Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
data security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/423)
Export
export all inquiry results
(4)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book article EST
/
book article ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
3
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
4
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 4, displaying
1 - 4
keyword
419
1.
data security
2.
security of data
3.
metadata model for security measures
4.
security dataset
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security monitoring
17.
cyber security strategies
18.
cyber-security
19.
development of security cameras
20.
drinking water security
21.
economic security
22.
economic security of enterprise
23.
emotional security
24.
energy security
25.
energy security indicator
26.
Estonian information security standard
27.
graded security
28.
hardware security
29.
hardware security primitive
30.
human security
31.
information security
32.
information security and privacy
33.
internal security
34.
international security
35.
investment and innovation security
36.
IPv6 security
37.
IT security
38.
IT security management
39.
job security
40.
long-term security
41.
Middle Eastern security
42.
Mobile security
43.
national cyber security strategy
44.
national security
45.
NATO. Science for Peace and Security Program
46.
network security
47.
network security monitoring
48.
OSCE (Organization for Security and Co-operation in Europe)
49.
passenger’s security
50.
policy-based routing security
51.
political and security cultures
52.
post-quantum security
53.
power system security
54.
quantitative security
55.
regional security
56.
RISC-V Security Verification
57.
safety and security testing
58.
security
59.
security adaptation
60.
security alert prioritization
61.
security analysis
62.
security and justice (AFSJ)
63.
Security and political science
64.
security and privacy
65.
security and privacy in smart grids
66.
Security Assertion Mining
67.
security closure
68.
Security Coverage
69.
security dilemma
70.
Security evaluation
71.
security evaluation instruments
72.
Security limitations
73.
security log analysis
74.
security management
75.
security model
76.
security monitoring
77.
security notion
78.
security objectives
79.
security of supply
80.
security operation center
81.
security operations center
82.
security patterns
83.
security policy
84.
security problem definition
85.
security proof
86.
security protocols
87.
security requirements
88.
security requirements engineering
89.
security risk assessment
90.
security risk management
91.
security risks
92.
security strategies
93.
security systems for military objects
94.
security testing
95.
security training
96.
security verification
97.
security-by-design
98.
social security planning
99.
societal security
100.
system of economic security
101.
system security
102.
terrorism security
103.
transmission System Security
104.
voting privacy and security
105.
accident data
106.
adversarial data perturbation
107.
AI-based data curation
108.
AIS data
109.
Aligned data
110.
ALS data enhancements
111.
Amazon Kinesis Data Analytics
112.
application data
113.
audio and visual data
114.
big data
115.
big data analysis
116.
big data analytics
117.
big data science
118.
big geo-data
119.
borehole data
120.
building lifecycle data
121.
call data record
122.
catalogue of data sources
123.
cellular phone data
124.
clinical data capture
125.
clinical data exchange
126.
compositional data
127.
conceptual data model
128.
construction data management
129.
control and data path tests
130.
critical data studies
131.
cross-border data exchange
132.
data
133.
data assimilation
134.
data protection
135.
data acquisition
136.
data acquisition system
137.
data acquisition systems
138.
data aggregation
139.
data alignment
140.
data analysis
141.
data analytics
142.
data analytics and machine learning
143.
data anisotropy
144.
data annotation
145.
data assimilation
146.
data attacks
147.
data augmentation
148.
data breach handling
149.
data capabilities
150.
data capture
151.
data center
152.
data center (DC)
153.
data centers
154.
data centre
155.
data centres
156.
data classification
157.
data clustering
158.
data collection
159.
data commons
160.
data compression
161.
data conversion
162.
data copy
163.
data dictionaries
164.
data discovery
165.
Data dissemination
166.
Data distribution structure
167.
data donation
168.
Data drift
169.
data driven planning
170.
data embassy
171.
data engineering
172.
data enrichment
173.
data envelopment analysis
174.
data ethnography
175.
data exchange
176.
data exchange framework
177.
Data exchange layers
178.
data exchange platform
179.
data experts
180.
data filtering
181.
data fitting approach
182.
data flow languages
183.
data flow visualization
184.
data flows
185.
data fusion
186.
data generative model
187.
data governance
188.
data governance act
189.
data hiding
190.
data integration
191.
data integrity
192.
data intermediary
193.
data Interoperability
194.
data justice
195.
data labeling
196.
data lineage
197.
data logger
198.
data logistics
199.
data management
200.
data mappings
201.
Data Mart
202.
Data Mart (DM)
203.
data mesh
204.
data migration
205.
data mining
206.
data modeling
207.
data models
208.
data modem
209.
data movements
210.
data noise
211.
data offloading
212.
data ownership
213.
data platform
214.
data privacy
215.
data processing
216.
data product
217.
data protection
218.
data quality
219.
data quality management
220.
data quality maturity model
221.
data rate
222.
data reuse
223.
data re-use
224.
data routing
225.
data science
226.
data scraping
227.
data set
228.
data set generation
229.
data sets
230.
data sharing
231.
data simulation
232.
data simultaneity
233.
data sort
234.
data sources
235.
data spaces
236.
data storage
237.
data storage systems
238.
data stream mining
239.
data streams
240.
data structures
241.
data studies
242.
data subject
243.
data subjects
244.
data synthesis
245.
data to decision
246.
data types
247.
data validity
248.
data valorization
249.
data warehouse
250.
data warenhouse
251.
data visualization
252.
data-augmentation
253.
data-based computational psychiatry
254.
data-centric construction
255.
data-centric systems
256.
data-controlled circuit partition
257.
data-controlled segmentation
258.
data-driven
259.
data-driven characterization
260.
data-driven condition monitoring
261.
data-driven control
262.
Data-driven decision-making
263.
Data-driven method
264.
data-driven model
265.
data-driven modeling
266.
data-driven optimization
267.
data-driven public services
268.
data-driven techniques
269.
data-exchange infrastructures
270.
data-exchange solutions
271.
data-flow architecture
272.
data‐fusion
273.
data-independent acquisition
274.
Data-information-knowledgewisdom (DIKW)
275.
data-intelligence
276.
data-mining
277.
data-science
278.
diagnostic data
279.
digital data exchange
280.
discrete data
281.
distributed data aggregation
282.
distributed data fusion
283.
distributed data mining
284.
distributed data mining (DDM)
285.
DNA microarray data
286.
educational data mining
287.
enterprise data analysis
288.
European Health Data Space
289.
European Health Data Space (EHDS)
290.
eventdriven data
291.
event-driven data
292.
experimental data
293.
exploratory data analysis
294.
false data injection attack
295.
field data
296.
financial data
297.
floating car data (FCD)
298.
flood data platform
299.
FMI open data
300.
functional data analysis
301.
GDPR (General Data Protection Regulation)
302.
general data protection regulation
303.
genome data
304.
global data hub
305.
GNSS-levelling data
306.
GNSS-RO data
307.
GRUAN data
308.
health data
309.
health data accessibility
310.
Health data anonymization
311.
health data custodianship
312.
health data governance
313.
health data interoperability
314.
health data policy
315.
health data stewardship
316.
healthcare data
317.
heterogeneous sensor data
318.
high-dimensional data
319.
high-frequency data
320.
high-level test data generation
321.
historical data
322.
hyperspectral data
323.
imbalanced data
324.
implications of energy data
325.
initial data
326.
initial data for AI
327.
initial data model
328.
in-network data processing
329.
insurance data
330.
knowledge discovery and data mining
331.
linked data
332.
linked open data
333.
linked open statistical data
334.
linked data
335.
lossless data compression
336.
low-pass data filtering
337.
Master Data Management
338.
medical claims data
339.
medical data
340.
Medical Data Reuse
341.
meta-data
342.
metered data
343.
methods: data analysis
344.
microplastic data uncertainty
345.
mobile data
346.
mobile phone big data
347.
mobile phone data
348.
mobile phone usage data
349.
mobile positioning data
350.
multisource data fusion
351.
multivariate data analysis
352.
Nigeria's National data protection regulation
353.
open data
354.
open data ecosystem
355.
open data format
356.
open data policies
357.
open government data
358.
open government data (OGD)
359.
open-data
360.
OSM data
361.
oversharing personal data
362.
panel data
363.
parallel data processing
364.
passenger data
365.
patient-generated health data (PGHD)
366.
personal data
367.
personal data disclosure
368.
personal data processing
369.
personal data protection
370.
Personal Data Protection Act
371.
plan data
372.
point cloud data
373.
pollen data
374.
process and data modelling
375.
Product Data Management (PDM)
376.
public data-set
377.
random data
378.
real-time data
379.
real-time data collection
380.
reconstruction of gap-free data
381.
reference architecture for global health data space
382.
remote data transmission
383.
satellite data
384.
semantic data modelling
385.
semantic health data
386.
sequential data
387.
small data machine learning
388.
small training data set
389.
smart data analytics
390.
smart meter data
391.
social media data
392.
Spatial data
393.
spatial data analysis
394.
statistical data
395.
stochastic image data
396.
structured data
397.
student data analysis
398.
supervised learning data
399.
supervisory control and data acquisition (SCADA)
400.
surrogate data
401.
sustainable data governance
402.
symbolic data
403.
symbolic data analysis
404.
synthetic data
405.
temperature historical data series
406.
time-selective data fusion
407.
training data
408.
Transcriptome data
409.
tree-like data structures
410.
underwater data center
411.
urban data
412.
urban data acquisition
413.
weather data
414.
web traffic data
415.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
416.
virtual data embassy
417.
Virtual Data Explorer
418.
18O data
419.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT