Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
data security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
4
Vaata veel..
(2/470)
Ekspordi
ekspordi kõik päringu tulemused
(4)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
raamat
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
raamat
2
artikkel kogumikus EST
/
artikkel kogumikus ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
3
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 4, kuvan
1 - 4
võtmesõna
466
1.
data security
2.
data and information security
3.
security of data
4.
metadata model for security measures
5.
security dataset
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
communication system security
11.
comprehensive system of economic security
12.
computer security
13.
cooperative security dilemma
14.
cyber security
15.
cyber security education
16.
cyber security exercises
17.
cyber security monitoring
18.
cyber security strategies
19.
cyber-security
20.
development of security cameras
21.
digital security practices
22.
drinking water security
23.
economic security
24.
economic security of enterprise
25.
emotional security
26.
energy security
27.
energy security indicator
28.
Estonian information security standard
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
high level of security
33.
Homeland security
34.
human security
35.
information security
36.
information security and privacy
37.
initial level of security
38.
internal security
39.
international security
40.
investment and innovation security
41.
IPv6 security
42.
IT security
43.
IT security management
44.
job security
45.
long-term security
46.
maritime cyber security
47.
maritime cyber security operations centers
48.
Maritime Security Operations Center (M-SOC)
49.
medium level of security
50.
Middle Eastern security
51.
Mobile security
52.
national cyber security strategy
53.
national security
54.
NATO. Science for Peace and Security Program
55.
network security
56.
network security monitoring
57.
OSCE (Organization for Security and Co-operation in Europe)
58.
passenger’s security
59.
policy-based routing security
60.
political and security cultures
61.
post-quantum security
62.
power system security
63.
quantitative security
64.
regional security
65.
RISC-V Security Verification
66.
Safety and Security in Sea Transportation
67.
safety and security testing
68.
security
69.
security adaptation
70.
security alert prioritization
71.
security analysis
72.
security and justice (AFSJ)
73.
Security and political science
74.
security and privacy
75.
security and privacy in smart grids
76.
Security Assertion Mining
77.
security closure
78.
Security Coverage
79.
security dilemma
80.
Security evaluation
81.
security evaluation instruments
82.
Security Level Evaluation
83.
Security limitations
84.
security log analysis
85.
security management
86.
security model
87.
security monitoring
88.
security notion
89.
security objectives
90.
security of supply
91.
security operation center
92.
security operations center
93.
security patterns
94.
security policy
95.
security problem definition
96.
security proof
97.
security protocols
98.
security requirements
99.
security requirements engineering
100.
security research
101.
security risk assessment
102.
security risk management
103.
security risks
104.
security science and technology
105.
security strategies
106.
security systems for military objects
107.
security testing
108.
security training
109.
security verification
110.
security-by-design
111.
social security planning
112.
societal security
113.
software security
114.
software security level
115.
software security subcharacteristics
116.
sufficient level of security
117.
system of economic security
118.
system security
119.
terrorism security
120.
transmission System Security
121.
voting privacy and security
122.
accident data
123.
adversarial data perturbation
124.
AI data centers
125.
AI-based data curation
126.
AIS data
127.
AIS data format optimization
128.
Aligned data
129.
ALS data enhancements
130.
Amazon Kinesis Data Analytics
131.
application data
132.
audio and visual data
133.
big data
134.
big data analysis
135.
big data analytics
136.
big data science
137.
big geo-data
138.
borehole data
139.
building lifecycle data
140.
call data record
141.
catalogue of data sources
142.
cellular phone data
143.
clinical data capture
144.
clinical data exchange
145.
compositional data
146.
conceptual data model
147.
construction data management
148.
consumption data
149.
control and data path tests
150.
critical data studies
151.
cross-border data exchange
152.
data
153.
data assimilation
154.
data protection
155.
data acquisition
156.
data acquisition system
157.
data acquisition systems
158.
data aggregation
159.
data alignment
160.
Data Altruism
161.
Data Altruism Consent
162.
data analysis
163.
data analytics
164.
data analytics and machine learning
165.
data anisotropy
166.
data annotation
167.
data assimilation
168.
data attacks
169.
data augmentation
170.
data breach handling
171.
data capabilities
172.
data capture
173.
data center
174.
data center (DC)
175.
data center applications
176.
data centers
177.
data centre
178.
data centres
179.
data classification
180.
data clustering
181.
data collection
182.
data commons
183.
data compression
184.
data compression and normalization
185.
data conversion
186.
data copy
187.
data curation
188.
data curing
189.
data dictionaries
190.
data discovery
191.
Data dissemination
192.
Data distribution structure
193.
data donation
194.
Data drift
195.
data driven planning
196.
data dropouts
197.
Data Ecosystem
198.
data embassy
199.
data engineering
200.
data enrichment
201.
data envelopment analysis
202.
data ethnography
203.
data exchange
204.
data exchange framework
205.
Data exchange layers
206.
data exchange platform
207.
data experts
208.
data filtering
209.
data fitting approach
210.
data flow languages
211.
data flow visualization
212.
data flows
213.
data fusion
214.
data generative model
215.
data governance
216.
data governance act
217.
data harmonization
218.
data hiding
219.
data integration
220.
data integrity
221.
data intermediary
222.
data Interoperability
223.
data justice
224.
data labeling
225.
data limitations in public sector
226.
data lineage
227.
data literacy
228.
data logger
229.
data logistics
230.
data management
231.
data mappings
232.
Data Mart
233.
Data Mart (DM)
234.
data mesh
235.
data migration
236.
data mining
237.
data mining and knowledge discovery
238.
data modeling
239.
data models
240.
data modem
241.
data movements
242.
data noise
243.
data offloading
244.
data ownership
245.
data platform
246.
data privacy
247.
data processing
248.
data product
249.
data protection
250.
data publishing
251.
data quality
252.
data quality management
253.
data quality maturity model
254.
data rate
255.
data representativeness
256.
data reuse
257.
data re-use
258.
data routing
259.
data scarce environments
260.
data science
261.
data scraping
262.
data set
263.
data set generation
264.
data sets
265.
data sharing
266.
data simulation
267.
data simultaneity
268.
data sort
269.
data sources
270.
data spaces
271.
data storage
272.
data storage systems
273.
data stream mining
274.
data streams
275.
data structures
276.
data studies
277.
data subject
278.
data subjects
279.
data synthesis
280.
data to decision
281.
data types
282.
data validity
283.
data valorization
284.
data warehouse
285.
data warenhouse
286.
data visualization
287.
data-augmentation
288.
data-based computational psychiatry
289.
data-centric construction
290.
data-centric systems
291.
data-controlled circuit partition
292.
data-controlled segmentation
293.
data-driven
294.
data-driven characterization
295.
data-driven condition monitoring
296.
data-driven control
297.
Data-driven decision-making
298.
data-driven imputation
299.
Data-driven method
300.
data-driven model
301.
data-driven modeling
302.
data-driven optimization
303.
data-driven policy
304.
data-driven public services
305.
data-driven techniques
306.
data-exchange infrastructures
307.
data-exchange solutions
308.
data-flow architecture
309.
data‐fusion
310.
data-independent acquisition
311.
Data-information-knowledgewisdom (DIKW)
312.
data-intelligence
313.
data-mining
314.
data-science
315.
data-sharing
316.
diagnostic data
317.
digital data exchange
318.
discrete data
319.
distributed data aggregation
320.
distributed data fusion
321.
distributed data mining
322.
distributed data mining (DDM)
323.
distributional data
324.
DNA microarray data
325.
educational data mining
326.
educational data-mining
327.
empirical data
328.
enterprise data analysis
329.
European Health Data Space
330.
European Health Data Space (EHDS)
331.
eventdriven data
332.
event-driven data
333.
experimental data
334.
exploratory data analysis
335.
fair data
336.
false data injection attack
337.
field data
338.
financial data
339.
floating car data (FCD)
340.
flood data platform
341.
FMI open data
342.
functional data analysis
343.
GDPR (General Data Protection Regulation)
344.
general data protection regulation
345.
genome data
346.
global data hub
347.
GNSS-levelling data
348.
GNSS-RO data
349.
GRUAN data
350.
health data
351.
health data accessibility
352.
Health data anonymization
353.
health data custodianship
354.
health data governance
355.
health data integrity and transparency
356.
health data interoperability
357.
health data policy
358.
health data stewardship
359.
healthcare data
360.
heterogeneous data
361.
heterogeneous sensor data
362.
high-dimensional data
363.
high-frequency data
364.
high-level test data generation
365.
historical data
366.
hyperspectral data
367.
imbalanced data
368.
implications of energy data
369.
initial data
370.
initial data for AI
371.
initial data model
372.
in-network data processing
373.
insurance data
374.
knowledge discovery and data mining
375.
linked data
376.
linked open data
377.
linked open statistical data
378.
linked data
379.
lossless data compression
380.
low-pass data filtering
381.
Master Data Management
382.
medical claims data
383.
medical data
384.
Medical Data Reuse
385.
meta-data
386.
metered data
387.
methods: data analysis
388.
microplastic data uncertainty
389.
mobile data
390.
mobile phone big data
391.
mobile phone data
392.
mobile phone usage data
393.
mobile positioning data
394.
multisource data fusion
395.
multivariate data analysis
396.
Nigeria's National data protection regulation
397.
open data
398.
open data ecosystem
399.
open data format
400.
open data policies
401.
open government data
402.
open government data (OGD)
403.
open-data
404.
open-data platform
405.
OSM data
406.
oversharing personal data
407.
panel data
408.
parallel data processing
409.
passenger data
410.
patient-generated health data (PGHD)
411.
personal data
412.
personal data disclosure
413.
personal data processing
414.
personal data protection
415.
Personal Data Protection Act
416.
plan data
417.
point cloud data
418.
pollen data
419.
process and data modelling
420.
Product Data Management (PDM)
421.
public data-set
422.
random data
423.
real-time data
424.
real-time data collection
425.
reconstruction of gap-free data
426.
reference architecture for global health data space
427.
remote data transmission
428.
satellite data
429.
semantic data modelling
430.
semantic health data
431.
sequential data
432.
small data machine learning
433.
small training data set
434.
smart data analytics
435.
smart meter data
436.
social media data
437.
Spatial data
438.
spatial data analysis
439.
statistical data
440.
stochastic image data
441.
structured data
442.
student data analysis
443.
supervised learning data
444.
supervisory control and data acquisition (SCADA)
445.
surrogate data
446.
sustainable data governance
447.
sustainable data storage
448.
symbolic data
449.
symbolic data analysis
450.
synthetic data
451.
temperature historical data series
452.
three-way data
453.
time-selective data fusion
454.
training data
455.
Transcriptome data
456.
tree-like data structures
457.
underwater data center
458.
urban data
459.
urban data acquisition
460.
weather data
461.
web traffic data
462.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
463.
virtual data embassy
464.
Virtual Data Explorer
465.
18O data
466.
(big) data
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT