Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
data security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
4
Vaata veel..
(2/389)
Ekspordi
ekspordi kõik päringu tulemused
(4)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
raamat
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
raamat
2
artikkel kogumikus EST
/
artikkel kogumikus ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
3
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 4, kuvan
1 - 4
võtmesõna
385
1.
data security
2.
security of data
3.
metadata model for security measures
4.
security dataset
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security strategies
17.
cyber-security
18.
development of security cameras
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
Estonian information security standard
26.
graded security
27.
hardware security
28.
hardware security primitive
29.
human security
30.
information security
31.
internal security
32.
international security
33.
investment and innovation security
34.
IPv6 security
35.
IT security
36.
IT security management
37.
job security
38.
long-term security
39.
Middle Eastern security
40.
Mobile security
41.
national cyber security strategy
42.
national security
43.
NATO. Science for Peace and Security Program
44.
network security
45.
network security monitoring
46.
OSCE (Organization for Security and Co-operation in Europe)
47.
passenger’s security
48.
policy-based routing security
49.
political and security cultures
50.
post-quantum security
51.
power system security
52.
quantitative security
53.
regional security
54.
RISC-V Security Verification
55.
safety and security testing
56.
security
57.
security adaptation
58.
security alert prioritization
59.
security analysis
60.
security and justice (AFSJ)
61.
security and privacy
62.
security and privacy in smart grids
63.
Security Assertion Mining
64.
security closure
65.
Security Coverage
66.
security dilemma
67.
Security evaluation
68.
security evaluation instruments
69.
security log analysis
70.
security management
71.
security model
72.
security monitoring
73.
security notion
74.
security objectives
75.
security of supply
76.
security operation center
77.
security operations center
78.
security patterns
79.
security policy
80.
security problem definition
81.
security proof
82.
security protocols
83.
security requirements
84.
security requirements engineering
85.
security risk assessment
86.
security risk management
87.
security strategies
88.
security systems for military objects
89.
security testing
90.
security training
91.
security verification
92.
security-by-design
93.
social security planning
94.
societal security
95.
system of economic security
96.
system security
97.
terrorism security
98.
transmission System Security
99.
voting privacy and security
100.
accident data
101.
adversarial data perturbation
102.
AI-based data curation
103.
AIS data
104.
Aligned data
105.
ALS data enhancements
106.
Amazon Kinesis Data Analytics
107.
application data
108.
audio and visual data
109.
big data
110.
big data analysis
111.
big data analytics
112.
big data science
113.
big geo-data
114.
borehole data
115.
building lifecycle data
116.
call data record
117.
catalogue of data sources
118.
cellular phone data
119.
clinical data capture
120.
clinical data exchange
121.
compositional data
122.
conceptual data model
123.
control and data path tests
124.
critical data studies
125.
cross-border data exchange
126.
data
127.
data assimilation
128.
data protection
129.
data acquisition
130.
data acquisition system
131.
data acquisition systems
132.
data aggregation
133.
data alignment
134.
data analysis
135.
data analytics
136.
data anisotropy
137.
data annotation
138.
data assimilation
139.
data attacks
140.
data augmentation
141.
data breach handling
142.
data capabilities
143.
data capture
144.
data center
145.
data center (DC)
146.
data centers
147.
data centre
148.
data centres
149.
data classification
150.
data clustering
151.
data collection
152.
data commons
153.
data compression
154.
data conversion
155.
data copy
156.
data dictionaries
157.
data discovery
158.
Data dissemination
159.
Data distribution structure
160.
Data drift
161.
data driven planning
162.
data embassy
163.
data engineering
164.
data envelopment analysis
165.
data ethnography
166.
data exchange
167.
data exchange framework
168.
Data exchange layers
169.
data exchange platform
170.
data experts
171.
data filtering
172.
data fitting approach
173.
data flow languages
174.
data flow visualization
175.
data fusion
176.
data generative model
177.
data governance
178.
data integration
179.
data integrity
180.
data intermediary
181.
data Interoperability
182.
data justice
183.
data labeling
184.
data lineage
185.
data logger
186.
data logistics
187.
data management
188.
data mappings
189.
Data Mart
190.
data mesh
191.
data mining
192.
data modeling
193.
data models
194.
data modem
195.
data noise
196.
data offloading
197.
data ownership
198.
data platform
199.
data privacy
200.
data processing
201.
data product
202.
data protection
203.
data quality
204.
data quality management
205.
data quality maturity model
206.
data rate
207.
data reuse
208.
data re-use
209.
data routing
210.
data science
211.
data scraping
212.
data set
213.
data set generation
214.
data sets
215.
data sharing
216.
data simulation
217.
data simultaneity
218.
data sort
219.
data sources
220.
data storage
221.
data storage systems
222.
data stream mining
223.
data streams
224.
data studies
225.
data subject
226.
data synthesis
227.
data to decision
228.
data types
229.
data validity
230.
data valorization
231.
data warehouse
232.
data warenhouse
233.
data visualization
234.
data-based computational psychiatry
235.
data-centric construction
236.
data-centric systems
237.
data-controlled circuit partition
238.
data-controlled segmentation
239.
data-driven
240.
data-driven characterization
241.
data-driven condition monitoring
242.
Data-driven method
243.
data-driven modeling
244.
data-exchange infrastructures
245.
data-exchange solutions
246.
data‐fusion
247.
data-independent acquisition
248.
Data-information-knowledgewisdom (DIKW)
249.
data-intelligence
250.
data-mining
251.
data-science
252.
diagnostic data
253.
digital data exchange
254.
discrete data
255.
distributed data aggregation
256.
distributed data fusion
257.
distributed data mining
258.
distributed data mining (DDM)
259.
DNA microarray data
260.
educational data mining
261.
enterprise data analysis
262.
European Health Data Space
263.
European Health Data Space (EHDS)
264.
eventdriven data
265.
event-driven data
266.
experimental data
267.
exploratory data analysis
268.
false data injection attack
269.
field data
270.
financial data
271.
floating car data (FCD)
272.
flood data platform
273.
FMI open data
274.
functional data analysis
275.
GDPR (General Data Protection Regulation)
276.
general data protection regulation
277.
genome data
278.
global data hub
279.
GNSS-levelling data
280.
health data
281.
health data accessibility
282.
Health data anonymization
283.
health data custodianship
284.
health data governance
285.
health data interoperability
286.
health data policy
287.
health data stewardship
288.
healthcare data
289.
heterogeneous sensor data
290.
high-dimensional data
291.
high-frequency data
292.
high-level test data generation
293.
historical data
294.
hyperspectral data
295.
imbalanced data
296.
implications of energy data
297.
initial data
298.
in-network data processing
299.
insurance data
300.
knowledge discovery and data mining
301.
linked data
302.
linked open data
303.
linked open statistical data
304.
linked data
305.
lossless data compression
306.
low-pass data filtering
307.
Master Data Management
308.
medical claims data
309.
medical data
310.
Medical Data Reuse
311.
meta-data
312.
metered data
313.
methods: data analysis
314.
microplastic data uncertainty
315.
mobile data
316.
mobile phone big data
317.
mobile phone data
318.
mobile phone usage data
319.
mobile positioning data
320.
multisource data fusion
321.
multivariate data analysis
322.
Nigeria's National data protection regulation
323.
open data
324.
open data ecosystem
325.
open data format
326.
open data policies
327.
open government data
328.
open government data (OGD)
329.
OSM data
330.
oversharing personal data
331.
panel data
332.
parallel data processing
333.
passenger data
334.
patient-generated health data (PGHD)
335.
personal data
336.
personal data disclosure
337.
personal data processing
338.
personal data protection
339.
Personal Data Protection Act
340.
plan data
341.
point cloud data
342.
pollen data
343.
process and data modelling
344.
public data-set
345.
random data
346.
real-time data
347.
reconstruction of gap-free data
348.
reference architecture for global health data space
349.
remote data transmission
350.
satellite data
351.
semantic data modelling
352.
semantic health data
353.
sequential data
354.
small data machine learning
355.
small training data set
356.
smart data analytics
357.
smart meter data
358.
social media data
359.
Spatial data
360.
spatial data analysis
361.
statistical data
362.
stochastic image data
363.
structured data
364.
student data analysis
365.
supervised learning data
366.
supervisory control and data acquisition (SCADA)
367.
surrogate data
368.
sustainable data governance
369.
symbolic data
370.
symbolic data analysis
371.
synthetic data
372.
time-selective data fusion
373.
training data
374.
Transcriptome data
375.
tree-like data structures
376.
underwater data center
377.
urban data
378.
urban data acquisition
379.
weather data
380.
web traffic data
381.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
382.
virtual data embassy
383.
Virtual Data Explorer
384.
18O data
385.
(big) data
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT