Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security of data (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/472)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Black-box separations and their adaptability to the non-uniform model
Buldas, Ahto
;
Niitsoo, Margus
Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings
2013
/
p. 152-167
https://doi.org/10.1007/978-3-642-39059-3_11
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
2
book article
A security verification template to assess cache architecture vulnerabilities
Ghasempouri, Tara
;
Raik, Jaan
;
Paul, Kolin
;
Reinbrecht, Cezar
;
Hamdioui, Said
;
Taouil, M.
2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), April 22nd – 24th 2020 Novi Sad, Serbia : Proceedings
2020
/
art. 9095707, 6 p
https://doi.org/10.1109/DDECS50862.2020.9095707
book article
Number of records 2, displaying
1 - 2
keyword
468
1.
security of data
2.
data and information security
3.
data security
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
cloud security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security monitoring
17.
cyber security strategies
18.
cyber-security
19.
development of security cameras
20.
digital security practices
21.
drinking water security
22.
economic security
23.
economic security of enterprise
24.
emotional security
25.
energy security
26.
energy security indicator
27.
Estonian information security standard
28.
graded security
29.
hardware security
30.
hardware security primitive
31.
high level of security
32.
Homeland security
33.
human security
34.
information security
35.
information security and privacy
36.
initial level of security
37.
internal security
38.
international security
39.
investment and innovation security
40.
IPv6 security
41.
IT security
42.
IT security management
43.
job security
44.
long-term security
45.
maritime cyber security
46.
maritime cyber security operations centers
47.
Maritime Security Operations Center (M-SOC)
48.
medium level of security
49.
metadata model for security measures
50.
Middle Eastern security
51.
Mobile security
52.
national cyber security strategy
53.
national security
54.
NATO. Science for Peace and Security Program
55.
network security
56.
network security monitoring
57.
OSCE (Organization for Security and Co-operation in Europe)
58.
passenger’s security
59.
policy-based routing security
60.
political and security cultures
61.
post-quantum security
62.
power system security
63.
quantitative security
64.
regional security
65.
RISC-V Security Verification
66.
Safety and Security in Sea Transportation
67.
safety and security testing
68.
security
69.
security adaptation
70.
security alert prioritization
71.
security analysis
72.
security and justice (AFSJ)
73.
Security and political science
74.
security and privacy
75.
security and privacy in smart grids
76.
Security Assertion
77.
Security Assertion Mining
78.
security closure
79.
Security Coverage
80.
security dataset
81.
security dilemma
82.
Security evaluation
83.
security evaluation instruments
84.
Security Level Evaluation
85.
Security limitations
86.
security log analysis
87.
security management
88.
security model
89.
security monitoring
90.
security notion
91.
security objectives
92.
security of supply
93.
security operation center
94.
security operations center
95.
security patterns
96.
security policy
97.
security problem definition
98.
security proof
99.
security protocols
100.
security requirements
101.
security requirements engineering
102.
security research
103.
security risk assessment
104.
security risk management
105.
security risks
106.
security science and technology
107.
security strategies
108.
security systems for military objects
109.
security testing
110.
security training
111.
security verification
112.
security-by-design
113.
social security planning
114.
societal security
115.
software security
116.
software security level
117.
software security subcharacteristics
118.
sufficient level of security
119.
system of economic security
120.
system security
121.
terrorism security
122.
transmission System Security
123.
voting privacy and security
124.
accident data
125.
adversarial data perturbation
126.
AI data centers
127.
AI-based data curation
128.
AIS data
129.
AIS data format optimization
130.
Aligned data
131.
ALS data enhancements
132.
Amazon Kinesis Data Analytics
133.
application data
134.
audio and visual data
135.
big data
136.
big data analysis
137.
big data analytics
138.
big data science
139.
big geo-data
140.
borehole data
141.
building lifecycle data
142.
call data record
143.
catalogue of data sources
144.
cellular phone data
145.
clinical data capture
146.
clinical data exchange
147.
compositional data
148.
conceptual data model
149.
construction data management
150.
consumption data
151.
control and data path tests
152.
critical data studies
153.
cross-border data exchange
154.
data
155.
data assimilation
156.
data protection
157.
data acquisition
158.
data acquisition system
159.
data acquisition systems
160.
data aggregation
161.
data alignment
162.
Data Altruism
163.
Data Altruism Consent
164.
data analysis
165.
data analytics
166.
data analytics and machine learning
167.
data anisotropy
168.
data annotation
169.
data assimilation
170.
data attacks
171.
data augmentation
172.
data breach handling
173.
data capabilities
174.
data capture
175.
data center
176.
data center (DC)
177.
data center applications
178.
data centers
179.
data centre
180.
data centres
181.
data classification
182.
data clustering
183.
data collection
184.
data commons
185.
data compression
186.
data compression and normalization
187.
data conversion
188.
data copy
189.
data curation
190.
data curing
191.
data dictionaries
192.
data discovery
193.
Data dissemination
194.
Data distribution structure
195.
data donation
196.
Data drift
197.
data driven planning
198.
data dropouts
199.
Data Ecosystem
200.
data embassy
201.
data engineering
202.
data enrichment
203.
data envelopment analysis
204.
data ethnography
205.
data exchange
206.
data exchange framework
207.
Data exchange layers
208.
data exchange platform
209.
data experts
210.
data filtering
211.
data fitting approach
212.
data flow languages
213.
data flow visualization
214.
data flows
215.
data fusion
216.
data generative model
217.
data governance
218.
data governance act
219.
data harmonization
220.
data hiding
221.
data integration
222.
data integrity
223.
data intermediary
224.
data Interoperability
225.
data justice
226.
data labeling
227.
data limitations in public sector
228.
data lineage
229.
data literacy
230.
data logger
231.
data logistics
232.
data management
233.
data mappings
234.
Data Mart
235.
Data Mart (DM)
236.
data mesh
237.
data migration
238.
data mining
239.
data mining and knowledge discovery
240.
data modeling
241.
data models
242.
data modem
243.
data movements
244.
data noise
245.
data offloading
246.
data ownership
247.
data platform
248.
data privacy
249.
data processing
250.
data product
251.
data protection
252.
data publishing
253.
data quality
254.
data quality management
255.
data quality maturity model
256.
data rate
257.
data representativeness
258.
data reuse
259.
data re-use
260.
data routing
261.
data scarce environments
262.
data science
263.
data scraping
264.
data set
265.
data set generation
266.
data sets
267.
data sharing
268.
data simulation
269.
data simultaneity
270.
data sort
271.
data sources
272.
data spaces
273.
data storage
274.
data storage systems
275.
data stream mining
276.
data streams
277.
data structures
278.
data studies
279.
data subject
280.
data subjects
281.
data synthesis
282.
data to decision
283.
data types
284.
data validity
285.
data valorization
286.
data warehouse
287.
data warenhouse
288.
data visualization
289.
data-augmentation
290.
data-based computational psychiatry
291.
data-centric construction
292.
data-centric systems
293.
data-controlled circuit partition
294.
data-controlled segmentation
295.
data-driven
296.
data-driven characterization
297.
data-driven condition monitoring
298.
data-driven control
299.
Data-driven decision-making
300.
data-driven imputation
301.
Data-driven method
302.
data-driven model
303.
data-driven modeling
304.
data-driven optimization
305.
data-driven policy
306.
data-driven public services
307.
data-driven techniques
308.
data-exchange infrastructures
309.
data-exchange solutions
310.
data-flow architecture
311.
data‐fusion
312.
data-independent acquisition
313.
Data-information-knowledgewisdom (DIKW)
314.
data-intelligence
315.
data-mining
316.
data-science
317.
data-sharing
318.
diagnostic data
319.
digital data exchange
320.
discrete data
321.
distributed data aggregation
322.
distributed data fusion
323.
distributed data mining
324.
distributed data mining (DDM)
325.
distributional data
326.
DNA microarray data
327.
educational data mining
328.
educational data-mining
329.
empirical data
330.
enterprise data analysis
331.
European Health Data Space
332.
European Health Data Space (EHDS)
333.
eventdriven data
334.
event-driven data
335.
experimental data
336.
exploratory data analysis
337.
fair data
338.
false data injection attack
339.
field data
340.
financial data
341.
floating car data (FCD)
342.
flood data platform
343.
FMI open data
344.
functional data analysis
345.
GDPR (General Data Protection Regulation)
346.
general data protection regulation
347.
genome data
348.
global data hub
349.
GNSS-levelling data
350.
GNSS-RO data
351.
GRUAN data
352.
health data
353.
health data accessibility
354.
Health data anonymization
355.
health data custodianship
356.
health data governance
357.
health data integrity and transparency
358.
health data interoperability
359.
health data policy
360.
health data stewardship
361.
healthcare data
362.
heterogeneous data
363.
heterogeneous sensor data
364.
high-dimensional data
365.
high-frequency data
366.
high-level test data generation
367.
historical data
368.
hyperspectral data
369.
imbalanced data
370.
implications of energy data
371.
initial data
372.
initial data for AI
373.
initial data model
374.
in-network data processing
375.
insurance data
376.
knowledge discovery and data mining
377.
linked data
378.
linked open data
379.
linked open statistical data
380.
linked data
381.
lossless data compression
382.
low-pass data filtering
383.
Master Data Management
384.
medical claims data
385.
medical data
386.
Medical Data Reuse
387.
meta-data
388.
metered data
389.
methods: data analysis
390.
microplastic data uncertainty
391.
mobile data
392.
mobile phone big data
393.
mobile phone data
394.
mobile phone usage data
395.
mobile positioning data
396.
multisource data fusion
397.
multivariate data analysis
398.
Nigeria's National data protection regulation
399.
open data
400.
open data ecosystem
401.
open data format
402.
open data policies
403.
open government data
404.
open government data (OGD)
405.
open-data
406.
open-data platform
407.
OSM data
408.
oversharing personal data
409.
panel data
410.
parallel data processing
411.
passenger data
412.
patient-generated health data (PGHD)
413.
personal data
414.
personal data disclosure
415.
personal data processing
416.
personal data protection
417.
Personal Data Protection Act
418.
plan data
419.
point cloud data
420.
pollen data
421.
process and data modelling
422.
Product Data Management (PDM)
423.
public data-set
424.
random data
425.
real-time data
426.
real-time data collection
427.
reconstruction of gap-free data
428.
reference architecture for global health data space
429.
remote data transmission
430.
satellite data
431.
semantic data modelling
432.
semantic health data
433.
sequential data
434.
small data machine learning
435.
small training data set
436.
smart data analytics
437.
smart meter data
438.
social media data
439.
Spatial data
440.
spatial data analysis
441.
statistical data
442.
stochastic image data
443.
structured data
444.
student data analysis
445.
supervised learning data
446.
supervisory control and data acquisition (SCADA)
447.
surrogate data
448.
sustainable data governance
449.
sustainable data storage
450.
symbolic data
451.
symbolic data analysis
452.
synthetic data
453.
temperature historical data series
454.
three-way data
455.
time-selective data fusion
456.
training data
457.
Transcriptome data
458.
tree-like data structures
459.
underwater data center
460.
urban data
461.
urban data acquisition
462.
weather data
463.
web traffic data
464.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
465.
virtual data embassy
466.
Virtual Data Explorer
467.
18O data
468.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT