Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security of data (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/436)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Black-box separations and their adaptability to the non-uniform model
Buldas, Ahto
;
Niitsoo, Margus
Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings
2013
/
p. 152-167
https://doi.org/10.1007/978-3-642-39059-3_11
Conference Proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
2
artikkel kogumikus
A security verification template to assess cache architecture vulnerabilities
Ghasempouri, Tara
;
Raik, Jaan
;
Paul, Kolin
;
Reinbrecht, Cezar
;
Hamdioui, Said
;
Taouil, M.
2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), April 22nd – 24th 2020 Novi Sad, Serbia : Proceedings
2020
/
art. 9095707, 6 p
https://doi.org/10.1109/DDECS50862.2020.9095707
artikkel kogumikus
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
432
1.
security of data
2.
data and information security
3.
data security
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security strategies
17.
cyber-security
18.
development of security cameras
19.
digital security practices
20.
drinking water security
21.
economic security
22.
economic security of enterprise
23.
emotional security
24.
energy security
25.
energy security indicator
26.
Estonian information security standard
27.
graded security
28.
hardware security
29.
hardware security primitive
30.
human security
31.
information security
32.
information security and privacy
33.
internal security
34.
international security
35.
investment and innovation security
36.
IPv6 security
37.
IT security
38.
IT security management
39.
job security
40.
long-term security
41.
metadata model for security measures
42.
Middle Eastern security
43.
Mobile security
44.
national cyber security strategy
45.
national security
46.
NATO. Science for Peace and Security Program
47.
network security
48.
network security monitoring
49.
OSCE (Organization for Security and Co-operation in Europe)
50.
passenger’s security
51.
policy-based routing security
52.
political and security cultures
53.
post-quantum security
54.
power system security
55.
quantitative security
56.
regional security
57.
RISC-V Security Verification
58.
safety and security testing
59.
security
60.
security adaptation
61.
security alert prioritization
62.
security analysis
63.
security and justice (AFSJ)
64.
Security and political science
65.
security and privacy
66.
security and privacy in smart grids
67.
Security Assertion Mining
68.
security closure
69.
Security Coverage
70.
security dataset
71.
security dilemma
72.
Security evaluation
73.
security evaluation instruments
74.
Security limitations
75.
security log analysis
76.
security management
77.
security model
78.
security monitoring
79.
security notion
80.
security objectives
81.
security of supply
82.
security operation center
83.
security operations center
84.
security patterns
85.
security policy
86.
security problem definition
87.
security proof
88.
security protocols
89.
security requirements
90.
security requirements engineering
91.
security risk assessment
92.
security risk management
93.
security risks
94.
security science and technology
95.
security strategies
96.
security systems for military objects
97.
security testing
98.
security training
99.
security verification
100.
security-by-design
101.
social security planning
102.
societal security
103.
system of economic security
104.
system security
105.
terrorism security
106.
transmission System Security
107.
voting privacy and security
108.
accident data
109.
adversarial data perturbation
110.
AI-based data curation
111.
AIS data
112.
Aligned data
113.
ALS data enhancements
114.
Amazon Kinesis Data Analytics
115.
application data
116.
audio and visual data
117.
big data
118.
big data analysis
119.
big data analytics
120.
big data science
121.
big geo-data
122.
borehole data
123.
building lifecycle data
124.
call data record
125.
catalogue of data sources
126.
cellular phone data
127.
clinical data capture
128.
clinical data exchange
129.
compositional data
130.
conceptual data model
131.
construction data management
132.
control and data path tests
133.
critical data studies
134.
cross-border data exchange
135.
data
136.
data assimilation
137.
data protection
138.
data acquisition
139.
data acquisition system
140.
data acquisition systems
141.
data aggregation
142.
data alignment
143.
data analysis
144.
data analytics
145.
data analytics and machine learning
146.
data anisotropy
147.
data annotation
148.
data assimilation
149.
data attacks
150.
data augmentation
151.
data breach handling
152.
data capabilities
153.
data capture
154.
data center
155.
data center (DC)
156.
data center applications
157.
data centers
158.
data centre
159.
data centres
160.
data classification
161.
data clustering
162.
data collection
163.
data commons
164.
data compression
165.
data conversion
166.
data copy
167.
data dictionaries
168.
data discovery
169.
Data dissemination
170.
Data distribution structure
171.
data donation
172.
Data drift
173.
data driven planning
174.
data dropouts
175.
data embassy
176.
data engineering
177.
data enrichment
178.
data envelopment analysis
179.
data ethnography
180.
data exchange
181.
data exchange framework
182.
Data exchange layers
183.
data exchange platform
184.
data experts
185.
data filtering
186.
data fitting approach
187.
data flow languages
188.
data flow visualization
189.
data flows
190.
data fusion
191.
data generative model
192.
data governance
193.
data governance act
194.
data hiding
195.
data integration
196.
data integrity
197.
data intermediary
198.
data Interoperability
199.
data justice
200.
data labeling
201.
data limitations in public sector
202.
data lineage
203.
data logger
204.
data logistics
205.
data management
206.
data mappings
207.
Data Mart
208.
Data Mart (DM)
209.
data mesh
210.
data migration
211.
data mining
212.
data mining and knowledge discovery
213.
data modeling
214.
data models
215.
data modem
216.
data movements
217.
data noise
218.
data offloading
219.
data ownership
220.
data platform
221.
data privacy
222.
data processing
223.
data product
224.
data protection
225.
data quality
226.
data quality management
227.
data quality maturity model
228.
data rate
229.
data reuse
230.
data re-use
231.
data routing
232.
data science
233.
data scraping
234.
data set
235.
data set generation
236.
data sets
237.
data sharing
238.
data simulation
239.
data simultaneity
240.
data sort
241.
data sources
242.
data spaces
243.
data storage
244.
data storage systems
245.
data stream mining
246.
data streams
247.
data structures
248.
data studies
249.
data subject
250.
data subjects
251.
data synthesis
252.
data to decision
253.
data types
254.
data validity
255.
data valorization
256.
data warehouse
257.
data warenhouse
258.
data visualization
259.
data-augmentation
260.
data-based computational psychiatry
261.
data-centric construction
262.
data-centric systems
263.
data-controlled circuit partition
264.
data-controlled segmentation
265.
data-driven
266.
data-driven characterization
267.
data-driven condition monitoring
268.
data-driven control
269.
Data-driven decision-making
270.
data-driven imputation
271.
Data-driven method
272.
data-driven model
273.
data-driven modeling
274.
data-driven optimization
275.
data-driven policy
276.
data-driven public services
277.
data-driven techniques
278.
data-exchange infrastructures
279.
data-exchange solutions
280.
data-flow architecture
281.
data‐fusion
282.
data-independent acquisition
283.
Data-information-knowledgewisdom (DIKW)
284.
data-intelligence
285.
data-mining
286.
data-science
287.
diagnostic data
288.
digital data exchange
289.
discrete data
290.
distributed data aggregation
291.
distributed data fusion
292.
distributed data mining
293.
distributed data mining (DDM)
294.
distributional data
295.
DNA microarray data
296.
educational data mining
297.
enterprise data analysis
298.
European Health Data Space
299.
European Health Data Space (EHDS)
300.
eventdriven data
301.
event-driven data
302.
experimental data
303.
exploratory data analysis
304.
false data injection attack
305.
field data
306.
financial data
307.
floating car data (FCD)
308.
flood data platform
309.
FMI open data
310.
functional data analysis
311.
GDPR (General Data Protection Regulation)
312.
general data protection regulation
313.
genome data
314.
global data hub
315.
GNSS-levelling data
316.
GNSS-RO data
317.
GRUAN data
318.
health data
319.
health data accessibility
320.
Health data anonymization
321.
health data custodianship
322.
health data governance
323.
health data integrity and transparency
324.
health data interoperability
325.
health data policy
326.
health data stewardship
327.
healthcare data
328.
heterogeneous sensor data
329.
high-dimensional data
330.
high-frequency data
331.
high-level test data generation
332.
historical data
333.
hyperspectral data
334.
imbalanced data
335.
implications of energy data
336.
initial data
337.
initial data for AI
338.
initial data model
339.
in-network data processing
340.
insurance data
341.
knowledge discovery and data mining
342.
linked data
343.
linked open data
344.
linked open statistical data
345.
linked data
346.
lossless data compression
347.
low-pass data filtering
348.
Master Data Management
349.
medical claims data
350.
medical data
351.
Medical Data Reuse
352.
meta-data
353.
metered data
354.
methods: data analysis
355.
microplastic data uncertainty
356.
mobile data
357.
mobile phone big data
358.
mobile phone data
359.
mobile phone usage data
360.
mobile positioning data
361.
multisource data fusion
362.
multivariate data analysis
363.
Nigeria's National data protection regulation
364.
open data
365.
open data ecosystem
366.
open data format
367.
open data policies
368.
open government data
369.
open government data (OGD)
370.
open-data
371.
open-data platform
372.
OSM data
373.
oversharing personal data
374.
panel data
375.
parallel data processing
376.
passenger data
377.
patient-generated health data (PGHD)
378.
personal data
379.
personal data disclosure
380.
personal data processing
381.
personal data protection
382.
Personal Data Protection Act
383.
plan data
384.
point cloud data
385.
pollen data
386.
process and data modelling
387.
Product Data Management (PDM)
388.
public data-set
389.
random data
390.
real-time data
391.
real-time data collection
392.
reconstruction of gap-free data
393.
reference architecture for global health data space
394.
remote data transmission
395.
satellite data
396.
semantic data modelling
397.
semantic health data
398.
sequential data
399.
small data machine learning
400.
small training data set
401.
smart data analytics
402.
smart meter data
403.
social media data
404.
Spatial data
405.
spatial data analysis
406.
statistical data
407.
stochastic image data
408.
structured data
409.
student data analysis
410.
supervised learning data
411.
supervisory control and data acquisition (SCADA)
412.
surrogate data
413.
sustainable data governance
414.
symbolic data
415.
symbolic data analysis
416.
synthetic data
417.
temperature historical data series
418.
three-way data
419.
time-selective data fusion
420.
training data
421.
Transcriptome data
422.
tree-like data structures
423.
underwater data center
424.
urban data
425.
urban data acquisition
426.
weather data
427.
web traffic data
428.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
429.
virtual data embassy
430.
Virtual Data Explorer
431.
18O data
432.
(big) data
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT