Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
data security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
3
Look more..
(2/377)
Export
export all inquiry results
(3)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
3
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 3, displaying
1 - 3
keyword
374
1.
data security
2.
security of data
3.
metadata model for security measures
4.
security dataset
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security strategies
17.
cyber-security
18.
development of security cameras
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
Estonian information security standard
26.
graded security
27.
hardware security
28.
hardware security primitive
29.
human security
30.
information security
31.
internal security
32.
international security
33.
investment and innovation security
34.
IPv6 security
35.
IT security
36.
IT security management
37.
job security
38.
long-term security
39.
Middle Eastern security
40.
Mobile security
41.
national cyber security strategy
42.
national security
43.
NATO. Science for Peace and Security Program
44.
network security
45.
network security monitoring
46.
OSCE (Organization for Security and Co-operation in Europe)
47.
passenger’s security
48.
policy-based routing security
49.
political and security cultures
50.
post-quantum security
51.
power system security
52.
quantitative security
53.
regional security
54.
RISC-V Security Verification
55.
safety and security testing
56.
security
57.
security adaptation
58.
security alert prioritization
59.
security analysis
60.
security and justice (AFSJ)
61.
security and privacy
62.
security and privacy in smart grids
63.
Security Assertion Mining
64.
security closure
65.
Security Coverage
66.
security dilemma
67.
Security evaluation
68.
security evaluation instruments
69.
security log analysis
70.
security management
71.
security model
72.
security monitoring
73.
security notion
74.
security objectives
75.
security of supply
76.
security operation center
77.
security operations center
78.
security patterns
79.
security policy
80.
security problem definition
81.
security proof
82.
security protocols
83.
security requirements
84.
security requirements engineering
85.
security risk assessment
86.
security risk management
87.
security strategies
88.
security systems for military objects
89.
security testing
90.
security training
91.
security verification
92.
security-by-design
93.
social security planning
94.
societal security
95.
system of economic security
96.
system security
97.
terrorism security
98.
transmission System Security
99.
voting privacy and security
100.
accident data
101.
adversarial data perturbation
102.
AI-based data curation
103.
AIS data
104.
Aligned data
105.
ALS data enhancements
106.
Amazon Kinesis Data Analytics
107.
application data
108.
audio and visual data
109.
big data
110.
big data analysis
111.
big data analytics
112.
borehole data
113.
building lifecycle data
114.
call data record
115.
catalogue of data sources
116.
clinical data capture
117.
clinical data exchange
118.
conceptual data model
119.
control and data path tests
120.
critical data studies
121.
cross-border data exchange
122.
data
123.
data assimilation
124.
data protection
125.
data acquisition
126.
data acquisition system
127.
data acquisition systems
128.
data aggregation
129.
data alignment
130.
data analysis
131.
data analytics
132.
data anisotropy
133.
data annotation
134.
data assimilation
135.
data attacks
136.
data augmentation
137.
data capabilities
138.
data capture
139.
data center
140.
data center (DC)
141.
data centers
142.
data centre
143.
data centres
144.
data classification
145.
data clustering
146.
data collection
147.
data commons
148.
data compression
149.
data conversion
150.
data copy
151.
data dictionaries
152.
data discovery
153.
Data dissemination
154.
Data distribution structure
155.
Data drift
156.
data driven planning
157.
data embassy
158.
data engineering
159.
data envelopment analysis
160.
data ethnography
161.
data exchange
162.
data exchange framework
163.
Data exchange layers
164.
data exchange platform
165.
data experts
166.
data filtering
167.
data fitting approach
168.
data flow languages
169.
data flow visualization
170.
data fusion
171.
data generative model
172.
data governance
173.
data integration
174.
data integrity
175.
data intermediary
176.
data justice
177.
data labeling
178.
data lineage
179.
data logger
180.
data logistics
181.
data management
182.
data mappings
183.
Data Mart
184.
data mesh
185.
data mining
186.
data modeling
187.
data models
188.
data modem
189.
data noise
190.
data offloading
191.
data ownership
192.
data platform
193.
data privacy
194.
data processing
195.
data product
196.
data protection
197.
data quality
198.
data quality management
199.
data quality maturity model
200.
data rate
201.
data reuse
202.
data re-use
203.
data routing
204.
data science
205.
data scraping
206.
data set generation
207.
data sets
208.
data sharing
209.
data simulation
210.
data simultaneity
211.
data sort
212.
data sources
213.
data storage
214.
data storage systems
215.
data stream mining
216.
data streams
217.
data studies
218.
data subject
219.
data synthesis
220.
data to decision
221.
data types
222.
data validity
223.
data valorization
224.
data warehouse
225.
data warenhouse
226.
data visualization
227.
data-based computational psychiatry
228.
data-centric construction
229.
data-centric systems
230.
data-controlled circuit partition
231.
data-controlled segmentation
232.
data-driven
233.
data-driven characterization
234.
Data-driven method
235.
data-driven modeling
236.
data-exchange infrastructures
237.
data-exchange solutions
238.
data‐fusion
239.
data-independent acquisition
240.
Data-information-knowledgewisdom (DIKW)
241.
data-intelligence
242.
data-mining
243.
data-science
244.
diagnostic data
245.
digital data exchange
246.
discrete data
247.
distributed data aggregation
248.
distributed data fusion
249.
distributed data mining
250.
distributed data mining (DDM)
251.
DNA microarray data
252.
educational data mining
253.
enterprise data analysis
254.
European Health Data Space
255.
European Health Data Space (EHDS)
256.
eventdriven data
257.
event-driven data
258.
experimental data
259.
exploratory data analysis
260.
false data injection attack
261.
field data
262.
financial data
263.
floating car data (FCD)
264.
flood data platform
265.
FMI open data
266.
functional data analysis
267.
GDPR (General Data Protection Regulation)
268.
general data protection regulation
269.
genome data
270.
global data hub
271.
GNSS-levelling data
272.
health data
273.
health data accessibility
274.
Health data anonymization
275.
health data custodianship
276.
health data governance
277.
health data interoperability
278.
health data policy
279.
health data stewardship
280.
healthcare data
281.
heterogeneous sensor data
282.
high-dimensional data
283.
high-frequency data
284.
high-level test data generation
285.
historical data
286.
hyperspectral data
287.
imbalanced data
288.
implications of energy data
289.
initial data
290.
in-network data processing
291.
insurance data
292.
knowledge discovery and data mining
293.
linked data
294.
linked open data
295.
linked open statistical data
296.
linked data
297.
lossless data compression
298.
low-pass data filtering
299.
Master Data Management
300.
medical claims data
301.
medical data
302.
Medical Data Reuse
303.
meta-data
304.
metered data
305.
microplastic data uncertainty
306.
mobile data
307.
mobile phone big data
308.
mobile phone data
309.
mobile phone usage data
310.
mobile positioning data
311.
multisource data fusion
312.
multivariate data analysis
313.
Nigeria's National data protection regulation
314.
open data
315.
open data ecosystem
316.
open data format
317.
open data policies
318.
open government data
319.
open government data (OGD)
320.
OSM data
321.
oversharing personal data
322.
panel data
323.
parallel data processing
324.
passenger data
325.
patient-generated health data (PGHD)
326.
personal data
327.
personal data disclosure
328.
personal data processing
329.
personal data protection
330.
Personal Data Protection Act
331.
plan data
332.
point cloud data
333.
pollen data
334.
process and data modelling
335.
public data-set
336.
random data
337.
real-time data
338.
reconstruction of gap-free data
339.
reference architecture for global health data space
340.
remote data transmission
341.
satellite data
342.
semantic health data
343.
sequential data
344.
small data machine learning
345.
small training data set
346.
smart data analytics
347.
smart meter data
348.
social media data
349.
Spatial data
350.
spatial data analysis
351.
statistical data
352.
stochastic image data
353.
structured data
354.
student data analysis
355.
supervised learning data
356.
supervisory control and data acquisition (SCADA)
357.
surrogate data
358.
sustainable data governance
359.
symbolic data
360.
symbolic data analysis
361.
synthetic data
362.
time-selective data fusion
363.
training data
364.
Transcriptome data
365.
tree-like data structures
366.
urban data
367.
urban data acquisition
368.
weather data
369.
web traffic data
370.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
371.
virtual data embassy
372.
Virtual Data Explorer
373.
18O data
374.
(big) data
subject term
3
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT