Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security of data (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/403)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Black-box separations and their adaptability to the non-uniform model
Buldas, Ahto
;
Niitsoo, Margus
Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings
2013
/
p. 152-167
https://doi.org/10.1007/978-3-642-39059-3_11
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
2
book article
A security verification template to assess cache architecture vulnerabilities
Ghasempouri, Tara
;
Raik, Jaan
;
Paul, Kolin
;
Reinbrecht, Cezar
;
Hamdioui, Said
;
Taouil, M.
2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), April 22nd – 24th 2020 Novi Sad, Serbia : Proceedings
2020
/
art. 9095707, 6 p
https://doi.org/10.1109/DDECS50862.2020.9095707
book article
Number of records 2, displaying
1 - 2
keyword
399
1.
security of data
2.
data security
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security strategies
15.
cyber-security
16.
development of security cameras
17.
drinking water security
18.
economic security
19.
economic security of enterprise
20.
emotional security
21.
energy security
22.
energy security indicator
23.
Estonian information security standard
24.
graded security
25.
hardware security
26.
hardware security primitive
27.
human security
28.
information security
29.
internal security
30.
international security
31.
investment and innovation security
32.
IPv6 security
33.
IT security
34.
IT security management
35.
job security
36.
long-term security
37.
metadata model for security measures
38.
Middle Eastern security
39.
Mobile security
40.
national cyber security strategy
41.
national security
42.
NATO. Science for Peace and Security Program
43.
network security
44.
network security monitoring
45.
OSCE (Organization for Security and Co-operation in Europe)
46.
passenger’s security
47.
policy-based routing security
48.
political and security cultures
49.
post-quantum security
50.
power system security
51.
quantitative security
52.
regional security
53.
RISC-V Security Verification
54.
safety and security testing
55.
security
56.
security adaptation
57.
security alert prioritization
58.
security analysis
59.
security and justice (AFSJ)
60.
security and privacy
61.
security and privacy in smart grids
62.
Security Assertion Mining
63.
security closure
64.
Security Coverage
65.
security dataset
66.
security dilemma
67.
Security evaluation
68.
security evaluation instruments
69.
security log analysis
70.
security management
71.
security model
72.
security monitoring
73.
security notion
74.
security objectives
75.
security of supply
76.
security operation center
77.
security operations center
78.
security patterns
79.
security policy
80.
security problem definition
81.
security proof
82.
security protocols
83.
security requirements
84.
security requirements engineering
85.
security risk assessment
86.
security risk management
87.
security strategies
88.
security systems for military objects
89.
security testing
90.
security training
91.
security verification
92.
security-by-design
93.
social security planning
94.
societal security
95.
system of economic security
96.
system security
97.
terrorism security
98.
transmission System Security
99.
voting privacy and security
100.
accident data
101.
adversarial data perturbation
102.
AI-based data curation
103.
AIS data
104.
Aligned data
105.
ALS data enhancements
106.
Amazon Kinesis Data Analytics
107.
application data
108.
audio and visual data
109.
big data
110.
big data analysis
111.
big data analytics
112.
big data science
113.
big geo-data
114.
borehole data
115.
building lifecycle data
116.
call data record
117.
catalogue of data sources
118.
cellular phone data
119.
clinical data capture
120.
clinical data exchange
121.
compositional data
122.
conceptual data model
123.
control and data path tests
124.
critical data studies
125.
cross-border data exchange
126.
data
127.
data assimilation
128.
data protection
129.
data acquisition
130.
data acquisition system
131.
data acquisition systems
132.
data aggregation
133.
data alignment
134.
data analysis
135.
data analytics
136.
data anisotropy
137.
data annotation
138.
data assimilation
139.
data attacks
140.
data augmentation
141.
data breach handling
142.
data capabilities
143.
data capture
144.
data center
145.
data center (DC)
146.
data centers
147.
data centre
148.
data centres
149.
data classification
150.
data clustering
151.
data collection
152.
data commons
153.
data compression
154.
data conversion
155.
data copy
156.
data dictionaries
157.
data discovery
158.
Data dissemination
159.
Data distribution structure
160.
data donation
161.
Data drift
162.
data driven planning
163.
data embassy
164.
data engineering
165.
data envelopment analysis
166.
data ethnography
167.
data exchange
168.
data exchange framework
169.
Data exchange layers
170.
data exchange platform
171.
data experts
172.
data filtering
173.
data fitting approach
174.
data flow languages
175.
data flow visualization
176.
data flows
177.
data fusion
178.
data generative model
179.
data governance
180.
data hiding
181.
data integration
182.
data integrity
183.
data intermediary
184.
data Interoperability
185.
data justice
186.
data labeling
187.
data lineage
188.
data logger
189.
data logistics
190.
data management
191.
data mappings
192.
Data Mart
193.
Data Mart (DM)
194.
data mesh
195.
data migration
196.
data mining
197.
data modeling
198.
data models
199.
data modem
200.
data movements
201.
data noise
202.
data offloading
203.
data ownership
204.
data platform
205.
data privacy
206.
data processing
207.
data product
208.
data protection
209.
data quality
210.
data quality management
211.
data quality maturity model
212.
data rate
213.
data reuse
214.
data re-use
215.
data routing
216.
data science
217.
data scraping
218.
data set
219.
data set generation
220.
data sets
221.
data sharing
222.
data simulation
223.
data simultaneity
224.
data sort
225.
data sources
226.
data spaces
227.
data storage
228.
data storage systems
229.
data stream mining
230.
data streams
231.
data studies
232.
data subject
233.
data synthesis
234.
data to decision
235.
data types
236.
data validity
237.
data valorization
238.
data warehouse
239.
data warenhouse
240.
data visualization
241.
data-based computational psychiatry
242.
data-centric construction
243.
data-centric systems
244.
data-controlled circuit partition
245.
data-controlled segmentation
246.
data-driven
247.
data-driven characterization
248.
data-driven condition monitoring
249.
Data-driven method
250.
data-driven model
251.
data-driven modeling
252.
data-driven optimization
253.
data-exchange infrastructures
254.
data-exchange solutions
255.
data‐fusion
256.
data-independent acquisition
257.
Data-information-knowledgewisdom (DIKW)
258.
data-intelligence
259.
data-mining
260.
data-science
261.
diagnostic data
262.
digital data exchange
263.
discrete data
264.
distributed data aggregation
265.
distributed data fusion
266.
distributed data mining
267.
distributed data mining (DDM)
268.
DNA microarray data
269.
educational data mining
270.
enterprise data analysis
271.
European Health Data Space
272.
European Health Data Space (EHDS)
273.
eventdriven data
274.
event-driven data
275.
experimental data
276.
exploratory data analysis
277.
false data injection attack
278.
field data
279.
financial data
280.
floating car data (FCD)
281.
flood data platform
282.
FMI open data
283.
functional data analysis
284.
GDPR (General Data Protection Regulation)
285.
general data protection regulation
286.
genome data
287.
global data hub
288.
GNSS-levelling data
289.
health data
290.
health data accessibility
291.
Health data anonymization
292.
health data custodianship
293.
health data governance
294.
health data interoperability
295.
health data policy
296.
health data stewardship
297.
healthcare data
298.
heterogeneous sensor data
299.
high-dimensional data
300.
high-frequency data
301.
high-level test data generation
302.
historical data
303.
hyperspectral data
304.
imbalanced data
305.
implications of energy data
306.
initial data
307.
initial data for AI
308.
initial data model
309.
in-network data processing
310.
insurance data
311.
knowledge discovery and data mining
312.
linked data
313.
linked open data
314.
linked open statistical data
315.
linked data
316.
lossless data compression
317.
low-pass data filtering
318.
Master Data Management
319.
medical claims data
320.
medical data
321.
Medical Data Reuse
322.
meta-data
323.
metered data
324.
methods: data analysis
325.
microplastic data uncertainty
326.
mobile data
327.
mobile phone big data
328.
mobile phone data
329.
mobile phone usage data
330.
mobile positioning data
331.
multisource data fusion
332.
multivariate data analysis
333.
Nigeria's National data protection regulation
334.
open data
335.
open data ecosystem
336.
open data format
337.
open data policies
338.
open government data
339.
open government data (OGD)
340.
OSM data
341.
oversharing personal data
342.
panel data
343.
parallel data processing
344.
passenger data
345.
patient-generated health data (PGHD)
346.
personal data
347.
personal data disclosure
348.
personal data processing
349.
personal data protection
350.
Personal Data Protection Act
351.
plan data
352.
point cloud data
353.
pollen data
354.
process and data modelling
355.
Product Data Management (PDM)
356.
public data-set
357.
random data
358.
real-time data
359.
real-time data collection
360.
reconstruction of gap-free data
361.
reference architecture for global health data space
362.
remote data transmission
363.
satellite data
364.
semantic data modelling
365.
semantic health data
366.
sequential data
367.
small data machine learning
368.
small training data set
369.
smart data analytics
370.
smart meter data
371.
social media data
372.
Spatial data
373.
spatial data analysis
374.
statistical data
375.
stochastic image data
376.
structured data
377.
student data analysis
378.
supervised learning data
379.
supervisory control and data acquisition (SCADA)
380.
surrogate data
381.
sustainable data governance
382.
symbolic data
383.
symbolic data analysis
384.
synthetic data
385.
temperature historical data series
386.
time-selective data fusion
387.
training data
388.
Transcriptome data
389.
tree-like data structures
390.
underwater data center
391.
urban data
392.
urban data acquisition
393.
weather data
394.
web traffic data
395.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
396.
virtual data embassy
397.
Virtual Data Explorer
398.
18O data
399.
(big) data
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT