Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
data security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/466)
Export
export all inquiry results
(4)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book article EST
/
book article ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
3
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
4
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 4, displaying
1 - 4
keyword
462
1.
data security
2.
data and information security
3.
security of data
4.
metadata model for security measures
5.
security dataset
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
communication system security
11.
comprehensive system of economic security
12.
computer security
13.
cooperative security dilemma
14.
cyber security
15.
cyber security education
16.
cyber security exercises
17.
cyber security monitoring
18.
cyber security strategies
19.
cyber-security
20.
development of security cameras
21.
digital security practices
22.
drinking water security
23.
economic security
24.
economic security of enterprise
25.
emotional security
26.
energy security
27.
energy security indicator
28.
Estonian information security standard
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
high level of security
33.
Homeland security
34.
human security
35.
information security
36.
information security and privacy
37.
initial level of security
38.
internal security
39.
international security
40.
investment and innovation security
41.
IPv6 security
42.
IT security
43.
IT security management
44.
job security
45.
long-term security
46.
maritime cyber security
47.
maritime cyber security operations centers
48.
Maritime Security Operations Center (M-SOC)
49.
medium level of security
50.
Middle Eastern security
51.
Mobile security
52.
national cyber security strategy
53.
national security
54.
NATO. Science for Peace and Security Program
55.
network security
56.
network security monitoring
57.
OSCE (Organization for Security and Co-operation in Europe)
58.
passenger’s security
59.
policy-based routing security
60.
political and security cultures
61.
post-quantum security
62.
power system security
63.
quantitative security
64.
regional security
65.
RISC-V Security Verification
66.
Safety and Security in Sea Transportation
67.
safety and security testing
68.
security
69.
security adaptation
70.
security alert prioritization
71.
security analysis
72.
security and justice (AFSJ)
73.
Security and political science
74.
security and privacy
75.
security and privacy in smart grids
76.
Security Assertion Mining
77.
security closure
78.
Security Coverage
79.
security dilemma
80.
Security evaluation
81.
security evaluation instruments
82.
Security limitations
83.
security log analysis
84.
security management
85.
security model
86.
security monitoring
87.
security notion
88.
security objectives
89.
security of supply
90.
security operation center
91.
security operations center
92.
security patterns
93.
security policy
94.
security problem definition
95.
security proof
96.
security protocols
97.
security requirements
98.
security requirements engineering
99.
security research
100.
security risk assessment
101.
security risk management
102.
security risks
103.
security science and technology
104.
security strategies
105.
security systems for military objects
106.
security testing
107.
security training
108.
security verification
109.
security-by-design
110.
social security planning
111.
societal security
112.
software security
113.
software security level
114.
software security subcharacteristics
115.
sufficient level of security
116.
system of economic security
117.
system security
118.
terrorism security
119.
transmission System Security
120.
voting privacy and security
121.
accident data
122.
adversarial data perturbation
123.
AI-based data curation
124.
AIS data
125.
AIS data format optimization
126.
Aligned data
127.
ALS data enhancements
128.
Amazon Kinesis Data Analytics
129.
application data
130.
audio and visual data
131.
big data
132.
big data analysis
133.
big data analytics
134.
big data science
135.
big geo-data
136.
borehole data
137.
building lifecycle data
138.
call data record
139.
catalogue of data sources
140.
cellular phone data
141.
clinical data capture
142.
clinical data exchange
143.
compositional data
144.
conceptual data model
145.
construction data management
146.
consumption data
147.
control and data path tests
148.
critical data studies
149.
cross-border data exchange
150.
data
151.
data assimilation
152.
data protection
153.
data acquisition
154.
data acquisition system
155.
data acquisition systems
156.
data aggregation
157.
data alignment
158.
Data Altruism
159.
Data Altruism Consent
160.
data analysis
161.
data analytics
162.
data analytics and machine learning
163.
data anisotropy
164.
data annotation
165.
data assimilation
166.
data attacks
167.
data augmentation
168.
data breach handling
169.
data capabilities
170.
data capture
171.
data center
172.
data center (DC)
173.
data center applications
174.
data centers
175.
data centre
176.
data centres
177.
data classification
178.
data clustering
179.
data collection
180.
data commons
181.
data compression
182.
data compression and normalization
183.
data conversion
184.
data copy
185.
data curation
186.
data curing
187.
data dictionaries
188.
data discovery
189.
Data dissemination
190.
Data distribution structure
191.
data donation
192.
Data drift
193.
data driven planning
194.
data dropouts
195.
Data Ecosystem
196.
data embassy
197.
data engineering
198.
data enrichment
199.
data envelopment analysis
200.
data ethnography
201.
data exchange
202.
data exchange framework
203.
Data exchange layers
204.
data exchange platform
205.
data experts
206.
data filtering
207.
data fitting approach
208.
data flow languages
209.
data flow visualization
210.
data flows
211.
data fusion
212.
data generative model
213.
data governance
214.
data governance act
215.
data harmonization
216.
data hiding
217.
data integration
218.
data integrity
219.
data intermediary
220.
data Interoperability
221.
data justice
222.
data labeling
223.
data limitations in public sector
224.
data lineage
225.
data literacy
226.
data logger
227.
data logistics
228.
data management
229.
data mappings
230.
Data Mart
231.
Data Mart (DM)
232.
data mesh
233.
data migration
234.
data mining
235.
data mining and knowledge discovery
236.
data modeling
237.
data models
238.
data modem
239.
data movements
240.
data noise
241.
data offloading
242.
data ownership
243.
data platform
244.
data privacy
245.
data processing
246.
data product
247.
data protection
248.
data publishing
249.
data quality
250.
data quality management
251.
data quality maturity model
252.
data rate
253.
data representativeness
254.
data reuse
255.
data re-use
256.
data routing
257.
data scarce environments
258.
data science
259.
data scraping
260.
data set
261.
data set generation
262.
data sets
263.
data sharing
264.
data simulation
265.
data simultaneity
266.
data sort
267.
data sources
268.
data spaces
269.
data storage
270.
data storage systems
271.
data stream mining
272.
data streams
273.
data structures
274.
data studies
275.
data subject
276.
data subjects
277.
data synthesis
278.
data to decision
279.
data types
280.
data validity
281.
data valorization
282.
data warehouse
283.
data warenhouse
284.
data visualization
285.
data-augmentation
286.
data-based computational psychiatry
287.
data-centric construction
288.
data-centric systems
289.
data-controlled circuit partition
290.
data-controlled segmentation
291.
data-driven
292.
data-driven characterization
293.
data-driven condition monitoring
294.
data-driven control
295.
Data-driven decision-making
296.
data-driven imputation
297.
Data-driven method
298.
data-driven model
299.
data-driven modeling
300.
data-driven optimization
301.
data-driven policy
302.
data-driven public services
303.
data-driven techniques
304.
data-exchange infrastructures
305.
data-exchange solutions
306.
data-flow architecture
307.
data‐fusion
308.
data-independent acquisition
309.
Data-information-knowledgewisdom (DIKW)
310.
data-intelligence
311.
data-mining
312.
data-science
313.
data-sharing
314.
diagnostic data
315.
digital data exchange
316.
discrete data
317.
distributed data aggregation
318.
distributed data fusion
319.
distributed data mining
320.
distributed data mining (DDM)
321.
distributional data
322.
DNA microarray data
323.
educational data mining
324.
educational data-mining
325.
enterprise data analysis
326.
European Health Data Space
327.
European Health Data Space (EHDS)
328.
eventdriven data
329.
event-driven data
330.
experimental data
331.
exploratory data analysis
332.
fair data
333.
false data injection attack
334.
field data
335.
financial data
336.
floating car data (FCD)
337.
flood data platform
338.
FMI open data
339.
functional data analysis
340.
GDPR (General Data Protection Regulation)
341.
general data protection regulation
342.
genome data
343.
global data hub
344.
GNSS-levelling data
345.
GNSS-RO data
346.
GRUAN data
347.
health data
348.
health data accessibility
349.
Health data anonymization
350.
health data custodianship
351.
health data governance
352.
health data integrity and transparency
353.
health data interoperability
354.
health data policy
355.
health data stewardship
356.
healthcare data
357.
heterogeneous sensor data
358.
high-dimensional data
359.
high-frequency data
360.
high-level test data generation
361.
historical data
362.
hyperspectral data
363.
imbalanced data
364.
implications of energy data
365.
initial data
366.
initial data for AI
367.
initial data model
368.
in-network data processing
369.
insurance data
370.
knowledge discovery and data mining
371.
linked data
372.
linked open data
373.
linked open statistical data
374.
linked data
375.
lossless data compression
376.
low-pass data filtering
377.
Master Data Management
378.
medical claims data
379.
medical data
380.
Medical Data Reuse
381.
meta-data
382.
metered data
383.
methods: data analysis
384.
microplastic data uncertainty
385.
mobile data
386.
mobile phone big data
387.
mobile phone data
388.
mobile phone usage data
389.
mobile positioning data
390.
multisource data fusion
391.
multivariate data analysis
392.
Nigeria's National data protection regulation
393.
open data
394.
open data ecosystem
395.
open data format
396.
open data policies
397.
open government data
398.
open government data (OGD)
399.
open-data
400.
open-data platform
401.
OSM data
402.
oversharing personal data
403.
panel data
404.
parallel data processing
405.
passenger data
406.
patient-generated health data (PGHD)
407.
personal data
408.
personal data disclosure
409.
personal data processing
410.
personal data protection
411.
Personal Data Protection Act
412.
plan data
413.
point cloud data
414.
pollen data
415.
process and data modelling
416.
Product Data Management (PDM)
417.
public data-set
418.
random data
419.
real-time data
420.
real-time data collection
421.
reconstruction of gap-free data
422.
reference architecture for global health data space
423.
remote data transmission
424.
satellite data
425.
semantic data modelling
426.
semantic health data
427.
sequential data
428.
small data machine learning
429.
small training data set
430.
smart data analytics
431.
smart meter data
432.
social media data
433.
Spatial data
434.
spatial data analysis
435.
statistical data
436.
stochastic image data
437.
structured data
438.
student data analysis
439.
supervised learning data
440.
supervisory control and data acquisition (SCADA)
441.
surrogate data
442.
sustainable data governance
443.
sustainable data storage
444.
symbolic data
445.
symbolic data analysis
446.
synthetic data
447.
temperature historical data series
448.
three-way data
449.
time-selective data fusion
450.
training data
451.
Transcriptome data
452.
tree-like data structures
453.
underwater data center
454.
urban data
455.
urban data acquisition
456.
weather data
457.
web traffic data
458.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
459.
virtual data embassy
460.
Virtual Data Explorer
461.
18O data
462.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT