Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
data security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
3
Look more..
(2/363)
Export
export all inquiry results
(3)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
3
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 3, displaying
1 - 3
keyword
360
1.
data security
2.
security of data
3.
metadata model for security measures
4.
security dataset
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security strategies
17.
cyber-security
18.
development of security cameras
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
Estonian information security standard
26.
graded security
27.
hardware security
28.
hardware security primitive
29.
human security
30.
information security
31.
internal security
32.
international security
33.
investment and innovation security
34.
IPv6 security
35.
IT security
36.
IT security management
37.
job security
38.
long-term security
39.
Middle Eastern security
40.
Mobile security
41.
national cyber security strategy
42.
national security
43.
NATO. Science for Peace and Security Program
44.
network security
45.
network security monitoring
46.
OSCE (Organization for Security and Co-operation in Europe)
47.
passenger’s security
48.
policy-based routing security
49.
political and security cultures
50.
post-quantum security
51.
power system security
52.
quantitative security
53.
regional security
54.
RISC-V Security Verification
55.
security
56.
security adaptation
57.
security and justice (AFSJ)
58.
security and privacy
59.
security and privacy in smart grids
60.
Security Assertion Mining
61.
security closure
62.
Security Coverage
63.
security dilemma
64.
Security evaluation
65.
security evaluation instruments
66.
security log analysis
67.
security management
68.
security model
69.
security monitoring
70.
security notion
71.
security objectives
72.
security of supply
73.
security operation center
74.
security patterns
75.
security policy
76.
security problem definition
77.
security proof
78.
security protocols
79.
security requirements
80.
security requirements engineering
81.
security risk assessment
82.
security risk management
83.
security strategies
84.
security systems for military objects
85.
security testing
86.
security training
87.
security verification
88.
social security planning
89.
societal security
90.
system of economic security
91.
system security
92.
terrorism security
93.
transmission System Security
94.
voting privacy and security
95.
accident data
96.
adversarial data perturbation
97.
AI-based data curation
98.
AIS data
99.
Aligned data
100.
ALS data enhancements
101.
application data
102.
audio and visual data
103.
big data
104.
big data analysis
105.
big data analytics
106.
borehole data
107.
building lifecycle data
108.
call data record
109.
catalogue of data sources
110.
clinical data capture
111.
conceptual data model
112.
control and data path tests
113.
critical data studies
114.
cross-border data exchange
115.
data
116.
data assimilation
117.
data protection
118.
data acquisition
119.
data acquisition system
120.
data acquisition systems
121.
data aggregation
122.
data alignment
123.
data analysis
124.
data analytics
125.
data anisotropy
126.
data annotation
127.
data assimilation
128.
data attacks
129.
data augmentation
130.
data capabilities
131.
data capture
132.
data center
133.
data center (DC)
134.
data centers
135.
data centre
136.
data centres
137.
data classification
138.
data clustering
139.
data collection
140.
data commons
141.
data compression
142.
data conversion
143.
data copy
144.
data dictionaries
145.
data discovery
146.
Data dissemination
147.
Data distribution structure
148.
Data drift
149.
data driven planning
150.
data embassy
151.
data engineering
152.
data envelopment analysis
153.
data ethnography
154.
data exchange
155.
data exchange framework
156.
Data exchange layers
157.
data exchange platform
158.
data experts
159.
data filtering
160.
data flow languages
161.
data flow visualization
162.
data fusion
163.
data generative model
164.
data governance
165.
data integration
166.
data integrity
167.
data intermediary
168.
data justice
169.
data lineage
170.
data logger
171.
data logistics
172.
data management
173.
data mappings
174.
Data Mart
175.
data mesh
176.
data mining
177.
data modeling
178.
data models
179.
data modem
180.
data noise
181.
data offloading
182.
data ownership
183.
data platform
184.
data privacy
185.
data processing
186.
data product
187.
data protection
188.
data quality
189.
data quality management
190.
data quality maturity model
191.
data rate
192.
data reuse
193.
data re-use
194.
data routing
195.
data science
196.
data scraping
197.
data sets
198.
data sharing
199.
data simulation
200.
data simultaneity
201.
data sort
202.
data sources
203.
data storage
204.
data storage systems
205.
data stream mining
206.
data streams
207.
data studies
208.
data subject
209.
data synthesis
210.
data to decision
211.
data types
212.
data validity
213.
data valorization
214.
data warehouse
215.
data warenhouse
216.
data visualization
217.
data-based computational psychiatry
218.
data-centric construction
219.
data-centric systems
220.
data-controlled circuit partition
221.
data-controlled segmentation
222.
data-driven
223.
data-driven characterization
224.
Data-driven method
225.
data-driven modeling
226.
data-exchange infrastructures
227.
data-exchange solutions
228.
data‐fusion
229.
data-independent acquisition
230.
Data-information-knowledgewisdom (DIKW)
231.
data-intelligence
232.
data-mining
233.
data-science
234.
diagnostic data
235.
digital data exchange
236.
discrete data
237.
distributed data aggregation
238.
distributed data fusion
239.
distributed data mining
240.
distributed data mining (DDM)
241.
DNA microarray data
242.
educational data mining
243.
enterprise data analysis
244.
European Health Data Space
245.
European Health Data Space (EHDS)
246.
eventdriven data
247.
event-driven data
248.
experimental data
249.
exploratory data analysis
250.
false data injection attack
251.
field data
252.
financial data
253.
floating car data (FCD)
254.
FMI open data
255.
functional data analysis
256.
GDPR (General Data Protection Regulation)
257.
general data protection regulation
258.
global data hub
259.
GNSS-levelling data
260.
health data
261.
health data accessibility
262.
Health data anonymization
263.
health data custodianship
264.
health data governance
265.
health data interoperability
266.
health data policy
267.
health data stewardship
268.
healthcare data
269.
heterogeneous sensor data
270.
high-dimensional data
271.
high-frequency data
272.
high-level test data generation
273.
historical data
274.
hyperspectral data
275.
imbalanced data
276.
implications of energy data
277.
initial data
278.
in-network data processing
279.
insurance data
280.
knowledge discovery and data mining
281.
linked data
282.
linked open data
283.
linked open statistical data
284.
linked data
285.
lossless data compression
286.
low-pass data filtering
287.
Master Data Management
288.
medical claims data
289.
medical data
290.
Medical Data Reuse
291.
meta-data
292.
metered data
293.
microplastic data uncertainty
294.
mobile data
295.
mobile phone big data
296.
mobile phone data
297.
mobile phone usage data
298.
mobile positioning data
299.
multisource data fusion
300.
multivariate data analysis
301.
Nigeria's National data protection regulation
302.
open data
303.
open data ecosystem
304.
open data format
305.
open data policies
306.
open government data
307.
open government data (OGD)
308.
OSM data
309.
oversharing personal data
310.
panel data
311.
parallel data processing
312.
passenger data
313.
personal data
314.
personal data disclosure
315.
personal data processing
316.
personal data protection
317.
Personal Data Protection Act
318.
plan data
319.
point cloud data
320.
pollen data
321.
process and data modelling
322.
public data-set
323.
random data
324.
real-time data
325.
reconstruction of gap-free data
326.
reference architecture for global health data space
327.
remote data transmission
328.
satellite data
329.
semantic health data
330.
sequential data
331.
small data machine learning
332.
smart data analytics
333.
smart meter data
334.
social media data
335.
Spatial data
336.
spatial data analysis
337.
statistical data
338.
stochastic image data
339.
structured data
340.
student data analysis
341.
supervised learning data
342.
supervisory control and data acquisition (SCADA)
343.
surrogate data
344.
sustainable data governance
345.
symbolic data
346.
symbolic data analysis
347.
synthetic data
348.
time-selective data fusion
349.
training data
350.
Transcriptome data
351.
tree-like data structures
352.
urban data
353.
urban data acquisition
354.
weather data
355.
web traffic data
356.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
357.
virtual data embassy
358.
Virtual Data Explorer
359.
18O data
360.
(big) data
subject term
3
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT