Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
data security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/462)
Export
export all inquiry results
(4)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book article EST
/
book article ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
3
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
4
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 4, displaying
1 - 4
keyword
458
1.
data security
2.
data and information security
3.
security of data
4.
metadata model for security measures
5.
security dataset
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
communication system security
11.
comprehensive system of economic security
12.
computer security
13.
cooperative security dilemma
14.
cyber security
15.
cyber security education
16.
cyber security exercises
17.
cyber security monitoring
18.
cyber security strategies
19.
cyber-security
20.
development of security cameras
21.
digital security practices
22.
drinking water security
23.
economic security
24.
economic security of enterprise
25.
emotional security
26.
energy security
27.
energy security indicator
28.
Estonian information security standard
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
high level of security
33.
Homeland security
34.
human security
35.
information security
36.
information security and privacy
37.
initial level of security
38.
internal security
39.
international security
40.
investment and innovation security
41.
IPv6 security
42.
IT security
43.
IT security management
44.
job security
45.
long-term security
46.
Maritime Security Operations Center (M-SOC)
47.
medium level of security
48.
Middle Eastern security
49.
Mobile security
50.
national cyber security strategy
51.
national security
52.
NATO. Science for Peace and Security Program
53.
network security
54.
network security monitoring
55.
OSCE (Organization for Security and Co-operation in Europe)
56.
passenger’s security
57.
policy-based routing security
58.
political and security cultures
59.
post-quantum security
60.
power system security
61.
quantitative security
62.
regional security
63.
RISC-V Security Verification
64.
Safety and Security in Sea Transportation
65.
safety and security testing
66.
security
67.
security adaptation
68.
security alert prioritization
69.
security analysis
70.
security and justice (AFSJ)
71.
Security and political science
72.
security and privacy
73.
security and privacy in smart grids
74.
Security Assertion Mining
75.
security closure
76.
Security Coverage
77.
security dilemma
78.
Security evaluation
79.
security evaluation instruments
80.
Security limitations
81.
security log analysis
82.
security management
83.
security model
84.
security monitoring
85.
security notion
86.
security objectives
87.
security of supply
88.
security operation center
89.
security operations center
90.
security patterns
91.
security policy
92.
security problem definition
93.
security proof
94.
security protocols
95.
security requirements
96.
security requirements engineering
97.
security risk assessment
98.
security risk management
99.
security risks
100.
security science and technology
101.
security strategies
102.
security systems for military objects
103.
security testing
104.
security training
105.
security verification
106.
security-by-design
107.
social security planning
108.
societal security
109.
software security
110.
software security level
111.
software security subcharacteristics
112.
sufficient level of security
113.
system of economic security
114.
system security
115.
terrorism security
116.
transmission System Security
117.
voting privacy and security
118.
accident data
119.
adversarial data perturbation
120.
AI-based data curation
121.
AIS data
122.
AIS data format optimization
123.
Aligned data
124.
ALS data enhancements
125.
Amazon Kinesis Data Analytics
126.
application data
127.
audio and visual data
128.
big data
129.
big data analysis
130.
big data analytics
131.
big data science
132.
big geo-data
133.
borehole data
134.
building lifecycle data
135.
call data record
136.
catalogue of data sources
137.
cellular phone data
138.
clinical data capture
139.
clinical data exchange
140.
compositional data
141.
conceptual data model
142.
construction data management
143.
control and data path tests
144.
critical data studies
145.
cross-border data exchange
146.
data
147.
data assimilation
148.
data protection
149.
data acquisition
150.
data acquisition system
151.
data acquisition systems
152.
data aggregation
153.
data alignment
154.
Data Altruism
155.
Data Altruism Consent
156.
data analysis
157.
data analytics
158.
data analytics and machine learning
159.
data anisotropy
160.
data annotation
161.
data assimilation
162.
data attacks
163.
data augmentation
164.
data breach handling
165.
data capabilities
166.
data capture
167.
data center
168.
data center (DC)
169.
data center applications
170.
data centers
171.
data centre
172.
data centres
173.
data classification
174.
data clustering
175.
data collection
176.
data commons
177.
data compression
178.
data compression and normalization
179.
data conversion
180.
data copy
181.
data curation
182.
data curing
183.
data dictionaries
184.
data discovery
185.
Data dissemination
186.
Data distribution structure
187.
data donation
188.
Data drift
189.
data driven planning
190.
data dropouts
191.
Data Ecosystem
192.
data embassy
193.
data engineering
194.
data enrichment
195.
data envelopment analysis
196.
data ethnography
197.
data exchange
198.
data exchange framework
199.
Data exchange layers
200.
data exchange platform
201.
data experts
202.
data filtering
203.
data fitting approach
204.
data flow languages
205.
data flow visualization
206.
data flows
207.
data fusion
208.
data generative model
209.
data governance
210.
data governance act
211.
data harmonization
212.
data hiding
213.
data integration
214.
data integrity
215.
data intermediary
216.
data Interoperability
217.
data justice
218.
data labeling
219.
data limitations in public sector
220.
data lineage
221.
data literacy
222.
data logger
223.
data logistics
224.
data management
225.
data mappings
226.
Data Mart
227.
Data Mart (DM)
228.
data mesh
229.
data migration
230.
data mining
231.
data mining and knowledge discovery
232.
data modeling
233.
data models
234.
data modem
235.
data movements
236.
data noise
237.
data offloading
238.
data ownership
239.
data platform
240.
data privacy
241.
data processing
242.
data product
243.
data protection
244.
data publishing
245.
data quality
246.
data quality management
247.
data quality maturity model
248.
data rate
249.
data representativeness
250.
data reuse
251.
data re-use
252.
data routing
253.
data scarce environments
254.
data science
255.
data scraping
256.
data set
257.
data set generation
258.
data sets
259.
data sharing
260.
data simulation
261.
data simultaneity
262.
data sort
263.
data sources
264.
data spaces
265.
data storage
266.
data storage systems
267.
data stream mining
268.
data streams
269.
data structures
270.
data studies
271.
data subject
272.
data subjects
273.
data synthesis
274.
data to decision
275.
data types
276.
data validity
277.
data valorization
278.
data warehouse
279.
data warenhouse
280.
data visualization
281.
data-augmentation
282.
data-based computational psychiatry
283.
data-centric construction
284.
data-centric systems
285.
data-controlled circuit partition
286.
data-controlled segmentation
287.
data-driven
288.
data-driven characterization
289.
data-driven condition monitoring
290.
data-driven control
291.
Data-driven decision-making
292.
data-driven imputation
293.
Data-driven method
294.
data-driven model
295.
data-driven modeling
296.
data-driven optimization
297.
data-driven policy
298.
data-driven public services
299.
data-driven techniques
300.
data-exchange infrastructures
301.
data-exchange solutions
302.
data-flow architecture
303.
data‐fusion
304.
data-independent acquisition
305.
Data-information-knowledgewisdom (DIKW)
306.
data-intelligence
307.
data-mining
308.
data-science
309.
data-sharing
310.
diagnostic data
311.
digital data exchange
312.
discrete data
313.
distributed data aggregation
314.
distributed data fusion
315.
distributed data mining
316.
distributed data mining (DDM)
317.
distributional data
318.
DNA microarray data
319.
educational data mining
320.
educational data-mining
321.
enterprise data analysis
322.
European Health Data Space
323.
European Health Data Space (EHDS)
324.
eventdriven data
325.
event-driven data
326.
experimental data
327.
exploratory data analysis
328.
fair data
329.
false data injection attack
330.
field data
331.
financial data
332.
floating car data (FCD)
333.
flood data platform
334.
FMI open data
335.
functional data analysis
336.
GDPR (General Data Protection Regulation)
337.
general data protection regulation
338.
genome data
339.
global data hub
340.
GNSS-levelling data
341.
GNSS-RO data
342.
GRUAN data
343.
health data
344.
health data accessibility
345.
Health data anonymization
346.
health data custodianship
347.
health data governance
348.
health data integrity and transparency
349.
health data interoperability
350.
health data policy
351.
health data stewardship
352.
healthcare data
353.
heterogeneous sensor data
354.
high-dimensional data
355.
high-frequency data
356.
high-level test data generation
357.
historical data
358.
hyperspectral data
359.
imbalanced data
360.
implications of energy data
361.
initial data
362.
initial data for AI
363.
initial data model
364.
in-network data processing
365.
insurance data
366.
knowledge discovery and data mining
367.
linked data
368.
linked open data
369.
linked open statistical data
370.
linked data
371.
lossless data compression
372.
low-pass data filtering
373.
Master Data Management
374.
medical claims data
375.
medical data
376.
Medical Data Reuse
377.
meta-data
378.
metered data
379.
methods: data analysis
380.
microplastic data uncertainty
381.
mobile data
382.
mobile phone big data
383.
mobile phone data
384.
mobile phone usage data
385.
mobile positioning data
386.
multisource data fusion
387.
multivariate data analysis
388.
Nigeria's National data protection regulation
389.
open data
390.
open data ecosystem
391.
open data format
392.
open data policies
393.
open government data
394.
open government data (OGD)
395.
open-data
396.
open-data platform
397.
OSM data
398.
oversharing personal data
399.
panel data
400.
parallel data processing
401.
passenger data
402.
patient-generated health data (PGHD)
403.
personal data
404.
personal data disclosure
405.
personal data processing
406.
personal data protection
407.
Personal Data Protection Act
408.
plan data
409.
point cloud data
410.
pollen data
411.
process and data modelling
412.
Product Data Management (PDM)
413.
public data-set
414.
random data
415.
real-time data
416.
real-time data collection
417.
reconstruction of gap-free data
418.
reference architecture for global health data space
419.
remote data transmission
420.
satellite data
421.
semantic data modelling
422.
semantic health data
423.
sequential data
424.
small data machine learning
425.
small training data set
426.
smart data analytics
427.
smart meter data
428.
social media data
429.
Spatial data
430.
spatial data analysis
431.
statistical data
432.
stochastic image data
433.
structured data
434.
student data analysis
435.
supervised learning data
436.
supervisory control and data acquisition (SCADA)
437.
surrogate data
438.
sustainable data governance
439.
sustainable data storage
440.
symbolic data
441.
symbolic data analysis
442.
synthetic data
443.
temperature historical data series
444.
three-way data
445.
time-selective data fusion
446.
training data
447.
Transcriptome data
448.
tree-like data structures
449.
underwater data center
450.
urban data
451.
urban data acquisition
452.
weather data
453.
web traffic data
454.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
455.
virtual data embassy
456.
Virtual Data Explorer
457.
18O data
458.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT