Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security of data (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/464)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Black-box separations and their adaptability to the non-uniform model
Buldas, Ahto
;
Niitsoo, Margus
Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings
2013
/
p. 152-167
https://doi.org/10.1007/978-3-642-39059-3_11
Conference Proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
2
artikkel kogumikus
A security verification template to assess cache architecture vulnerabilities
Ghasempouri, Tara
;
Raik, Jaan
;
Paul, Kolin
;
Reinbrecht, Cezar
;
Hamdioui, Said
;
Taouil, M.
2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), April 22nd – 24th 2020 Novi Sad, Serbia : Proceedings
2020
/
art. 9095707, 6 p
https://doi.org/10.1109/DDECS50862.2020.9095707
artikkel kogumikus
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
460
1.
security of data
2.
data and information security
3.
data security
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security strategies
17.
cyber-security
18.
development of security cameras
19.
digital security practices
20.
drinking water security
21.
economic security
22.
economic security of enterprise
23.
emotional security
24.
energy security
25.
energy security indicator
26.
Estonian information security standard
27.
graded security
28.
hardware security
29.
hardware security primitive
30.
high level of security
31.
Homeland security
32.
human security
33.
information security
34.
information security and privacy
35.
initial level of security
36.
internal security
37.
international security
38.
investment and innovation security
39.
IPv6 security
40.
IT security
41.
IT security management
42.
job security
43.
long-term security
44.
maritime cyber security
45.
maritime cyber security operations centers
46.
Maritime Security Operations Center (M-SOC)
47.
medium level of security
48.
metadata model for security measures
49.
Middle Eastern security
50.
Mobile security
51.
national cyber security strategy
52.
national security
53.
NATO. Science for Peace and Security Program
54.
network security
55.
network security monitoring
56.
OSCE (Organization for Security and Co-operation in Europe)
57.
passenger’s security
58.
policy-based routing security
59.
political and security cultures
60.
post-quantum security
61.
power system security
62.
quantitative security
63.
regional security
64.
RISC-V Security Verification
65.
Safety and Security in Sea Transportation
66.
safety and security testing
67.
security
68.
security adaptation
69.
security alert prioritization
70.
security analysis
71.
security and justice (AFSJ)
72.
Security and political science
73.
security and privacy
74.
security and privacy in smart grids
75.
Security Assertion Mining
76.
security closure
77.
Security Coverage
78.
security dataset
79.
security dilemma
80.
Security evaluation
81.
security evaluation instruments
82.
Security limitations
83.
security log analysis
84.
security management
85.
security model
86.
security monitoring
87.
security notion
88.
security objectives
89.
security of supply
90.
security operation center
91.
security operations center
92.
security patterns
93.
security policy
94.
security problem definition
95.
security proof
96.
security protocols
97.
security requirements
98.
security requirements engineering
99.
security risk assessment
100.
security risk management
101.
security risks
102.
security science and technology
103.
security strategies
104.
security systems for military objects
105.
security testing
106.
security training
107.
security verification
108.
security-by-design
109.
social security planning
110.
societal security
111.
software security
112.
software security level
113.
software security subcharacteristics
114.
sufficient level of security
115.
system of economic security
116.
system security
117.
terrorism security
118.
transmission System Security
119.
voting privacy and security
120.
accident data
121.
adversarial data perturbation
122.
AI-based data curation
123.
AIS data
124.
AIS data format optimization
125.
Aligned data
126.
ALS data enhancements
127.
Amazon Kinesis Data Analytics
128.
application data
129.
audio and visual data
130.
big data
131.
big data analysis
132.
big data analytics
133.
big data science
134.
big geo-data
135.
borehole data
136.
building lifecycle data
137.
call data record
138.
catalogue of data sources
139.
cellular phone data
140.
clinical data capture
141.
clinical data exchange
142.
compositional data
143.
conceptual data model
144.
construction data management
145.
control and data path tests
146.
critical data studies
147.
cross-border data exchange
148.
data
149.
data assimilation
150.
data protection
151.
data acquisition
152.
data acquisition system
153.
data acquisition systems
154.
data aggregation
155.
data alignment
156.
Data Altruism
157.
Data Altruism Consent
158.
data analysis
159.
data analytics
160.
data analytics and machine learning
161.
data anisotropy
162.
data annotation
163.
data assimilation
164.
data attacks
165.
data augmentation
166.
data breach handling
167.
data capabilities
168.
data capture
169.
data center
170.
data center (DC)
171.
data center applications
172.
data centers
173.
data centre
174.
data centres
175.
data classification
176.
data clustering
177.
data collection
178.
data commons
179.
data compression
180.
data compression and normalization
181.
data conversion
182.
data copy
183.
data curation
184.
data curing
185.
data dictionaries
186.
data discovery
187.
Data dissemination
188.
Data distribution structure
189.
data donation
190.
Data drift
191.
data driven planning
192.
data dropouts
193.
Data Ecosystem
194.
data embassy
195.
data engineering
196.
data enrichment
197.
data envelopment analysis
198.
data ethnography
199.
data exchange
200.
data exchange framework
201.
Data exchange layers
202.
data exchange platform
203.
data experts
204.
data filtering
205.
data fitting approach
206.
data flow languages
207.
data flow visualization
208.
data flows
209.
data fusion
210.
data generative model
211.
data governance
212.
data governance act
213.
data harmonization
214.
data hiding
215.
data integration
216.
data integrity
217.
data intermediary
218.
data Interoperability
219.
data justice
220.
data labeling
221.
data limitations in public sector
222.
data lineage
223.
data literacy
224.
data logger
225.
data logistics
226.
data management
227.
data mappings
228.
Data Mart
229.
Data Mart (DM)
230.
data mesh
231.
data migration
232.
data mining
233.
data mining and knowledge discovery
234.
data modeling
235.
data models
236.
data modem
237.
data movements
238.
data noise
239.
data offloading
240.
data ownership
241.
data platform
242.
data privacy
243.
data processing
244.
data product
245.
data protection
246.
data publishing
247.
data quality
248.
data quality management
249.
data quality maturity model
250.
data rate
251.
data representativeness
252.
data reuse
253.
data re-use
254.
data routing
255.
data scarce environments
256.
data science
257.
data scraping
258.
data set
259.
data set generation
260.
data sets
261.
data sharing
262.
data simulation
263.
data simultaneity
264.
data sort
265.
data sources
266.
data spaces
267.
data storage
268.
data storage systems
269.
data stream mining
270.
data streams
271.
data structures
272.
data studies
273.
data subject
274.
data subjects
275.
data synthesis
276.
data to decision
277.
data types
278.
data validity
279.
data valorization
280.
data warehouse
281.
data warenhouse
282.
data visualization
283.
data-augmentation
284.
data-based computational psychiatry
285.
data-centric construction
286.
data-centric systems
287.
data-controlled circuit partition
288.
data-controlled segmentation
289.
data-driven
290.
data-driven characterization
291.
data-driven condition monitoring
292.
data-driven control
293.
Data-driven decision-making
294.
data-driven imputation
295.
Data-driven method
296.
data-driven model
297.
data-driven modeling
298.
data-driven optimization
299.
data-driven policy
300.
data-driven public services
301.
data-driven techniques
302.
data-exchange infrastructures
303.
data-exchange solutions
304.
data-flow architecture
305.
data‐fusion
306.
data-independent acquisition
307.
Data-information-knowledgewisdom (DIKW)
308.
data-intelligence
309.
data-mining
310.
data-science
311.
data-sharing
312.
diagnostic data
313.
digital data exchange
314.
discrete data
315.
distributed data aggregation
316.
distributed data fusion
317.
distributed data mining
318.
distributed data mining (DDM)
319.
distributional data
320.
DNA microarray data
321.
educational data mining
322.
educational data-mining
323.
enterprise data analysis
324.
European Health Data Space
325.
European Health Data Space (EHDS)
326.
eventdriven data
327.
event-driven data
328.
experimental data
329.
exploratory data analysis
330.
fair data
331.
false data injection attack
332.
field data
333.
financial data
334.
floating car data (FCD)
335.
flood data platform
336.
FMI open data
337.
functional data analysis
338.
GDPR (General Data Protection Regulation)
339.
general data protection regulation
340.
genome data
341.
global data hub
342.
GNSS-levelling data
343.
GNSS-RO data
344.
GRUAN data
345.
health data
346.
health data accessibility
347.
Health data anonymization
348.
health data custodianship
349.
health data governance
350.
health data integrity and transparency
351.
health data interoperability
352.
health data policy
353.
health data stewardship
354.
healthcare data
355.
heterogeneous sensor data
356.
high-dimensional data
357.
high-frequency data
358.
high-level test data generation
359.
historical data
360.
hyperspectral data
361.
imbalanced data
362.
implications of energy data
363.
initial data
364.
initial data for AI
365.
initial data model
366.
in-network data processing
367.
insurance data
368.
knowledge discovery and data mining
369.
linked data
370.
linked open data
371.
linked open statistical data
372.
linked data
373.
lossless data compression
374.
low-pass data filtering
375.
Master Data Management
376.
medical claims data
377.
medical data
378.
Medical Data Reuse
379.
meta-data
380.
metered data
381.
methods: data analysis
382.
microplastic data uncertainty
383.
mobile data
384.
mobile phone big data
385.
mobile phone data
386.
mobile phone usage data
387.
mobile positioning data
388.
multisource data fusion
389.
multivariate data analysis
390.
Nigeria's National data protection regulation
391.
open data
392.
open data ecosystem
393.
open data format
394.
open data policies
395.
open government data
396.
open government data (OGD)
397.
open-data
398.
open-data platform
399.
OSM data
400.
oversharing personal data
401.
panel data
402.
parallel data processing
403.
passenger data
404.
patient-generated health data (PGHD)
405.
personal data
406.
personal data disclosure
407.
personal data processing
408.
personal data protection
409.
Personal Data Protection Act
410.
plan data
411.
point cloud data
412.
pollen data
413.
process and data modelling
414.
Product Data Management (PDM)
415.
public data-set
416.
random data
417.
real-time data
418.
real-time data collection
419.
reconstruction of gap-free data
420.
reference architecture for global health data space
421.
remote data transmission
422.
satellite data
423.
semantic data modelling
424.
semantic health data
425.
sequential data
426.
small data machine learning
427.
small training data set
428.
smart data analytics
429.
smart meter data
430.
social media data
431.
Spatial data
432.
spatial data analysis
433.
statistical data
434.
stochastic image data
435.
structured data
436.
student data analysis
437.
supervised learning data
438.
supervisory control and data acquisition (SCADA)
439.
surrogate data
440.
sustainable data governance
441.
sustainable data storage
442.
symbolic data
443.
symbolic data analysis
444.
synthetic data
445.
temperature historical data series
446.
three-way data
447.
time-selective data fusion
448.
training data
449.
Transcriptome data
450.
tree-like data structures
451.
underwater data center
452.
urban data
453.
urban data acquisition
454.
weather data
455.
web traffic data
456.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
457.
virtual data embassy
458.
Virtual Data Explorer
459.
18O data
460.
(big) data
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT