Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
data security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/475)
Export
export all inquiry results
(4)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book article EST
/
book article ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
3
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
4
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 4, displaying
1 - 4
keyword
471
1.
data security
2.
data and information security
3.
security of data
4.
metadata model for security measures
5.
security dataset
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
cloud security
11.
communication system security
12.
comprehensive system of economic security
13.
computer security
14.
cooperative security dilemma
15.
cyber security
16.
cyber security education
17.
cyber security exercises
18.
cyber security monitoring
19.
cyber security strategies
20.
cyber-physical system security
21.
cyber-security
22.
development of security cameras
23.
digital security practices
24.
drinking water security
25.
economic security
26.
economic security of enterprise
27.
emotional security
28.
energy security
29.
energy security indicator
30.
Estonian information security standard
31.
graded security
32.
hardware security
33.
hardware security primitive
34.
high level of security
35.
Homeland security
36.
human security
37.
information security
38.
information security and privacy
39.
initial level of security
40.
internal security
41.
international security
42.
investment and innovation security
43.
IPv6 security
44.
IT security
45.
IT security management
46.
job security
47.
long-term security
48.
maritime cyber security
49.
maritime cyber security operations centers
50.
Maritime Security Operations Center (M-SOC)
51.
medium level of security
52.
Middle Eastern security
53.
Mobile security
54.
national cyber security strategy
55.
national security
56.
NATO. Science for Peace and Security Program
57.
network security
58.
network security monitoring
59.
OSCE (Organization for Security and Co-operation in Europe)
60.
passenger’s security
61.
policy-based routing security
62.
political and security cultures
63.
post-quantum security
64.
power system security
65.
quantitative security
66.
regional security
67.
RISC-V Security Verification
68.
Safety and Security in Sea Transportation
69.
safety and security testing
70.
security
71.
security adaptation
72.
security alert prioritization
73.
security analysis
74.
security and justice (AFSJ)
75.
Security and political science
76.
security and privacy
77.
security and privacy in smart grids
78.
Security Assertion
79.
Security Assertion Mining
80.
security closure
81.
Security Coverage
82.
security dilemma
83.
Security evaluation
84.
security evaluation instruments
85.
Security Level Evaluation
86.
Security limitations
87.
security log analysis
88.
security management
89.
security model
90.
security monitoring
91.
security notion
92.
security objectives
93.
security of supply
94.
security operation center
95.
security operations center
96.
security patterns
97.
security policy
98.
security problem definition
99.
security proof
100.
security protocols
101.
security requirements
102.
security requirements engineering
103.
security research
104.
security risk assessment
105.
security risk management
106.
security risks
107.
security science and technology
108.
security strategies
109.
security systems for military objects
110.
security testing
111.
security training
112.
security verification
113.
security-by-design
114.
social security planning
115.
societal security
116.
software security
117.
software security level
118.
software security subcharacteristics
119.
sufficient level of security
120.
system of economic security
121.
system security
122.
terrorism security
123.
transmission System Security
124.
voting privacy and security
125.
accident data
126.
adversarial data perturbation
127.
AI data centers
128.
AI-based data curation
129.
AIS data
130.
AIS data format optimization
131.
Aligned data
132.
ALS data enhancements
133.
Amazon Kinesis Data Analytics
134.
application data
135.
audio and visual data
136.
big data
137.
big data analysis
138.
big data analytics
139.
big data science
140.
big geo-data
141.
borehole data
142.
building lifecycle data
143.
call data record
144.
catalogue of data sources
145.
cellular phone data
146.
clinical data capture
147.
clinical data exchange
148.
compositional data
149.
conceptual data model
150.
construction data management
151.
consumption data
152.
control and data path tests
153.
critical data studies
154.
cross-border data exchange
155.
data
156.
data assimilation
157.
data protection
158.
data acquisition
159.
data acquisition system
160.
data acquisition systems
161.
data aggregation
162.
data alignment
163.
Data Altruism
164.
Data Altruism Consent
165.
data analysis
166.
data analytics
167.
data analytics and machine learning
168.
data anisotropy
169.
data annotation
170.
data assimilation
171.
data attacks
172.
data augmentation
173.
data breach handling
174.
data capabilities
175.
data capture
176.
data center
177.
data center (DC)
178.
data center applications
179.
data centers
180.
data centre
181.
data centres
182.
data classification
183.
data clustering
184.
data collection
185.
data commons
186.
data compression
187.
data compression and normalization
188.
data conversion
189.
data copy
190.
data curation
191.
data curing
192.
data dictionaries
193.
data discovery
194.
Data dissemination
195.
Data distribution structure
196.
data donation
197.
Data drift
198.
data driven planning
199.
data dropouts
200.
Data Ecosystem
201.
data embassy
202.
data engineering
203.
data enrichment
204.
data envelopment analysis
205.
data ethnography
206.
data exchange
207.
data exchange framework
208.
Data exchange layers
209.
data exchange platform
210.
data experts
211.
data filtering
212.
data fitting approach
213.
data flow diagram
214.
data flow languages
215.
data flow visualization
216.
data flows
217.
data fusion
218.
data generative model
219.
data governance
220.
data governance act
221.
data harmonization
222.
data hiding
223.
data integration
224.
data integrity
225.
data intermediary
226.
data Interoperability
227.
data justice
228.
data labeling
229.
data limitations in public sector
230.
data lineage
231.
data literacy
232.
data logger
233.
data logistics
234.
data management
235.
data mappings
236.
Data Mart
237.
Data Mart (DM)
238.
data mesh
239.
data migration
240.
data mining
241.
data mining and knowledge discovery
242.
data modeling
243.
data models
244.
data modem
245.
data movements
246.
data noise
247.
data offloading
248.
data ownership
249.
data platform
250.
data privacy
251.
data processing
252.
data product
253.
data protection
254.
data publishing
255.
data quality
256.
data quality management
257.
data quality maturity model
258.
data rate
259.
data representativeness
260.
data reuse
261.
data re-use
262.
data routing
263.
data scarce environments
264.
data science
265.
data scraping
266.
data set
267.
data set generation
268.
data sets
269.
data sharing
270.
data simulation
271.
data simultaneity
272.
data sort
273.
data sources
274.
data spaces
275.
data storage
276.
data storage systems
277.
data stream mining
278.
data streams
279.
data structures
280.
data studies
281.
data subject
282.
data subjects
283.
data synthesis
284.
data to decision
285.
data types
286.
data validity
287.
data valorization
288.
data warehouse
289.
data warenhouse
290.
data visualization
291.
data-augmentation
292.
data-based computational psychiatry
293.
data-centric construction
294.
data-centric systems
295.
data-controlled circuit partition
296.
data-controlled segmentation
297.
data-driven
298.
data-driven characterization
299.
data-driven condition monitoring
300.
data-driven control
301.
Data-driven decision-making
302.
data-driven imputation
303.
Data-driven method
304.
data-driven model
305.
data-driven modeling
306.
data-driven optimization
307.
data-driven policy
308.
data-driven public services
309.
data-driven techniques
310.
data-exchange infrastructures
311.
data-exchange solutions
312.
data-flow architecture
313.
data‐fusion
314.
data-independent acquisition
315.
Data-information-knowledgewisdom (DIKW)
316.
data-intelligence
317.
data-mining
318.
data-science
319.
data-sharing
320.
diagnostic data
321.
digital data exchange
322.
discrete data
323.
distributed data aggregation
324.
distributed data fusion
325.
distributed data mining
326.
distributed data mining (DDM)
327.
distributional data
328.
DNA microarray data
329.
educational data mining
330.
educational data-mining
331.
empirical data
332.
enterprise data analysis
333.
European Health Data Space
334.
European Health Data Space (EHDS)
335.
eventdriven data
336.
event-driven data
337.
experimental data
338.
exploratory data analysis
339.
fair data
340.
false data injection attack
341.
field data
342.
financial data
343.
floating car data (FCD)
344.
flood data platform
345.
FMI open data
346.
functional data analysis
347.
GDPR (General Data Protection Regulation)
348.
general data protection regulation
349.
genome data
350.
global data hub
351.
GNSS-levelling data
352.
GNSS-RO data
353.
GRUAN data
354.
health data
355.
health data accessibility
356.
Health data anonymization
357.
health data custodianship
358.
health data governance
359.
health data integrity and transparency
360.
health data interoperability
361.
health data policy
362.
health data stewardship
363.
healthcare data
364.
heterogeneous data
365.
heterogeneous sensor data
366.
high-dimensional data
367.
high-frequency data
368.
high-level test data generation
369.
historical data
370.
hyperspectral data
371.
imbalanced data
372.
implications of energy data
373.
initial data
374.
initial data for AI
375.
initial data model
376.
in-network data processing
377.
insurance data
378.
knowledge discovery and data mining
379.
linked data
380.
linked open data
381.
linked open statistical data
382.
linked data
383.
lossless data compression
384.
low-pass data filtering
385.
Master Data Management
386.
medical claims data
387.
medical data
388.
Medical Data Reuse
389.
meta-data
390.
metered data
391.
methods: data analysis
392.
microplastic data uncertainty
393.
mobile data
394.
mobile phone big data
395.
mobile phone data
396.
mobile phone usage data
397.
mobile positioning data
398.
multisource data fusion
399.
multivariate data analysis
400.
Nigeria's National data protection regulation
401.
on/off-chain data storages
402.
open data
403.
open data ecosystem
404.
open data format
405.
open data policies
406.
open government data
407.
open government data (OGD)
408.
open-data
409.
open-data platform
410.
OSM data
411.
oversharing personal data
412.
panel data
413.
parallel data processing
414.
passenger data
415.
patient-generated health data (PGHD)
416.
personal data
417.
personal data disclosure
418.
personal data processing
419.
personal data protection
420.
Personal Data Protection Act
421.
plan data
422.
point cloud data
423.
pollen data
424.
process and data modelling
425.
Product Data Management (PDM)
426.
public data-set
427.
random data
428.
real-time data
429.
real-time data collection
430.
reconstruction of gap-free data
431.
reference architecture for global health data space
432.
remote data transmission
433.
satellite data
434.
semantic data modelling
435.
semantic health data
436.
sequential data
437.
small data machine learning
438.
small training data set
439.
smart data analytics
440.
smart meter data
441.
social media data
442.
Spatial data
443.
spatial data analysis
444.
statistical data
445.
stochastic image data
446.
structured data
447.
student data analysis
448.
supervised learning data
449.
supervisory control and data acquisition (SCADA)
450.
surrogate data
451.
sustainable data governance
452.
sustainable data storage
453.
symbolic data
454.
symbolic data analysis
455.
synthetic data
456.
temperature historical data series
457.
three-way data
458.
time-selective data fusion
459.
training data
460.
Transcriptome data
461.
tree-like data structures
462.
underwater data center
463.
urban data
464.
urban data acquisition
465.
weather data
466.
web traffic data
467.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
468.
virtual data embassy
469.
Virtual Data Explorer
470.
18O data
471.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT