Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
data security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
3
Look more..
(2/348)
Export
export all inquiry results
(3)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
book
2
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
3
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 3, displaying
1 - 3
keyword
345
1.
data security
2.
security of data
3.
metadata model for security measures
4.
security dataset
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security strategies
17.
cyber-security
18.
development of security cameras
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
graded security
26.
hardware security
27.
hardware security primitive
28.
human security
29.
information security
30.
internal security
31.
international security
32.
investment and innovation security
33.
IPv6 security
34.
IT security
35.
IT security management
36.
job security
37.
long-term security
38.
Middle Eastern security
39.
Mobile security
40.
national cyber security strategy
41.
national security
42.
NATO. Science for Peace and Security Program
43.
network security
44.
network security monitoring
45.
OSCE (Organization for Security and Co-operation in Europe)
46.
passenger’s security
47.
policy-based routing security
48.
political and security cultures
49.
post-quantum security
50.
power system security
51.
quantitative security
52.
regional security
53.
RISC-V Security Verification
54.
security
55.
security and justice (AFSJ)
56.
security and privacy
57.
security and privacy in smart grids
58.
Security Assertion Mining
59.
security closure
60.
Security Coverage
61.
security dilemma
62.
Security evaluation
63.
security log analysis
64.
security management
65.
security model
66.
security monitoring
67.
security notion
68.
security objectives
69.
security of supply
70.
security operation center
71.
security patterns
72.
security policy
73.
security problem definition
74.
security proof
75.
security protocols
76.
security requirements
77.
security requirements engineering
78.
security risk assessment
79.
security risk management
80.
security strategies
81.
security systems for military objects
82.
security testing
83.
security training
84.
security verification
85.
social security planning
86.
societal security
87.
system of economic security
88.
system security
89.
terrorism security
90.
transmission System Security
91.
voting privacy and security
92.
accident data
93.
adversarial data perturbation
94.
AIS data
95.
Aligned data
96.
ALS data enhancements
97.
application data
98.
audio and visual data
99.
big data
100.
big data analysis
101.
big data analytics
102.
borehole data
103.
building lifecycle data
104.
call data record
105.
clinical data capture
106.
conceptual data model
107.
control and data path tests
108.
critical data studies
109.
cross-border data exchange
110.
data
111.
data assimilation
112.
data protection
113.
data acquisition
114.
data acquisition system
115.
data acquisition systems
116.
data aggregation
117.
data alignment
118.
data analysis
119.
data analytics
120.
data anisotropy
121.
data annotation
122.
data assimilation
123.
data attacks
124.
data augmentation
125.
data capabilities
126.
data capture
127.
data center
128.
data center (DC)
129.
data centers
130.
data centre
131.
data centres
132.
data classification
133.
data clustering
134.
data collection
135.
data commons
136.
data compression
137.
data conversion
138.
data copy
139.
data dictionaries
140.
data discovery
141.
Data dissemination
142.
Data distribution structure
143.
Data drift
144.
data driven planning
145.
data embassy
146.
data engineering
147.
data envelopment analysis
148.
data ethnography
149.
data exchange
150.
data exchange framework
151.
Data exchange layers
152.
data exchange platform
153.
data experts
154.
data filtering
155.
data flow languages
156.
data flow visualization
157.
data fusion
158.
data generative model
159.
data governance
160.
data integration
161.
data integrity
162.
data justice
163.
data lineage
164.
data logger
165.
data logistics
166.
data management
167.
data mappings
168.
Data Mart
169.
data mesh
170.
data mining
171.
data modeling
172.
data models
173.
data modem
174.
data noise
175.
data offloading
176.
data ownership
177.
data platform
178.
data privacy
179.
data processing
180.
data product
181.
data protection
182.
data quality
183.
data quality management
184.
data quality maturity model
185.
data rate
186.
data reuse
187.
data re-use
188.
data routing
189.
data science
190.
data scraping
191.
data sets
192.
data sharing
193.
data simulation
194.
data simultaneity
195.
data sort
196.
data sources
197.
data storage
198.
data storage systems
199.
data stream mining
200.
data streams
201.
data studies
202.
data subject
203.
data synthesis
204.
data to decision
205.
data types
206.
data validity
207.
data valorization
208.
data warehouse
209.
data warenhouse
210.
data visualization
211.
data-based computational psychiatry
212.
data-centric construction
213.
data-centric systems
214.
data-controlled circuit partition
215.
data-controlled segmentation
216.
data-driven
217.
data-driven characterization
218.
Data-driven method
219.
data-driven modeling
220.
data-exchange infrastructures
221.
data-exchange solutions
222.
data‐fusion
223.
data-independent acquisition
224.
Data-information-knowledgewisdom (DIKW)
225.
data-intelligence
226.
data-mining
227.
data-science
228.
diagnostic data
229.
digital data exchange
230.
discrete data
231.
distributed data aggregation
232.
distributed data fusion
233.
distributed data mining
234.
distributed data mining (DDM)
235.
DNA microarray data
236.
educational data mining
237.
enterprise data analysis
238.
eventdriven data
239.
event-driven data
240.
experimental data
241.
exploratory data analysis
242.
false data injection attack
243.
field data
244.
financial data
245.
floating car data (FCD)
246.
FMI open data
247.
functional data analysis
248.
GDPR (General Data Protection Regulation)
249.
general data protection regulation
250.
global data hub
251.
GNSS-levelling data
252.
health data
253.
Health data anonymization
254.
health data interoperability
255.
healthcare data
256.
heterogeneous sensor data
257.
high-dimensional data
258.
high-frequency data
259.
high-level test data generation
260.
historical data
261.
hyperspectral data
262.
imbalanced data
263.
implications of energy data
264.
initial data
265.
in-network data processing
266.
insurance data
267.
knowledge discovery and data mining
268.
linked data
269.
linked open data
270.
linked open statistical data
271.
linked data
272.
lossless data compression
273.
low-pass data filtering
274.
Master Data Management
275.
medical claims data
276.
medical data
277.
Medical Data Reuse
278.
meta-data
279.
metered data
280.
microplastic data uncertainty
281.
mobile data
282.
mobile phone big data
283.
mobile phone data
284.
mobile phone usage data
285.
mobile positioning data
286.
multisource data fusion
287.
multivariate data analysis
288.
Nigeria's National data protection regulation
289.
open data
290.
open data ecosystem
291.
open data format
292.
open data policies
293.
open government data
294.
open government data (OGD)
295.
OSM data
296.
oversharing personal data
297.
panel data
298.
parallel data processing
299.
passenger data
300.
personal data
301.
personal data disclosure
302.
personal data processing
303.
personal data protection
304.
Personal Data Protection Act
305.
plan data
306.
point cloud data
307.
pollen data
308.
process and data modelling
309.
public data-set
310.
real-time data
311.
reconstruction of gap-free data
312.
remote data transmission
313.
satellite data
314.
semantic health data
315.
sequential data
316.
small data machine learning
317.
smart data analytics
318.
smart meter data
319.
social media data
320.
Spatial data
321.
spatial data analysis
322.
statistical data
323.
stochastic image data
324.
structured data
325.
student data analysis
326.
supervised learning data
327.
supervisory control and data acquisition (SCADA)
328.
surrogate data
329.
sustainable data governance
330.
symbolic data
331.
symbolic data analysis
332.
synthetic data
333.
time-selective data fusion
334.
training data
335.
Transcriptome data
336.
tree-like data structures
337.
urban data
338.
urban data acquisition
339.
weather data
340.
web traffic data
341.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
342.
virtual data embassy
343.
Virtual Data Explorer
344.
18O data
345.
(big) data
subject term
3
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Greenergy Data Centers
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT