Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security of data (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/412)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Black-box separations and their adaptability to the non-uniform model
Buldas, Ahto
;
Niitsoo, Margus
Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings
2013
/
p. 152-167
https://doi.org/10.1007/978-3-642-39059-3_11
Conference Proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
2
artikkel kogumikus
A security verification template to assess cache architecture vulnerabilities
Ghasempouri, Tara
;
Raik, Jaan
;
Paul, Kolin
;
Reinbrecht, Cezar
;
Hamdioui, Said
;
Taouil, M.
2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), April 22nd – 24th 2020 Novi Sad, Serbia : Proceedings
2020
/
art. 9095707, 6 p
https://doi.org/10.1109/DDECS50862.2020.9095707
artikkel kogumikus
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
408
1.
security of data
2.
data security
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security monitoring
15.
cyber security strategies
16.
cyber-security
17.
development of security cameras
18.
drinking water security
19.
economic security
20.
economic security of enterprise
21.
emotional security
22.
energy security
23.
energy security indicator
24.
Estonian information security standard
25.
graded security
26.
hardware security
27.
hardware security primitive
28.
human security
29.
information security
30.
internal security
31.
international security
32.
investment and innovation security
33.
IPv6 security
34.
IT security
35.
IT security management
36.
job security
37.
long-term security
38.
metadata model for security measures
39.
Middle Eastern security
40.
Mobile security
41.
national cyber security strategy
42.
national security
43.
NATO. Science for Peace and Security Program
44.
network security
45.
network security monitoring
46.
OSCE (Organization for Security and Co-operation in Europe)
47.
passenger’s security
48.
policy-based routing security
49.
political and security cultures
50.
post-quantum security
51.
power system security
52.
quantitative security
53.
regional security
54.
RISC-V Security Verification
55.
safety and security testing
56.
security
57.
security adaptation
58.
security alert prioritization
59.
security analysis
60.
security and justice (AFSJ)
61.
Security and political science
62.
security and privacy
63.
security and privacy in smart grids
64.
Security Assertion Mining
65.
security closure
66.
Security Coverage
67.
security dataset
68.
security dilemma
69.
Security evaluation
70.
security evaluation instruments
71.
security log analysis
72.
security management
73.
security model
74.
security monitoring
75.
security notion
76.
security objectives
77.
security of supply
78.
security operation center
79.
security operations center
80.
security patterns
81.
security policy
82.
security problem definition
83.
security proof
84.
security protocols
85.
security requirements
86.
security requirements engineering
87.
security risk assessment
88.
security risk management
89.
security strategies
90.
security systems for military objects
91.
security testing
92.
security training
93.
security verification
94.
security-by-design
95.
social security planning
96.
societal security
97.
system of economic security
98.
system security
99.
terrorism security
100.
transmission System Security
101.
voting privacy and security
102.
accident data
103.
adversarial data perturbation
104.
AI-based data curation
105.
AIS data
106.
Aligned data
107.
ALS data enhancements
108.
Amazon Kinesis Data Analytics
109.
application data
110.
audio and visual data
111.
big data
112.
big data analysis
113.
big data analytics
114.
big data science
115.
big geo-data
116.
borehole data
117.
building lifecycle data
118.
call data record
119.
catalogue of data sources
120.
cellular phone data
121.
clinical data capture
122.
clinical data exchange
123.
compositional data
124.
conceptual data model
125.
construction data management
126.
control and data path tests
127.
critical data studies
128.
cross-border data exchange
129.
data
130.
data assimilation
131.
data protection
132.
data acquisition
133.
data acquisition system
134.
data acquisition systems
135.
data aggregation
136.
data alignment
137.
data analysis
138.
data analytics
139.
data anisotropy
140.
data annotation
141.
data assimilation
142.
data attacks
143.
data augmentation
144.
data breach handling
145.
data capabilities
146.
data capture
147.
data center
148.
data center (DC)
149.
data centers
150.
data centre
151.
data centres
152.
data classification
153.
data clustering
154.
data collection
155.
data commons
156.
data compression
157.
data conversion
158.
data copy
159.
data dictionaries
160.
data discovery
161.
Data dissemination
162.
Data distribution structure
163.
data donation
164.
Data drift
165.
data driven planning
166.
data embassy
167.
data engineering
168.
data enrichment
169.
data envelopment analysis
170.
data ethnography
171.
data exchange
172.
data exchange framework
173.
Data exchange layers
174.
data exchange platform
175.
data experts
176.
data filtering
177.
data fitting approach
178.
data flow languages
179.
data flow visualization
180.
data flows
181.
data fusion
182.
data generative model
183.
data governance
184.
data hiding
185.
data integration
186.
data integrity
187.
data intermediary
188.
data Interoperability
189.
data justice
190.
data labeling
191.
data lineage
192.
data logger
193.
data logistics
194.
data management
195.
data mappings
196.
Data Mart
197.
Data Mart (DM)
198.
data mesh
199.
data migration
200.
data mining
201.
data modeling
202.
data models
203.
data modem
204.
data movements
205.
data noise
206.
data offloading
207.
data ownership
208.
data platform
209.
data privacy
210.
data processing
211.
data product
212.
data protection
213.
data quality
214.
data quality management
215.
data quality maturity model
216.
data rate
217.
data reuse
218.
data re-use
219.
data routing
220.
data science
221.
data scraping
222.
data set
223.
data set generation
224.
data sets
225.
data sharing
226.
data simulation
227.
data simultaneity
228.
data sort
229.
data sources
230.
data spaces
231.
data storage
232.
data storage systems
233.
data stream mining
234.
data streams
235.
data studies
236.
data subject
237.
data subjects
238.
data synthesis
239.
data to decision
240.
data types
241.
data validity
242.
data valorization
243.
data warehouse
244.
data warenhouse
245.
data visualization
246.
data-based computational psychiatry
247.
data-centric construction
248.
data-centric systems
249.
data-controlled circuit partition
250.
data-controlled segmentation
251.
data-driven
252.
data-driven characterization
253.
data-driven condition monitoring
254.
Data-driven decision-making
255.
Data-driven method
256.
data-driven model
257.
data-driven modeling
258.
data-driven optimization
259.
data-exchange infrastructures
260.
data-exchange solutions
261.
data-flow architecture
262.
data‐fusion
263.
data-independent acquisition
264.
Data-information-knowledgewisdom (DIKW)
265.
data-intelligence
266.
data-mining
267.
data-science
268.
diagnostic data
269.
digital data exchange
270.
discrete data
271.
distributed data aggregation
272.
distributed data fusion
273.
distributed data mining
274.
distributed data mining (DDM)
275.
DNA microarray data
276.
educational data mining
277.
enterprise data analysis
278.
European Health Data Space
279.
European Health Data Space (EHDS)
280.
eventdriven data
281.
event-driven data
282.
experimental data
283.
exploratory data analysis
284.
false data injection attack
285.
field data
286.
financial data
287.
floating car data (FCD)
288.
flood data platform
289.
FMI open data
290.
functional data analysis
291.
GDPR (General Data Protection Regulation)
292.
general data protection regulation
293.
genome data
294.
global data hub
295.
GNSS-levelling data
296.
GNSS-RO data
297.
GRUAN data
298.
health data
299.
health data accessibility
300.
Health data anonymization
301.
health data custodianship
302.
health data governance
303.
health data interoperability
304.
health data policy
305.
health data stewardship
306.
healthcare data
307.
heterogeneous sensor data
308.
high-dimensional data
309.
high-frequency data
310.
high-level test data generation
311.
historical data
312.
hyperspectral data
313.
imbalanced data
314.
implications of energy data
315.
initial data
316.
initial data for AI
317.
initial data model
318.
in-network data processing
319.
insurance data
320.
knowledge discovery and data mining
321.
linked data
322.
linked open data
323.
linked open statistical data
324.
linked data
325.
lossless data compression
326.
low-pass data filtering
327.
Master Data Management
328.
medical claims data
329.
medical data
330.
Medical Data Reuse
331.
meta-data
332.
metered data
333.
methods: data analysis
334.
microplastic data uncertainty
335.
mobile data
336.
mobile phone big data
337.
mobile phone data
338.
mobile phone usage data
339.
mobile positioning data
340.
multisource data fusion
341.
multivariate data analysis
342.
Nigeria's National data protection regulation
343.
open data
344.
open data ecosystem
345.
open data format
346.
open data policies
347.
open government data
348.
open government data (OGD)
349.
OSM data
350.
oversharing personal data
351.
panel data
352.
parallel data processing
353.
passenger data
354.
patient-generated health data (PGHD)
355.
personal data
356.
personal data disclosure
357.
personal data processing
358.
personal data protection
359.
Personal Data Protection Act
360.
plan data
361.
point cloud data
362.
pollen data
363.
process and data modelling
364.
Product Data Management (PDM)
365.
public data-set
366.
random data
367.
real-time data
368.
real-time data collection
369.
reconstruction of gap-free data
370.
reference architecture for global health data space
371.
remote data transmission
372.
satellite data
373.
semantic data modelling
374.
semantic health data
375.
sequential data
376.
small data machine learning
377.
small training data set
378.
smart data analytics
379.
smart meter data
380.
social media data
381.
Spatial data
382.
spatial data analysis
383.
statistical data
384.
stochastic image data
385.
structured data
386.
student data analysis
387.
supervised learning data
388.
supervisory control and data acquisition (SCADA)
389.
surrogate data
390.
sustainable data governance
391.
symbolic data
392.
symbolic data analysis
393.
synthetic data
394.
temperature historical data series
395.
time-selective data fusion
396.
training data
397.
Transcriptome data
398.
tree-like data structures
399.
underwater data center
400.
urban data
401.
urban data acquisition
402.
weather data
403.
web traffic data
404.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
405.
virtual data embassy
406.
Virtual Data Explorer
407.
18O data
408.
(big) data
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT