Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security of data (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/423)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Black-box separations and their adaptability to the non-uniform model
Buldas, Ahto
;
Niitsoo, Margus
Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings
2013
/
p. 152-167
https://doi.org/10.1007/978-3-642-39059-3_11
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
2
book article
A security verification template to assess cache architecture vulnerabilities
Ghasempouri, Tara
;
Raik, Jaan
;
Paul, Kolin
;
Reinbrecht, Cezar
;
Hamdioui, Said
;
Taouil, M.
2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), April 22nd – 24th 2020 Novi Sad, Serbia : Proceedings
2020
/
art. 9095707, 6 p
https://doi.org/10.1109/DDECS50862.2020.9095707
book article
Number of records 2, displaying
1 - 2
keyword
419
1.
security of data
2.
data security
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security monitoring
15.
cyber security strategies
16.
cyber-security
17.
development of security cameras
18.
drinking water security
19.
economic security
20.
economic security of enterprise
21.
emotional security
22.
energy security
23.
energy security indicator
24.
Estonian information security standard
25.
graded security
26.
hardware security
27.
hardware security primitive
28.
human security
29.
information security
30.
information security and privacy
31.
internal security
32.
international security
33.
investment and innovation security
34.
IPv6 security
35.
IT security
36.
IT security management
37.
job security
38.
long-term security
39.
metadata model for security measures
40.
Middle Eastern security
41.
Mobile security
42.
national cyber security strategy
43.
national security
44.
NATO. Science for Peace and Security Program
45.
network security
46.
network security monitoring
47.
OSCE (Organization for Security and Co-operation in Europe)
48.
passenger’s security
49.
policy-based routing security
50.
political and security cultures
51.
post-quantum security
52.
power system security
53.
quantitative security
54.
regional security
55.
RISC-V Security Verification
56.
safety and security testing
57.
security
58.
security adaptation
59.
security alert prioritization
60.
security analysis
61.
security and justice (AFSJ)
62.
Security and political science
63.
security and privacy
64.
security and privacy in smart grids
65.
Security Assertion Mining
66.
security closure
67.
Security Coverage
68.
security dataset
69.
security dilemma
70.
Security evaluation
71.
security evaluation instruments
72.
Security limitations
73.
security log analysis
74.
security management
75.
security model
76.
security monitoring
77.
security notion
78.
security objectives
79.
security of supply
80.
security operation center
81.
security operations center
82.
security patterns
83.
security policy
84.
security problem definition
85.
security proof
86.
security protocols
87.
security requirements
88.
security requirements engineering
89.
security risk assessment
90.
security risk management
91.
security risks
92.
security strategies
93.
security systems for military objects
94.
security testing
95.
security training
96.
security verification
97.
security-by-design
98.
social security planning
99.
societal security
100.
system of economic security
101.
system security
102.
terrorism security
103.
transmission System Security
104.
voting privacy and security
105.
accident data
106.
adversarial data perturbation
107.
AI-based data curation
108.
AIS data
109.
Aligned data
110.
ALS data enhancements
111.
Amazon Kinesis Data Analytics
112.
application data
113.
audio and visual data
114.
big data
115.
big data analysis
116.
big data analytics
117.
big data science
118.
big geo-data
119.
borehole data
120.
building lifecycle data
121.
call data record
122.
catalogue of data sources
123.
cellular phone data
124.
clinical data capture
125.
clinical data exchange
126.
compositional data
127.
conceptual data model
128.
construction data management
129.
control and data path tests
130.
critical data studies
131.
cross-border data exchange
132.
data
133.
data assimilation
134.
data protection
135.
data acquisition
136.
data acquisition system
137.
data acquisition systems
138.
data aggregation
139.
data alignment
140.
data analysis
141.
data analytics
142.
data analytics and machine learning
143.
data anisotropy
144.
data annotation
145.
data assimilation
146.
data attacks
147.
data augmentation
148.
data breach handling
149.
data capabilities
150.
data capture
151.
data center
152.
data center (DC)
153.
data centers
154.
data centre
155.
data centres
156.
data classification
157.
data clustering
158.
data collection
159.
data commons
160.
data compression
161.
data conversion
162.
data copy
163.
data dictionaries
164.
data discovery
165.
Data dissemination
166.
Data distribution structure
167.
data donation
168.
Data drift
169.
data driven planning
170.
data embassy
171.
data engineering
172.
data enrichment
173.
data envelopment analysis
174.
data ethnography
175.
data exchange
176.
data exchange framework
177.
Data exchange layers
178.
data exchange platform
179.
data experts
180.
data filtering
181.
data fitting approach
182.
data flow languages
183.
data flow visualization
184.
data flows
185.
data fusion
186.
data generative model
187.
data governance
188.
data governance act
189.
data hiding
190.
data integration
191.
data integrity
192.
data intermediary
193.
data Interoperability
194.
data justice
195.
data labeling
196.
data lineage
197.
data logger
198.
data logistics
199.
data management
200.
data mappings
201.
Data Mart
202.
Data Mart (DM)
203.
data mesh
204.
data migration
205.
data mining
206.
data modeling
207.
data models
208.
data modem
209.
data movements
210.
data noise
211.
data offloading
212.
data ownership
213.
data platform
214.
data privacy
215.
data processing
216.
data product
217.
data protection
218.
data quality
219.
data quality management
220.
data quality maturity model
221.
data rate
222.
data reuse
223.
data re-use
224.
data routing
225.
data science
226.
data scraping
227.
data set
228.
data set generation
229.
data sets
230.
data sharing
231.
data simulation
232.
data simultaneity
233.
data sort
234.
data sources
235.
data spaces
236.
data storage
237.
data storage systems
238.
data stream mining
239.
data streams
240.
data structures
241.
data studies
242.
data subject
243.
data subjects
244.
data synthesis
245.
data to decision
246.
data types
247.
data validity
248.
data valorization
249.
data warehouse
250.
data warenhouse
251.
data visualization
252.
data-augmentation
253.
data-based computational psychiatry
254.
data-centric construction
255.
data-centric systems
256.
data-controlled circuit partition
257.
data-controlled segmentation
258.
data-driven
259.
data-driven characterization
260.
data-driven condition monitoring
261.
data-driven control
262.
Data-driven decision-making
263.
Data-driven method
264.
data-driven model
265.
data-driven modeling
266.
data-driven optimization
267.
data-driven public services
268.
data-driven techniques
269.
data-exchange infrastructures
270.
data-exchange solutions
271.
data-flow architecture
272.
data‐fusion
273.
data-independent acquisition
274.
Data-information-knowledgewisdom (DIKW)
275.
data-intelligence
276.
data-mining
277.
data-science
278.
diagnostic data
279.
digital data exchange
280.
discrete data
281.
distributed data aggregation
282.
distributed data fusion
283.
distributed data mining
284.
distributed data mining (DDM)
285.
DNA microarray data
286.
educational data mining
287.
enterprise data analysis
288.
European Health Data Space
289.
European Health Data Space (EHDS)
290.
eventdriven data
291.
event-driven data
292.
experimental data
293.
exploratory data analysis
294.
false data injection attack
295.
field data
296.
financial data
297.
floating car data (FCD)
298.
flood data platform
299.
FMI open data
300.
functional data analysis
301.
GDPR (General Data Protection Regulation)
302.
general data protection regulation
303.
genome data
304.
global data hub
305.
GNSS-levelling data
306.
GNSS-RO data
307.
GRUAN data
308.
health data
309.
health data accessibility
310.
Health data anonymization
311.
health data custodianship
312.
health data governance
313.
health data interoperability
314.
health data policy
315.
health data stewardship
316.
healthcare data
317.
heterogeneous sensor data
318.
high-dimensional data
319.
high-frequency data
320.
high-level test data generation
321.
historical data
322.
hyperspectral data
323.
imbalanced data
324.
implications of energy data
325.
initial data
326.
initial data for AI
327.
initial data model
328.
in-network data processing
329.
insurance data
330.
knowledge discovery and data mining
331.
linked data
332.
linked open data
333.
linked open statistical data
334.
linked data
335.
lossless data compression
336.
low-pass data filtering
337.
Master Data Management
338.
medical claims data
339.
medical data
340.
Medical Data Reuse
341.
meta-data
342.
metered data
343.
methods: data analysis
344.
microplastic data uncertainty
345.
mobile data
346.
mobile phone big data
347.
mobile phone data
348.
mobile phone usage data
349.
mobile positioning data
350.
multisource data fusion
351.
multivariate data analysis
352.
Nigeria's National data protection regulation
353.
open data
354.
open data ecosystem
355.
open data format
356.
open data policies
357.
open government data
358.
open government data (OGD)
359.
open-data
360.
OSM data
361.
oversharing personal data
362.
panel data
363.
parallel data processing
364.
passenger data
365.
patient-generated health data (PGHD)
366.
personal data
367.
personal data disclosure
368.
personal data processing
369.
personal data protection
370.
Personal Data Protection Act
371.
plan data
372.
point cloud data
373.
pollen data
374.
process and data modelling
375.
Product Data Management (PDM)
376.
public data-set
377.
random data
378.
real-time data
379.
real-time data collection
380.
reconstruction of gap-free data
381.
reference architecture for global health data space
382.
remote data transmission
383.
satellite data
384.
semantic data modelling
385.
semantic health data
386.
sequential data
387.
small data machine learning
388.
small training data set
389.
smart data analytics
390.
smart meter data
391.
social media data
392.
Spatial data
393.
spatial data analysis
394.
statistical data
395.
stochastic image data
396.
structured data
397.
student data analysis
398.
supervised learning data
399.
supervisory control and data acquisition (SCADA)
400.
surrogate data
401.
sustainable data governance
402.
symbolic data
403.
symbolic data analysis
404.
synthetic data
405.
temperature historical data series
406.
time-selective data fusion
407.
training data
408.
Transcriptome data
409.
tree-like data structures
410.
underwater data center
411.
urban data
412.
urban data acquisition
413.
weather data
414.
web traffic data
415.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
416.
virtual data embassy
417.
Virtual Data Explorer
418.
18O data
419.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT