Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
data attacks (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/268)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Survey on architectural attacks : a unified classification and attack model
Ghasempouri, Tara
;
Raik, Jaan
;
Reinbrecht, Cezar
;
Hamdioui, Said
;
Hamdioui, Said
ACM Computing Surveys
2023
/
art. 42
https://doi.org/10.1145/3604803
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
267
1.
data attacks
2.
architectural attacks
3.
attacks
4.
cache attacks
5.
cyber attacks
6.
DDoS attacks
7.
denial of service attacks
8.
functionality attacks
9.
IP attacks
10.
jamming attacks
11.
offline guessing attacks
12.
oracle-guided attacks
13.
oracle-less (OL) and oracle-guided (OG) attacks
14.
side-channel attacks
15.
targeted attacks
16.
accident data
17.
adversarial data perturbation
18.
AIS data
19.
Aligned data
20.
ALS data enhancements
21.
application data
22.
audio and visual data
23.
big data
24.
big data analysis
25.
big data analytics
26.
borehole data
27.
building lifecycle data
28.
call data record
29.
clinical data capture
30.
conceptual data model
31.
control and data path tests
32.
critical data studies
33.
cross-border data exchange
34.
data
35.
data assimilation
36.
data protection
37.
data acquisition
38.
data acquisition system
39.
data aggregation
40.
data alignment
41.
data analysis
42.
data analytics
43.
data anisotropy
44.
data annotation
45.
data assimilation
46.
data augmentation
47.
data capture
48.
data center
49.
data center (DC)
50.
data centers
51.
data centre
52.
data centres
53.
data classification
54.
data clustering
55.
data collection
56.
data commons
57.
data compression
58.
data conversion
59.
data copy
60.
data dictionaries
61.
data discovery
62.
Data dissemination
63.
Data distribution structure
64.
Data drift
65.
data driven planning
66.
data embassy
67.
data engineering
68.
data envelopment analysis
69.
data ethnography
70.
data exchange
71.
data exchange framework
72.
Data exchange layers
73.
data exchange platform
74.
data experts
75.
data filtering
76.
data flow languages
77.
data flow visualization
78.
data fusion
79.
data generative model
80.
data governance
81.
data integration
82.
data integrity
83.
data justice
84.
data lineage
85.
data logger
86.
data logistics
87.
data management
88.
data mappings
89.
Data Mart
90.
data mesh
91.
data mining
92.
data modeling
93.
data models
94.
data modem
95.
data noise
96.
data offloading
97.
data ownership
98.
data platform
99.
data privacy
100.
data processing
101.
data product
102.
data protection
103.
data quality
104.
data quality management
105.
data quality maturity model
106.
data rate
107.
data reuse
108.
data re-use
109.
data routing
110.
data science
111.
data scraping
112.
data security
113.
data sets
114.
data sharing
115.
data simulation
116.
data simultaneity
117.
data sort
118.
data sources
119.
data storage
120.
data storage systems
121.
data stream mining
122.
data streams
123.
data studies
124.
data subject
125.
data synthesis
126.
data to decision
127.
data types
128.
data validity
129.
data valorization
130.
data warehouse
131.
data warenhouse
132.
data visualization
133.
data-based computational psychiatry
134.
data-centric construction
135.
data-centric systems
136.
data-controlled circuit partition
137.
data-controlled segmentation
138.
data-driven
139.
data-driven characterization
140.
Data-driven method
141.
data-driven modeling
142.
data-exchange infrastructures
143.
data-exchange solutions
144.
data‐fusion
145.
data-independent acquisition
146.
Data-information-knowledgewisdom (DIKW)
147.
data-intelligence
148.
data-mining
149.
data-science
150.
diagnostic data
151.
digital data exchange
152.
discrete data
153.
distributed data aggregation
154.
distributed data fusion
155.
distributed data mining
156.
distributed data mining (DDM)
157.
DNA microarray data
158.
educational data mining
159.
eventdriven data
160.
event-driven data
161.
experimental data
162.
exploratory data analysis
163.
false data injection attack
164.
False data injection attack; Machine learning; Matlab; Python; State estimation; Sudden load change
165.
field data
166.
financial data
167.
floating car data (FCD)
168.
FMI open data
169.
functional data analysis
170.
GDPR (General Data Protection Regulation)
171.
general data protection regulation
172.
global data hub
173.
GNSS-levelling data
174.
health data
175.
Health data anonymization
176.
health data interoperability
177.
healthcare data
178.
heterogeneous sensor data
179.
high-dimensional data
180.
high-frequency data
181.
high-level test data generation
182.
historical data
183.
hyperspectral data
184.
imbalanced data
185.
implications of energy data
186.
initial data
187.
in-network data processing
188.
insurance data
189.
knowledge discovery and data mining
190.
linked data
191.
linked open data
192.
linked open statistical data
193.
linked data
194.
lossless data compression
195.
low-pass data filtering
196.
Master Data Management
197.
medical claims data
198.
medical data
199.
Medical Data Reuse
200.
meta-data
201.
microplastic data uncertainty
202.
mobile data
203.
mobile phone big data
204.
mobile phone data
205.
mobile phone usage data
206.
mobile positioning data
207.
multisource data fusion
208.
multivariate data analysis
209.
Nigeria's National data protection regulation
210.
open data
211.
open data ecosystem
212.
open data format
213.
open data policies
214.
open government data
215.
open government data (OGD)
216.
OSM data
217.
oversharing personal data
218.
panel data
219.
parallel data processing
220.
passenger data
221.
personal data
222.
personal data disclosure
223.
personal data processing
224.
personal data protection
225.
Personal Data Protection Act
226.
plan data
227.
point cloud data
228.
pollen data
229.
process and data modelling
230.
public data-set
231.
real-time data
232.
reconstruction of gap-free data
233.
remote data transmission
234.
satellite data
235.
security of data
236.
semantic health data
237.
sequential data
238.
small data machine learning
239.
smart data analytics
240.
smart meter data
241.
social media data
242.
Spatial data
243.
spatial data analysis
244.
statistical data
245.
stochastic image data
246.
structured data
247.
student data analysis
248.
supervised learning data
249.
supervisory control and data acquisition (SCADA)
250.
surrogate data
251.
sustainable data governance
252.
symbolic data
253.
symbolic data analysis
254.
synthetic data
255.
time-selective data fusion
256.
training data
257.
Transcriptome data
258.
tree-like data structures
259.
urban data
260.
urban data acquisition
261.
weather data
262.
web traffic data
263.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
264.
virtual data embassy
265.
Virtual Data Explorer
266.
18O data
267.
(big) data
subject term
1
1.
Greenergy Data Centers
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT