Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
data security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/464)
Export
export all inquiry results
(4)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book article EST
/
book article ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
3
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
4
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 4, displaying
1 - 4
keyword
460
1.
data security
2.
data and information security
3.
security of data
4.
metadata model for security measures
5.
security dataset
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
communication system security
11.
comprehensive system of economic security
12.
computer security
13.
cooperative security dilemma
14.
cyber security
15.
cyber security education
16.
cyber security exercises
17.
cyber security monitoring
18.
cyber security strategies
19.
cyber-security
20.
development of security cameras
21.
digital security practices
22.
drinking water security
23.
economic security
24.
economic security of enterprise
25.
emotional security
26.
energy security
27.
energy security indicator
28.
Estonian information security standard
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
high level of security
33.
Homeland security
34.
human security
35.
information security
36.
information security and privacy
37.
initial level of security
38.
internal security
39.
international security
40.
investment and innovation security
41.
IPv6 security
42.
IT security
43.
IT security management
44.
job security
45.
long-term security
46.
maritime cyber security
47.
maritime cyber security operations centers
48.
Maritime Security Operations Center (M-SOC)
49.
medium level of security
50.
Middle Eastern security
51.
Mobile security
52.
national cyber security strategy
53.
national security
54.
NATO. Science for Peace and Security Program
55.
network security
56.
network security monitoring
57.
OSCE (Organization for Security and Co-operation in Europe)
58.
passenger’s security
59.
policy-based routing security
60.
political and security cultures
61.
post-quantum security
62.
power system security
63.
quantitative security
64.
regional security
65.
RISC-V Security Verification
66.
Safety and Security in Sea Transportation
67.
safety and security testing
68.
security
69.
security adaptation
70.
security alert prioritization
71.
security analysis
72.
security and justice (AFSJ)
73.
Security and political science
74.
security and privacy
75.
security and privacy in smart grids
76.
Security Assertion Mining
77.
security closure
78.
Security Coverage
79.
security dilemma
80.
Security evaluation
81.
security evaluation instruments
82.
Security limitations
83.
security log analysis
84.
security management
85.
security model
86.
security monitoring
87.
security notion
88.
security objectives
89.
security of supply
90.
security operation center
91.
security operations center
92.
security patterns
93.
security policy
94.
security problem definition
95.
security proof
96.
security protocols
97.
security requirements
98.
security requirements engineering
99.
security risk assessment
100.
security risk management
101.
security risks
102.
security science and technology
103.
security strategies
104.
security systems for military objects
105.
security testing
106.
security training
107.
security verification
108.
security-by-design
109.
social security planning
110.
societal security
111.
software security
112.
software security level
113.
software security subcharacteristics
114.
sufficient level of security
115.
system of economic security
116.
system security
117.
terrorism security
118.
transmission System Security
119.
voting privacy and security
120.
accident data
121.
adversarial data perturbation
122.
AI-based data curation
123.
AIS data
124.
AIS data format optimization
125.
Aligned data
126.
ALS data enhancements
127.
Amazon Kinesis Data Analytics
128.
application data
129.
audio and visual data
130.
big data
131.
big data analysis
132.
big data analytics
133.
big data science
134.
big geo-data
135.
borehole data
136.
building lifecycle data
137.
call data record
138.
catalogue of data sources
139.
cellular phone data
140.
clinical data capture
141.
clinical data exchange
142.
compositional data
143.
conceptual data model
144.
construction data management
145.
control and data path tests
146.
critical data studies
147.
cross-border data exchange
148.
data
149.
data assimilation
150.
data protection
151.
data acquisition
152.
data acquisition system
153.
data acquisition systems
154.
data aggregation
155.
data alignment
156.
Data Altruism
157.
Data Altruism Consent
158.
data analysis
159.
data analytics
160.
data analytics and machine learning
161.
data anisotropy
162.
data annotation
163.
data assimilation
164.
data attacks
165.
data augmentation
166.
data breach handling
167.
data capabilities
168.
data capture
169.
data center
170.
data center (DC)
171.
data center applications
172.
data centers
173.
data centre
174.
data centres
175.
data classification
176.
data clustering
177.
data collection
178.
data commons
179.
data compression
180.
data compression and normalization
181.
data conversion
182.
data copy
183.
data curation
184.
data curing
185.
data dictionaries
186.
data discovery
187.
Data dissemination
188.
Data distribution structure
189.
data donation
190.
Data drift
191.
data driven planning
192.
data dropouts
193.
Data Ecosystem
194.
data embassy
195.
data engineering
196.
data enrichment
197.
data envelopment analysis
198.
data ethnography
199.
data exchange
200.
data exchange framework
201.
Data exchange layers
202.
data exchange platform
203.
data experts
204.
data filtering
205.
data fitting approach
206.
data flow languages
207.
data flow visualization
208.
data flows
209.
data fusion
210.
data generative model
211.
data governance
212.
data governance act
213.
data harmonization
214.
data hiding
215.
data integration
216.
data integrity
217.
data intermediary
218.
data Interoperability
219.
data justice
220.
data labeling
221.
data limitations in public sector
222.
data lineage
223.
data literacy
224.
data logger
225.
data logistics
226.
data management
227.
data mappings
228.
Data Mart
229.
Data Mart (DM)
230.
data mesh
231.
data migration
232.
data mining
233.
data mining and knowledge discovery
234.
data modeling
235.
data models
236.
data modem
237.
data movements
238.
data noise
239.
data offloading
240.
data ownership
241.
data platform
242.
data privacy
243.
data processing
244.
data product
245.
data protection
246.
data publishing
247.
data quality
248.
data quality management
249.
data quality maturity model
250.
data rate
251.
data representativeness
252.
data reuse
253.
data re-use
254.
data routing
255.
data scarce environments
256.
data science
257.
data scraping
258.
data set
259.
data set generation
260.
data sets
261.
data sharing
262.
data simulation
263.
data simultaneity
264.
data sort
265.
data sources
266.
data spaces
267.
data storage
268.
data storage systems
269.
data stream mining
270.
data streams
271.
data structures
272.
data studies
273.
data subject
274.
data subjects
275.
data synthesis
276.
data to decision
277.
data types
278.
data validity
279.
data valorization
280.
data warehouse
281.
data warenhouse
282.
data visualization
283.
data-augmentation
284.
data-based computational psychiatry
285.
data-centric construction
286.
data-centric systems
287.
data-controlled circuit partition
288.
data-controlled segmentation
289.
data-driven
290.
data-driven characterization
291.
data-driven condition monitoring
292.
data-driven control
293.
Data-driven decision-making
294.
data-driven imputation
295.
Data-driven method
296.
data-driven model
297.
data-driven modeling
298.
data-driven optimization
299.
data-driven policy
300.
data-driven public services
301.
data-driven techniques
302.
data-exchange infrastructures
303.
data-exchange solutions
304.
data-flow architecture
305.
data‐fusion
306.
data-independent acquisition
307.
Data-information-knowledgewisdom (DIKW)
308.
data-intelligence
309.
data-mining
310.
data-science
311.
data-sharing
312.
diagnostic data
313.
digital data exchange
314.
discrete data
315.
distributed data aggregation
316.
distributed data fusion
317.
distributed data mining
318.
distributed data mining (DDM)
319.
distributional data
320.
DNA microarray data
321.
educational data mining
322.
educational data-mining
323.
enterprise data analysis
324.
European Health Data Space
325.
European Health Data Space (EHDS)
326.
eventdriven data
327.
event-driven data
328.
experimental data
329.
exploratory data analysis
330.
fair data
331.
false data injection attack
332.
field data
333.
financial data
334.
floating car data (FCD)
335.
flood data platform
336.
FMI open data
337.
functional data analysis
338.
GDPR (General Data Protection Regulation)
339.
general data protection regulation
340.
genome data
341.
global data hub
342.
GNSS-levelling data
343.
GNSS-RO data
344.
GRUAN data
345.
health data
346.
health data accessibility
347.
Health data anonymization
348.
health data custodianship
349.
health data governance
350.
health data integrity and transparency
351.
health data interoperability
352.
health data policy
353.
health data stewardship
354.
healthcare data
355.
heterogeneous sensor data
356.
high-dimensional data
357.
high-frequency data
358.
high-level test data generation
359.
historical data
360.
hyperspectral data
361.
imbalanced data
362.
implications of energy data
363.
initial data
364.
initial data for AI
365.
initial data model
366.
in-network data processing
367.
insurance data
368.
knowledge discovery and data mining
369.
linked data
370.
linked open data
371.
linked open statistical data
372.
linked data
373.
lossless data compression
374.
low-pass data filtering
375.
Master Data Management
376.
medical claims data
377.
medical data
378.
Medical Data Reuse
379.
meta-data
380.
metered data
381.
methods: data analysis
382.
microplastic data uncertainty
383.
mobile data
384.
mobile phone big data
385.
mobile phone data
386.
mobile phone usage data
387.
mobile positioning data
388.
multisource data fusion
389.
multivariate data analysis
390.
Nigeria's National data protection regulation
391.
open data
392.
open data ecosystem
393.
open data format
394.
open data policies
395.
open government data
396.
open government data (OGD)
397.
open-data
398.
open-data platform
399.
OSM data
400.
oversharing personal data
401.
panel data
402.
parallel data processing
403.
passenger data
404.
patient-generated health data (PGHD)
405.
personal data
406.
personal data disclosure
407.
personal data processing
408.
personal data protection
409.
Personal Data Protection Act
410.
plan data
411.
point cloud data
412.
pollen data
413.
process and data modelling
414.
Product Data Management (PDM)
415.
public data-set
416.
random data
417.
real-time data
418.
real-time data collection
419.
reconstruction of gap-free data
420.
reference architecture for global health data space
421.
remote data transmission
422.
satellite data
423.
semantic data modelling
424.
semantic health data
425.
sequential data
426.
small data machine learning
427.
small training data set
428.
smart data analytics
429.
smart meter data
430.
social media data
431.
Spatial data
432.
spatial data analysis
433.
statistical data
434.
stochastic image data
435.
structured data
436.
student data analysis
437.
supervised learning data
438.
supervisory control and data acquisition (SCADA)
439.
surrogate data
440.
sustainable data governance
441.
sustainable data storage
442.
symbolic data
443.
symbolic data analysis
444.
synthetic data
445.
temperature historical data series
446.
three-way data
447.
time-selective data fusion
448.
training data
449.
Transcriptome data
450.
tree-like data structures
451.
underwater data center
452.
urban data
453.
urban data acquisition
454.
weather data
455.
web traffic data
456.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
457.
virtual data embassy
458.
Virtual Data Explorer
459.
18O data
460.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT