Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security of data (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/474)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Black-box separations and their adaptability to the non-uniform model
Buldas, Ahto
;
Niitsoo, Margus
Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings
2013
/
p. 152-167
https://doi.org/10.1007/978-3-642-39059-3_11
Conference Proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
2
artikkel kogumikus
A security verification template to assess cache architecture vulnerabilities
Ghasempouri, Tara
;
Raik, Jaan
;
Paul, Kolin
;
Reinbrecht, Cezar
;
Hamdioui, Said
;
Taouil, M.
2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), April 22nd – 24th 2020 Novi Sad, Serbia : Proceedings
2020
/
art. 9095707, 6 p
https://doi.org/10.1109/DDECS50862.2020.9095707
artikkel kogumikus
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
470
1.
security of data
2.
data and information security
3.
data security
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
cloud security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security monitoring
17.
cyber security strategies
18.
cyber-physical system security
19.
cyber-security
20.
development of security cameras
21.
digital security practices
22.
drinking water security
23.
economic security
24.
economic security of enterprise
25.
emotional security
26.
energy security
27.
energy security indicator
28.
Estonian information security standard
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
high level of security
33.
Homeland security
34.
human security
35.
information security
36.
information security and privacy
37.
initial level of security
38.
internal security
39.
international security
40.
investment and innovation security
41.
IPv6 security
42.
IT security
43.
IT security management
44.
job security
45.
long-term security
46.
maritime cyber security
47.
maritime cyber security operations centers
48.
Maritime Security Operations Center (M-SOC)
49.
medium level of security
50.
metadata model for security measures
51.
Middle Eastern security
52.
Mobile security
53.
national cyber security strategy
54.
national security
55.
NATO. Science for Peace and Security Program
56.
network security
57.
network security monitoring
58.
OSCE (Organization for Security and Co-operation in Europe)
59.
passenger’s security
60.
policy-based routing security
61.
political and security cultures
62.
post-quantum security
63.
power system security
64.
quantitative security
65.
regional security
66.
RISC-V Security Verification
67.
Safety and Security in Sea Transportation
68.
safety and security testing
69.
security
70.
security adaptation
71.
security alert prioritization
72.
security analysis
73.
security and justice (AFSJ)
74.
Security and political science
75.
security and privacy
76.
security and privacy in smart grids
77.
Security Assertion
78.
Security Assertion Mining
79.
security closure
80.
Security Coverage
81.
security dataset
82.
security dilemma
83.
Security evaluation
84.
security evaluation instruments
85.
Security Level Evaluation
86.
Security limitations
87.
security log analysis
88.
security management
89.
security model
90.
security monitoring
91.
security notion
92.
security objectives
93.
security of supply
94.
security operation center
95.
security operations center
96.
security patterns
97.
security policy
98.
security problem definition
99.
security proof
100.
security protocols
101.
security requirements
102.
security requirements engineering
103.
security research
104.
security risk assessment
105.
security risk management
106.
security risks
107.
security science and technology
108.
security strategies
109.
security systems for military objects
110.
security testing
111.
security training
112.
security verification
113.
security-by-design
114.
social security planning
115.
societal security
116.
software security
117.
software security level
118.
software security subcharacteristics
119.
sufficient level of security
120.
system of economic security
121.
system security
122.
terrorism security
123.
transmission System Security
124.
voting privacy and security
125.
accident data
126.
adversarial data perturbation
127.
AI data centers
128.
AI-based data curation
129.
AIS data
130.
AIS data format optimization
131.
Aligned data
132.
ALS data enhancements
133.
Amazon Kinesis Data Analytics
134.
application data
135.
audio and visual data
136.
big data
137.
big data analysis
138.
big data analytics
139.
big data science
140.
big geo-data
141.
borehole data
142.
building lifecycle data
143.
call data record
144.
catalogue of data sources
145.
cellular phone data
146.
clinical data capture
147.
clinical data exchange
148.
compositional data
149.
conceptual data model
150.
construction data management
151.
consumption data
152.
control and data path tests
153.
critical data studies
154.
cross-border data exchange
155.
data
156.
data assimilation
157.
data protection
158.
data acquisition
159.
data acquisition system
160.
data acquisition systems
161.
data aggregation
162.
data alignment
163.
Data Altruism
164.
Data Altruism Consent
165.
data analysis
166.
data analytics
167.
data analytics and machine learning
168.
data anisotropy
169.
data annotation
170.
data assimilation
171.
data attacks
172.
data augmentation
173.
data breach handling
174.
data capabilities
175.
data capture
176.
data center
177.
data center (DC)
178.
data center applications
179.
data centers
180.
data centre
181.
data centres
182.
data classification
183.
data clustering
184.
data collection
185.
data commons
186.
data compression
187.
data compression and normalization
188.
data conversion
189.
data copy
190.
data curation
191.
data curing
192.
data dictionaries
193.
data discovery
194.
Data dissemination
195.
Data distribution structure
196.
data donation
197.
Data drift
198.
data driven planning
199.
data dropouts
200.
Data Ecosystem
201.
data embassy
202.
data engineering
203.
data enrichment
204.
data envelopment analysis
205.
data ethnography
206.
data exchange
207.
data exchange framework
208.
Data exchange layers
209.
data exchange platform
210.
data experts
211.
data filtering
212.
data fitting approach
213.
data flow diagram
214.
data flow languages
215.
data flow visualization
216.
data flows
217.
data fusion
218.
data generative model
219.
data governance
220.
data governance act
221.
data harmonization
222.
data hiding
223.
data integration
224.
data integrity
225.
data intermediary
226.
data Interoperability
227.
data justice
228.
data labeling
229.
data limitations in public sector
230.
data lineage
231.
data literacy
232.
data logger
233.
data logistics
234.
data management
235.
data mappings
236.
Data Mart
237.
Data Mart (DM)
238.
data mesh
239.
data migration
240.
data mining
241.
data mining and knowledge discovery
242.
data modeling
243.
data models
244.
data modem
245.
data movements
246.
data noise
247.
data offloading
248.
data ownership
249.
data platform
250.
data privacy
251.
data processing
252.
data product
253.
data protection
254.
data publishing
255.
data quality
256.
data quality management
257.
data quality maturity model
258.
data rate
259.
data representativeness
260.
data reuse
261.
data re-use
262.
data routing
263.
data scarce environments
264.
data science
265.
data scraping
266.
data set
267.
data set generation
268.
data sets
269.
data sharing
270.
data simulation
271.
data simultaneity
272.
data sort
273.
data sources
274.
data spaces
275.
data storage
276.
data storage systems
277.
data stream mining
278.
data streams
279.
data structures
280.
data studies
281.
data subject
282.
data subjects
283.
data synthesis
284.
data to decision
285.
data types
286.
data validity
287.
data valorization
288.
data warehouse
289.
data warenhouse
290.
data visualization
291.
data-augmentation
292.
data-based computational psychiatry
293.
data-centric construction
294.
data-centric systems
295.
data-controlled circuit partition
296.
data-controlled segmentation
297.
data-driven
298.
data-driven characterization
299.
data-driven condition monitoring
300.
data-driven control
301.
Data-driven decision-making
302.
data-driven imputation
303.
Data-driven method
304.
data-driven model
305.
data-driven modeling
306.
data-driven optimization
307.
data-driven policy
308.
data-driven public services
309.
data-driven techniques
310.
data-exchange infrastructures
311.
data-exchange solutions
312.
data-flow architecture
313.
data‐fusion
314.
data-independent acquisition
315.
Data-information-knowledgewisdom (DIKW)
316.
data-intelligence
317.
data-mining
318.
data-science
319.
data-sharing
320.
diagnostic data
321.
digital data exchange
322.
discrete data
323.
distributed data aggregation
324.
distributed data fusion
325.
distributed data mining
326.
distributed data mining (DDM)
327.
distributional data
328.
DNA microarray data
329.
educational data mining
330.
educational data-mining
331.
empirical data
332.
enterprise data analysis
333.
European Health Data Space
334.
European Health Data Space (EHDS)
335.
eventdriven data
336.
event-driven data
337.
experimental data
338.
exploratory data analysis
339.
fair data
340.
false data injection attack
341.
field data
342.
financial data
343.
floating car data (FCD)
344.
flood data platform
345.
FMI open data
346.
functional data analysis
347.
GDPR (General Data Protection Regulation)
348.
general data protection regulation
349.
genome data
350.
global data hub
351.
GNSS-levelling data
352.
GNSS-RO data
353.
GRUAN data
354.
health data
355.
health data accessibility
356.
Health data anonymization
357.
health data custodianship
358.
health data governance
359.
health data integrity and transparency
360.
health data interoperability
361.
health data policy
362.
health data stewardship
363.
healthcare data
364.
heterogeneous data
365.
heterogeneous sensor data
366.
high-dimensional data
367.
high-frequency data
368.
high-level test data generation
369.
historical data
370.
hyperspectral data
371.
imbalanced data
372.
implications of energy data
373.
initial data
374.
initial data for AI
375.
initial data model
376.
in-network data processing
377.
insurance data
378.
knowledge discovery and data mining
379.
linked data
380.
linked open data
381.
linked open statistical data
382.
linked data
383.
lossless data compression
384.
low-pass data filtering
385.
Master Data Management
386.
medical claims data
387.
medical data
388.
Medical Data Reuse
389.
meta-data
390.
metered data
391.
methods: data analysis
392.
microplastic data uncertainty
393.
mobile data
394.
mobile phone big data
395.
mobile phone data
396.
mobile phone usage data
397.
mobile positioning data
398.
multisource data fusion
399.
multivariate data analysis
400.
Nigeria's National data protection regulation
401.
open data
402.
open data ecosystem
403.
open data format
404.
open data policies
405.
open government data
406.
open government data (OGD)
407.
open-data
408.
open-data platform
409.
OSM data
410.
oversharing personal data
411.
panel data
412.
parallel data processing
413.
passenger data
414.
patient-generated health data (PGHD)
415.
personal data
416.
personal data disclosure
417.
personal data processing
418.
personal data protection
419.
Personal Data Protection Act
420.
plan data
421.
point cloud data
422.
pollen data
423.
process and data modelling
424.
Product Data Management (PDM)
425.
public data-set
426.
random data
427.
real-time data
428.
real-time data collection
429.
reconstruction of gap-free data
430.
reference architecture for global health data space
431.
remote data transmission
432.
satellite data
433.
semantic data modelling
434.
semantic health data
435.
sequential data
436.
small data machine learning
437.
small training data set
438.
smart data analytics
439.
smart meter data
440.
social media data
441.
Spatial data
442.
spatial data analysis
443.
statistical data
444.
stochastic image data
445.
structured data
446.
student data analysis
447.
supervised learning data
448.
supervisory control and data acquisition (SCADA)
449.
surrogate data
450.
sustainable data governance
451.
sustainable data storage
452.
symbolic data
453.
symbolic data analysis
454.
synthetic data
455.
temperature historical data series
456.
three-way data
457.
time-selective data fusion
458.
training data
459.
Transcriptome data
460.
tree-like data structures
461.
underwater data center
462.
urban data
463.
urban data acquisition
464.
weather data
465.
web traffic data
466.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
467.
virtual data embassy
468.
Virtual Data Explorer
469.
18O data
470.
(big) data
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT