Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security of data (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/468)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Black-box separations and their adaptability to the non-uniform model
Buldas, Ahto
;
Niitsoo, Margus
Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings
2013
/
p. 152-167
https://doi.org/10.1007/978-3-642-39059-3_11
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
2
book article
A security verification template to assess cache architecture vulnerabilities
Ghasempouri, Tara
;
Raik, Jaan
;
Paul, Kolin
;
Reinbrecht, Cezar
;
Hamdioui, Said
;
Taouil, M.
2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), April 22nd – 24th 2020 Novi Sad, Serbia : Proceedings
2020
/
art. 9095707, 6 p
https://doi.org/10.1109/DDECS50862.2020.9095707
book article
Number of records 2, displaying
1 - 2
keyword
464
1.
security of data
2.
data and information security
3.
data security
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security strategies
17.
cyber-security
18.
development of security cameras
19.
digital security practices
20.
drinking water security
21.
economic security
22.
economic security of enterprise
23.
emotional security
24.
energy security
25.
energy security indicator
26.
Estonian information security standard
27.
graded security
28.
hardware security
29.
hardware security primitive
30.
high level of security
31.
Homeland security
32.
human security
33.
information security
34.
information security and privacy
35.
initial level of security
36.
internal security
37.
international security
38.
investment and innovation security
39.
IPv6 security
40.
IT security
41.
IT security management
42.
job security
43.
long-term security
44.
maritime cyber security
45.
maritime cyber security operations centers
46.
Maritime Security Operations Center (M-SOC)
47.
medium level of security
48.
metadata model for security measures
49.
Middle Eastern security
50.
Mobile security
51.
national cyber security strategy
52.
national security
53.
NATO. Science for Peace and Security Program
54.
network security
55.
network security monitoring
56.
OSCE (Organization for Security and Co-operation in Europe)
57.
passenger’s security
58.
policy-based routing security
59.
political and security cultures
60.
post-quantum security
61.
power system security
62.
quantitative security
63.
regional security
64.
RISC-V Security Verification
65.
Safety and Security in Sea Transportation
66.
safety and security testing
67.
security
68.
security adaptation
69.
security alert prioritization
70.
security analysis
71.
security and justice (AFSJ)
72.
Security and political science
73.
security and privacy
74.
security and privacy in smart grids
75.
Security Assertion Mining
76.
security closure
77.
Security Coverage
78.
security dataset
79.
security dilemma
80.
Security evaluation
81.
security evaluation instruments
82.
Security Level Evaluation
83.
Security limitations
84.
security log analysis
85.
security management
86.
security model
87.
security monitoring
88.
security notion
89.
security objectives
90.
security of supply
91.
security operation center
92.
security operations center
93.
security patterns
94.
security policy
95.
security problem definition
96.
security proof
97.
security protocols
98.
security requirements
99.
security requirements engineering
100.
security research
101.
security risk assessment
102.
security risk management
103.
security risks
104.
security science and technology
105.
security strategies
106.
security systems for military objects
107.
security testing
108.
security training
109.
security verification
110.
security-by-design
111.
social security planning
112.
societal security
113.
software security
114.
software security level
115.
software security subcharacteristics
116.
sufficient level of security
117.
system of economic security
118.
system security
119.
terrorism security
120.
transmission System Security
121.
voting privacy and security
122.
accident data
123.
adversarial data perturbation
124.
AI-based data curation
125.
AIS data
126.
AIS data format optimization
127.
Aligned data
128.
ALS data enhancements
129.
Amazon Kinesis Data Analytics
130.
application data
131.
audio and visual data
132.
big data
133.
big data analysis
134.
big data analytics
135.
big data science
136.
big geo-data
137.
borehole data
138.
building lifecycle data
139.
call data record
140.
catalogue of data sources
141.
cellular phone data
142.
clinical data capture
143.
clinical data exchange
144.
compositional data
145.
conceptual data model
146.
construction data management
147.
consumption data
148.
control and data path tests
149.
critical data studies
150.
cross-border data exchange
151.
data
152.
data assimilation
153.
data protection
154.
data acquisition
155.
data acquisition system
156.
data acquisition systems
157.
data aggregation
158.
data alignment
159.
Data Altruism
160.
Data Altruism Consent
161.
data analysis
162.
data analytics
163.
data analytics and machine learning
164.
data anisotropy
165.
data annotation
166.
data assimilation
167.
data attacks
168.
data augmentation
169.
data breach handling
170.
data capabilities
171.
data capture
172.
data center
173.
data center (DC)
174.
data center applications
175.
data centers
176.
data centre
177.
data centres
178.
data classification
179.
data clustering
180.
data collection
181.
data commons
182.
data compression
183.
data compression and normalization
184.
data conversion
185.
data copy
186.
data curation
187.
data curing
188.
data dictionaries
189.
data discovery
190.
Data dissemination
191.
Data distribution structure
192.
data donation
193.
Data drift
194.
data driven planning
195.
data dropouts
196.
Data Ecosystem
197.
data embassy
198.
data engineering
199.
data enrichment
200.
data envelopment analysis
201.
data ethnography
202.
data exchange
203.
data exchange framework
204.
Data exchange layers
205.
data exchange platform
206.
data experts
207.
data filtering
208.
data fitting approach
209.
data flow languages
210.
data flow visualization
211.
data flows
212.
data fusion
213.
data generative model
214.
data governance
215.
data governance act
216.
data harmonization
217.
data hiding
218.
data integration
219.
data integrity
220.
data intermediary
221.
data Interoperability
222.
data justice
223.
data labeling
224.
data limitations in public sector
225.
data lineage
226.
data literacy
227.
data logger
228.
data logistics
229.
data management
230.
data mappings
231.
Data Mart
232.
Data Mart (DM)
233.
data mesh
234.
data migration
235.
data mining
236.
data mining and knowledge discovery
237.
data modeling
238.
data models
239.
data modem
240.
data movements
241.
data noise
242.
data offloading
243.
data ownership
244.
data platform
245.
data privacy
246.
data processing
247.
data product
248.
data protection
249.
data publishing
250.
data quality
251.
data quality management
252.
data quality maturity model
253.
data rate
254.
data representativeness
255.
data reuse
256.
data re-use
257.
data routing
258.
data scarce environments
259.
data science
260.
data scraping
261.
data set
262.
data set generation
263.
data sets
264.
data sharing
265.
data simulation
266.
data simultaneity
267.
data sort
268.
data sources
269.
data spaces
270.
data storage
271.
data storage systems
272.
data stream mining
273.
data streams
274.
data structures
275.
data studies
276.
data subject
277.
data subjects
278.
data synthesis
279.
data to decision
280.
data types
281.
data validity
282.
data valorization
283.
data warehouse
284.
data warenhouse
285.
data visualization
286.
data-augmentation
287.
data-based computational psychiatry
288.
data-centric construction
289.
data-centric systems
290.
data-controlled circuit partition
291.
data-controlled segmentation
292.
data-driven
293.
data-driven characterization
294.
data-driven condition monitoring
295.
data-driven control
296.
Data-driven decision-making
297.
data-driven imputation
298.
Data-driven method
299.
data-driven model
300.
data-driven modeling
301.
data-driven optimization
302.
data-driven policy
303.
data-driven public services
304.
data-driven techniques
305.
data-exchange infrastructures
306.
data-exchange solutions
307.
data-flow architecture
308.
data‐fusion
309.
data-independent acquisition
310.
Data-information-knowledgewisdom (DIKW)
311.
data-intelligence
312.
data-mining
313.
data-science
314.
data-sharing
315.
diagnostic data
316.
digital data exchange
317.
discrete data
318.
distributed data aggregation
319.
distributed data fusion
320.
distributed data mining
321.
distributed data mining (DDM)
322.
distributional data
323.
DNA microarray data
324.
educational data mining
325.
educational data-mining
326.
empirical data
327.
enterprise data analysis
328.
European Health Data Space
329.
European Health Data Space (EHDS)
330.
eventdriven data
331.
event-driven data
332.
experimental data
333.
exploratory data analysis
334.
fair data
335.
false data injection attack
336.
field data
337.
financial data
338.
floating car data (FCD)
339.
flood data platform
340.
FMI open data
341.
functional data analysis
342.
GDPR (General Data Protection Regulation)
343.
general data protection regulation
344.
genome data
345.
global data hub
346.
GNSS-levelling data
347.
GNSS-RO data
348.
GRUAN data
349.
health data
350.
health data accessibility
351.
Health data anonymization
352.
health data custodianship
353.
health data governance
354.
health data integrity and transparency
355.
health data interoperability
356.
health data policy
357.
health data stewardship
358.
healthcare data
359.
heterogeneous sensor data
360.
high-dimensional data
361.
high-frequency data
362.
high-level test data generation
363.
historical data
364.
hyperspectral data
365.
imbalanced data
366.
implications of energy data
367.
initial data
368.
initial data for AI
369.
initial data model
370.
in-network data processing
371.
insurance data
372.
knowledge discovery and data mining
373.
linked data
374.
linked open data
375.
linked open statistical data
376.
linked data
377.
lossless data compression
378.
low-pass data filtering
379.
Master Data Management
380.
medical claims data
381.
medical data
382.
Medical Data Reuse
383.
meta-data
384.
metered data
385.
methods: data analysis
386.
microplastic data uncertainty
387.
mobile data
388.
mobile phone big data
389.
mobile phone data
390.
mobile phone usage data
391.
mobile positioning data
392.
multisource data fusion
393.
multivariate data analysis
394.
Nigeria's National data protection regulation
395.
open data
396.
open data ecosystem
397.
open data format
398.
open data policies
399.
open government data
400.
open government data (OGD)
401.
open-data
402.
open-data platform
403.
OSM data
404.
oversharing personal data
405.
panel data
406.
parallel data processing
407.
passenger data
408.
patient-generated health data (PGHD)
409.
personal data
410.
personal data disclosure
411.
personal data processing
412.
personal data protection
413.
Personal Data Protection Act
414.
plan data
415.
point cloud data
416.
pollen data
417.
process and data modelling
418.
Product Data Management (PDM)
419.
public data-set
420.
random data
421.
real-time data
422.
real-time data collection
423.
reconstruction of gap-free data
424.
reference architecture for global health data space
425.
remote data transmission
426.
satellite data
427.
semantic data modelling
428.
semantic health data
429.
sequential data
430.
small data machine learning
431.
small training data set
432.
smart data analytics
433.
smart meter data
434.
social media data
435.
Spatial data
436.
spatial data analysis
437.
statistical data
438.
stochastic image data
439.
structured data
440.
student data analysis
441.
supervised learning data
442.
supervisory control and data acquisition (SCADA)
443.
surrogate data
444.
sustainable data governance
445.
sustainable data storage
446.
symbolic data
447.
symbolic data analysis
448.
synthetic data
449.
temperature historical data series
450.
three-way data
451.
time-selective data fusion
452.
training data
453.
Transcriptome data
454.
tree-like data structures
455.
underwater data center
456.
urban data
457.
urban data acquisition
458.
weather data
459.
web traffic data
460.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
461.
virtual data embassy
462.
Virtual Data Explorer
463.
18O data
464.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT