Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
data security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/429)
Export
export all inquiry results
(4)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book article EST
/
book article ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
3
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
4
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 4, displaying
1 - 4
keyword
425
1.
data security
2.
security of data
3.
metadata model for security measures
4.
security dataset
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security monitoring
17.
cyber security strategies
18.
cyber-security
19.
development of security cameras
20.
digital security practices
21.
drinking water security
22.
economic security
23.
economic security of enterprise
24.
emotional security
25.
energy security
26.
energy security indicator
27.
Estonian information security standard
28.
graded security
29.
hardware security
30.
hardware security primitive
31.
human security
32.
information security
33.
information security and privacy
34.
internal security
35.
international security
36.
investment and innovation security
37.
IPv6 security
38.
IT security
39.
IT security management
40.
job security
41.
long-term security
42.
Middle Eastern security
43.
Mobile security
44.
national cyber security strategy
45.
national security
46.
NATO. Science for Peace and Security Program
47.
network security
48.
network security monitoring
49.
OSCE (Organization for Security and Co-operation in Europe)
50.
passenger’s security
51.
policy-based routing security
52.
political and security cultures
53.
post-quantum security
54.
power system security
55.
quantitative security
56.
regional security
57.
RISC-V Security Verification
58.
safety and security testing
59.
security
60.
security adaptation
61.
security alert prioritization
62.
security analysis
63.
security and justice (AFSJ)
64.
Security and political science
65.
security and privacy
66.
security and privacy in smart grids
67.
Security Assertion Mining
68.
security closure
69.
Security Coverage
70.
security dilemma
71.
Security evaluation
72.
security evaluation instruments
73.
Security limitations
74.
security log analysis
75.
security management
76.
security model
77.
security monitoring
78.
security notion
79.
security objectives
80.
security of supply
81.
security operation center
82.
security operations center
83.
security patterns
84.
security policy
85.
security problem definition
86.
security proof
87.
security protocols
88.
security requirements
89.
security requirements engineering
90.
security risk assessment
91.
security risk management
92.
security risks
93.
security strategies
94.
security systems for military objects
95.
security testing
96.
security training
97.
security verification
98.
security-by-design
99.
social security planning
100.
societal security
101.
system of economic security
102.
system security
103.
terrorism security
104.
transmission System Security
105.
voting privacy and security
106.
accident data
107.
adversarial data perturbation
108.
AI-based data curation
109.
AIS data
110.
Aligned data
111.
ALS data enhancements
112.
Amazon Kinesis Data Analytics
113.
application data
114.
audio and visual data
115.
big data
116.
big data analysis
117.
big data analytics
118.
big data science
119.
big geo-data
120.
borehole data
121.
building lifecycle data
122.
call data record
123.
catalogue of data sources
124.
cellular phone data
125.
clinical data capture
126.
clinical data exchange
127.
compositional data
128.
conceptual data model
129.
construction data management
130.
control and data path tests
131.
critical data studies
132.
cross-border data exchange
133.
data
134.
data assimilation
135.
data protection
136.
data acquisition
137.
data acquisition system
138.
data acquisition systems
139.
data aggregation
140.
data alignment
141.
data analysis
142.
data analytics
143.
data analytics and machine learning
144.
data anisotropy
145.
data annotation
146.
data assimilation
147.
data attacks
148.
data augmentation
149.
data breach handling
150.
data capabilities
151.
data capture
152.
data center
153.
data center (DC)
154.
data centers
155.
data centre
156.
data centres
157.
data classification
158.
data clustering
159.
data collection
160.
data commons
161.
data compression
162.
data conversion
163.
data copy
164.
data dictionaries
165.
data discovery
166.
Data dissemination
167.
Data distribution structure
168.
data donation
169.
Data drift
170.
data driven planning
171.
data dropouts
172.
data embassy
173.
data engineering
174.
data enrichment
175.
data envelopment analysis
176.
data ethnography
177.
data exchange
178.
data exchange framework
179.
Data exchange layers
180.
data exchange platform
181.
data experts
182.
data filtering
183.
data fitting approach
184.
data flow languages
185.
data flow visualization
186.
data flows
187.
data fusion
188.
data generative model
189.
data governance
190.
data governance act
191.
data hiding
192.
data integration
193.
data integrity
194.
data intermediary
195.
data Interoperability
196.
data justice
197.
data labeling
198.
data lineage
199.
data logger
200.
data logistics
201.
data management
202.
data mappings
203.
Data Mart
204.
Data Mart (DM)
205.
data mesh
206.
data migration
207.
data mining
208.
data modeling
209.
data models
210.
data modem
211.
data movements
212.
data noise
213.
data offloading
214.
data ownership
215.
data platform
216.
data privacy
217.
data processing
218.
data product
219.
data protection
220.
data quality
221.
data quality management
222.
data quality maturity model
223.
data rate
224.
data reuse
225.
data re-use
226.
data routing
227.
data science
228.
data scraping
229.
data set
230.
data set generation
231.
data sets
232.
data sharing
233.
data simulation
234.
data simultaneity
235.
data sort
236.
data sources
237.
data spaces
238.
data storage
239.
data storage systems
240.
data stream mining
241.
data streams
242.
data structures
243.
data studies
244.
data subject
245.
data subjects
246.
data synthesis
247.
data to decision
248.
data types
249.
data validity
250.
data valorization
251.
data warehouse
252.
data warenhouse
253.
data visualization
254.
data-augmentation
255.
data-based computational psychiatry
256.
data-centric construction
257.
data-centric systems
258.
data-controlled circuit partition
259.
data-controlled segmentation
260.
data-driven
261.
data-driven characterization
262.
data-driven condition monitoring
263.
data-driven control
264.
Data-driven decision-making
265.
data-driven imputation
266.
Data-driven method
267.
data-driven model
268.
data-driven modeling
269.
data-driven optimization
270.
data-driven public services
271.
data-driven techniques
272.
data-exchange infrastructures
273.
data-exchange solutions
274.
data-flow architecture
275.
data‐fusion
276.
data-independent acquisition
277.
Data-information-knowledgewisdom (DIKW)
278.
data-intelligence
279.
data-mining
280.
data-science
281.
diagnostic data
282.
digital data exchange
283.
discrete data
284.
distributed data aggregation
285.
distributed data fusion
286.
distributed data mining
287.
distributed data mining (DDM)
288.
distributional data
289.
DNA microarray data
290.
educational data mining
291.
enterprise data analysis
292.
European Health Data Space
293.
European Health Data Space (EHDS)
294.
eventdriven data
295.
event-driven data
296.
experimental data
297.
exploratory data analysis
298.
false data injection attack
299.
field data
300.
financial data
301.
floating car data (FCD)
302.
flood data platform
303.
FMI open data
304.
functional data analysis
305.
GDPR (General Data Protection Regulation)
306.
general data protection regulation
307.
genome data
308.
global data hub
309.
GNSS-levelling data
310.
GNSS-RO data
311.
GRUAN data
312.
health data
313.
health data accessibility
314.
Health data anonymization
315.
health data custodianship
316.
health data governance
317.
health data integrity and transparency
318.
health data interoperability
319.
health data policy
320.
health data stewardship
321.
healthcare data
322.
heterogeneous sensor data
323.
high-dimensional data
324.
high-frequency data
325.
high-level test data generation
326.
historical data
327.
hyperspectral data
328.
imbalanced data
329.
implications of energy data
330.
initial data
331.
initial data for AI
332.
initial data model
333.
in-network data processing
334.
insurance data
335.
knowledge discovery and data mining
336.
linked data
337.
linked open data
338.
linked open statistical data
339.
linked data
340.
lossless data compression
341.
low-pass data filtering
342.
Master Data Management
343.
medical claims data
344.
medical data
345.
Medical Data Reuse
346.
meta-data
347.
metered data
348.
methods: data analysis
349.
microplastic data uncertainty
350.
mobile data
351.
mobile phone big data
352.
mobile phone data
353.
mobile phone usage data
354.
mobile positioning data
355.
multisource data fusion
356.
multivariate data analysis
357.
Nigeria's National data protection regulation
358.
open data
359.
open data ecosystem
360.
open data format
361.
open data policies
362.
open government data
363.
open government data (OGD)
364.
open-data
365.
OSM data
366.
oversharing personal data
367.
panel data
368.
parallel data processing
369.
passenger data
370.
patient-generated health data (PGHD)
371.
personal data
372.
personal data disclosure
373.
personal data processing
374.
personal data protection
375.
Personal Data Protection Act
376.
plan data
377.
point cloud data
378.
pollen data
379.
process and data modelling
380.
Product Data Management (PDM)
381.
public data-set
382.
random data
383.
real-time data
384.
real-time data collection
385.
reconstruction of gap-free data
386.
reference architecture for global health data space
387.
remote data transmission
388.
satellite data
389.
semantic data modelling
390.
semantic health data
391.
sequential data
392.
small data machine learning
393.
small training data set
394.
smart data analytics
395.
smart meter data
396.
social media data
397.
Spatial data
398.
spatial data analysis
399.
statistical data
400.
stochastic image data
401.
structured data
402.
student data analysis
403.
supervised learning data
404.
supervisory control and data acquisition (SCADA)
405.
surrogate data
406.
sustainable data governance
407.
symbolic data
408.
symbolic data analysis
409.
synthetic data
410.
temperature historical data series
411.
three-way data
412.
time-selective data fusion
413.
training data
414.
Transcriptome data
415.
tree-like data structures
416.
underwater data center
417.
urban data
418.
urban data acquisition
419.
weather data
420.
web traffic data
421.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
422.
virtual data embassy
423.
Virtual Data Explorer
424.
18O data
425.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT