Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security of data (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/431)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Black-box separations and their adaptability to the non-uniform model
Buldas, Ahto
;
Niitsoo, Margus
Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings
2013
/
p. 152-167
https://doi.org/10.1007/978-3-642-39059-3_11
Conference Proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
2
artikkel kogumikus
A security verification template to assess cache architecture vulnerabilities
Ghasempouri, Tara
;
Raik, Jaan
;
Paul, Kolin
;
Reinbrecht, Cezar
;
Hamdioui, Said
;
Taouil, M.
2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), April 22nd – 24th 2020 Novi Sad, Serbia : Proceedings
2020
/
art. 9095707, 6 p
https://doi.org/10.1109/DDECS50862.2020.9095707
artikkel kogumikus
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
427
1.
security of data
2.
data security
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security monitoring
15.
cyber security strategies
16.
cyber-security
17.
development of security cameras
18.
digital security practices
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
Estonian information security standard
26.
graded security
27.
hardware security
28.
hardware security primitive
29.
human security
30.
information security
31.
information security and privacy
32.
internal security
33.
international security
34.
investment and innovation security
35.
IPv6 security
36.
IT security
37.
IT security management
38.
job security
39.
long-term security
40.
metadata model for security measures
41.
Middle Eastern security
42.
Mobile security
43.
national cyber security strategy
44.
national security
45.
NATO. Science for Peace and Security Program
46.
network security
47.
network security monitoring
48.
OSCE (Organization for Security and Co-operation in Europe)
49.
passenger’s security
50.
policy-based routing security
51.
political and security cultures
52.
post-quantum security
53.
power system security
54.
quantitative security
55.
regional security
56.
RISC-V Security Verification
57.
safety and security testing
58.
security
59.
security adaptation
60.
security alert prioritization
61.
security analysis
62.
security and justice (AFSJ)
63.
Security and political science
64.
security and privacy
65.
security and privacy in smart grids
66.
Security Assertion Mining
67.
security closure
68.
Security Coverage
69.
security dataset
70.
security dilemma
71.
Security evaluation
72.
security evaluation instruments
73.
Security limitations
74.
security log analysis
75.
security management
76.
security model
77.
security monitoring
78.
security notion
79.
security objectives
80.
security of supply
81.
security operation center
82.
security operations center
83.
security patterns
84.
security policy
85.
security problem definition
86.
security proof
87.
security protocols
88.
security requirements
89.
security requirements engineering
90.
security risk assessment
91.
security risk management
92.
security risks
93.
security science and technology
94.
security strategies
95.
security systems for military objects
96.
security testing
97.
security training
98.
security verification
99.
security-by-design
100.
social security planning
101.
societal security
102.
system of economic security
103.
system security
104.
terrorism security
105.
transmission System Security
106.
voting privacy and security
107.
accident data
108.
adversarial data perturbation
109.
AI-based data curation
110.
AIS data
111.
Aligned data
112.
ALS data enhancements
113.
Amazon Kinesis Data Analytics
114.
application data
115.
audio and visual data
116.
big data
117.
big data analysis
118.
big data analytics
119.
big data science
120.
big geo-data
121.
borehole data
122.
building lifecycle data
123.
call data record
124.
catalogue of data sources
125.
cellular phone data
126.
clinical data capture
127.
clinical data exchange
128.
compositional data
129.
conceptual data model
130.
construction data management
131.
control and data path tests
132.
critical data studies
133.
cross-border data exchange
134.
data
135.
data assimilation
136.
data protection
137.
data acquisition
138.
data acquisition system
139.
data acquisition systems
140.
data aggregation
141.
data alignment
142.
data analysis
143.
data analytics
144.
data analytics and machine learning
145.
data anisotropy
146.
data annotation
147.
data assimilation
148.
data attacks
149.
data augmentation
150.
data breach handling
151.
data capabilities
152.
data capture
153.
data center
154.
data center (DC)
155.
data centers
156.
data centre
157.
data centres
158.
data classification
159.
data clustering
160.
data collection
161.
data commons
162.
data compression
163.
data conversion
164.
data copy
165.
data dictionaries
166.
data discovery
167.
Data dissemination
168.
Data distribution structure
169.
data donation
170.
Data drift
171.
data driven planning
172.
data dropouts
173.
data embassy
174.
data engineering
175.
data enrichment
176.
data envelopment analysis
177.
data ethnography
178.
data exchange
179.
data exchange framework
180.
Data exchange layers
181.
data exchange platform
182.
data experts
183.
data filtering
184.
data fitting approach
185.
data flow languages
186.
data flow visualization
187.
data flows
188.
data fusion
189.
data generative model
190.
data governance
191.
data governance act
192.
data hiding
193.
data integration
194.
data integrity
195.
data intermediary
196.
data Interoperability
197.
data justice
198.
data labeling
199.
data lineage
200.
data logger
201.
data logistics
202.
data management
203.
data mappings
204.
Data Mart
205.
Data Mart (DM)
206.
data mesh
207.
data migration
208.
data mining
209.
data modeling
210.
data models
211.
data modem
212.
data movements
213.
data noise
214.
data offloading
215.
data ownership
216.
data platform
217.
data privacy
218.
data processing
219.
data product
220.
data protection
221.
data quality
222.
data quality management
223.
data quality maturity model
224.
data rate
225.
data reuse
226.
data re-use
227.
data routing
228.
data science
229.
data scraping
230.
data set
231.
data set generation
232.
data sets
233.
data sharing
234.
data simulation
235.
data simultaneity
236.
data sort
237.
data sources
238.
data spaces
239.
data storage
240.
data storage systems
241.
data stream mining
242.
data streams
243.
data structures
244.
data studies
245.
data subject
246.
data subjects
247.
data synthesis
248.
data to decision
249.
data types
250.
data validity
251.
data valorization
252.
data warehouse
253.
data warenhouse
254.
data visualization
255.
data-augmentation
256.
data-based computational psychiatry
257.
data-centric construction
258.
data-centric systems
259.
data-controlled circuit partition
260.
data-controlled segmentation
261.
data-driven
262.
data-driven characterization
263.
data-driven condition monitoring
264.
data-driven control
265.
Data-driven decision-making
266.
data-driven imputation
267.
Data-driven method
268.
data-driven model
269.
data-driven modeling
270.
data-driven optimization
271.
data-driven public services
272.
data-driven techniques
273.
data-exchange infrastructures
274.
data-exchange solutions
275.
data-flow architecture
276.
data‐fusion
277.
data-independent acquisition
278.
Data-information-knowledgewisdom (DIKW)
279.
data-intelligence
280.
data-mining
281.
data-science
282.
diagnostic data
283.
digital data exchange
284.
discrete data
285.
distributed data aggregation
286.
distributed data fusion
287.
distributed data mining
288.
distributed data mining (DDM)
289.
distributional data
290.
DNA microarray data
291.
educational data mining
292.
enterprise data analysis
293.
European Health Data Space
294.
European Health Data Space (EHDS)
295.
eventdriven data
296.
event-driven data
297.
experimental data
298.
exploratory data analysis
299.
false data injection attack
300.
field data
301.
financial data
302.
floating car data (FCD)
303.
flood data platform
304.
FMI open data
305.
functional data analysis
306.
GDPR (General Data Protection Regulation)
307.
general data protection regulation
308.
genome data
309.
global data hub
310.
GNSS-levelling data
311.
GNSS-RO data
312.
GRUAN data
313.
health data
314.
health data accessibility
315.
Health data anonymization
316.
health data custodianship
317.
health data governance
318.
health data integrity and transparency
319.
health data interoperability
320.
health data policy
321.
health data stewardship
322.
healthcare data
323.
heterogeneous sensor data
324.
high-dimensional data
325.
high-frequency data
326.
high-level test data generation
327.
historical data
328.
hyperspectral data
329.
imbalanced data
330.
implications of energy data
331.
initial data
332.
initial data for AI
333.
initial data model
334.
in-network data processing
335.
insurance data
336.
knowledge discovery and data mining
337.
linked data
338.
linked open data
339.
linked open statistical data
340.
linked data
341.
lossless data compression
342.
low-pass data filtering
343.
Master Data Management
344.
medical claims data
345.
medical data
346.
Medical Data Reuse
347.
meta-data
348.
metered data
349.
methods: data analysis
350.
microplastic data uncertainty
351.
mobile data
352.
mobile phone big data
353.
mobile phone data
354.
mobile phone usage data
355.
mobile positioning data
356.
multisource data fusion
357.
multivariate data analysis
358.
Nigeria's National data protection regulation
359.
open data
360.
open data ecosystem
361.
open data format
362.
open data policies
363.
open government data
364.
open government data (OGD)
365.
open-data
366.
open-data platform
367.
OSM data
368.
oversharing personal data
369.
panel data
370.
parallel data processing
371.
passenger data
372.
patient-generated health data (PGHD)
373.
personal data
374.
personal data disclosure
375.
personal data processing
376.
personal data protection
377.
Personal Data Protection Act
378.
plan data
379.
point cloud data
380.
pollen data
381.
process and data modelling
382.
Product Data Management (PDM)
383.
public data-set
384.
random data
385.
real-time data
386.
real-time data collection
387.
reconstruction of gap-free data
388.
reference architecture for global health data space
389.
remote data transmission
390.
satellite data
391.
semantic data modelling
392.
semantic health data
393.
sequential data
394.
small data machine learning
395.
small training data set
396.
smart data analytics
397.
smart meter data
398.
social media data
399.
Spatial data
400.
spatial data analysis
401.
statistical data
402.
stochastic image data
403.
structured data
404.
student data analysis
405.
supervised learning data
406.
supervisory control and data acquisition (SCADA)
407.
surrogate data
408.
sustainable data governance
409.
symbolic data
410.
symbolic data analysis
411.
synthetic data
412.
temperature historical data series
413.
three-way data
414.
time-selective data fusion
415.
training data
416.
Transcriptome data
417.
tree-like data structures
418.
underwater data center
419.
urban data
420.
urban data acquisition
421.
weather data
422.
web traffic data
423.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
424.
virtual data embassy
425.
Virtual Data Explorer
426.
18O data
427.
(big) data
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT