Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
data security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/468)
Export
export all inquiry results
(4)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book article EST
/
book article ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
3
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
4
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 4, displaying
1 - 4
keyword
464
1.
data security
2.
data and information security
3.
security of data
4.
metadata model for security measures
5.
security dataset
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
communication system security
11.
comprehensive system of economic security
12.
computer security
13.
cooperative security dilemma
14.
cyber security
15.
cyber security education
16.
cyber security exercises
17.
cyber security monitoring
18.
cyber security strategies
19.
cyber-security
20.
development of security cameras
21.
digital security practices
22.
drinking water security
23.
economic security
24.
economic security of enterprise
25.
emotional security
26.
energy security
27.
energy security indicator
28.
Estonian information security standard
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
high level of security
33.
Homeland security
34.
human security
35.
information security
36.
information security and privacy
37.
initial level of security
38.
internal security
39.
international security
40.
investment and innovation security
41.
IPv6 security
42.
IT security
43.
IT security management
44.
job security
45.
long-term security
46.
maritime cyber security
47.
maritime cyber security operations centers
48.
Maritime Security Operations Center (M-SOC)
49.
medium level of security
50.
Middle Eastern security
51.
Mobile security
52.
national cyber security strategy
53.
national security
54.
NATO. Science for Peace and Security Program
55.
network security
56.
network security monitoring
57.
OSCE (Organization for Security and Co-operation in Europe)
58.
passenger’s security
59.
policy-based routing security
60.
political and security cultures
61.
post-quantum security
62.
power system security
63.
quantitative security
64.
regional security
65.
RISC-V Security Verification
66.
Safety and Security in Sea Transportation
67.
safety and security testing
68.
security
69.
security adaptation
70.
security alert prioritization
71.
security analysis
72.
security and justice (AFSJ)
73.
Security and political science
74.
security and privacy
75.
security and privacy in smart grids
76.
Security Assertion Mining
77.
security closure
78.
Security Coverage
79.
security dilemma
80.
Security evaluation
81.
security evaluation instruments
82.
Security Level Evaluation
83.
Security limitations
84.
security log analysis
85.
security management
86.
security model
87.
security monitoring
88.
security notion
89.
security objectives
90.
security of supply
91.
security operation center
92.
security operations center
93.
security patterns
94.
security policy
95.
security problem definition
96.
security proof
97.
security protocols
98.
security requirements
99.
security requirements engineering
100.
security research
101.
security risk assessment
102.
security risk management
103.
security risks
104.
security science and technology
105.
security strategies
106.
security systems for military objects
107.
security testing
108.
security training
109.
security verification
110.
security-by-design
111.
social security planning
112.
societal security
113.
software security
114.
software security level
115.
software security subcharacteristics
116.
sufficient level of security
117.
system of economic security
118.
system security
119.
terrorism security
120.
transmission System Security
121.
voting privacy and security
122.
accident data
123.
adversarial data perturbation
124.
AI-based data curation
125.
AIS data
126.
AIS data format optimization
127.
Aligned data
128.
ALS data enhancements
129.
Amazon Kinesis Data Analytics
130.
application data
131.
audio and visual data
132.
big data
133.
big data analysis
134.
big data analytics
135.
big data science
136.
big geo-data
137.
borehole data
138.
building lifecycle data
139.
call data record
140.
catalogue of data sources
141.
cellular phone data
142.
clinical data capture
143.
clinical data exchange
144.
compositional data
145.
conceptual data model
146.
construction data management
147.
consumption data
148.
control and data path tests
149.
critical data studies
150.
cross-border data exchange
151.
data
152.
data assimilation
153.
data protection
154.
data acquisition
155.
data acquisition system
156.
data acquisition systems
157.
data aggregation
158.
data alignment
159.
Data Altruism
160.
Data Altruism Consent
161.
data analysis
162.
data analytics
163.
data analytics and machine learning
164.
data anisotropy
165.
data annotation
166.
data assimilation
167.
data attacks
168.
data augmentation
169.
data breach handling
170.
data capabilities
171.
data capture
172.
data center
173.
data center (DC)
174.
data center applications
175.
data centers
176.
data centre
177.
data centres
178.
data classification
179.
data clustering
180.
data collection
181.
data commons
182.
data compression
183.
data compression and normalization
184.
data conversion
185.
data copy
186.
data curation
187.
data curing
188.
data dictionaries
189.
data discovery
190.
Data dissemination
191.
Data distribution structure
192.
data donation
193.
Data drift
194.
data driven planning
195.
data dropouts
196.
Data Ecosystem
197.
data embassy
198.
data engineering
199.
data enrichment
200.
data envelopment analysis
201.
data ethnography
202.
data exchange
203.
data exchange framework
204.
Data exchange layers
205.
data exchange platform
206.
data experts
207.
data filtering
208.
data fitting approach
209.
data flow languages
210.
data flow visualization
211.
data flows
212.
data fusion
213.
data generative model
214.
data governance
215.
data governance act
216.
data harmonization
217.
data hiding
218.
data integration
219.
data integrity
220.
data intermediary
221.
data Interoperability
222.
data justice
223.
data labeling
224.
data limitations in public sector
225.
data lineage
226.
data literacy
227.
data logger
228.
data logistics
229.
data management
230.
data mappings
231.
Data Mart
232.
Data Mart (DM)
233.
data mesh
234.
data migration
235.
data mining
236.
data mining and knowledge discovery
237.
data modeling
238.
data models
239.
data modem
240.
data movements
241.
data noise
242.
data offloading
243.
data ownership
244.
data platform
245.
data privacy
246.
data processing
247.
data product
248.
data protection
249.
data publishing
250.
data quality
251.
data quality management
252.
data quality maturity model
253.
data rate
254.
data representativeness
255.
data reuse
256.
data re-use
257.
data routing
258.
data scarce environments
259.
data science
260.
data scraping
261.
data set
262.
data set generation
263.
data sets
264.
data sharing
265.
data simulation
266.
data simultaneity
267.
data sort
268.
data sources
269.
data spaces
270.
data storage
271.
data storage systems
272.
data stream mining
273.
data streams
274.
data structures
275.
data studies
276.
data subject
277.
data subjects
278.
data synthesis
279.
data to decision
280.
data types
281.
data validity
282.
data valorization
283.
data warehouse
284.
data warenhouse
285.
data visualization
286.
data-augmentation
287.
data-based computational psychiatry
288.
data-centric construction
289.
data-centric systems
290.
data-controlled circuit partition
291.
data-controlled segmentation
292.
data-driven
293.
data-driven characterization
294.
data-driven condition monitoring
295.
data-driven control
296.
Data-driven decision-making
297.
data-driven imputation
298.
Data-driven method
299.
data-driven model
300.
data-driven modeling
301.
data-driven optimization
302.
data-driven policy
303.
data-driven public services
304.
data-driven techniques
305.
data-exchange infrastructures
306.
data-exchange solutions
307.
data-flow architecture
308.
data‐fusion
309.
data-independent acquisition
310.
Data-information-knowledgewisdom (DIKW)
311.
data-intelligence
312.
data-mining
313.
data-science
314.
data-sharing
315.
diagnostic data
316.
digital data exchange
317.
discrete data
318.
distributed data aggregation
319.
distributed data fusion
320.
distributed data mining
321.
distributed data mining (DDM)
322.
distributional data
323.
DNA microarray data
324.
educational data mining
325.
educational data-mining
326.
empirical data
327.
enterprise data analysis
328.
European Health Data Space
329.
European Health Data Space (EHDS)
330.
eventdriven data
331.
event-driven data
332.
experimental data
333.
exploratory data analysis
334.
fair data
335.
false data injection attack
336.
field data
337.
financial data
338.
floating car data (FCD)
339.
flood data platform
340.
FMI open data
341.
functional data analysis
342.
GDPR (General Data Protection Regulation)
343.
general data protection regulation
344.
genome data
345.
global data hub
346.
GNSS-levelling data
347.
GNSS-RO data
348.
GRUAN data
349.
health data
350.
health data accessibility
351.
Health data anonymization
352.
health data custodianship
353.
health data governance
354.
health data integrity and transparency
355.
health data interoperability
356.
health data policy
357.
health data stewardship
358.
healthcare data
359.
heterogeneous sensor data
360.
high-dimensional data
361.
high-frequency data
362.
high-level test data generation
363.
historical data
364.
hyperspectral data
365.
imbalanced data
366.
implications of energy data
367.
initial data
368.
initial data for AI
369.
initial data model
370.
in-network data processing
371.
insurance data
372.
knowledge discovery and data mining
373.
linked data
374.
linked open data
375.
linked open statistical data
376.
linked data
377.
lossless data compression
378.
low-pass data filtering
379.
Master Data Management
380.
medical claims data
381.
medical data
382.
Medical Data Reuse
383.
meta-data
384.
metered data
385.
methods: data analysis
386.
microplastic data uncertainty
387.
mobile data
388.
mobile phone big data
389.
mobile phone data
390.
mobile phone usage data
391.
mobile positioning data
392.
multisource data fusion
393.
multivariate data analysis
394.
Nigeria's National data protection regulation
395.
open data
396.
open data ecosystem
397.
open data format
398.
open data policies
399.
open government data
400.
open government data (OGD)
401.
open-data
402.
open-data platform
403.
OSM data
404.
oversharing personal data
405.
panel data
406.
parallel data processing
407.
passenger data
408.
patient-generated health data (PGHD)
409.
personal data
410.
personal data disclosure
411.
personal data processing
412.
personal data protection
413.
Personal Data Protection Act
414.
plan data
415.
point cloud data
416.
pollen data
417.
process and data modelling
418.
Product Data Management (PDM)
419.
public data-set
420.
random data
421.
real-time data
422.
real-time data collection
423.
reconstruction of gap-free data
424.
reference architecture for global health data space
425.
remote data transmission
426.
satellite data
427.
semantic data modelling
428.
semantic health data
429.
sequential data
430.
small data machine learning
431.
small training data set
432.
smart data analytics
433.
smart meter data
434.
social media data
435.
Spatial data
436.
spatial data analysis
437.
statistical data
438.
stochastic image data
439.
structured data
440.
student data analysis
441.
supervised learning data
442.
supervisory control and data acquisition (SCADA)
443.
surrogate data
444.
sustainable data governance
445.
sustainable data storage
446.
symbolic data
447.
symbolic data analysis
448.
synthetic data
449.
temperature historical data series
450.
three-way data
451.
time-selective data fusion
452.
training data
453.
Transcriptome data
454.
tree-like data structures
455.
underwater data center
456.
urban data
457.
urban data acquisition
458.
weather data
459.
web traffic data
460.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
461.
virtual data embassy
462.
Virtual Data Explorer
463.
18O data
464.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT