Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
data security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/492)
Export
export all inquiry results
(4)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book article EST
/
book article ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
3
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
4
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 4, displaying
1 - 4
keyword
488
1.
data security
2.
data and information security
3.
security of data
4.
metadata model for security measures
5.
security dataset
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
cloud security
11.
communication system security
12.
comprehensive system of economic security
13.
computer security
14.
cooperative security dilemma
15.
cyber security
16.
cyber security education
17.
cyber security exercises
18.
cyber security monitoring
19.
cyber security monitoring in maritime
20.
cyber security strategies
21.
cyber-physical system security
22.
cyber-security
23.
development of security cameras
24.
digital security practices
25.
drinking water security
26.
economic security
27.
economic security of enterprise
28.
emotional security
29.
energy security
30.
energy security indicator
31.
Estonian information security standard
32.
graded security
33.
hardware security
34.
hardware security primitive
35.
high level of security
36.
Homeland security
37.
human security
38.
information security
39.
information security and privacy
40.
initial level of security
41.
internal security
42.
international security
43.
investment and innovation security
44.
IPv6 security
45.
IT security
46.
IT security management
47.
job security
48.
long-term security
49.
maritime cyber security
50.
maritime cyber security operations centers
51.
Maritime Security Operations Center (M-SOC)
52.
medium level of security
53.
Middle Eastern security
54.
Mobile security
55.
national cyber security strategy
56.
national security
57.
NATO. Science for Peace and Security Program
58.
network security
59.
network security monitoring
60.
OSCE (Organization for Security and Co-operation in Europe)
61.
passenger’s security
62.
policy-based routing security
63.
political and security cultures
64.
post-quantum security
65.
power system security
66.
quantitative security
67.
regional security
68.
RISC-V Security Verification
69.
safety and security in sea transportation
70.
safety and security testing
71.
security
72.
security adaptation
73.
security alert prioritization
74.
security analysis
75.
security and justice (AFSJ)
76.
Security and political science
77.
security and privacy
78.
security and privacy in smart grids
79.
Security Assertion
80.
Security Assertion Mining
81.
security closure
82.
Security Coverage
83.
security dilemma
84.
Security evaluation
85.
security evaluation instruments
86.
Security Level Evaluation
87.
Security limitations
88.
security log analysis
89.
security management
90.
security model
91.
security monitoring
92.
security notion
93.
security objectives
94.
security of supply
95.
security operation center
96.
security operations center
97.
security patterns
98.
security policy
99.
security problem definition
100.
security proof
101.
security protocols
102.
security requirements
103.
security requirements engineering
104.
security research
105.
security risk assessment
106.
security risk management
107.
security risks
108.
security science and technology
109.
security strategies
110.
security systems for military objects
111.
security testing
112.
security training
113.
security verification
114.
security-by-design
115.
social security planning
116.
societal security
117.
software security
118.
software security level
119.
software security subcharacteristics
120.
sufficient level of security
121.
system of economic security
122.
system security
123.
terrorism security
124.
transmission System Security
125.
voting privacy and security
126.
accident data
127.
adversarial data perturbation
128.
AI data centers
129.
AI-based data curation
130.
AIS data
131.
AIS data format optimization
132.
Aligned data
133.
ALS data enhancements
134.
Amazon Kinesis Data Analytics
135.
application data
136.
audio and visual data
137.
automated data processing
138.
big data
139.
big data analysis
140.
big data analytics
141.
big data science
142.
big geo-data
143.
borehole data
144.
building data quality
145.
building lifecycle data
146.
call data record
147.
catalogue of data sources
148.
cellular phone data
149.
clinical data capture
150.
clinical data exchange
151.
compositional data
152.
conceptual data model
153.
construction data management
154.
consumption data
155.
control and data path tests
156.
critical data studies
157.
cross-border data exchange
158.
data
159.
data assimilation
160.
data protection
161.
data acquisition
162.
data acquisition efficiency
163.
data acquisition system
164.
data acquisition systems
165.
data aggregation
166.
data alignment
167.
Data Altruism
168.
Data Altruism Consent
169.
data analysis
170.
data analytics
171.
data analytics and machine learning
172.
data anisotropy
173.
data annotation
174.
data assimilation
175.
data attacks
176.
data augmentation
177.
Data biases
178.
data breach handling
179.
data capabilities
180.
data capture
181.
data center
182.
data center (DC)
183.
data center applications
184.
data centers
185.
data centre
186.
data centres
187.
data classification
188.
data clustering
189.
data collection
190.
data commons
191.
data compression
192.
data compression and normalization
193.
data conversion
194.
data copy
195.
data curation
196.
data curing
197.
data dictionaries
198.
data discovery
199.
Data dissemination
200.
Data distribution structure
201.
data donation
202.
Data drift
203.
data driven planning
204.
data dropouts
205.
Data Ecosystem
206.
data embassy
207.
data engineering
208.
data enrichment
209.
data envelopment analysis
210.
data ethics
211.
data ethnography
212.
data exchange
213.
data exchange framework
214.
Data exchange layers
215.
data exchange platform
216.
data experts
217.
data filtering
218.
data fitting approach
219.
data flow diagram
220.
data flow languages
221.
data flow visualization
222.
data flows
223.
data fusion
224.
data generative model
225.
data governance
226.
data governance act
227.
data harmonization
228.
data hiding
229.
data integration
230.
data integrity
231.
data intermediary
232.
data Interoperability
233.
data justice
234.
data labeling
235.
data limitations in public sector
236.
data lineage
237.
data literacy
238.
data logger
239.
data logistics
240.
data management
241.
data mappings
242.
Data Mart
243.
Data Mart (DM)
244.
data mesh
245.
data migration
246.
data mining
247.
data mining and knowledge discovery
248.
data modeling
249.
data models
250.
data modem
251.
data movements
252.
data noise
253.
data offloading
254.
data ownership
255.
data platform
256.
data privacy
257.
data processing
258.
data product
259.
data protection
260.
data publishing
261.
data quality
262.
data quality management
263.
data quality maturity model
264.
data rate
265.
data representativeness
266.
data reuse
267.
data re-use
268.
data routing
269.
data scarce environments
270.
data science
271.
data scraping
272.
data set
273.
data set generation
274.
data sets
275.
data sharing
276.
data simulation
277.
data simultaneity
278.
data sort
279.
data sources
280.
data spaces
281.
data storage
282.
data storage systems
283.
data stream mining
284.
data streams
285.
data structures
286.
data studies
287.
data subject
288.
data subjects
289.
data synthesis
290.
data to decision
291.
data types
292.
data validity
293.
data valorization
294.
data warehouse
295.
data warenhouse
296.
data visualization
297.
data-augmentation
298.
data-based computational psychiatry
299.
data-centric construction
300.
data-centric systems
301.
data-controlled circuit partition
302.
data-controlled segmentation
303.
data-driven
304.
data-driven characterization
305.
data-driven condition monitoring
306.
data-driven control
307.
Data-driven decision-making
308.
data-driven diagnostics
309.
data-driven imputation
310.
Data-driven method
311.
data-driven model
312.
data-driven modeling
313.
data-driven optimization
314.
data-driven policy
315.
data-driven public services
316.
data-driven strategic planning
317.
data-driven techniques
318.
data-exchange infrastructures
319.
data-exchange solutions
320.
data-flow architecture
321.
data‐fusion
322.
data-independent acquisition
323.
Data-information-knowledgewisdom (DIKW)
324.
data-intelligence
325.
data-mining
326.
data-science
327.
data-sharing
328.
diagnostic data
329.
digital data exchange
330.
discrete data
331.
distributed data aggregation
332.
distributed data fusion
333.
distributed data mining
334.
distributed data mining (DDM)
335.
distributional data
336.
DNA microarray data
337.
easy data augmentation
338.
educational data mining
339.
educational data-mining
340.
empirical data
341.
enterprise data analysis
342.
European Health Data Space
343.
European Health Data Space (EHDS)
344.
eventdriven data
345.
event-driven data
346.
experimental data
347.
exploratory data analysis
348.
fair data
349.
false data injection attack
350.
field data
351.
financial data
352.
floating car data (FCD)
353.
flood data platform
354.
FMI open data
355.
functional data analysis
356.
GDPR (General Data Protection Regulation)
357.
general data protection regulation
358.
general data protection regulation (GDPR)
359.
genome data
360.
global data hub
361.
global navigation data
362.
GNSS-levelling data
363.
GNSS-RO data
364.
GRUAN data
365.
health data
366.
health data accessibility
367.
Health data anonymization
368.
health data custodianship
369.
health data governance
370.
health data integrity and transparency
371.
health data interoperability
372.
health data policy
373.
health data semantic interoperability
374.
health data stewardship
375.
healthcare data
376.
heat meter data
377.
heterogeneous data
378.
heterogeneous sensor data
379.
high-dimensional data
380.
high-frequency data
381.
high-level test data generation
382.
historical data
383.
hyperspectral data
384.
imbalanced data
385.
implications of energy data
386.
initial data
387.
initial data for AI
388.
initial data model
389.
in-network data processing
390.
insurance data
391.
knowledge discovery and data mining
392.
linked data
393.
linked open data
394.
linked open statistical data
395.
linked data
396.
lossless data compression
397.
low-pass data filtering
398.
Master Data Management
399.
medical claims data
400.
medical data
401.
Medical Data Reuse
402.
meta-data
403.
metered data
404.
methods: data analysis
405.
microplastic data uncertainty
406.
mobile data
407.
mobile phone big data
408.
mobile phone data
409.
mobile phone usage data
410.
mobile positioning data
411.
multisource data fusion
412.
multivariate data analysis
413.
Nigeria's National data protection regulation
414.
on/off-chain data storages
415.
open data
416.
open data ecosystem
417.
open data format
418.
open data policies
419.
open government data
420.
open government data (OGD)
421.
open-data
422.
open-data platform
423.
OSM data
424.
oversharing personal data
425.
panel data
426.
parallel data processing
427.
passenger data
428.
patient-generated health data (PGHD)
429.
personal data
430.
personal data disclosure
431.
personal data processing
432.
personal data protection
433.
Personal Data Protection Act
434.
personal health data space
435.
plan data
436.
point cloud data
437.
pollen data
438.
process and data modelling
439.
Product Data Management (PDM)
440.
public data-set
441.
random data
442.
real-time data
443.
real-time data collection
444.
reconstruction of gap-free data
445.
reference architecture for global health data space
446.
remote data transmission
447.
sampled-data control
448.
satellite data
449.
semantic data modelling
450.
semantic health data
451.
sensitive data
452.
sequential data
453.
small data
454.
small data machine learning
455.
small training data set
456.
smart data analytics
457.
smart meter data
458.
social media data
459.
Spatial data
460.
spatial data analysis
461.
statistical data
462.
stochastic image data
463.
structured data
464.
student data analysis
465.
supervised learning data
466.
supervisory control and data acquisition (SCADA)
467.
surrogate data
468.
sustainable data governance
469.
sustainable data storage
470.
symbolic data
471.
symbolic data analysis
472.
synthetic data
473.
temperature historical data series
474.
three-way data
475.
time-selective data fusion
476.
training data
477.
Transcriptome data
478.
tree-like data structures
479.
underwater data center
480.
urban data
481.
urban data acquisition
482.
weather data
483.
web traffic data
484.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
485.
virtual data embassy
486.
Virtual Data Explorer
487.
18O data
488.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT