Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
security of data (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/425)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Black-box separations and their adaptability to the non-uniform model
Buldas, Ahto
;
Niitsoo, Margus
Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings
2013
/
p. 152-167
https://doi.org/10.1007/978-3-642-39059-3_11
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
2
book article
A security verification template to assess cache architecture vulnerabilities
Ghasempouri, Tara
;
Raik, Jaan
;
Paul, Kolin
;
Reinbrecht, Cezar
;
Hamdioui, Said
;
Taouil, M.
2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), April 22nd – 24th 2020 Novi Sad, Serbia : Proceedings
2020
/
art. 9095707, 6 p
https://doi.org/10.1109/DDECS50862.2020.9095707
book article
Number of records 2, displaying
1 - 2
keyword
421
1.
security of data
2.
data security
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security monitoring
15.
cyber security strategies
16.
cyber-security
17.
development of security cameras
18.
digital security practices
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
Estonian information security standard
26.
graded security
27.
hardware security
28.
hardware security primitive
29.
human security
30.
information security
31.
information security and privacy
32.
internal security
33.
international security
34.
investment and innovation security
35.
IPv6 security
36.
IT security
37.
IT security management
38.
job security
39.
long-term security
40.
metadata model for security measures
41.
Middle Eastern security
42.
Mobile security
43.
national cyber security strategy
44.
national security
45.
NATO. Science for Peace and Security Program
46.
network security
47.
network security monitoring
48.
OSCE (Organization for Security and Co-operation in Europe)
49.
passenger’s security
50.
policy-based routing security
51.
political and security cultures
52.
post-quantum security
53.
power system security
54.
quantitative security
55.
regional security
56.
RISC-V Security Verification
57.
safety and security testing
58.
security
59.
security adaptation
60.
security alert prioritization
61.
security analysis
62.
security and justice (AFSJ)
63.
Security and political science
64.
security and privacy
65.
security and privacy in smart grids
66.
Security Assertion Mining
67.
security closure
68.
Security Coverage
69.
security dataset
70.
security dilemma
71.
Security evaluation
72.
security evaluation instruments
73.
Security limitations
74.
security log analysis
75.
security management
76.
security model
77.
security monitoring
78.
security notion
79.
security objectives
80.
security of supply
81.
security operation center
82.
security operations center
83.
security patterns
84.
security policy
85.
security problem definition
86.
security proof
87.
security protocols
88.
security requirements
89.
security requirements engineering
90.
security risk assessment
91.
security risk management
92.
security risks
93.
security strategies
94.
security systems for military objects
95.
security testing
96.
security training
97.
security verification
98.
security-by-design
99.
social security planning
100.
societal security
101.
system of economic security
102.
system security
103.
terrorism security
104.
transmission System Security
105.
voting privacy and security
106.
accident data
107.
adversarial data perturbation
108.
AI-based data curation
109.
AIS data
110.
Aligned data
111.
ALS data enhancements
112.
Amazon Kinesis Data Analytics
113.
application data
114.
audio and visual data
115.
big data
116.
big data analysis
117.
big data analytics
118.
big data science
119.
big geo-data
120.
borehole data
121.
building lifecycle data
122.
call data record
123.
catalogue of data sources
124.
cellular phone data
125.
clinical data capture
126.
clinical data exchange
127.
compositional data
128.
conceptual data model
129.
construction data management
130.
control and data path tests
131.
critical data studies
132.
cross-border data exchange
133.
data
134.
data assimilation
135.
data protection
136.
data acquisition
137.
data acquisition system
138.
data acquisition systems
139.
data aggregation
140.
data alignment
141.
data analysis
142.
data analytics
143.
data analytics and machine learning
144.
data anisotropy
145.
data annotation
146.
data assimilation
147.
data attacks
148.
data augmentation
149.
data breach handling
150.
data capabilities
151.
data capture
152.
data center
153.
data center (DC)
154.
data centers
155.
data centre
156.
data centres
157.
data classification
158.
data clustering
159.
data collection
160.
data commons
161.
data compression
162.
data conversion
163.
data copy
164.
data dictionaries
165.
data discovery
166.
Data dissemination
167.
Data distribution structure
168.
data donation
169.
Data drift
170.
data driven planning
171.
data embassy
172.
data engineering
173.
data enrichment
174.
data envelopment analysis
175.
data ethnography
176.
data exchange
177.
data exchange framework
178.
Data exchange layers
179.
data exchange platform
180.
data experts
181.
data filtering
182.
data fitting approach
183.
data flow languages
184.
data flow visualization
185.
data flows
186.
data fusion
187.
data generative model
188.
data governance
189.
data governance act
190.
data hiding
191.
data integration
192.
data integrity
193.
data intermediary
194.
data Interoperability
195.
data justice
196.
data labeling
197.
data lineage
198.
data logger
199.
data logistics
200.
data management
201.
data mappings
202.
Data Mart
203.
Data Mart (DM)
204.
data mesh
205.
data migration
206.
data mining
207.
data modeling
208.
data models
209.
data modem
210.
data movements
211.
data noise
212.
data offloading
213.
data ownership
214.
data platform
215.
data privacy
216.
data processing
217.
data product
218.
data protection
219.
data quality
220.
data quality management
221.
data quality maturity model
222.
data rate
223.
data reuse
224.
data re-use
225.
data routing
226.
data science
227.
data scraping
228.
data set
229.
data set generation
230.
data sets
231.
data sharing
232.
data simulation
233.
data simultaneity
234.
data sort
235.
data sources
236.
data spaces
237.
data storage
238.
data storage systems
239.
data stream mining
240.
data streams
241.
data structures
242.
data studies
243.
data subject
244.
data subjects
245.
data synthesis
246.
data to decision
247.
data types
248.
data validity
249.
data valorization
250.
data warehouse
251.
data warenhouse
252.
data visualization
253.
data-augmentation
254.
data-based computational psychiatry
255.
data-centric construction
256.
data-centric systems
257.
data-controlled circuit partition
258.
data-controlled segmentation
259.
data-driven
260.
data-driven characterization
261.
data-driven condition monitoring
262.
data-driven control
263.
Data-driven decision-making
264.
data-driven imputation
265.
Data-driven method
266.
data-driven model
267.
data-driven modeling
268.
data-driven optimization
269.
data-driven public services
270.
data-driven techniques
271.
data-exchange infrastructures
272.
data-exchange solutions
273.
data-flow architecture
274.
data‐fusion
275.
data-independent acquisition
276.
Data-information-knowledgewisdom (DIKW)
277.
data-intelligence
278.
data-mining
279.
data-science
280.
diagnostic data
281.
digital data exchange
282.
discrete data
283.
distributed data aggregation
284.
distributed data fusion
285.
distributed data mining
286.
distributed data mining (DDM)
287.
DNA microarray data
288.
educational data mining
289.
enterprise data analysis
290.
European Health Data Space
291.
European Health Data Space (EHDS)
292.
eventdriven data
293.
event-driven data
294.
experimental data
295.
exploratory data analysis
296.
false data injection attack
297.
field data
298.
financial data
299.
floating car data (FCD)
300.
flood data platform
301.
FMI open data
302.
functional data analysis
303.
GDPR (General Data Protection Regulation)
304.
general data protection regulation
305.
genome data
306.
global data hub
307.
GNSS-levelling data
308.
GNSS-RO data
309.
GRUAN data
310.
health data
311.
health data accessibility
312.
Health data anonymization
313.
health data custodianship
314.
health data governance
315.
health data interoperability
316.
health data policy
317.
health data stewardship
318.
healthcare data
319.
heterogeneous sensor data
320.
high-dimensional data
321.
high-frequency data
322.
high-level test data generation
323.
historical data
324.
hyperspectral data
325.
imbalanced data
326.
implications of energy data
327.
initial data
328.
initial data for AI
329.
initial data model
330.
in-network data processing
331.
insurance data
332.
knowledge discovery and data mining
333.
linked data
334.
linked open data
335.
linked open statistical data
336.
linked data
337.
lossless data compression
338.
low-pass data filtering
339.
Master Data Management
340.
medical claims data
341.
medical data
342.
Medical Data Reuse
343.
meta-data
344.
metered data
345.
methods: data analysis
346.
microplastic data uncertainty
347.
mobile data
348.
mobile phone big data
349.
mobile phone data
350.
mobile phone usage data
351.
mobile positioning data
352.
multisource data fusion
353.
multivariate data analysis
354.
Nigeria's National data protection regulation
355.
open data
356.
open data ecosystem
357.
open data format
358.
open data policies
359.
open government data
360.
open government data (OGD)
361.
open-data
362.
OSM data
363.
oversharing personal data
364.
panel data
365.
parallel data processing
366.
passenger data
367.
patient-generated health data (PGHD)
368.
personal data
369.
personal data disclosure
370.
personal data processing
371.
personal data protection
372.
Personal Data Protection Act
373.
plan data
374.
point cloud data
375.
pollen data
376.
process and data modelling
377.
Product Data Management (PDM)
378.
public data-set
379.
random data
380.
real-time data
381.
real-time data collection
382.
reconstruction of gap-free data
383.
reference architecture for global health data space
384.
remote data transmission
385.
satellite data
386.
semantic data modelling
387.
semantic health data
388.
sequential data
389.
small data machine learning
390.
small training data set
391.
smart data analytics
392.
smart meter data
393.
social media data
394.
Spatial data
395.
spatial data analysis
396.
statistical data
397.
stochastic image data
398.
structured data
399.
student data analysis
400.
supervised learning data
401.
supervisory control and data acquisition (SCADA)
402.
surrogate data
403.
sustainable data governance
404.
symbolic data
405.
symbolic data analysis
406.
synthetic data
407.
temperature historical data series
408.
time-selective data fusion
409.
training data
410.
Transcriptome data
411.
tree-like data structures
412.
underwater data center
413.
urban data
414.
urban data acquisition
415.
weather data
416.
web traffic data
417.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
418.
virtual data embassy
419.
Virtual Data Explorer
420.
18O data
421.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT