Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
data security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
4
Vaata veel..
(2/484)
Ekspordi
ekspordi kõik päringu tulemused
(4)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
raamat
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
raamat
2
artikkel kogumikus EST
/
artikkel kogumikus ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
3
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 4, kuvan
1 - 4
võtmesõna
480
1.
data security
2.
data and information security
3.
security of data
4.
metadata model for security measures
5.
security dataset
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
cloud security
11.
communication system security
12.
comprehensive system of economic security
13.
computer security
14.
cooperative security dilemma
15.
cyber security
16.
cyber security education
17.
cyber security exercises
18.
cyber security monitoring
19.
cyber security monitoring in maritime
20.
cyber security strategies
21.
cyber-physical system security
22.
cyber-security
23.
development of security cameras
24.
digital security practices
25.
drinking water security
26.
economic security
27.
economic security of enterprise
28.
emotional security
29.
energy security
30.
energy security indicator
31.
Estonian information security standard
32.
graded security
33.
hardware security
34.
hardware security primitive
35.
high level of security
36.
Homeland security
37.
human security
38.
information security
39.
information security and privacy
40.
initial level of security
41.
internal security
42.
international security
43.
investment and innovation security
44.
IPv6 security
45.
IT security
46.
IT security management
47.
job security
48.
long-term security
49.
maritime cyber security
50.
maritime cyber security operations centers
51.
Maritime Security Operations Center (M-SOC)
52.
medium level of security
53.
Middle Eastern security
54.
Mobile security
55.
national cyber security strategy
56.
national security
57.
NATO. Science for Peace and Security Program
58.
network security
59.
network security monitoring
60.
OSCE (Organization for Security and Co-operation in Europe)
61.
passenger’s security
62.
policy-based routing security
63.
political and security cultures
64.
post-quantum security
65.
power system security
66.
quantitative security
67.
regional security
68.
RISC-V Security Verification
69.
Safety and Security in Sea Transportation
70.
safety and security testing
71.
security
72.
security adaptation
73.
security alert prioritization
74.
security analysis
75.
security and justice (AFSJ)
76.
Security and political science
77.
security and privacy
78.
security and privacy in smart grids
79.
Security Assertion
80.
Security Assertion Mining
81.
security closure
82.
Security Coverage
83.
security dilemma
84.
Security evaluation
85.
security evaluation instruments
86.
Security Level Evaluation
87.
Security limitations
88.
security log analysis
89.
security management
90.
security model
91.
security monitoring
92.
security notion
93.
security objectives
94.
security of supply
95.
security operation center
96.
security operations center
97.
security patterns
98.
security policy
99.
security problem definition
100.
security proof
101.
security protocols
102.
security requirements
103.
security requirements engineering
104.
security research
105.
security risk assessment
106.
security risk management
107.
security risks
108.
security science and technology
109.
security strategies
110.
security systems for military objects
111.
security testing
112.
security training
113.
security verification
114.
security-by-design
115.
social security planning
116.
societal security
117.
software security
118.
software security level
119.
software security subcharacteristics
120.
sufficient level of security
121.
system of economic security
122.
system security
123.
terrorism security
124.
transmission System Security
125.
voting privacy and security
126.
accident data
127.
adversarial data perturbation
128.
AI data centers
129.
AI-based data curation
130.
AIS data
131.
AIS data format optimization
132.
Aligned data
133.
ALS data enhancements
134.
Amazon Kinesis Data Analytics
135.
application data
136.
audio and visual data
137.
big data
138.
big data analysis
139.
big data analytics
140.
big data science
141.
big geo-data
142.
borehole data
143.
building lifecycle data
144.
call data record
145.
catalogue of data sources
146.
cellular phone data
147.
clinical data capture
148.
clinical data exchange
149.
compositional data
150.
conceptual data model
151.
construction data management
152.
consumption data
153.
control and data path tests
154.
critical data studies
155.
cross-border data exchange
156.
data
157.
data assimilation
158.
data protection
159.
data acquisition
160.
data acquisition efficiency
161.
data acquisition system
162.
data acquisition systems
163.
data aggregation
164.
data alignment
165.
Data Altruism
166.
Data Altruism Consent
167.
data analysis
168.
data analytics
169.
data analytics and machine learning
170.
data anisotropy
171.
data annotation
172.
data assimilation
173.
data attacks
174.
data augmentation
175.
data breach handling
176.
data capabilities
177.
data capture
178.
data center
179.
data center (DC)
180.
data center applications
181.
data centers
182.
data centre
183.
data centres
184.
data classification
185.
data clustering
186.
data collection
187.
data commons
188.
data compression
189.
data compression and normalization
190.
data conversion
191.
data copy
192.
data curation
193.
data curing
194.
data dictionaries
195.
data discovery
196.
Data dissemination
197.
Data distribution structure
198.
data donation
199.
Data drift
200.
data driven planning
201.
data dropouts
202.
Data Ecosystem
203.
data embassy
204.
data engineering
205.
data enrichment
206.
data envelopment analysis
207.
data ethics
208.
data ethnography
209.
data exchange
210.
data exchange framework
211.
Data exchange layers
212.
data exchange platform
213.
data experts
214.
data filtering
215.
data fitting approach
216.
data flow diagram
217.
data flow languages
218.
data flow visualization
219.
data flows
220.
data fusion
221.
data generative model
222.
data governance
223.
data governance act
224.
data harmonization
225.
data hiding
226.
data integration
227.
data integrity
228.
data intermediary
229.
data Interoperability
230.
data justice
231.
data labeling
232.
data limitations in public sector
233.
data lineage
234.
data literacy
235.
data logger
236.
data logistics
237.
data management
238.
data mappings
239.
Data Mart
240.
Data Mart (DM)
241.
data mesh
242.
data migration
243.
data mining
244.
data mining and knowledge discovery
245.
data modeling
246.
data models
247.
data modem
248.
data movements
249.
data noise
250.
data offloading
251.
data ownership
252.
data platform
253.
data privacy
254.
data processing
255.
data product
256.
data protection
257.
data publishing
258.
data quality
259.
data quality management
260.
data quality maturity model
261.
data rate
262.
data representativeness
263.
data reuse
264.
data re-use
265.
data routing
266.
data scarce environments
267.
data science
268.
data scraping
269.
data set
270.
data set generation
271.
data sets
272.
data sharing
273.
data simulation
274.
data simultaneity
275.
data sort
276.
data sources
277.
data spaces
278.
data storage
279.
data storage systems
280.
data stream mining
281.
data streams
282.
data structures
283.
data studies
284.
data subject
285.
data subjects
286.
data synthesis
287.
data to decision
288.
data types
289.
data validity
290.
data valorization
291.
data warehouse
292.
data warenhouse
293.
data visualization
294.
data-augmentation
295.
data-based computational psychiatry
296.
data-centric construction
297.
data-centric systems
298.
data-controlled circuit partition
299.
data-controlled segmentation
300.
data-driven
301.
data-driven characterization
302.
data-driven condition monitoring
303.
data-driven control
304.
Data-driven decision-making
305.
data-driven diagnostics
306.
data-driven imputation
307.
Data-driven method
308.
data-driven model
309.
data-driven modeling
310.
data-driven optimization
311.
data-driven policy
312.
data-driven public services
313.
data-driven strategic planning
314.
data-driven techniques
315.
data-exchange infrastructures
316.
data-exchange solutions
317.
data-flow architecture
318.
data‐fusion
319.
data-independent acquisition
320.
Data-information-knowledgewisdom (DIKW)
321.
data-intelligence
322.
data-mining
323.
data-science
324.
data-sharing
325.
diagnostic data
326.
digital data exchange
327.
discrete data
328.
distributed data aggregation
329.
distributed data fusion
330.
distributed data mining
331.
distributed data mining (DDM)
332.
distributional data
333.
DNA microarray data
334.
easy data augmentation
335.
educational data mining
336.
educational data-mining
337.
empirical data
338.
enterprise data analysis
339.
European Health Data Space
340.
European Health Data Space (EHDS)
341.
eventdriven data
342.
event-driven data
343.
experimental data
344.
exploratory data analysis
345.
fair data
346.
false data injection attack
347.
field data
348.
financial data
349.
floating car data (FCD)
350.
flood data platform
351.
FMI open data
352.
functional data analysis
353.
GDPR (General Data Protection Regulation)
354.
general data protection regulation
355.
genome data
356.
global data hub
357.
global navigation data
358.
GNSS-levelling data
359.
GNSS-RO data
360.
GRUAN data
361.
health data
362.
health data accessibility
363.
Health data anonymization
364.
health data custodianship
365.
health data governance
366.
health data integrity and transparency
367.
health data interoperability
368.
health data policy
369.
health data stewardship
370.
healthcare data
371.
heat meter data
372.
heterogeneous data
373.
heterogeneous sensor data
374.
high-dimensional data
375.
high-frequency data
376.
high-level test data generation
377.
historical data
378.
hyperspectral data
379.
imbalanced data
380.
implications of energy data
381.
initial data
382.
initial data for AI
383.
initial data model
384.
in-network data processing
385.
insurance data
386.
knowledge discovery and data mining
387.
linked data
388.
linked open data
389.
linked open statistical data
390.
linked data
391.
lossless data compression
392.
low-pass data filtering
393.
Master Data Management
394.
medical claims data
395.
medical data
396.
Medical Data Reuse
397.
meta-data
398.
metered data
399.
methods: data analysis
400.
microplastic data uncertainty
401.
mobile data
402.
mobile phone big data
403.
mobile phone data
404.
mobile phone usage data
405.
mobile positioning data
406.
multisource data fusion
407.
multivariate data analysis
408.
Nigeria's National data protection regulation
409.
on/off-chain data storages
410.
open data
411.
open data ecosystem
412.
open data format
413.
open data policies
414.
open government data
415.
open government data (OGD)
416.
open-data
417.
open-data platform
418.
OSM data
419.
oversharing personal data
420.
panel data
421.
parallel data processing
422.
passenger data
423.
patient-generated health data (PGHD)
424.
personal data
425.
personal data disclosure
426.
personal data processing
427.
personal data protection
428.
Personal Data Protection Act
429.
plan data
430.
point cloud data
431.
pollen data
432.
process and data modelling
433.
Product Data Management (PDM)
434.
public data-set
435.
random data
436.
real-time data
437.
real-time data collection
438.
reconstruction of gap-free data
439.
reference architecture for global health data space
440.
remote data transmission
441.
satellite data
442.
semantic data modelling
443.
semantic health data
444.
sensitive data
445.
sequential data
446.
small data machine learning
447.
small training data set
448.
smart data analytics
449.
smart meter data
450.
social media data
451.
Spatial data
452.
spatial data analysis
453.
statistical data
454.
stochastic image data
455.
structured data
456.
student data analysis
457.
supervised learning data
458.
supervisory control and data acquisition (SCADA)
459.
surrogate data
460.
sustainable data governance
461.
sustainable data storage
462.
symbolic data
463.
symbolic data analysis
464.
synthetic data
465.
temperature historical data series
466.
three-way data
467.
time-selective data fusion
468.
training data
469.
Transcriptome data
470.
tree-like data structures
471.
underwater data center
472.
urban data
473.
urban data acquisition
474.
weather data
475.
web traffic data
476.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
477.
virtual data embassy
478.
Virtual Data Explorer
479.
18O data
480.
(big) data
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT