Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security of data (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/416)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Black-box separations and their adaptability to the non-uniform model
Buldas, Ahto
;
Niitsoo, Margus
Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings
2013
/
p. 152-167
https://doi.org/10.1007/978-3-642-39059-3_11
Conference Proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
2
artikkel kogumikus
A security verification template to assess cache architecture vulnerabilities
Ghasempouri, Tara
;
Raik, Jaan
;
Paul, Kolin
;
Reinbrecht, Cezar
;
Hamdioui, Said
;
Taouil, M.
2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), April 22nd – 24th 2020 Novi Sad, Serbia : Proceedings
2020
/
art. 9095707, 6 p
https://doi.org/10.1109/DDECS50862.2020.9095707
artikkel kogumikus
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
412
1.
security of data
2.
data security
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security monitoring
15.
cyber security strategies
16.
cyber-security
17.
development of security cameras
18.
drinking water security
19.
economic security
20.
economic security of enterprise
21.
emotional security
22.
energy security
23.
energy security indicator
24.
Estonian information security standard
25.
graded security
26.
hardware security
27.
hardware security primitive
28.
human security
29.
information security
30.
internal security
31.
international security
32.
investment and innovation security
33.
IPv6 security
34.
IT security
35.
IT security management
36.
job security
37.
long-term security
38.
metadata model for security measures
39.
Middle Eastern security
40.
Mobile security
41.
national cyber security strategy
42.
national security
43.
NATO. Science for Peace and Security Program
44.
network security
45.
network security monitoring
46.
OSCE (Organization for Security and Co-operation in Europe)
47.
passenger’s security
48.
policy-based routing security
49.
political and security cultures
50.
post-quantum security
51.
power system security
52.
quantitative security
53.
regional security
54.
RISC-V Security Verification
55.
safety and security testing
56.
security
57.
security adaptation
58.
security alert prioritization
59.
security analysis
60.
security and justice (AFSJ)
61.
Security and political science
62.
security and privacy
63.
security and privacy in smart grids
64.
Security Assertion Mining
65.
security closure
66.
Security Coverage
67.
security dataset
68.
security dilemma
69.
Security evaluation
70.
security evaluation instruments
71.
security log analysis
72.
security management
73.
security model
74.
security monitoring
75.
security notion
76.
security objectives
77.
security of supply
78.
security operation center
79.
security operations center
80.
security patterns
81.
security policy
82.
security problem definition
83.
security proof
84.
security protocols
85.
security requirements
86.
security requirements engineering
87.
security risk assessment
88.
security risk management
89.
security risks
90.
security strategies
91.
security systems for military objects
92.
security testing
93.
security training
94.
security verification
95.
security-by-design
96.
social security planning
97.
societal security
98.
system of economic security
99.
system security
100.
terrorism security
101.
transmission System Security
102.
voting privacy and security
103.
accident data
104.
adversarial data perturbation
105.
AI-based data curation
106.
AIS data
107.
Aligned data
108.
ALS data enhancements
109.
Amazon Kinesis Data Analytics
110.
application data
111.
audio and visual data
112.
big data
113.
big data analysis
114.
big data analytics
115.
big data science
116.
big geo-data
117.
borehole data
118.
building lifecycle data
119.
call data record
120.
catalogue of data sources
121.
cellular phone data
122.
clinical data capture
123.
clinical data exchange
124.
compositional data
125.
conceptual data model
126.
construction data management
127.
control and data path tests
128.
critical data studies
129.
cross-border data exchange
130.
data
131.
data assimilation
132.
data protection
133.
data acquisition
134.
data acquisition system
135.
data acquisition systems
136.
data aggregation
137.
data alignment
138.
data analysis
139.
data analytics
140.
data anisotropy
141.
data annotation
142.
data assimilation
143.
data attacks
144.
data augmentation
145.
data breach handling
146.
data capabilities
147.
data capture
148.
data center
149.
data center (DC)
150.
data centers
151.
data centre
152.
data centres
153.
data classification
154.
data clustering
155.
data collection
156.
data commons
157.
data compression
158.
data conversion
159.
data copy
160.
data dictionaries
161.
data discovery
162.
Data dissemination
163.
Data distribution structure
164.
data donation
165.
Data drift
166.
data driven planning
167.
data embassy
168.
data engineering
169.
data enrichment
170.
data envelopment analysis
171.
data ethnography
172.
data exchange
173.
data exchange framework
174.
Data exchange layers
175.
data exchange platform
176.
data experts
177.
data filtering
178.
data fitting approach
179.
data flow languages
180.
data flow visualization
181.
data flows
182.
data fusion
183.
data generative model
184.
data governance
185.
data governance act
186.
data hiding
187.
data integration
188.
data integrity
189.
data intermediary
190.
data Interoperability
191.
data justice
192.
data labeling
193.
data lineage
194.
data logger
195.
data logistics
196.
data management
197.
data mappings
198.
Data Mart
199.
Data Mart (DM)
200.
data mesh
201.
data migration
202.
data mining
203.
data modeling
204.
data models
205.
data modem
206.
data movements
207.
data noise
208.
data offloading
209.
data ownership
210.
data platform
211.
data privacy
212.
data processing
213.
data product
214.
data protection
215.
data quality
216.
data quality management
217.
data quality maturity model
218.
data rate
219.
data reuse
220.
data re-use
221.
data routing
222.
data science
223.
data scraping
224.
data set
225.
data set generation
226.
data sets
227.
data sharing
228.
data simulation
229.
data simultaneity
230.
data sort
231.
data sources
232.
data spaces
233.
data storage
234.
data storage systems
235.
data stream mining
236.
data streams
237.
data studies
238.
data subject
239.
data subjects
240.
data synthesis
241.
data to decision
242.
data types
243.
data validity
244.
data valorization
245.
data warehouse
246.
data warenhouse
247.
data visualization
248.
data-based computational psychiatry
249.
data-centric construction
250.
data-centric systems
251.
data-controlled circuit partition
252.
data-controlled segmentation
253.
data-driven
254.
data-driven characterization
255.
data-driven condition monitoring
256.
data-driven control
257.
Data-driven decision-making
258.
Data-driven method
259.
data-driven model
260.
data-driven modeling
261.
data-driven optimization
262.
data-driven techniques
263.
data-exchange infrastructures
264.
data-exchange solutions
265.
data-flow architecture
266.
data‐fusion
267.
data-independent acquisition
268.
Data-information-knowledgewisdom (DIKW)
269.
data-intelligence
270.
data-mining
271.
data-science
272.
diagnostic data
273.
digital data exchange
274.
discrete data
275.
distributed data aggregation
276.
distributed data fusion
277.
distributed data mining
278.
distributed data mining (DDM)
279.
DNA microarray data
280.
educational data mining
281.
enterprise data analysis
282.
European Health Data Space
283.
European Health Data Space (EHDS)
284.
eventdriven data
285.
event-driven data
286.
experimental data
287.
exploratory data analysis
288.
false data injection attack
289.
field data
290.
financial data
291.
floating car data (FCD)
292.
flood data platform
293.
FMI open data
294.
functional data analysis
295.
GDPR (General Data Protection Regulation)
296.
general data protection regulation
297.
genome data
298.
global data hub
299.
GNSS-levelling data
300.
GNSS-RO data
301.
GRUAN data
302.
health data
303.
health data accessibility
304.
Health data anonymization
305.
health data custodianship
306.
health data governance
307.
health data interoperability
308.
health data policy
309.
health data stewardship
310.
healthcare data
311.
heterogeneous sensor data
312.
high-dimensional data
313.
high-frequency data
314.
high-level test data generation
315.
historical data
316.
hyperspectral data
317.
imbalanced data
318.
implications of energy data
319.
initial data
320.
initial data for AI
321.
initial data model
322.
in-network data processing
323.
insurance data
324.
knowledge discovery and data mining
325.
linked data
326.
linked open data
327.
linked open statistical data
328.
linked data
329.
lossless data compression
330.
low-pass data filtering
331.
Master Data Management
332.
medical claims data
333.
medical data
334.
Medical Data Reuse
335.
meta-data
336.
metered data
337.
methods: data analysis
338.
microplastic data uncertainty
339.
mobile data
340.
mobile phone big data
341.
mobile phone data
342.
mobile phone usage data
343.
mobile positioning data
344.
multisource data fusion
345.
multivariate data analysis
346.
Nigeria's National data protection regulation
347.
open data
348.
open data ecosystem
349.
open data format
350.
open data policies
351.
open government data
352.
open government data (OGD)
353.
OSM data
354.
oversharing personal data
355.
panel data
356.
parallel data processing
357.
passenger data
358.
patient-generated health data (PGHD)
359.
personal data
360.
personal data disclosure
361.
personal data processing
362.
personal data protection
363.
Personal Data Protection Act
364.
plan data
365.
point cloud data
366.
pollen data
367.
process and data modelling
368.
Product Data Management (PDM)
369.
public data-set
370.
random data
371.
real-time data
372.
real-time data collection
373.
reconstruction of gap-free data
374.
reference architecture for global health data space
375.
remote data transmission
376.
satellite data
377.
semantic data modelling
378.
semantic health data
379.
sequential data
380.
small data machine learning
381.
small training data set
382.
smart data analytics
383.
smart meter data
384.
social media data
385.
Spatial data
386.
spatial data analysis
387.
statistical data
388.
stochastic image data
389.
structured data
390.
student data analysis
391.
supervised learning data
392.
supervisory control and data acquisition (SCADA)
393.
surrogate data
394.
sustainable data governance
395.
symbolic data
396.
symbolic data analysis
397.
synthetic data
398.
temperature historical data series
399.
time-selective data fusion
400.
training data
401.
Transcriptome data
402.
tree-like data structures
403.
underwater data center
404.
urban data
405.
urban data acquisition
406.
weather data
407.
web traffic data
408.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
409.
virtual data embassy
410.
Virtual Data Explorer
411.
18O data
412.
(big) data
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT