Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
data security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
4
Vaata veel..
(2/379)
Ekspordi
ekspordi kõik päringu tulemused
(4)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
raamat
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
raamat
2
artikkel kogumikus EST
/
artikkel kogumikus ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
3
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 4, kuvan
1 - 4
võtmesõna
376
1.
data security
2.
security of data
3.
metadata model for security measures
4.
security dataset
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security strategies
17.
cyber-security
18.
development of security cameras
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
Estonian information security standard
26.
graded security
27.
hardware security
28.
hardware security primitive
29.
human security
30.
information security
31.
internal security
32.
international security
33.
investment and innovation security
34.
IPv6 security
35.
IT security
36.
IT security management
37.
job security
38.
long-term security
39.
Middle Eastern security
40.
Mobile security
41.
national cyber security strategy
42.
national security
43.
NATO. Science for Peace and Security Program
44.
network security
45.
network security monitoring
46.
OSCE (Organization for Security and Co-operation in Europe)
47.
passenger’s security
48.
policy-based routing security
49.
political and security cultures
50.
post-quantum security
51.
power system security
52.
quantitative security
53.
regional security
54.
RISC-V Security Verification
55.
safety and security testing
56.
security
57.
security adaptation
58.
security alert prioritization
59.
security analysis
60.
security and justice (AFSJ)
61.
security and privacy
62.
security and privacy in smart grids
63.
Security Assertion Mining
64.
security closure
65.
Security Coverage
66.
security dilemma
67.
Security evaluation
68.
security evaluation instruments
69.
security log analysis
70.
security management
71.
security model
72.
security monitoring
73.
security notion
74.
security objectives
75.
security of supply
76.
security operation center
77.
security operations center
78.
security patterns
79.
security policy
80.
security problem definition
81.
security proof
82.
security protocols
83.
security requirements
84.
security requirements engineering
85.
security risk assessment
86.
security risk management
87.
security strategies
88.
security systems for military objects
89.
security testing
90.
security training
91.
security verification
92.
security-by-design
93.
social security planning
94.
societal security
95.
system of economic security
96.
system security
97.
terrorism security
98.
transmission System Security
99.
voting privacy and security
100.
accident data
101.
adversarial data perturbation
102.
AI-based data curation
103.
AIS data
104.
Aligned data
105.
ALS data enhancements
106.
Amazon Kinesis Data Analytics
107.
application data
108.
audio and visual data
109.
big data
110.
big data analysis
111.
big data analytics
112.
borehole data
113.
building lifecycle data
114.
call data record
115.
catalogue of data sources
116.
clinical data capture
117.
clinical data exchange
118.
compositional data
119.
conceptual data model
120.
control and data path tests
121.
critical data studies
122.
cross-border data exchange
123.
data
124.
data assimilation
125.
data protection
126.
data acquisition
127.
data acquisition system
128.
data acquisition systems
129.
data aggregation
130.
data alignment
131.
data analysis
132.
data analytics
133.
data anisotropy
134.
data annotation
135.
data assimilation
136.
data attacks
137.
data augmentation
138.
data breach handling
139.
data capabilities
140.
data capture
141.
data center
142.
data center (DC)
143.
data centers
144.
data centre
145.
data centres
146.
data classification
147.
data clustering
148.
data collection
149.
data commons
150.
data compression
151.
data conversion
152.
data copy
153.
data dictionaries
154.
data discovery
155.
Data dissemination
156.
Data distribution structure
157.
Data drift
158.
data driven planning
159.
data embassy
160.
data engineering
161.
data envelopment analysis
162.
data ethnography
163.
data exchange
164.
data exchange framework
165.
Data exchange layers
166.
data exchange platform
167.
data experts
168.
data filtering
169.
data fitting approach
170.
data flow languages
171.
data flow visualization
172.
data fusion
173.
data generative model
174.
data governance
175.
data integration
176.
data integrity
177.
data intermediary
178.
data justice
179.
data labeling
180.
data lineage
181.
data logger
182.
data logistics
183.
data management
184.
data mappings
185.
Data Mart
186.
data mesh
187.
data mining
188.
data modeling
189.
data models
190.
data modem
191.
data noise
192.
data offloading
193.
data ownership
194.
data platform
195.
data privacy
196.
data processing
197.
data product
198.
data protection
199.
data quality
200.
data quality management
201.
data quality maturity model
202.
data rate
203.
data reuse
204.
data re-use
205.
data routing
206.
data science
207.
data scraping
208.
data set generation
209.
data sets
210.
data sharing
211.
data simulation
212.
data simultaneity
213.
data sort
214.
data sources
215.
data storage
216.
data storage systems
217.
data stream mining
218.
data streams
219.
data studies
220.
data subject
221.
data synthesis
222.
data to decision
223.
data types
224.
data validity
225.
data valorization
226.
data warehouse
227.
data warenhouse
228.
data visualization
229.
data-based computational psychiatry
230.
data-centric construction
231.
data-centric systems
232.
data-controlled circuit partition
233.
data-controlled segmentation
234.
data-driven
235.
data-driven characterization
236.
Data-driven method
237.
data-driven modeling
238.
data-exchange infrastructures
239.
data-exchange solutions
240.
data‐fusion
241.
data-independent acquisition
242.
Data-information-knowledgewisdom (DIKW)
243.
data-intelligence
244.
data-mining
245.
data-science
246.
diagnostic data
247.
digital data exchange
248.
discrete data
249.
distributed data aggregation
250.
distributed data fusion
251.
distributed data mining
252.
distributed data mining (DDM)
253.
DNA microarray data
254.
educational data mining
255.
enterprise data analysis
256.
European Health Data Space
257.
European Health Data Space (EHDS)
258.
eventdriven data
259.
event-driven data
260.
experimental data
261.
exploratory data analysis
262.
false data injection attack
263.
field data
264.
financial data
265.
floating car data (FCD)
266.
flood data platform
267.
FMI open data
268.
functional data analysis
269.
GDPR (General Data Protection Regulation)
270.
general data protection regulation
271.
genome data
272.
global data hub
273.
GNSS-levelling data
274.
health data
275.
health data accessibility
276.
Health data anonymization
277.
health data custodianship
278.
health data governance
279.
health data interoperability
280.
health data policy
281.
health data stewardship
282.
healthcare data
283.
heterogeneous sensor data
284.
high-dimensional data
285.
high-frequency data
286.
high-level test data generation
287.
historical data
288.
hyperspectral data
289.
imbalanced data
290.
implications of energy data
291.
initial data
292.
in-network data processing
293.
insurance data
294.
knowledge discovery and data mining
295.
linked data
296.
linked open data
297.
linked open statistical data
298.
linked data
299.
lossless data compression
300.
low-pass data filtering
301.
Master Data Management
302.
medical claims data
303.
medical data
304.
Medical Data Reuse
305.
meta-data
306.
metered data
307.
microplastic data uncertainty
308.
mobile data
309.
mobile phone big data
310.
mobile phone data
311.
mobile phone usage data
312.
mobile positioning data
313.
multisource data fusion
314.
multivariate data analysis
315.
Nigeria's National data protection regulation
316.
open data
317.
open data ecosystem
318.
open data format
319.
open data policies
320.
open government data
321.
open government data (OGD)
322.
OSM data
323.
oversharing personal data
324.
panel data
325.
parallel data processing
326.
passenger data
327.
patient-generated health data (PGHD)
328.
personal data
329.
personal data disclosure
330.
personal data processing
331.
personal data protection
332.
Personal Data Protection Act
333.
plan data
334.
point cloud data
335.
pollen data
336.
process and data modelling
337.
public data-set
338.
random data
339.
real-time data
340.
reconstruction of gap-free data
341.
reference architecture for global health data space
342.
remote data transmission
343.
satellite data
344.
semantic health data
345.
sequential data
346.
small data machine learning
347.
small training data set
348.
smart data analytics
349.
smart meter data
350.
social media data
351.
Spatial data
352.
spatial data analysis
353.
statistical data
354.
stochastic image data
355.
structured data
356.
student data analysis
357.
supervised learning data
358.
supervisory control and data acquisition (SCADA)
359.
surrogate data
360.
sustainable data governance
361.
symbolic data
362.
symbolic data analysis
363.
synthetic data
364.
time-selective data fusion
365.
training data
366.
Transcriptome data
367.
tree-like data structures
368.
urban data
369.
urban data acquisition
370.
weather data
371.
web traffic data
372.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
373.
virtual data embassy
374.
Virtual Data Explorer
375.
18O data
376.
(big) data
märksõna
3
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Greenergy Data Centers
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT