Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
data security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/436)
Export
export all inquiry results
(4)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book article EST
/
book article ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
3
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
4
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 4, displaying
1 - 4
keyword
432
1.
data security
2.
data and information security
3.
security of data
4.
metadata model for security measures
5.
security dataset
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
communication system security
11.
comprehensive system of economic security
12.
computer security
13.
cooperative security dilemma
14.
cyber security
15.
cyber security education
16.
cyber security exercises
17.
cyber security monitoring
18.
cyber security strategies
19.
cyber-security
20.
development of security cameras
21.
digital security practices
22.
drinking water security
23.
economic security
24.
economic security of enterprise
25.
emotional security
26.
energy security
27.
energy security indicator
28.
Estonian information security standard
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
human security
33.
information security
34.
information security and privacy
35.
internal security
36.
international security
37.
investment and innovation security
38.
IPv6 security
39.
IT security
40.
IT security management
41.
job security
42.
long-term security
43.
Middle Eastern security
44.
Mobile security
45.
national cyber security strategy
46.
national security
47.
NATO. Science for Peace and Security Program
48.
network security
49.
network security monitoring
50.
OSCE (Organization for Security and Co-operation in Europe)
51.
passenger’s security
52.
policy-based routing security
53.
political and security cultures
54.
post-quantum security
55.
power system security
56.
quantitative security
57.
regional security
58.
RISC-V Security Verification
59.
safety and security testing
60.
security
61.
security adaptation
62.
security alert prioritization
63.
security analysis
64.
security and justice (AFSJ)
65.
Security and political science
66.
security and privacy
67.
security and privacy in smart grids
68.
Security Assertion Mining
69.
security closure
70.
Security Coverage
71.
security dilemma
72.
Security evaluation
73.
security evaluation instruments
74.
Security limitations
75.
security log analysis
76.
security management
77.
security model
78.
security monitoring
79.
security notion
80.
security objectives
81.
security of supply
82.
security operation center
83.
security operations center
84.
security patterns
85.
security policy
86.
security problem definition
87.
security proof
88.
security protocols
89.
security requirements
90.
security requirements engineering
91.
security risk assessment
92.
security risk management
93.
security risks
94.
security science and technology
95.
security strategies
96.
security systems for military objects
97.
security testing
98.
security training
99.
security verification
100.
security-by-design
101.
social security planning
102.
societal security
103.
system of economic security
104.
system security
105.
terrorism security
106.
transmission System Security
107.
voting privacy and security
108.
accident data
109.
adversarial data perturbation
110.
AI-based data curation
111.
AIS data
112.
Aligned data
113.
ALS data enhancements
114.
Amazon Kinesis Data Analytics
115.
application data
116.
audio and visual data
117.
big data
118.
big data analysis
119.
big data analytics
120.
big data science
121.
big geo-data
122.
borehole data
123.
building lifecycle data
124.
call data record
125.
catalogue of data sources
126.
cellular phone data
127.
clinical data capture
128.
clinical data exchange
129.
compositional data
130.
conceptual data model
131.
construction data management
132.
control and data path tests
133.
critical data studies
134.
cross-border data exchange
135.
data
136.
data assimilation
137.
data protection
138.
data acquisition
139.
data acquisition system
140.
data acquisition systems
141.
data aggregation
142.
data alignment
143.
data analysis
144.
data analytics
145.
data analytics and machine learning
146.
data anisotropy
147.
data annotation
148.
data assimilation
149.
data attacks
150.
data augmentation
151.
data breach handling
152.
data capabilities
153.
data capture
154.
data center
155.
data center (DC)
156.
data center applications
157.
data centers
158.
data centre
159.
data centres
160.
data classification
161.
data clustering
162.
data collection
163.
data commons
164.
data compression
165.
data conversion
166.
data copy
167.
data dictionaries
168.
data discovery
169.
Data dissemination
170.
Data distribution structure
171.
data donation
172.
Data drift
173.
data driven planning
174.
data dropouts
175.
data embassy
176.
data engineering
177.
data enrichment
178.
data envelopment analysis
179.
data ethnography
180.
data exchange
181.
data exchange framework
182.
Data exchange layers
183.
data exchange platform
184.
data experts
185.
data filtering
186.
data fitting approach
187.
data flow languages
188.
data flow visualization
189.
data flows
190.
data fusion
191.
data generative model
192.
data governance
193.
data governance act
194.
data hiding
195.
data integration
196.
data integrity
197.
data intermediary
198.
data Interoperability
199.
data justice
200.
data labeling
201.
data limitations in public sector
202.
data lineage
203.
data logger
204.
data logistics
205.
data management
206.
data mappings
207.
Data Mart
208.
Data Mart (DM)
209.
data mesh
210.
data migration
211.
data mining
212.
data mining and knowledge discovery
213.
data modeling
214.
data models
215.
data modem
216.
data movements
217.
data noise
218.
data offloading
219.
data ownership
220.
data platform
221.
data privacy
222.
data processing
223.
data product
224.
data protection
225.
data quality
226.
data quality management
227.
data quality maturity model
228.
data rate
229.
data reuse
230.
data re-use
231.
data routing
232.
data science
233.
data scraping
234.
data set
235.
data set generation
236.
data sets
237.
data sharing
238.
data simulation
239.
data simultaneity
240.
data sort
241.
data sources
242.
data spaces
243.
data storage
244.
data storage systems
245.
data stream mining
246.
data streams
247.
data structures
248.
data studies
249.
data subject
250.
data subjects
251.
data synthesis
252.
data to decision
253.
data types
254.
data validity
255.
data valorization
256.
data warehouse
257.
data warenhouse
258.
data visualization
259.
data-augmentation
260.
data-based computational psychiatry
261.
data-centric construction
262.
data-centric systems
263.
data-controlled circuit partition
264.
data-controlled segmentation
265.
data-driven
266.
data-driven characterization
267.
data-driven condition monitoring
268.
data-driven control
269.
Data-driven decision-making
270.
data-driven imputation
271.
Data-driven method
272.
data-driven model
273.
data-driven modeling
274.
data-driven optimization
275.
data-driven policy
276.
data-driven public services
277.
data-driven techniques
278.
data-exchange infrastructures
279.
data-exchange solutions
280.
data-flow architecture
281.
data‐fusion
282.
data-independent acquisition
283.
Data-information-knowledgewisdom (DIKW)
284.
data-intelligence
285.
data-mining
286.
data-science
287.
diagnostic data
288.
digital data exchange
289.
discrete data
290.
distributed data aggregation
291.
distributed data fusion
292.
distributed data mining
293.
distributed data mining (DDM)
294.
distributional data
295.
DNA microarray data
296.
educational data mining
297.
enterprise data analysis
298.
European Health Data Space
299.
European Health Data Space (EHDS)
300.
eventdriven data
301.
event-driven data
302.
experimental data
303.
exploratory data analysis
304.
false data injection attack
305.
field data
306.
financial data
307.
floating car data (FCD)
308.
flood data platform
309.
FMI open data
310.
functional data analysis
311.
GDPR (General Data Protection Regulation)
312.
general data protection regulation
313.
genome data
314.
global data hub
315.
GNSS-levelling data
316.
GNSS-RO data
317.
GRUAN data
318.
health data
319.
health data accessibility
320.
Health data anonymization
321.
health data custodianship
322.
health data governance
323.
health data integrity and transparency
324.
health data interoperability
325.
health data policy
326.
health data stewardship
327.
healthcare data
328.
heterogeneous sensor data
329.
high-dimensional data
330.
high-frequency data
331.
high-level test data generation
332.
historical data
333.
hyperspectral data
334.
imbalanced data
335.
implications of energy data
336.
initial data
337.
initial data for AI
338.
initial data model
339.
in-network data processing
340.
insurance data
341.
knowledge discovery and data mining
342.
linked data
343.
linked open data
344.
linked open statistical data
345.
linked data
346.
lossless data compression
347.
low-pass data filtering
348.
Master Data Management
349.
medical claims data
350.
medical data
351.
Medical Data Reuse
352.
meta-data
353.
metered data
354.
methods: data analysis
355.
microplastic data uncertainty
356.
mobile data
357.
mobile phone big data
358.
mobile phone data
359.
mobile phone usage data
360.
mobile positioning data
361.
multisource data fusion
362.
multivariate data analysis
363.
Nigeria's National data protection regulation
364.
open data
365.
open data ecosystem
366.
open data format
367.
open data policies
368.
open government data
369.
open government data (OGD)
370.
open-data
371.
open-data platform
372.
OSM data
373.
oversharing personal data
374.
panel data
375.
parallel data processing
376.
passenger data
377.
patient-generated health data (PGHD)
378.
personal data
379.
personal data disclosure
380.
personal data processing
381.
personal data protection
382.
Personal Data Protection Act
383.
plan data
384.
point cloud data
385.
pollen data
386.
process and data modelling
387.
Product Data Management (PDM)
388.
public data-set
389.
random data
390.
real-time data
391.
real-time data collection
392.
reconstruction of gap-free data
393.
reference architecture for global health data space
394.
remote data transmission
395.
satellite data
396.
semantic data modelling
397.
semantic health data
398.
sequential data
399.
small data machine learning
400.
small training data set
401.
smart data analytics
402.
smart meter data
403.
social media data
404.
Spatial data
405.
spatial data analysis
406.
statistical data
407.
stochastic image data
408.
structured data
409.
student data analysis
410.
supervised learning data
411.
supervisory control and data acquisition (SCADA)
412.
surrogate data
413.
sustainable data governance
414.
symbolic data
415.
symbolic data analysis
416.
synthetic data
417.
temperature historical data series
418.
three-way data
419.
time-selective data fusion
420.
training data
421.
Transcriptome data
422.
tree-like data structures
423.
underwater data center
424.
urban data
425.
urban data acquisition
426.
weather data
427.
web traffic data
428.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
429.
virtual data embassy
430.
Virtual Data Explorer
431.
18O data
432.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT