Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
data security (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/472)
Export
export all inquiry results
(4)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book article EST
/
book article ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
3
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
4
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 4, displaying
1 - 4
keyword
468
1.
data security
2.
data and information security
3.
security of data
4.
metadata model for security measures
5.
security dataset
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
cloud security
11.
communication system security
12.
comprehensive system of economic security
13.
computer security
14.
cooperative security dilemma
15.
cyber security
16.
cyber security education
17.
cyber security exercises
18.
cyber security monitoring
19.
cyber security strategies
20.
cyber-security
21.
development of security cameras
22.
digital security practices
23.
drinking water security
24.
economic security
25.
economic security of enterprise
26.
emotional security
27.
energy security
28.
energy security indicator
29.
Estonian information security standard
30.
graded security
31.
hardware security
32.
hardware security primitive
33.
high level of security
34.
Homeland security
35.
human security
36.
information security
37.
information security and privacy
38.
initial level of security
39.
internal security
40.
international security
41.
investment and innovation security
42.
IPv6 security
43.
IT security
44.
IT security management
45.
job security
46.
long-term security
47.
maritime cyber security
48.
maritime cyber security operations centers
49.
Maritime Security Operations Center (M-SOC)
50.
medium level of security
51.
Middle Eastern security
52.
Mobile security
53.
national cyber security strategy
54.
national security
55.
NATO. Science for Peace and Security Program
56.
network security
57.
network security monitoring
58.
OSCE (Organization for Security and Co-operation in Europe)
59.
passenger’s security
60.
policy-based routing security
61.
political and security cultures
62.
post-quantum security
63.
power system security
64.
quantitative security
65.
regional security
66.
RISC-V Security Verification
67.
Safety and Security in Sea Transportation
68.
safety and security testing
69.
security
70.
security adaptation
71.
security alert prioritization
72.
security analysis
73.
security and justice (AFSJ)
74.
Security and political science
75.
security and privacy
76.
security and privacy in smart grids
77.
Security Assertion
78.
Security Assertion Mining
79.
security closure
80.
Security Coverage
81.
security dilemma
82.
Security evaluation
83.
security evaluation instruments
84.
Security Level Evaluation
85.
Security limitations
86.
security log analysis
87.
security management
88.
security model
89.
security monitoring
90.
security notion
91.
security objectives
92.
security of supply
93.
security operation center
94.
security operations center
95.
security patterns
96.
security policy
97.
security problem definition
98.
security proof
99.
security protocols
100.
security requirements
101.
security requirements engineering
102.
security research
103.
security risk assessment
104.
security risk management
105.
security risks
106.
security science and technology
107.
security strategies
108.
security systems for military objects
109.
security testing
110.
security training
111.
security verification
112.
security-by-design
113.
social security planning
114.
societal security
115.
software security
116.
software security level
117.
software security subcharacteristics
118.
sufficient level of security
119.
system of economic security
120.
system security
121.
terrorism security
122.
transmission System Security
123.
voting privacy and security
124.
accident data
125.
adversarial data perturbation
126.
AI data centers
127.
AI-based data curation
128.
AIS data
129.
AIS data format optimization
130.
Aligned data
131.
ALS data enhancements
132.
Amazon Kinesis Data Analytics
133.
application data
134.
audio and visual data
135.
big data
136.
big data analysis
137.
big data analytics
138.
big data science
139.
big geo-data
140.
borehole data
141.
building lifecycle data
142.
call data record
143.
catalogue of data sources
144.
cellular phone data
145.
clinical data capture
146.
clinical data exchange
147.
compositional data
148.
conceptual data model
149.
construction data management
150.
consumption data
151.
control and data path tests
152.
critical data studies
153.
cross-border data exchange
154.
data
155.
data assimilation
156.
data protection
157.
data acquisition
158.
data acquisition system
159.
data acquisition systems
160.
data aggregation
161.
data alignment
162.
Data Altruism
163.
Data Altruism Consent
164.
data analysis
165.
data analytics
166.
data analytics and machine learning
167.
data anisotropy
168.
data annotation
169.
data assimilation
170.
data attacks
171.
data augmentation
172.
data breach handling
173.
data capabilities
174.
data capture
175.
data center
176.
data center (DC)
177.
data center applications
178.
data centers
179.
data centre
180.
data centres
181.
data classification
182.
data clustering
183.
data collection
184.
data commons
185.
data compression
186.
data compression and normalization
187.
data conversion
188.
data copy
189.
data curation
190.
data curing
191.
data dictionaries
192.
data discovery
193.
Data dissemination
194.
Data distribution structure
195.
data donation
196.
Data drift
197.
data driven planning
198.
data dropouts
199.
Data Ecosystem
200.
data embassy
201.
data engineering
202.
data enrichment
203.
data envelopment analysis
204.
data ethnography
205.
data exchange
206.
data exchange framework
207.
Data exchange layers
208.
data exchange platform
209.
data experts
210.
data filtering
211.
data fitting approach
212.
data flow languages
213.
data flow visualization
214.
data flows
215.
data fusion
216.
data generative model
217.
data governance
218.
data governance act
219.
data harmonization
220.
data hiding
221.
data integration
222.
data integrity
223.
data intermediary
224.
data Interoperability
225.
data justice
226.
data labeling
227.
data limitations in public sector
228.
data lineage
229.
data literacy
230.
data logger
231.
data logistics
232.
data management
233.
data mappings
234.
Data Mart
235.
Data Mart (DM)
236.
data mesh
237.
data migration
238.
data mining
239.
data mining and knowledge discovery
240.
data modeling
241.
data models
242.
data modem
243.
data movements
244.
data noise
245.
data offloading
246.
data ownership
247.
data platform
248.
data privacy
249.
data processing
250.
data product
251.
data protection
252.
data publishing
253.
data quality
254.
data quality management
255.
data quality maturity model
256.
data rate
257.
data representativeness
258.
data reuse
259.
data re-use
260.
data routing
261.
data scarce environments
262.
data science
263.
data scraping
264.
data set
265.
data set generation
266.
data sets
267.
data sharing
268.
data simulation
269.
data simultaneity
270.
data sort
271.
data sources
272.
data spaces
273.
data storage
274.
data storage systems
275.
data stream mining
276.
data streams
277.
data structures
278.
data studies
279.
data subject
280.
data subjects
281.
data synthesis
282.
data to decision
283.
data types
284.
data validity
285.
data valorization
286.
data warehouse
287.
data warenhouse
288.
data visualization
289.
data-augmentation
290.
data-based computational psychiatry
291.
data-centric construction
292.
data-centric systems
293.
data-controlled circuit partition
294.
data-controlled segmentation
295.
data-driven
296.
data-driven characterization
297.
data-driven condition monitoring
298.
data-driven control
299.
Data-driven decision-making
300.
data-driven imputation
301.
Data-driven method
302.
data-driven model
303.
data-driven modeling
304.
data-driven optimization
305.
data-driven policy
306.
data-driven public services
307.
data-driven techniques
308.
data-exchange infrastructures
309.
data-exchange solutions
310.
data-flow architecture
311.
data‐fusion
312.
data-independent acquisition
313.
Data-information-knowledgewisdom (DIKW)
314.
data-intelligence
315.
data-mining
316.
data-science
317.
data-sharing
318.
diagnostic data
319.
digital data exchange
320.
discrete data
321.
distributed data aggregation
322.
distributed data fusion
323.
distributed data mining
324.
distributed data mining (DDM)
325.
distributional data
326.
DNA microarray data
327.
educational data mining
328.
educational data-mining
329.
empirical data
330.
enterprise data analysis
331.
European Health Data Space
332.
European Health Data Space (EHDS)
333.
eventdriven data
334.
event-driven data
335.
experimental data
336.
exploratory data analysis
337.
fair data
338.
false data injection attack
339.
field data
340.
financial data
341.
floating car data (FCD)
342.
flood data platform
343.
FMI open data
344.
functional data analysis
345.
GDPR (General Data Protection Regulation)
346.
general data protection regulation
347.
genome data
348.
global data hub
349.
GNSS-levelling data
350.
GNSS-RO data
351.
GRUAN data
352.
health data
353.
health data accessibility
354.
Health data anonymization
355.
health data custodianship
356.
health data governance
357.
health data integrity and transparency
358.
health data interoperability
359.
health data policy
360.
health data stewardship
361.
healthcare data
362.
heterogeneous data
363.
heterogeneous sensor data
364.
high-dimensional data
365.
high-frequency data
366.
high-level test data generation
367.
historical data
368.
hyperspectral data
369.
imbalanced data
370.
implications of energy data
371.
initial data
372.
initial data for AI
373.
initial data model
374.
in-network data processing
375.
insurance data
376.
knowledge discovery and data mining
377.
linked data
378.
linked open data
379.
linked open statistical data
380.
linked data
381.
lossless data compression
382.
low-pass data filtering
383.
Master Data Management
384.
medical claims data
385.
medical data
386.
Medical Data Reuse
387.
meta-data
388.
metered data
389.
methods: data analysis
390.
microplastic data uncertainty
391.
mobile data
392.
mobile phone big data
393.
mobile phone data
394.
mobile phone usage data
395.
mobile positioning data
396.
multisource data fusion
397.
multivariate data analysis
398.
Nigeria's National data protection regulation
399.
open data
400.
open data ecosystem
401.
open data format
402.
open data policies
403.
open government data
404.
open government data (OGD)
405.
open-data
406.
open-data platform
407.
OSM data
408.
oversharing personal data
409.
panel data
410.
parallel data processing
411.
passenger data
412.
patient-generated health data (PGHD)
413.
personal data
414.
personal data disclosure
415.
personal data processing
416.
personal data protection
417.
Personal Data Protection Act
418.
plan data
419.
point cloud data
420.
pollen data
421.
process and data modelling
422.
Product Data Management (PDM)
423.
public data-set
424.
random data
425.
real-time data
426.
real-time data collection
427.
reconstruction of gap-free data
428.
reference architecture for global health data space
429.
remote data transmission
430.
satellite data
431.
semantic data modelling
432.
semantic health data
433.
sequential data
434.
small data machine learning
435.
small training data set
436.
smart data analytics
437.
smart meter data
438.
social media data
439.
Spatial data
440.
spatial data analysis
441.
statistical data
442.
stochastic image data
443.
structured data
444.
student data analysis
445.
supervised learning data
446.
supervisory control and data acquisition (SCADA)
447.
surrogate data
448.
sustainable data governance
449.
sustainable data storage
450.
symbolic data
451.
symbolic data analysis
452.
synthetic data
453.
temperature historical data series
454.
three-way data
455.
time-selective data fusion
456.
training data
457.
Transcriptome data
458.
tree-like data structures
459.
underwater data center
460.
urban data
461.
urban data acquisition
462.
weather data
463.
web traffic data
464.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
465.
virtual data embassy
466.
Virtual Data Explorer
467.
18O data
468.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT