Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security of data (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/426)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Black-box separations and their adaptability to the non-uniform model
Buldas, Ahto
;
Niitsoo, Margus
Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings
2013
/
p. 152-167
https://doi.org/10.1007/978-3-642-39059-3_11
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
2
book article
A security verification template to assess cache architecture vulnerabilities
Ghasempouri, Tara
;
Raik, Jaan
;
Paul, Kolin
;
Reinbrecht, Cezar
;
Hamdioui, Said
;
Taouil, M.
2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), April 22nd – 24th 2020 Novi Sad, Serbia : Proceedings
2020
/
art. 9095707, 6 p
https://doi.org/10.1109/DDECS50862.2020.9095707
book article
Number of records 2, displaying
1 - 2
keyword
422
1.
security of data
2.
data security
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security monitoring
15.
cyber security strategies
16.
cyber-security
17.
development of security cameras
18.
digital security practices
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
Estonian information security standard
26.
graded security
27.
hardware security
28.
hardware security primitive
29.
human security
30.
information security
31.
information security and privacy
32.
internal security
33.
international security
34.
investment and innovation security
35.
IPv6 security
36.
IT security
37.
IT security management
38.
job security
39.
long-term security
40.
metadata model for security measures
41.
Middle Eastern security
42.
Mobile security
43.
national cyber security strategy
44.
national security
45.
NATO. Science for Peace and Security Program
46.
network security
47.
network security monitoring
48.
OSCE (Organization for Security and Co-operation in Europe)
49.
passenger’s security
50.
policy-based routing security
51.
political and security cultures
52.
post-quantum security
53.
power system security
54.
quantitative security
55.
regional security
56.
RISC-V Security Verification
57.
safety and security testing
58.
security
59.
security adaptation
60.
security alert prioritization
61.
security analysis
62.
security and justice (AFSJ)
63.
Security and political science
64.
security and privacy
65.
security and privacy in smart grids
66.
Security Assertion Mining
67.
security closure
68.
Security Coverage
69.
security dataset
70.
security dilemma
71.
Security evaluation
72.
security evaluation instruments
73.
Security limitations
74.
security log analysis
75.
security management
76.
security model
77.
security monitoring
78.
security notion
79.
security objectives
80.
security of supply
81.
security operation center
82.
security operations center
83.
security patterns
84.
security policy
85.
security problem definition
86.
security proof
87.
security protocols
88.
security requirements
89.
security requirements engineering
90.
security risk assessment
91.
security risk management
92.
security risks
93.
security strategies
94.
security systems for military objects
95.
security testing
96.
security training
97.
security verification
98.
security-by-design
99.
social security planning
100.
societal security
101.
system of economic security
102.
system security
103.
terrorism security
104.
transmission System Security
105.
voting privacy and security
106.
accident data
107.
adversarial data perturbation
108.
AI-based data curation
109.
AIS data
110.
Aligned data
111.
ALS data enhancements
112.
Amazon Kinesis Data Analytics
113.
application data
114.
audio and visual data
115.
big data
116.
big data analysis
117.
big data analytics
118.
big data science
119.
big geo-data
120.
borehole data
121.
building lifecycle data
122.
call data record
123.
catalogue of data sources
124.
cellular phone data
125.
clinical data capture
126.
clinical data exchange
127.
compositional data
128.
conceptual data model
129.
construction data management
130.
control and data path tests
131.
critical data studies
132.
cross-border data exchange
133.
data
134.
data assimilation
135.
data protection
136.
data acquisition
137.
data acquisition system
138.
data acquisition systems
139.
data aggregation
140.
data alignment
141.
data analysis
142.
data analytics
143.
data analytics and machine learning
144.
data anisotropy
145.
data annotation
146.
data assimilation
147.
data attacks
148.
data augmentation
149.
data breach handling
150.
data capabilities
151.
data capture
152.
data center
153.
data center (DC)
154.
data centers
155.
data centre
156.
data centres
157.
data classification
158.
data clustering
159.
data collection
160.
data commons
161.
data compression
162.
data conversion
163.
data copy
164.
data dictionaries
165.
data discovery
166.
Data dissemination
167.
Data distribution structure
168.
data donation
169.
Data drift
170.
data driven planning
171.
data dropouts
172.
data embassy
173.
data engineering
174.
data enrichment
175.
data envelopment analysis
176.
data ethnography
177.
data exchange
178.
data exchange framework
179.
Data exchange layers
180.
data exchange platform
181.
data experts
182.
data filtering
183.
data fitting approach
184.
data flow languages
185.
data flow visualization
186.
data flows
187.
data fusion
188.
data generative model
189.
data governance
190.
data governance act
191.
data hiding
192.
data integration
193.
data integrity
194.
data intermediary
195.
data Interoperability
196.
data justice
197.
data labeling
198.
data lineage
199.
data logger
200.
data logistics
201.
data management
202.
data mappings
203.
Data Mart
204.
Data Mart (DM)
205.
data mesh
206.
data migration
207.
data mining
208.
data modeling
209.
data models
210.
data modem
211.
data movements
212.
data noise
213.
data offloading
214.
data ownership
215.
data platform
216.
data privacy
217.
data processing
218.
data product
219.
data protection
220.
data quality
221.
data quality management
222.
data quality maturity model
223.
data rate
224.
data reuse
225.
data re-use
226.
data routing
227.
data science
228.
data scraping
229.
data set
230.
data set generation
231.
data sets
232.
data sharing
233.
data simulation
234.
data simultaneity
235.
data sort
236.
data sources
237.
data spaces
238.
data storage
239.
data storage systems
240.
data stream mining
241.
data streams
242.
data structures
243.
data studies
244.
data subject
245.
data subjects
246.
data synthesis
247.
data to decision
248.
data types
249.
data validity
250.
data valorization
251.
data warehouse
252.
data warenhouse
253.
data visualization
254.
data-augmentation
255.
data-based computational psychiatry
256.
data-centric construction
257.
data-centric systems
258.
data-controlled circuit partition
259.
data-controlled segmentation
260.
data-driven
261.
data-driven characterization
262.
data-driven condition monitoring
263.
data-driven control
264.
Data-driven decision-making
265.
data-driven imputation
266.
Data-driven method
267.
data-driven model
268.
data-driven modeling
269.
data-driven optimization
270.
data-driven public services
271.
data-driven techniques
272.
data-exchange infrastructures
273.
data-exchange solutions
274.
data-flow architecture
275.
data‐fusion
276.
data-independent acquisition
277.
Data-information-knowledgewisdom (DIKW)
278.
data-intelligence
279.
data-mining
280.
data-science
281.
diagnostic data
282.
digital data exchange
283.
discrete data
284.
distributed data aggregation
285.
distributed data fusion
286.
distributed data mining
287.
distributed data mining (DDM)
288.
DNA microarray data
289.
educational data mining
290.
enterprise data analysis
291.
European Health Data Space
292.
European Health Data Space (EHDS)
293.
eventdriven data
294.
event-driven data
295.
experimental data
296.
exploratory data analysis
297.
false data injection attack
298.
field data
299.
financial data
300.
floating car data (FCD)
301.
flood data platform
302.
FMI open data
303.
functional data analysis
304.
GDPR (General Data Protection Regulation)
305.
general data protection regulation
306.
genome data
307.
global data hub
308.
GNSS-levelling data
309.
GNSS-RO data
310.
GRUAN data
311.
health data
312.
health data accessibility
313.
Health data anonymization
314.
health data custodianship
315.
health data governance
316.
health data interoperability
317.
health data policy
318.
health data stewardship
319.
healthcare data
320.
heterogeneous sensor data
321.
high-dimensional data
322.
high-frequency data
323.
high-level test data generation
324.
historical data
325.
hyperspectral data
326.
imbalanced data
327.
implications of energy data
328.
initial data
329.
initial data for AI
330.
initial data model
331.
in-network data processing
332.
insurance data
333.
knowledge discovery and data mining
334.
linked data
335.
linked open data
336.
linked open statistical data
337.
linked data
338.
lossless data compression
339.
low-pass data filtering
340.
Master Data Management
341.
medical claims data
342.
medical data
343.
Medical Data Reuse
344.
meta-data
345.
metered data
346.
methods: data analysis
347.
microplastic data uncertainty
348.
mobile data
349.
mobile phone big data
350.
mobile phone data
351.
mobile phone usage data
352.
mobile positioning data
353.
multisource data fusion
354.
multivariate data analysis
355.
Nigeria's National data protection regulation
356.
open data
357.
open data ecosystem
358.
open data format
359.
open data policies
360.
open government data
361.
open government data (OGD)
362.
open-data
363.
OSM data
364.
oversharing personal data
365.
panel data
366.
parallel data processing
367.
passenger data
368.
patient-generated health data (PGHD)
369.
personal data
370.
personal data disclosure
371.
personal data processing
372.
personal data protection
373.
Personal Data Protection Act
374.
plan data
375.
point cloud data
376.
pollen data
377.
process and data modelling
378.
Product Data Management (PDM)
379.
public data-set
380.
random data
381.
real-time data
382.
real-time data collection
383.
reconstruction of gap-free data
384.
reference architecture for global health data space
385.
remote data transmission
386.
satellite data
387.
semantic data modelling
388.
semantic health data
389.
sequential data
390.
small data machine learning
391.
small training data set
392.
smart data analytics
393.
smart meter data
394.
social media data
395.
Spatial data
396.
spatial data analysis
397.
statistical data
398.
stochastic image data
399.
structured data
400.
student data analysis
401.
supervised learning data
402.
supervisory control and data acquisition (SCADA)
403.
surrogate data
404.
sustainable data governance
405.
symbolic data
406.
symbolic data analysis
407.
synthetic data
408.
temperature historical data series
409.
time-selective data fusion
410.
training data
411.
Transcriptome data
412.
tree-like data structures
413.
underwater data center
414.
urban data
415.
urban data acquisition
416.
weather data
417.
web traffic data
418.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
419.
virtual data embassy
420.
Virtual Data Explorer
421.
18O data
422.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT