Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
data security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
4
Vaata veel..
(2/458)
Ekspordi
ekspordi kõik päringu tulemused
(4)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
raamat
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
raamat
2
artikkel kogumikus EST
/
artikkel kogumikus ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
3
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 4, kuvan
1 - 4
võtmesõna
454
1.
data security
2.
data and information security
3.
security of data
4.
metadata model for security measures
5.
security dataset
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
communication system security
11.
comprehensive system of economic security
12.
computer security
13.
cooperative security dilemma
14.
cyber security
15.
cyber security education
16.
cyber security exercises
17.
cyber security monitoring
18.
cyber security strategies
19.
cyber-security
20.
development of security cameras
21.
digital security practices
22.
drinking water security
23.
economic security
24.
economic security of enterprise
25.
emotional security
26.
energy security
27.
energy security indicator
28.
Estonian information security standard
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
high level of security
33.
Homeland security
34.
human security
35.
information security
36.
information security and privacy
37.
initial level of security
38.
internal security
39.
international security
40.
investment and innovation security
41.
IPv6 security
42.
IT security
43.
IT security management
44.
job security
45.
long-term security
46.
medium level of security
47.
Middle Eastern security
48.
Mobile security
49.
national cyber security strategy
50.
national security
51.
NATO. Science for Peace and Security Program
52.
network security
53.
network security monitoring
54.
OSCE (Organization for Security and Co-operation in Europe)
55.
passenger’s security
56.
policy-based routing security
57.
political and security cultures
58.
post-quantum security
59.
power system security
60.
quantitative security
61.
regional security
62.
RISC-V Security Verification
63.
Safety and Security in Sea Transportation
64.
safety and security testing
65.
security
66.
security adaptation
67.
security alert prioritization
68.
security analysis
69.
security and justice (AFSJ)
70.
Security and political science
71.
security and privacy
72.
security and privacy in smart grids
73.
Security Assertion Mining
74.
security closure
75.
Security Coverage
76.
security dilemma
77.
Security evaluation
78.
security evaluation instruments
79.
Security limitations
80.
security log analysis
81.
security management
82.
security model
83.
security monitoring
84.
security notion
85.
security objectives
86.
security of supply
87.
security operation center
88.
security operations center
89.
security patterns
90.
security policy
91.
security problem definition
92.
security proof
93.
security protocols
94.
security requirements
95.
security requirements engineering
96.
security risk assessment
97.
security risk management
98.
security risks
99.
security science and technology
100.
security strategies
101.
security systems for military objects
102.
security testing
103.
security training
104.
security verification
105.
security-by-design
106.
social security planning
107.
societal security
108.
software security
109.
software security level
110.
software security subcharacteristics
111.
sufficient level of security
112.
system of economic security
113.
system security
114.
terrorism security
115.
transmission System Security
116.
voting privacy and security
117.
accident data
118.
adversarial data perturbation
119.
AI-based data curation
120.
AIS data
121.
AIS data format optimization
122.
Aligned data
123.
ALS data enhancements
124.
Amazon Kinesis Data Analytics
125.
application data
126.
audio and visual data
127.
big data
128.
big data analysis
129.
big data analytics
130.
big data science
131.
big geo-data
132.
borehole data
133.
building lifecycle data
134.
call data record
135.
catalogue of data sources
136.
cellular phone data
137.
clinical data capture
138.
clinical data exchange
139.
compositional data
140.
conceptual data model
141.
construction data management
142.
control and data path tests
143.
critical data studies
144.
cross-border data exchange
145.
data
146.
data assimilation
147.
data protection
148.
data acquisition
149.
data acquisition system
150.
data acquisition systems
151.
data aggregation
152.
data alignment
153.
Data Altruism
154.
Data Altruism Consent
155.
data analysis
156.
data analytics
157.
data analytics and machine learning
158.
data anisotropy
159.
data annotation
160.
data assimilation
161.
data attacks
162.
data augmentation
163.
data breach handling
164.
data capabilities
165.
data capture
166.
data center
167.
data center (DC)
168.
data center applications
169.
data centers
170.
data centre
171.
data centres
172.
data classification
173.
data clustering
174.
data collection
175.
data commons
176.
data compression
177.
data compression and normalization
178.
data conversion
179.
data copy
180.
data curation
181.
data dictionaries
182.
data discovery
183.
Data dissemination
184.
Data distribution structure
185.
data donation
186.
Data drift
187.
data driven planning
188.
data dropouts
189.
Data Ecosystem
190.
data embassy
191.
data engineering
192.
data enrichment
193.
data envelopment analysis
194.
data ethnography
195.
data exchange
196.
data exchange framework
197.
Data exchange layers
198.
data exchange platform
199.
data experts
200.
data filtering
201.
data fitting approach
202.
data flow languages
203.
data flow visualization
204.
data flows
205.
data fusion
206.
data generative model
207.
data governance
208.
data governance act
209.
data harmonization
210.
data hiding
211.
data integration
212.
data integrity
213.
data intermediary
214.
data Interoperability
215.
data justice
216.
data labeling
217.
data limitations in public sector
218.
data lineage
219.
data literacy
220.
data logger
221.
data logistics
222.
data management
223.
data mappings
224.
Data Mart
225.
Data Mart (DM)
226.
data mesh
227.
data migration
228.
data mining
229.
data mining and knowledge discovery
230.
data modeling
231.
data models
232.
data modem
233.
data movements
234.
data noise
235.
data offloading
236.
data ownership
237.
data platform
238.
data privacy
239.
data processing
240.
data product
241.
data protection
242.
data publishing
243.
data quality
244.
data quality management
245.
data quality maturity model
246.
data rate
247.
data representativeness
248.
data reuse
249.
data re-use
250.
data routing
251.
data scarce environments
252.
data science
253.
data scraping
254.
data set
255.
data set generation
256.
data sets
257.
data sharing
258.
data simulation
259.
data simultaneity
260.
data sort
261.
data sources
262.
data spaces
263.
data storage
264.
data storage systems
265.
data stream mining
266.
data streams
267.
data structures
268.
data studies
269.
data subject
270.
data subjects
271.
data synthesis
272.
data to decision
273.
data types
274.
data validity
275.
data valorization
276.
data warehouse
277.
data warenhouse
278.
data visualization
279.
data-augmentation
280.
data-based computational psychiatry
281.
data-centric construction
282.
data-centric systems
283.
data-controlled circuit partition
284.
data-controlled segmentation
285.
data-driven
286.
data-driven characterization
287.
data-driven condition monitoring
288.
data-driven control
289.
Data-driven decision-making
290.
data-driven imputation
291.
Data-driven method
292.
data-driven model
293.
data-driven modeling
294.
data-driven optimization
295.
data-driven policy
296.
data-driven public services
297.
data-driven techniques
298.
data-exchange infrastructures
299.
data-exchange solutions
300.
data-flow architecture
301.
data‐fusion
302.
data-independent acquisition
303.
Data-information-knowledgewisdom (DIKW)
304.
data-intelligence
305.
data-mining
306.
data-science
307.
diagnostic data
308.
digital data exchange
309.
discrete data
310.
distributed data aggregation
311.
distributed data fusion
312.
distributed data mining
313.
distributed data mining (DDM)
314.
distributional data
315.
DNA microarray data
316.
educational data mining
317.
educational data-mining
318.
enterprise data analysis
319.
European Health Data Space
320.
European Health Data Space (EHDS)
321.
eventdriven data
322.
event-driven data
323.
experimental data
324.
exploratory data analysis
325.
false data injection attack
326.
field data
327.
financial data
328.
floating car data (FCD)
329.
flood data platform
330.
FMI open data
331.
functional data analysis
332.
GDPR (General Data Protection Regulation)
333.
general data protection regulation
334.
genome data
335.
global data hub
336.
GNSS-levelling data
337.
GNSS-RO data
338.
GRUAN data
339.
health data
340.
health data accessibility
341.
Health data anonymization
342.
health data custodianship
343.
health data governance
344.
health data integrity and transparency
345.
health data interoperability
346.
health data policy
347.
health data stewardship
348.
healthcare data
349.
heterogeneous sensor data
350.
high-dimensional data
351.
high-frequency data
352.
high-level test data generation
353.
historical data
354.
hyperspectral data
355.
imbalanced data
356.
implications of energy data
357.
initial data
358.
initial data for AI
359.
initial data model
360.
in-network data processing
361.
insurance data
362.
knowledge discovery and data mining
363.
linked data
364.
linked open data
365.
linked open statistical data
366.
linked data
367.
lossless data compression
368.
low-pass data filtering
369.
Master Data Management
370.
medical claims data
371.
medical data
372.
Medical Data Reuse
373.
meta-data
374.
metered data
375.
methods: data analysis
376.
microplastic data uncertainty
377.
mobile data
378.
mobile phone big data
379.
mobile phone data
380.
mobile phone usage data
381.
mobile positioning data
382.
multisource data fusion
383.
multivariate data analysis
384.
Nigeria's National data protection regulation
385.
open data
386.
open data ecosystem
387.
open data format
388.
open data policies
389.
open government data
390.
open government data (OGD)
391.
open-data
392.
open-data platform
393.
OSM data
394.
oversharing personal data
395.
panel data
396.
parallel data processing
397.
passenger data
398.
patient-generated health data (PGHD)
399.
personal data
400.
personal data disclosure
401.
personal data processing
402.
personal data protection
403.
Personal Data Protection Act
404.
plan data
405.
point cloud data
406.
pollen data
407.
process and data modelling
408.
Product Data Management (PDM)
409.
public data-set
410.
random data
411.
real-time data
412.
real-time data collection
413.
reconstruction of gap-free data
414.
reference architecture for global health data space
415.
remote data transmission
416.
satellite data
417.
semantic data modelling
418.
semantic health data
419.
sequential data
420.
small data machine learning
421.
small training data set
422.
smart data analytics
423.
smart meter data
424.
social media data
425.
Spatial data
426.
spatial data analysis
427.
statistical data
428.
stochastic image data
429.
structured data
430.
student data analysis
431.
supervised learning data
432.
supervisory control and data acquisition (SCADA)
433.
surrogate data
434.
sustainable data governance
435.
sustainable data storage
436.
symbolic data
437.
symbolic data analysis
438.
synthetic data
439.
temperature historical data series
440.
three-way data
441.
time-selective data fusion
442.
training data
443.
Transcriptome data
444.
tree-like data structures
445.
underwater data center
446.
urban data
447.
urban data acquisition
448.
weather data
449.
web traffic data
450.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
451.
virtual data embassy
452.
Virtual Data Explorer
453.
18O data
454.
(big) data
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT