Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
data security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/395)
Export
export all inquiry results
(4)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book article EST
/
book article ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
3
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
4
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 4, displaying
1 - 4
keyword
391
1.
data security
2.
security of data
3.
metadata model for security measures
4.
security dataset
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security strategies
17.
cyber-security
18.
development of security cameras
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
Estonian information security standard
26.
graded security
27.
hardware security
28.
hardware security primitive
29.
human security
30.
information security
31.
internal security
32.
international security
33.
investment and innovation security
34.
IPv6 security
35.
IT security
36.
IT security management
37.
job security
38.
long-term security
39.
Middle Eastern security
40.
Mobile security
41.
national cyber security strategy
42.
national security
43.
NATO. Science for Peace and Security Program
44.
network security
45.
network security monitoring
46.
OSCE (Organization for Security and Co-operation in Europe)
47.
passenger’s security
48.
policy-based routing security
49.
political and security cultures
50.
post-quantum security
51.
power system security
52.
quantitative security
53.
regional security
54.
RISC-V Security Verification
55.
safety and security testing
56.
security
57.
security adaptation
58.
security alert prioritization
59.
security analysis
60.
security and justice (AFSJ)
61.
security and privacy
62.
security and privacy in smart grids
63.
Security Assertion Mining
64.
security closure
65.
Security Coverage
66.
security dilemma
67.
Security evaluation
68.
security evaluation instruments
69.
security log analysis
70.
security management
71.
security model
72.
security monitoring
73.
security notion
74.
security objectives
75.
security of supply
76.
security operation center
77.
security operations center
78.
security patterns
79.
security policy
80.
security problem definition
81.
security proof
82.
security protocols
83.
security requirements
84.
security requirements engineering
85.
security risk assessment
86.
security risk management
87.
security strategies
88.
security systems for military objects
89.
security testing
90.
security training
91.
security verification
92.
security-by-design
93.
social security planning
94.
societal security
95.
system of economic security
96.
system security
97.
terrorism security
98.
transmission System Security
99.
voting privacy and security
100.
accident data
101.
adversarial data perturbation
102.
AI-based data curation
103.
AIS data
104.
Aligned data
105.
ALS data enhancements
106.
Amazon Kinesis Data Analytics
107.
application data
108.
audio and visual data
109.
big data
110.
big data analysis
111.
big data analytics
112.
big data science
113.
big geo-data
114.
borehole data
115.
building lifecycle data
116.
call data record
117.
catalogue of data sources
118.
cellular phone data
119.
clinical data capture
120.
clinical data exchange
121.
compositional data
122.
conceptual data model
123.
control and data path tests
124.
critical data studies
125.
cross-border data exchange
126.
data
127.
data assimilation
128.
data protection
129.
data acquisition
130.
data acquisition system
131.
data acquisition systems
132.
data aggregation
133.
data alignment
134.
data analysis
135.
data analytics
136.
data anisotropy
137.
data annotation
138.
data assimilation
139.
data attacks
140.
data augmentation
141.
data breach handling
142.
data capabilities
143.
data capture
144.
data center
145.
data center (DC)
146.
data centers
147.
data centre
148.
data centres
149.
data classification
150.
data clustering
151.
data collection
152.
data commons
153.
data compression
154.
data conversion
155.
data copy
156.
data dictionaries
157.
data discovery
158.
Data dissemination
159.
Data distribution structure
160.
Data drift
161.
data driven planning
162.
data embassy
163.
data engineering
164.
data envelopment analysis
165.
data ethnography
166.
data exchange
167.
data exchange framework
168.
Data exchange layers
169.
data exchange platform
170.
data experts
171.
data filtering
172.
data fitting approach
173.
data flow languages
174.
data flow visualization
175.
data fusion
176.
data generative model
177.
data governance
178.
data hiding
179.
data integration
180.
data integrity
181.
data intermediary
182.
data Interoperability
183.
data justice
184.
data labeling
185.
data lineage
186.
data logger
187.
data logistics
188.
data management
189.
data mappings
190.
Data Mart
191.
Data Mart (DM)
192.
data mesh
193.
data mining
194.
data modeling
195.
data models
196.
data modem
197.
data noise
198.
data offloading
199.
data ownership
200.
data platform
201.
data privacy
202.
data processing
203.
data product
204.
data protection
205.
data quality
206.
data quality management
207.
data quality maturity model
208.
data rate
209.
data reuse
210.
data re-use
211.
data routing
212.
data science
213.
data scraping
214.
data set
215.
data set generation
216.
data sets
217.
data sharing
218.
data simulation
219.
data simultaneity
220.
data sort
221.
data sources
222.
data storage
223.
data storage systems
224.
data stream mining
225.
data streams
226.
data studies
227.
data subject
228.
data synthesis
229.
data to decision
230.
data types
231.
data validity
232.
data valorization
233.
data warehouse
234.
data warenhouse
235.
data visualization
236.
data-based computational psychiatry
237.
data-centric construction
238.
data-centric systems
239.
data-controlled circuit partition
240.
data-controlled segmentation
241.
data-driven
242.
data-driven characterization
243.
data-driven condition monitoring
244.
Data-driven method
245.
data-driven modeling
246.
data-driven optimization
247.
data-exchange infrastructures
248.
data-exchange solutions
249.
data‐fusion
250.
data-independent acquisition
251.
Data-information-knowledgewisdom (DIKW)
252.
data-intelligence
253.
data-mining
254.
data-science
255.
diagnostic data
256.
digital data exchange
257.
discrete data
258.
distributed data aggregation
259.
distributed data fusion
260.
distributed data mining
261.
distributed data mining (DDM)
262.
DNA microarray data
263.
educational data mining
264.
enterprise data analysis
265.
European Health Data Space
266.
European Health Data Space (EHDS)
267.
eventdriven data
268.
event-driven data
269.
experimental data
270.
exploratory data analysis
271.
false data injection attack
272.
field data
273.
financial data
274.
floating car data (FCD)
275.
flood data platform
276.
FMI open data
277.
functional data analysis
278.
GDPR (General Data Protection Regulation)
279.
general data protection regulation
280.
genome data
281.
global data hub
282.
GNSS-levelling data
283.
health data
284.
health data accessibility
285.
Health data anonymization
286.
health data custodianship
287.
health data governance
288.
health data interoperability
289.
health data policy
290.
health data stewardship
291.
healthcare data
292.
heterogeneous sensor data
293.
high-dimensional data
294.
high-frequency data
295.
high-level test data generation
296.
historical data
297.
hyperspectral data
298.
imbalanced data
299.
implications of energy data
300.
initial data
301.
initial data for AI
302.
in-network data processing
303.
insurance data
304.
knowledge discovery and data mining
305.
linked data
306.
linked open data
307.
linked open statistical data
308.
linked data
309.
lossless data compression
310.
low-pass data filtering
311.
Master Data Management
312.
medical claims data
313.
medical data
314.
Medical Data Reuse
315.
meta-data
316.
metered data
317.
methods: data analysis
318.
microplastic data uncertainty
319.
mobile data
320.
mobile phone big data
321.
mobile phone data
322.
mobile phone usage data
323.
mobile positioning data
324.
multisource data fusion
325.
multivariate data analysis
326.
Nigeria's National data protection regulation
327.
open data
328.
open data ecosystem
329.
open data format
330.
open data policies
331.
open government data
332.
open government data (OGD)
333.
OSM data
334.
oversharing personal data
335.
panel data
336.
parallel data processing
337.
passenger data
338.
patient-generated health data (PGHD)
339.
personal data
340.
personal data disclosure
341.
personal data processing
342.
personal data protection
343.
Personal Data Protection Act
344.
plan data
345.
point cloud data
346.
pollen data
347.
process and data modelling
348.
Product Data Management (PDM)
349.
public data-set
350.
random data
351.
real-time data
352.
reconstruction of gap-free data
353.
reference architecture for global health data space
354.
remote data transmission
355.
satellite data
356.
semantic data modelling
357.
semantic health data
358.
sequential data
359.
small data machine learning
360.
small training data set
361.
smart data analytics
362.
smart meter data
363.
social media data
364.
Spatial data
365.
spatial data analysis
366.
statistical data
367.
stochastic image data
368.
structured data
369.
student data analysis
370.
supervised learning data
371.
supervisory control and data acquisition (SCADA)
372.
surrogate data
373.
sustainable data governance
374.
symbolic data
375.
symbolic data analysis
376.
synthetic data
377.
temperature historical data series
378.
time-selective data fusion
379.
training data
380.
Transcriptome data
381.
tree-like data structures
382.
underwater data center
383.
urban data
384.
urban data acquisition
385.
weather data
386.
web traffic data
387.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
388.
virtual data embassy
389.
Virtual Data Explorer
390.
18O data
391.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT