Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
data security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
4
Vaata veel..
(2/415)
Ekspordi
ekspordi kõik päringu tulemused
(4)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
raamat
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
raamat
2
artikkel kogumikus EST
/
artikkel kogumikus ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
3
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 4, kuvan
1 - 4
võtmesõna
411
1.
data security
2.
security of data
3.
metadata model for security measures
4.
security dataset
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security monitoring
17.
cyber security strategies
18.
cyber-security
19.
development of security cameras
20.
drinking water security
21.
economic security
22.
economic security of enterprise
23.
emotional security
24.
energy security
25.
energy security indicator
26.
Estonian information security standard
27.
graded security
28.
hardware security
29.
hardware security primitive
30.
human security
31.
information security
32.
internal security
33.
international security
34.
investment and innovation security
35.
IPv6 security
36.
IT security
37.
IT security management
38.
job security
39.
long-term security
40.
Middle Eastern security
41.
Mobile security
42.
national cyber security strategy
43.
national security
44.
NATO. Science for Peace and Security Program
45.
network security
46.
network security monitoring
47.
OSCE (Organization for Security and Co-operation in Europe)
48.
passenger’s security
49.
policy-based routing security
50.
political and security cultures
51.
post-quantum security
52.
power system security
53.
quantitative security
54.
regional security
55.
RISC-V Security Verification
56.
safety and security testing
57.
security
58.
security adaptation
59.
security alert prioritization
60.
security analysis
61.
security and justice (AFSJ)
62.
Security and political science
63.
security and privacy
64.
security and privacy in smart grids
65.
Security Assertion Mining
66.
security closure
67.
Security Coverage
68.
security dilemma
69.
Security evaluation
70.
security evaluation instruments
71.
security log analysis
72.
security management
73.
security model
74.
security monitoring
75.
security notion
76.
security objectives
77.
security of supply
78.
security operation center
79.
security operations center
80.
security patterns
81.
security policy
82.
security problem definition
83.
security proof
84.
security protocols
85.
security requirements
86.
security requirements engineering
87.
security risk assessment
88.
security risk management
89.
security risks
90.
security strategies
91.
security systems for military objects
92.
security testing
93.
security training
94.
security verification
95.
security-by-design
96.
social security planning
97.
societal security
98.
system of economic security
99.
system security
100.
terrorism security
101.
transmission System Security
102.
voting privacy and security
103.
accident data
104.
adversarial data perturbation
105.
AI-based data curation
106.
AIS data
107.
Aligned data
108.
ALS data enhancements
109.
Amazon Kinesis Data Analytics
110.
application data
111.
audio and visual data
112.
big data
113.
big data analysis
114.
big data analytics
115.
big data science
116.
big geo-data
117.
borehole data
118.
building lifecycle data
119.
call data record
120.
catalogue of data sources
121.
cellular phone data
122.
clinical data capture
123.
clinical data exchange
124.
compositional data
125.
conceptual data model
126.
construction data management
127.
control and data path tests
128.
critical data studies
129.
cross-border data exchange
130.
data
131.
data assimilation
132.
data protection
133.
data acquisition
134.
data acquisition system
135.
data acquisition systems
136.
data aggregation
137.
data alignment
138.
data analysis
139.
data analytics
140.
data anisotropy
141.
data annotation
142.
data assimilation
143.
data attacks
144.
data augmentation
145.
data breach handling
146.
data capabilities
147.
data capture
148.
data center
149.
data center (DC)
150.
data centers
151.
data centre
152.
data centres
153.
data classification
154.
data clustering
155.
data collection
156.
data commons
157.
data compression
158.
data conversion
159.
data copy
160.
data dictionaries
161.
data discovery
162.
Data dissemination
163.
Data distribution structure
164.
data donation
165.
Data drift
166.
data driven planning
167.
data embassy
168.
data engineering
169.
data enrichment
170.
data envelopment analysis
171.
data ethnography
172.
data exchange
173.
data exchange framework
174.
Data exchange layers
175.
data exchange platform
176.
data experts
177.
data filtering
178.
data fitting approach
179.
data flow languages
180.
data flow visualization
181.
data flows
182.
data fusion
183.
data generative model
184.
data governance
185.
data governance act
186.
data hiding
187.
data integration
188.
data integrity
189.
data intermediary
190.
data Interoperability
191.
data justice
192.
data labeling
193.
data lineage
194.
data logger
195.
data logistics
196.
data management
197.
data mappings
198.
Data Mart
199.
Data Mart (DM)
200.
data mesh
201.
data migration
202.
data mining
203.
data modeling
204.
data models
205.
data modem
206.
data movements
207.
data noise
208.
data offloading
209.
data ownership
210.
data platform
211.
data privacy
212.
data processing
213.
data product
214.
data protection
215.
data quality
216.
data quality management
217.
data quality maturity model
218.
data rate
219.
data reuse
220.
data re-use
221.
data routing
222.
data science
223.
data scraping
224.
data set
225.
data set generation
226.
data sets
227.
data sharing
228.
data simulation
229.
data simultaneity
230.
data sort
231.
data sources
232.
data spaces
233.
data storage
234.
data storage systems
235.
data stream mining
236.
data streams
237.
data studies
238.
data subject
239.
data subjects
240.
data synthesis
241.
data to decision
242.
data types
243.
data validity
244.
data valorization
245.
data warehouse
246.
data warenhouse
247.
data visualization
248.
data-based computational psychiatry
249.
data-centric construction
250.
data-centric systems
251.
data-controlled circuit partition
252.
data-controlled segmentation
253.
data-driven
254.
data-driven characterization
255.
data-driven condition monitoring
256.
Data-driven decision-making
257.
Data-driven method
258.
data-driven model
259.
data-driven modeling
260.
data-driven optimization
261.
data-driven techniques
262.
data-exchange infrastructures
263.
data-exchange solutions
264.
data-flow architecture
265.
data‐fusion
266.
data-independent acquisition
267.
Data-information-knowledgewisdom (DIKW)
268.
data-intelligence
269.
data-mining
270.
data-science
271.
diagnostic data
272.
digital data exchange
273.
discrete data
274.
distributed data aggregation
275.
distributed data fusion
276.
distributed data mining
277.
distributed data mining (DDM)
278.
DNA microarray data
279.
educational data mining
280.
enterprise data analysis
281.
European Health Data Space
282.
European Health Data Space (EHDS)
283.
eventdriven data
284.
event-driven data
285.
experimental data
286.
exploratory data analysis
287.
false data injection attack
288.
field data
289.
financial data
290.
floating car data (FCD)
291.
flood data platform
292.
FMI open data
293.
functional data analysis
294.
GDPR (General Data Protection Regulation)
295.
general data protection regulation
296.
genome data
297.
global data hub
298.
GNSS-levelling data
299.
GNSS-RO data
300.
GRUAN data
301.
health data
302.
health data accessibility
303.
Health data anonymization
304.
health data custodianship
305.
health data governance
306.
health data interoperability
307.
health data policy
308.
health data stewardship
309.
healthcare data
310.
heterogeneous sensor data
311.
high-dimensional data
312.
high-frequency data
313.
high-level test data generation
314.
historical data
315.
hyperspectral data
316.
imbalanced data
317.
implications of energy data
318.
initial data
319.
initial data for AI
320.
initial data model
321.
in-network data processing
322.
insurance data
323.
knowledge discovery and data mining
324.
linked data
325.
linked open data
326.
linked open statistical data
327.
linked data
328.
lossless data compression
329.
low-pass data filtering
330.
Master Data Management
331.
medical claims data
332.
medical data
333.
Medical Data Reuse
334.
meta-data
335.
metered data
336.
methods: data analysis
337.
microplastic data uncertainty
338.
mobile data
339.
mobile phone big data
340.
mobile phone data
341.
mobile phone usage data
342.
mobile positioning data
343.
multisource data fusion
344.
multivariate data analysis
345.
Nigeria's National data protection regulation
346.
open data
347.
open data ecosystem
348.
open data format
349.
open data policies
350.
open government data
351.
open government data (OGD)
352.
OSM data
353.
oversharing personal data
354.
panel data
355.
parallel data processing
356.
passenger data
357.
patient-generated health data (PGHD)
358.
personal data
359.
personal data disclosure
360.
personal data processing
361.
personal data protection
362.
Personal Data Protection Act
363.
plan data
364.
point cloud data
365.
pollen data
366.
process and data modelling
367.
Product Data Management (PDM)
368.
public data-set
369.
random data
370.
real-time data
371.
real-time data collection
372.
reconstruction of gap-free data
373.
reference architecture for global health data space
374.
remote data transmission
375.
satellite data
376.
semantic data modelling
377.
semantic health data
378.
sequential data
379.
small data machine learning
380.
small training data set
381.
smart data analytics
382.
smart meter data
383.
social media data
384.
Spatial data
385.
spatial data analysis
386.
statistical data
387.
stochastic image data
388.
structured data
389.
student data analysis
390.
supervised learning data
391.
supervisory control and data acquisition (SCADA)
392.
surrogate data
393.
sustainable data governance
394.
symbolic data
395.
symbolic data analysis
396.
synthetic data
397.
temperature historical data series
398.
time-selective data fusion
399.
training data
400.
Transcriptome data
401.
tree-like data structures
402.
underwater data center
403.
urban data
404.
urban data acquisition
405.
weather data
406.
web traffic data
407.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
408.
virtual data embassy
409.
Virtual Data Explorer
410.
18O data
411.
(big) data
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT