Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
data security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
3
Look more..
(2/347)
Export
export all inquiry results
(3)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
3
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 3, displaying
1 - 3
keyword
344
1.
data security
2.
security of data
3.
metadata model for security measures
4.
security dataset
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security strategies
17.
cyber-security
18.
development of security cameras
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
graded security
26.
hardware security
27.
hardware security primitive
28.
human security
29.
information security
30.
internal security
31.
international security
32.
investment and innovation security
33.
IPv6 security
34.
IT security
35.
IT security management
36.
job security
37.
long-term security
38.
Middle Eastern security
39.
Mobile security
40.
national cyber security strategy
41.
national security
42.
NATO. Science for Peace and Security Program
43.
network security
44.
network security monitoring
45.
OSCE (Organization for Security and Co-operation in Europe)
46.
passenger’s security
47.
policy-based routing security
48.
political and security cultures
49.
post-quantum security
50.
power system security
51.
quantitative security
52.
regional security
53.
RISC-V Security Verification
54.
security
55.
security and privacy
56.
security and privacy in smart grids
57.
Security Assertion Mining
58.
security closure
59.
Security Coverage
60.
security dilemma
61.
Security evaluation
62.
security log analysis
63.
security management
64.
security model
65.
security monitoring
66.
security notion
67.
security objectives
68.
security of supply
69.
security operation center
70.
security patterns
71.
security policy
72.
security problem definition
73.
security proof
74.
security protocols
75.
security requirements
76.
security requirements engineering
77.
security risk assessment
78.
security risk management
79.
security strategies
80.
security systems for military objects
81.
security testing
82.
security training
83.
security verification
84.
social security planning
85.
societal security
86.
system of economic security
87.
system security
88.
terrorism security
89.
transmission System Security
90.
voting privacy and security
91.
accident data
92.
adversarial data perturbation
93.
AIS data
94.
Aligned data
95.
ALS data enhancements
96.
application data
97.
audio and visual data
98.
big data
99.
big data analysis
100.
big data analytics
101.
borehole data
102.
building lifecycle data
103.
call data record
104.
clinical data capture
105.
conceptual data model
106.
control and data path tests
107.
critical data studies
108.
cross-border data exchange
109.
data
110.
data assimilation
111.
data protection
112.
data acquisition
113.
data acquisition system
114.
data acquisition systems
115.
data aggregation
116.
data alignment
117.
data analysis
118.
data analytics
119.
data anisotropy
120.
data annotation
121.
data assimilation
122.
data attacks
123.
data augmentation
124.
data capabilities
125.
data capture
126.
data center
127.
data center (DC)
128.
data centers
129.
data centre
130.
data centres
131.
data classification
132.
data clustering
133.
data collection
134.
data commons
135.
data compression
136.
data conversion
137.
data copy
138.
data dictionaries
139.
data discovery
140.
Data dissemination
141.
Data distribution structure
142.
Data drift
143.
data driven planning
144.
data embassy
145.
data engineering
146.
data envelopment analysis
147.
data ethnography
148.
data exchange
149.
data exchange framework
150.
Data exchange layers
151.
data exchange platform
152.
data experts
153.
data filtering
154.
data flow languages
155.
data flow visualization
156.
data fusion
157.
data generative model
158.
data governance
159.
data integration
160.
data integrity
161.
data justice
162.
data lineage
163.
data logger
164.
data logistics
165.
data management
166.
data mappings
167.
Data Mart
168.
data mesh
169.
data mining
170.
data modeling
171.
data models
172.
data modem
173.
data noise
174.
data offloading
175.
data ownership
176.
data platform
177.
data privacy
178.
data processing
179.
data product
180.
data protection
181.
data quality
182.
data quality management
183.
data quality maturity model
184.
data rate
185.
data reuse
186.
data re-use
187.
data routing
188.
data science
189.
data scraping
190.
data sets
191.
data sharing
192.
data simulation
193.
data simultaneity
194.
data sort
195.
data sources
196.
data storage
197.
data storage systems
198.
data stream mining
199.
data streams
200.
data studies
201.
data subject
202.
data synthesis
203.
data to decision
204.
data types
205.
data validity
206.
data valorization
207.
data warehouse
208.
data warenhouse
209.
data visualization
210.
data-based computational psychiatry
211.
data-centric construction
212.
data-centric systems
213.
data-controlled circuit partition
214.
data-controlled segmentation
215.
data-driven
216.
data-driven characterization
217.
Data-driven method
218.
data-driven modeling
219.
data-exchange infrastructures
220.
data-exchange solutions
221.
data‐fusion
222.
data-independent acquisition
223.
Data-information-knowledgewisdom (DIKW)
224.
data-intelligence
225.
data-mining
226.
data-science
227.
diagnostic data
228.
digital data exchange
229.
discrete data
230.
distributed data aggregation
231.
distributed data fusion
232.
distributed data mining
233.
distributed data mining (DDM)
234.
DNA microarray data
235.
educational data mining
236.
eventdriven data
237.
event-driven data
238.
experimental data
239.
exploratory data analysis
240.
false data injection attack
241.
False data injection attack; Machine learning; Matlab; Python; State estimation; Sudden load change
242.
field data
243.
financial data
244.
floating car data (FCD)
245.
FMI open data
246.
functional data analysis
247.
GDPR (General Data Protection Regulation)
248.
general data protection regulation
249.
global data hub
250.
GNSS-levelling data
251.
health data
252.
Health data anonymization
253.
health data interoperability
254.
healthcare data
255.
heterogeneous sensor data
256.
high-dimensional data
257.
high-frequency data
258.
high-level test data generation
259.
historical data
260.
hyperspectral data
261.
imbalanced data
262.
implications of energy data
263.
initial data
264.
in-network data processing
265.
insurance data
266.
knowledge discovery and data mining
267.
linked data
268.
linked open data
269.
linked open statistical data
270.
linked data
271.
lossless data compression
272.
low-pass data filtering
273.
Master Data Management
274.
medical claims data
275.
medical data
276.
Medical Data Reuse
277.
meta-data
278.
metered data
279.
microplastic data uncertainty
280.
mobile data
281.
mobile phone big data
282.
mobile phone data
283.
mobile phone usage data
284.
mobile positioning data
285.
multisource data fusion
286.
multivariate data analysis
287.
Nigeria's National data protection regulation
288.
open data
289.
open data ecosystem
290.
open data format
291.
open data policies
292.
open government data
293.
open government data (OGD)
294.
OSM data
295.
oversharing personal data
296.
panel data
297.
parallel data processing
298.
passenger data
299.
personal data
300.
personal data disclosure
301.
personal data processing
302.
personal data protection
303.
Personal Data Protection Act
304.
plan data
305.
point cloud data
306.
pollen data
307.
process and data modelling
308.
public data-set
309.
real-time data
310.
reconstruction of gap-free data
311.
remote data transmission
312.
satellite data
313.
semantic health data
314.
sequential data
315.
small data machine learning
316.
smart data analytics
317.
smart meter data
318.
social media data
319.
Spatial data
320.
spatial data analysis
321.
statistical data
322.
stochastic image data
323.
structured data
324.
student data analysis
325.
supervised learning data
326.
supervisory control and data acquisition (SCADA)
327.
surrogate data
328.
sustainable data governance
329.
symbolic data
330.
symbolic data analysis
331.
synthetic data
332.
time-selective data fusion
333.
training data
334.
Transcriptome data
335.
tree-like data structures
336.
urban data
337.
urban data acquisition
338.
weather data
339.
web traffic data
340.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
341.
virtual data embassy
342.
Virtual Data Explorer
343.
18O data
344.
(big) data
subject term
3
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Greenergy Data Centers
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT