Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
data security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
3
Look more..
(2/330)
Export
export all inquiry results
(3)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
3
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 3, displaying
1 - 3
keyword
327
1.
data security
2.
security of data
3.
metadata model for security measures
4.
security dataset
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security strategies
17.
cyber-security
18.
development of security cameras
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
graded security
26.
hardware security
27.
hardware security primitive
28.
human security
29.
information security
30.
internal security
31.
international security
32.
investment and innovation security
33.
IPv6 security
34.
IT security
35.
job security
36.
long-term security
37.
Middle Eastern security
38.
Mobile security
39.
national cyber security strategy
40.
national security
41.
NATO. Science for Peace and Security Program
42.
network security
43.
network security monitoring
44.
OSCE (Organization for Security and Co-operation in Europe)
45.
passenger’s security
46.
policy-based routing security
47.
political and security cultures
48.
post-quantum security
49.
power system security
50.
quantitative security
51.
regional security
52.
RISC-V Security Verification
53.
security
54.
security and privacy
55.
security and privacy in smart grids
56.
Security Assertion Mining
57.
security closure
58.
Security Coverage
59.
security dilemma
60.
Security evaluation
61.
security log analysis
62.
security management
63.
security model
64.
security monitoring
65.
security notion
66.
security objectives
67.
security of supply
68.
security operation center
69.
security patterns
70.
security problem definition
71.
security proof
72.
security protocols
73.
security requirements
74.
security requirements engineering
75.
security risk assessment
76.
security risk management
77.
security strategies
78.
security systems for military objects
79.
security testing
80.
security training
81.
security verification
82.
social security planning
83.
societal security
84.
system of economic security
85.
system security
86.
terrorism security
87.
transmission System Security
88.
voting privacy and security
89.
accident data
90.
AIS data
91.
ALS data enhancements
92.
application data
93.
audio and visual data
94.
big data
95.
big data analysis
96.
big data analytics
97.
borehole data
98.
clinical data capture
99.
conceptual data model
100.
control and data path tests
101.
critical data studies
102.
cross-border data exchange
103.
data
104.
data assimilation
105.
data protection
106.
data acquisition
107.
data acquisition system
108.
data aggregation
109.
data alignment
110.
data analysis
111.
data analytics
112.
data anisotropy
113.
data annotation
114.
data assimilation
115.
data augmentation
116.
data center
117.
data center (DC)
118.
data centers
119.
data centre
120.
data centres
121.
data classification
122.
data clustering
123.
data collection
124.
data commons
125.
data compression
126.
data conversion
127.
data copy
128.
data dictionaries
129.
data discovery
130.
Data dissemination
131.
Data distribution structure
132.
Data drift
133.
data driven planning
134.
data embassy
135.
data engineering
136.
data envelopment analysis
137.
data ethnography
138.
data exchange
139.
data exchange framework
140.
Data exchange layers
141.
data exchange platform
142.
data experts
143.
data filtering
144.
data flow languages
145.
data flow visualization
146.
data fusion
147.
data generative model
148.
data governance
149.
data integration
150.
data integrity
151.
data justice
152.
data lineage
153.
data logger
154.
data logistics
155.
data management
156.
data mappings
157.
Data Mart
158.
data mesh
159.
data mining
160.
data modeling
161.
data models
162.
data modem
163.
data noise
164.
data ownership
165.
data platform
166.
data privacy
167.
data processing
168.
data product
169.
data protection
170.
data quality
171.
data quality management
172.
data quality maturity model
173.
data rate
174.
data reuse
175.
data re-use
176.
data routing
177.
data science
178.
data scraping
179.
data sets
180.
data sharing
181.
data simulation
182.
data simultaneity
183.
data sort
184.
data sources
185.
data storage
186.
data storage systems
187.
data stream mining
188.
data streams
189.
data studies
190.
data subject
191.
data synthesis
192.
data to decision
193.
data types
194.
data validity
195.
data valorization
196.
data warehouse
197.
data warenhouse
198.
data visualization
199.
data-centric construction
200.
data-centric systems
201.
data-controlled circuit partition
202.
data-controlled segmentation
203.
data-driven
204.
data-driven characterization
205.
Data-driven method
206.
data-driven modeling
207.
data-exchange infrastructures
208.
data-exchange solutions
209.
data‐fusion
210.
data-independent acquisition
211.
Data-information-knowledgewisdom (DIKW)
212.
data-intelligence
213.
data-mining
214.
data-science
215.
diagnostic data
216.
digital data exchange
217.
discrete data
218.
distributed data aggregation
219.
distributed data fusion
220.
distributed data mining
221.
distributed data mining (DDM)
222.
DNA microarray data
223.
educational data mining
224.
eventdriven data
225.
event-driven data
226.
experimental data
227.
exploratory data analysis
228.
false data injection attack
229.
field data
230.
financial data
231.
floating car data (FCD)
232.
FMI open data
233.
functional data analysis
234.
GDPR (General Data Protection Regulation)
235.
general data protection regulation
236.
global data hub
237.
GNSS-levelling data
238.
health data
239.
Health data anonymization
240.
health data interoperability
241.
healthcare data
242.
heterogeneous sensor data
243.
high-dimensional data
244.
high-frequency data
245.
high-level test data generation
246.
historical data
247.
hyperspectral data
248.
imbalanced data
249.
implications of energy data
250.
initial data
251.
in-network data processing
252.
insurance data
253.
knowledge discovery and data mining
254.
linked data
255.
linked open data
256.
linked open statistical data
257.
linked data
258.
lossless data compression
259.
low-pass data filtering
260.
Master Data Management
261.
medical claims data
262.
medical data
263.
Medical Data Reuse
264.
meta-data
265.
microplastic data uncertainty
266.
mobile phone big data
267.
mobile phone data
268.
mobile phone usage data
269.
mobile positioning data
270.
multisource data fusion
271.
multivariate data analysis
272.
Nigeria's National data protection regulation
273.
open data
274.
open data ecosystem
275.
open data format
276.
open data policies
277.
open government data
278.
open government data (OGD)
279.
OSM data
280.
oversharing personal data
281.
panel data
282.
parallel data processing
283.
passenger data
284.
personal data
285.
personal data disclosure
286.
personal data processing
287.
personal data protection
288.
Personal Data Protection Act
289.
plan data
290.
point cloud data
291.
process and data modelling
292.
public data-set
293.
real-time data
294.
reconstruction of gap-free data
295.
remote data transmission
296.
satellite data
297.
sequential data
298.
small data machine learning
299.
smart data analytics
300.
smart meter data
301.
social media data
302.
Spatial data
303.
spatial data analysis
304.
statistical data
305.
stochastic image data
306.
structured data
307.
student data analysis
308.
supervised learning data
309.
supervisory control and data acquisition (SCADA)
310.
surrogate data
311.
sustainable data governance
312.
symbolic data
313.
symbolic data analysis
314.
synthetic data
315.
time-selective data fusion
316.
training data
317.
Transcriptome data
318.
tree-like data structures
319.
urban data
320.
urban data acquisition
321.
weather data
322.
web traffic data
323.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
324.
virtual data embassy
325.
Virtual Data Explorer
326.
18O data
327.
(big) data
subject term
3
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Greenergy Data Centers
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT