Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security of data (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/395)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Black-box separations and their adaptability to the non-uniform model
Buldas, Ahto
;
Niitsoo, Margus
Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings
2013
/
p. 152-167
https://doi.org/10.1007/978-3-642-39059-3_11
Conference Proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
2
artikkel kogumikus
A security verification template to assess cache architecture vulnerabilities
Ghasempouri, Tara
;
Raik, Jaan
;
Paul, Kolin
;
Reinbrecht, Cezar
;
Hamdioui, Said
;
Taouil, M.
2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), April 22nd – 24th 2020 Novi Sad, Serbia : Proceedings
2020
/
art. 9095707, 6 p
https://doi.org/10.1109/DDECS50862.2020.9095707
artikkel kogumikus
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
391
1.
security of data
2.
data security
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security strategies
15.
cyber-security
16.
development of security cameras
17.
drinking water security
18.
economic security
19.
economic security of enterprise
20.
emotional security
21.
energy security
22.
energy security indicator
23.
Estonian information security standard
24.
graded security
25.
hardware security
26.
hardware security primitive
27.
human security
28.
information security
29.
internal security
30.
international security
31.
investment and innovation security
32.
IPv6 security
33.
IT security
34.
IT security management
35.
job security
36.
long-term security
37.
metadata model for security measures
38.
Middle Eastern security
39.
Mobile security
40.
national cyber security strategy
41.
national security
42.
NATO. Science for Peace and Security Program
43.
network security
44.
network security monitoring
45.
OSCE (Organization for Security and Co-operation in Europe)
46.
passenger’s security
47.
policy-based routing security
48.
political and security cultures
49.
post-quantum security
50.
power system security
51.
quantitative security
52.
regional security
53.
RISC-V Security Verification
54.
safety and security testing
55.
security
56.
security adaptation
57.
security alert prioritization
58.
security analysis
59.
security and justice (AFSJ)
60.
security and privacy
61.
security and privacy in smart grids
62.
Security Assertion Mining
63.
security closure
64.
Security Coverage
65.
security dataset
66.
security dilemma
67.
Security evaluation
68.
security evaluation instruments
69.
security log analysis
70.
security management
71.
security model
72.
security monitoring
73.
security notion
74.
security objectives
75.
security of supply
76.
security operation center
77.
security operations center
78.
security patterns
79.
security policy
80.
security problem definition
81.
security proof
82.
security protocols
83.
security requirements
84.
security requirements engineering
85.
security risk assessment
86.
security risk management
87.
security strategies
88.
security systems for military objects
89.
security testing
90.
security training
91.
security verification
92.
security-by-design
93.
social security planning
94.
societal security
95.
system of economic security
96.
system security
97.
terrorism security
98.
transmission System Security
99.
voting privacy and security
100.
accident data
101.
adversarial data perturbation
102.
AI-based data curation
103.
AIS data
104.
Aligned data
105.
ALS data enhancements
106.
Amazon Kinesis Data Analytics
107.
application data
108.
audio and visual data
109.
big data
110.
big data analysis
111.
big data analytics
112.
big data science
113.
big geo-data
114.
borehole data
115.
building lifecycle data
116.
call data record
117.
catalogue of data sources
118.
cellular phone data
119.
clinical data capture
120.
clinical data exchange
121.
compositional data
122.
conceptual data model
123.
control and data path tests
124.
critical data studies
125.
cross-border data exchange
126.
data
127.
data assimilation
128.
data protection
129.
data acquisition
130.
data acquisition system
131.
data acquisition systems
132.
data aggregation
133.
data alignment
134.
data analysis
135.
data analytics
136.
data anisotropy
137.
data annotation
138.
data assimilation
139.
data attacks
140.
data augmentation
141.
data breach handling
142.
data capabilities
143.
data capture
144.
data center
145.
data center (DC)
146.
data centers
147.
data centre
148.
data centres
149.
data classification
150.
data clustering
151.
data collection
152.
data commons
153.
data compression
154.
data conversion
155.
data copy
156.
data dictionaries
157.
data discovery
158.
Data dissemination
159.
Data distribution structure
160.
Data drift
161.
data driven planning
162.
data embassy
163.
data engineering
164.
data envelopment analysis
165.
data ethnography
166.
data exchange
167.
data exchange framework
168.
Data exchange layers
169.
data exchange platform
170.
data experts
171.
data filtering
172.
data fitting approach
173.
data flow languages
174.
data flow visualization
175.
data fusion
176.
data generative model
177.
data governance
178.
data hiding
179.
data integration
180.
data integrity
181.
data intermediary
182.
data Interoperability
183.
data justice
184.
data labeling
185.
data lineage
186.
data logger
187.
data logistics
188.
data management
189.
data mappings
190.
Data Mart
191.
Data Mart (DM)
192.
data mesh
193.
data mining
194.
data modeling
195.
data models
196.
data modem
197.
data noise
198.
data offloading
199.
data ownership
200.
data platform
201.
data privacy
202.
data processing
203.
data product
204.
data protection
205.
data quality
206.
data quality management
207.
data quality maturity model
208.
data rate
209.
data reuse
210.
data re-use
211.
data routing
212.
data science
213.
data scraping
214.
data set
215.
data set generation
216.
data sets
217.
data sharing
218.
data simulation
219.
data simultaneity
220.
data sort
221.
data sources
222.
data storage
223.
data storage systems
224.
data stream mining
225.
data streams
226.
data studies
227.
data subject
228.
data synthesis
229.
data to decision
230.
data types
231.
data validity
232.
data valorization
233.
data warehouse
234.
data warenhouse
235.
data visualization
236.
data-based computational psychiatry
237.
data-centric construction
238.
data-centric systems
239.
data-controlled circuit partition
240.
data-controlled segmentation
241.
data-driven
242.
data-driven characterization
243.
data-driven condition monitoring
244.
Data-driven method
245.
data-driven modeling
246.
data-driven optimization
247.
data-exchange infrastructures
248.
data-exchange solutions
249.
data‐fusion
250.
data-independent acquisition
251.
Data-information-knowledgewisdom (DIKW)
252.
data-intelligence
253.
data-mining
254.
data-science
255.
diagnostic data
256.
digital data exchange
257.
discrete data
258.
distributed data aggregation
259.
distributed data fusion
260.
distributed data mining
261.
distributed data mining (DDM)
262.
DNA microarray data
263.
educational data mining
264.
enterprise data analysis
265.
European Health Data Space
266.
European Health Data Space (EHDS)
267.
eventdriven data
268.
event-driven data
269.
experimental data
270.
exploratory data analysis
271.
false data injection attack
272.
field data
273.
financial data
274.
floating car data (FCD)
275.
flood data platform
276.
FMI open data
277.
functional data analysis
278.
GDPR (General Data Protection Regulation)
279.
general data protection regulation
280.
genome data
281.
global data hub
282.
GNSS-levelling data
283.
health data
284.
health data accessibility
285.
Health data anonymization
286.
health data custodianship
287.
health data governance
288.
health data interoperability
289.
health data policy
290.
health data stewardship
291.
healthcare data
292.
heterogeneous sensor data
293.
high-dimensional data
294.
high-frequency data
295.
high-level test data generation
296.
historical data
297.
hyperspectral data
298.
imbalanced data
299.
implications of energy data
300.
initial data
301.
initial data for AI
302.
in-network data processing
303.
insurance data
304.
knowledge discovery and data mining
305.
linked data
306.
linked open data
307.
linked open statistical data
308.
linked data
309.
lossless data compression
310.
low-pass data filtering
311.
Master Data Management
312.
medical claims data
313.
medical data
314.
Medical Data Reuse
315.
meta-data
316.
metered data
317.
methods: data analysis
318.
microplastic data uncertainty
319.
mobile data
320.
mobile phone big data
321.
mobile phone data
322.
mobile phone usage data
323.
mobile positioning data
324.
multisource data fusion
325.
multivariate data analysis
326.
Nigeria's National data protection regulation
327.
open data
328.
open data ecosystem
329.
open data format
330.
open data policies
331.
open government data
332.
open government data (OGD)
333.
OSM data
334.
oversharing personal data
335.
panel data
336.
parallel data processing
337.
passenger data
338.
patient-generated health data (PGHD)
339.
personal data
340.
personal data disclosure
341.
personal data processing
342.
personal data protection
343.
Personal Data Protection Act
344.
plan data
345.
point cloud data
346.
pollen data
347.
process and data modelling
348.
Product Data Management (PDM)
349.
public data-set
350.
random data
351.
real-time data
352.
reconstruction of gap-free data
353.
reference architecture for global health data space
354.
remote data transmission
355.
satellite data
356.
semantic data modelling
357.
semantic health data
358.
sequential data
359.
small data machine learning
360.
small training data set
361.
smart data analytics
362.
smart meter data
363.
social media data
364.
Spatial data
365.
spatial data analysis
366.
statistical data
367.
stochastic image data
368.
structured data
369.
student data analysis
370.
supervised learning data
371.
supervisory control and data acquisition (SCADA)
372.
surrogate data
373.
sustainable data governance
374.
symbolic data
375.
symbolic data analysis
376.
synthetic data
377.
temperature historical data series
378.
time-selective data fusion
379.
training data
380.
Transcriptome data
381.
tree-like data structures
382.
underwater data center
383.
urban data
384.
urban data acquisition
385.
weather data
386.
web traffic data
387.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
388.
virtual data embassy
389.
Virtual Data Explorer
390.
18O data
391.
(big) data
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT