217.
data storage
218.
data storage systems
219.
data stream mining
220.
data streams
221.
data studies
222.
data subject
223.
data synthesis
224.
data to decision
225.
data types
226.
data validity
227.
data valorization
228.
data warehouse
229.
data warenhouse
230.
data visualization
231.
data-based computational psychiatry
232.
data-centric construction
233.
data-centric systems
234.
data-controlled circuit partition
235.
data-controlled segmentation
236.
data-driven
237.
data-driven characterization
238.
Data-driven method
239.
data-driven modeling
240.
data-exchange infrastructures
241.
data-exchange solutions
242.
data‐fusion
243.
data-independent acquisition
244.
Data-information-knowledgewisdom (DIKW)
245.
data-intelligence
246.
data-mining
247.
data-science
248.
diagnostic data
249.
digital data exchange
250.
discrete data
251.
distributed data aggregation
252.
distributed data fusion
253.
distributed data mining
254.
distributed data mining (DDM)
255.
DNA microarray data
256.
educational data mining
257.
enterprise data analysis
258.
European Health Data Space
259.
European Health Data Space (EHDS)
260.
eventdriven data
261.
event-driven data
262.
experimental data
263.
exploratory data analysis
264.
false data injection attack
265.
field data
266.
financial data
267.
floating car data (FCD)
268.
flood data platform
269.
FMI open data
270.
functional data analysis
271.
GDPR (General Data Protection Regulation)
272.
general data protection regulation
273.
genome data
274.
global data hub
275.
GNSS-levelling data
276.
health data
277.
health data accessibility
278.
Health data anonymization
279.
health data custodianship
280.
health data governance
281.
health data interoperability
282.
health data policy
283.
health data stewardship
284.
healthcare data
285.
heterogeneous sensor data
286.
high-dimensional data
287.
high-frequency data
288.
high-level test data generation
289.
historical data
290.
hyperspectral data
291.
imbalanced data
292.
implications of energy data
293.
initial data
294.
in-network data processing
295.
insurance data
296.
knowledge discovery and data mining
297.
linked data
298.
linked open data
299.
linked open statistical data
300.
linked data
301.
lossless data compression
302.
low-pass data filtering
303.
Master Data Management
304.
medical claims data
305.
medical data
306.
Medical Data Reuse
307.
meta-data
308.
metered data
309.
microplastic data uncertainty
310.
mobile data
311.
mobile phone big data
312.
mobile phone data
313.
mobile phone usage data
314.
mobile positioning data
315.
multisource data fusion
316.
multivariate data analysis
317.
Nigeria's National data protection regulation
318.
open data
319.
open data ecosystem
320.
open data format
321.
open data policies
322.
open government data
323.
open government data (OGD)
324.
OSM data
325.
oversharing personal data
326.
panel data
327.
parallel data processing
328.
passenger data
329.
patient-generated health data (PGHD)
330.
personal data
331.
personal data disclosure
332.
personal data processing
333.
personal data protection
334.
Personal Data Protection Act
335.
plan data
336.
point cloud data
337.
pollen data
338.
process and data modelling
339.
public data-set
340.
random data
341.
real-time data
342.
reconstruction of gap-free data
343.
reference architecture for global health data space
344.
remote data transmission
345.
satellite data
346.
semantic health data
347.
sequential data
348.
small data machine learning
349.
small training data set
350.
smart data analytics
351.
smart meter data
352.
social media data
353.
Spatial data
354.
spatial data analysis
355.
statistical data
356.
stochastic image data
357.
structured data
358.
student data analysis
359.
supervised learning data
360.
supervisory control and data acquisition (SCADA)
361.
surrogate data
362.
sustainable data governance
363.
symbolic data
364.
symbolic data analysis
365.
synthetic data
366.
time-selective data fusion
367.
training data
368.
Transcriptome data
369.
tree-like data structures
370.
underwater data center
371.
urban data
372.
urban data acquisition
373.
weather data
374.
web traffic data
375.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
376.
virtual data embassy
377.
Virtual Data Explorer
378.
18O data
379.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT