Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security of data (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/322)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
A security verification template to assess cache architecture vulnerabilities
Ghasempouri, Tara
;
Raik, Jaan
;
Paul, Kolin
;
Reinbrecht, Cezar
;
Hamdioui, Said
;
Taouil, M.
2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), April 22nd – 24th 2020 Novi Sad, Serbia : Proceedings
2020
/
art. 9095707, 6 p
https://doi.org/10.1109/DDECS50862.2020.9095707
book article
Number of records 1, displaying
1 - 1
keyword
319
1.
security of data
2.
data security
3.
ad-hoc sensor networks security
4.
Blockchain security
5.
cache security
6.
communication system security
7.
comprehensive system of economic security
8.
computer security
9.
cooperative security dilemma
10.
cyber security
11.
cyber security education
12.
cyber security exercises
13.
cyber security strategies
14.
cyber-security
15.
development of security cameras
16.
drinking water security
17.
economic security
18.
economic security of enterprise
19.
emotional security
20.
energy security
21.
energy security indicator
22.
graded security
23.
hardware security
24.
hardware security primitive
25.
human security
26.
information security
27.
internal security
28.
international security
29.
investment and innovation security
30.
IPv6 security
31.
IT security
32.
job security
33.
long-term security
34.
metadata model for security measures
35.
Middle Eastern security
36.
Mobile security
37.
national cyber security strategy
38.
national security
39.
NATO. Science for Peace and Security Program
40.
network security
41.
network security monitoring
42.
OSCE (Organization for Security and Co-operation in Europe)
43.
passenger’s security
44.
policy-based routing security
45.
political and security cultures
46.
post-quantum security
47.
power system security
48.
quantitative security
49.
regional security
50.
security
51.
security and privacy
52.
security and privacy in smart grids
53.
security closure
54.
Security Coverage
55.
security dataset
56.
security dilemma
57.
Security evaluation
58.
security log analysis
59.
security management
60.
security model
61.
security monitoring
62.
security notion
63.
security objectives
64.
security of supply
65.
security operation center
66.
security patterns
67.
security problem definition
68.
security proof
69.
security protocols
70.
security requirements
71.
security requirements engineering
72.
security risk assessment
73.
security risk management
74.
security strategies
75.
security systems for military objects
76.
security testing
77.
security training
78.
security verification
79.
social security planning
80.
societal security
81.
system of economic security
82.
system security
83.
terrorism security
84.
transmission System Security
85.
voting privacy and security
86.
accident data
87.
AIS data
88.
ALS data enhancements
89.
application data
90.
audio and visual data
91.
big data
92.
big data analysis
93.
big data analytics
94.
borehole data
95.
clinical data capture
96.
conceptual data model
97.
control and data path tests
98.
critical data studies
99.
cross-border data exchange
100.
data
101.
data assimilation
102.
data protection
103.
data acquisition
104.
data acquisition system
105.
data aggregation
106.
data alignment
107.
data analysis
108.
data analytics
109.
data anisotropy
110.
data annotation
111.
data assimilation
112.
data augmentation
113.
data center
114.
data centers
115.
data centre
116.
data centres
117.
data classification
118.
data clustering
119.
data collection
120.
data commons
121.
data compression
122.
data conversion
123.
data copy
124.
data dictionaries
125.
data discovery
126.
Data dissemination
127.
Data distribution structure
128.
Data drift
129.
data driven planning
130.
data embassy
131.
data engineering
132.
data envelopment analysis
133.
data ethnography
134.
data exchange
135.
data exchange framework
136.
Data exchange layers
137.
data exchange platform
138.
data experts
139.
data filtering
140.
data flow languages
141.
data flow visualization
142.
data fusion
143.
data generative model
144.
data governance
145.
data integration
146.
data integrity
147.
data justice
148.
data lineage
149.
data logger
150.
data logistics
151.
data management
152.
data mappings
153.
Data Mart
154.
data mesh
155.
data mining
156.
data modeling
157.
data models
158.
data modem
159.
data noise
160.
data ownership
161.
data platform
162.
data privacy
163.
data processing
164.
data product
165.
data protection
166.
data quality
167.
data quality management
168.
data quality maturity model
169.
data rate
170.
data reuse
171.
data re-use
172.
data science
173.
data scraping
174.
data sets
175.
data simulation
176.
data simultaneity
177.
data sort
178.
data sources
179.
data storage
180.
data storage systems
181.
data stream mining
182.
data streams
183.
data studies
184.
data subject
185.
data synthesis
186.
data to decision
187.
data types
188.
data validity
189.
data valorization
190.
data warehouse
191.
data warenhouse
192.
data visualization
193.
data-centric construction
194.
data-centric systems
195.
data-controlled circuit partition
196.
data-controlled segmentation
197.
data-driven
198.
data-driven characterization
199.
Data-driven method
200.
data-driven modeling
201.
data-exchange infrastructures
202.
data-exchange solutions
203.
data‐fusion
204.
data-independent acquisition
205.
Data-information-knowledgewisdom (DIKW)
206.
data-intelligence
207.
data-mining
208.
data-science
209.
diagnostic data
210.
digital data exchange
211.
discrete data
212.
distributed data aggregation
213.
distributed data fusion
214.
distributed data mining
215.
distributed data mining (DDM)
216.
DNA microarray data
217.
educational data mining
218.
eventdriven data
219.
event-driven data
220.
experimental data
221.
exploratory data analysis
222.
false data injection attack
223.
field data
224.
financial data
225.
floating car data (FCD)
226.
FMI open data
227.
functional data analysis
228.
GDPR (General Data Protection Regulation)
229.
general data protection regulation
230.
global data hub
231.
GNSS-levelling data
232.
health data
233.
Health data anonymization
234.
health data interoperability
235.
healthcare data
236.
heterogeneous sensor data
237.
high-dimensional data
238.
high-frequency data
239.
high-level test data generation
240.
historical data
241.
hyperspectral data
242.
imbalanced data
243.
implications of energy data
244.
initial data
245.
in-network data processing
246.
insurance data
247.
knowledge discovery and data mining
248.
linked data
249.
linked open data
250.
linked open statistical data
251.
linked data
252.
lossless data compression
253.
low-pass data filtering
254.
Master Data Management
255.
medical claims data
256.
medical data
257.
Medical Data Reuse
258.
meta-data
259.
microplastic data uncertainty
260.
mobile phone big data
261.
mobile phone data
262.
mobile phone usage data
263.
mobile positioning data
264.
multisource data fusion
265.
multivariate data analysis
266.
Nigeria's National data protection regulation
267.
open data
268.
open data ecosystem
269.
open data format
270.
open data policies
271.
open government data
272.
open government data (OGD)
273.
OSM data
274.
oversharing personal data
275.
panel data
276.
parallel data processing
277.
passenger data
278.
personal data
279.
personal data disclosure
280.
personal data processing
281.
personal data protection
282.
Personal Data Protection Act
283.
point cloud data
284.
process and data modelling
285.
public data-set
286.
real-time data
287.
reconstruction of gap-free data
288.
remote data transmission
289.
satellite data
290.
sequential data
291.
small data machine learning
292.
smart data analytics
293.
smart meter data
294.
social media data
295.
Spatial data
296.
spatial data analysis
297.
statistical data
298.
stochastic image data
299.
structured data
300.
student data analysis
301.
supervised learning data
302.
supervisory control and data acquisition (SCADA)
303.
surrogate data
304.
sustainable data governance
305.
symbolic data
306.
symbolic data analysis
307.
synthetic data
308.
time-selective data fusion
309.
training data
310.
Transcriptome data
311.
tree-like data structures
312.
urban data
313.
urban data acquisition
314.
weather data
315.
web traffic data
316.
virtual data embassy
317.
Virtual Data Explorer
318.
18O data
319.
(big) data
subject term
3
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Greenergy Data Centers
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT