Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
data security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
4
Vaata veel..
(2/426)
Ekspordi
ekspordi kõik päringu tulemused
(4)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
raamat
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
raamat
2
artikkel kogumikus EST
/
artikkel kogumikus ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
3
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 4, kuvan
1 - 4
võtmesõna
422
1.
data security
2.
security of data
3.
metadata model for security measures
4.
security dataset
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security monitoring
17.
cyber security strategies
18.
cyber-security
19.
development of security cameras
20.
digital security practices
21.
drinking water security
22.
economic security
23.
economic security of enterprise
24.
emotional security
25.
energy security
26.
energy security indicator
27.
Estonian information security standard
28.
graded security
29.
hardware security
30.
hardware security primitive
31.
human security
32.
information security
33.
information security and privacy
34.
internal security
35.
international security
36.
investment and innovation security
37.
IPv6 security
38.
IT security
39.
IT security management
40.
job security
41.
long-term security
42.
Middle Eastern security
43.
Mobile security
44.
national cyber security strategy
45.
national security
46.
NATO. Science for Peace and Security Program
47.
network security
48.
network security monitoring
49.
OSCE (Organization for Security and Co-operation in Europe)
50.
passenger’s security
51.
policy-based routing security
52.
political and security cultures
53.
post-quantum security
54.
power system security
55.
quantitative security
56.
regional security
57.
RISC-V Security Verification
58.
safety and security testing
59.
security
60.
security adaptation
61.
security alert prioritization
62.
security analysis
63.
security and justice (AFSJ)
64.
Security and political science
65.
security and privacy
66.
security and privacy in smart grids
67.
Security Assertion Mining
68.
security closure
69.
Security Coverage
70.
security dilemma
71.
Security evaluation
72.
security evaluation instruments
73.
Security limitations
74.
security log analysis
75.
security management
76.
security model
77.
security monitoring
78.
security notion
79.
security objectives
80.
security of supply
81.
security operation center
82.
security operations center
83.
security patterns
84.
security policy
85.
security problem definition
86.
security proof
87.
security protocols
88.
security requirements
89.
security requirements engineering
90.
security risk assessment
91.
security risk management
92.
security risks
93.
security strategies
94.
security systems for military objects
95.
security testing
96.
security training
97.
security verification
98.
security-by-design
99.
social security planning
100.
societal security
101.
system of economic security
102.
system security
103.
terrorism security
104.
transmission System Security
105.
voting privacy and security
106.
accident data
107.
adversarial data perturbation
108.
AI-based data curation
109.
AIS data
110.
Aligned data
111.
ALS data enhancements
112.
Amazon Kinesis Data Analytics
113.
application data
114.
audio and visual data
115.
big data
116.
big data analysis
117.
big data analytics
118.
big data science
119.
big geo-data
120.
borehole data
121.
building lifecycle data
122.
call data record
123.
catalogue of data sources
124.
cellular phone data
125.
clinical data capture
126.
clinical data exchange
127.
compositional data
128.
conceptual data model
129.
construction data management
130.
control and data path tests
131.
critical data studies
132.
cross-border data exchange
133.
data
134.
data assimilation
135.
data protection
136.
data acquisition
137.
data acquisition system
138.
data acquisition systems
139.
data aggregation
140.
data alignment
141.
data analysis
142.
data analytics
143.
data analytics and machine learning
144.
data anisotropy
145.
data annotation
146.
data assimilation
147.
data attacks
148.
data augmentation
149.
data breach handling
150.
data capabilities
151.
data capture
152.
data center
153.
data center (DC)
154.
data centers
155.
data centre
156.
data centres
157.
data classification
158.
data clustering
159.
data collection
160.
data commons
161.
data compression
162.
data conversion
163.
data copy
164.
data dictionaries
165.
data discovery
166.
Data dissemination
167.
Data distribution structure
168.
data donation
169.
Data drift
170.
data driven planning
171.
data dropouts
172.
data embassy
173.
data engineering
174.
data enrichment
175.
data envelopment analysis
176.
data ethnography
177.
data exchange
178.
data exchange framework
179.
Data exchange layers
180.
data exchange platform
181.
data experts
182.
data filtering
183.
data fitting approach
184.
data flow languages
185.
data flow visualization
186.
data flows
187.
data fusion
188.
data generative model
189.
data governance
190.
data governance act
191.
data hiding
192.
data integration
193.
data integrity
194.
data intermediary
195.
data Interoperability
196.
data justice
197.
data labeling
198.
data lineage
199.
data logger
200.
data logistics
201.
data management
202.
data mappings
203.
Data Mart
204.
Data Mart (DM)
205.
data mesh
206.
data migration
207.
data mining
208.
data modeling
209.
data models
210.
data modem
211.
data movements
212.
data noise
213.
data offloading
214.
data ownership
215.
data platform
216.
data privacy
217.
data processing
218.
data product
219.
data protection
220.
data quality
221.
data quality management
222.
data quality maturity model
223.
data rate
224.
data reuse
225.
data re-use
226.
data routing
227.
data science
228.
data scraping
229.
data set
230.
data set generation
231.
data sets
232.
data sharing
233.
data simulation
234.
data simultaneity
235.
data sort
236.
data sources
237.
data spaces
238.
data storage
239.
data storage systems
240.
data stream mining
241.
data streams
242.
data structures
243.
data studies
244.
data subject
245.
data subjects
246.
data synthesis
247.
data to decision
248.
data types
249.
data validity
250.
data valorization
251.
data warehouse
252.
data warenhouse
253.
data visualization
254.
data-augmentation
255.
data-based computational psychiatry
256.
data-centric construction
257.
data-centric systems
258.
data-controlled circuit partition
259.
data-controlled segmentation
260.
data-driven
261.
data-driven characterization
262.
data-driven condition monitoring
263.
data-driven control
264.
Data-driven decision-making
265.
data-driven imputation
266.
Data-driven method
267.
data-driven model
268.
data-driven modeling
269.
data-driven optimization
270.
data-driven public services
271.
data-driven techniques
272.
data-exchange infrastructures
273.
data-exchange solutions
274.
data-flow architecture
275.
data‐fusion
276.
data-independent acquisition
277.
Data-information-knowledgewisdom (DIKW)
278.
data-intelligence
279.
data-mining
280.
data-science
281.
diagnostic data
282.
digital data exchange
283.
discrete data
284.
distributed data aggregation
285.
distributed data fusion
286.
distributed data mining
287.
distributed data mining (DDM)
288.
DNA microarray data
289.
educational data mining
290.
enterprise data analysis
291.
European Health Data Space
292.
European Health Data Space (EHDS)
293.
eventdriven data
294.
event-driven data
295.
experimental data
296.
exploratory data analysis
297.
false data injection attack
298.
field data
299.
financial data
300.
floating car data (FCD)
301.
flood data platform
302.
FMI open data
303.
functional data analysis
304.
GDPR (General Data Protection Regulation)
305.
general data protection regulation
306.
genome data
307.
global data hub
308.
GNSS-levelling data
309.
GNSS-RO data
310.
GRUAN data
311.
health data
312.
health data accessibility
313.
Health data anonymization
314.
health data custodianship
315.
health data governance
316.
health data interoperability
317.
health data policy
318.
health data stewardship
319.
healthcare data
320.
heterogeneous sensor data
321.
high-dimensional data
322.
high-frequency data
323.
high-level test data generation
324.
historical data
325.
hyperspectral data
326.
imbalanced data
327.
implications of energy data
328.
initial data
329.
initial data for AI
330.
initial data model
331.
in-network data processing
332.
insurance data
333.
knowledge discovery and data mining
334.
linked data
335.
linked open data
336.
linked open statistical data
337.
linked data
338.
lossless data compression
339.
low-pass data filtering
340.
Master Data Management
341.
medical claims data
342.
medical data
343.
Medical Data Reuse
344.
meta-data
345.
metered data
346.
methods: data analysis
347.
microplastic data uncertainty
348.
mobile data
349.
mobile phone big data
350.
mobile phone data
351.
mobile phone usage data
352.
mobile positioning data
353.
multisource data fusion
354.
multivariate data analysis
355.
Nigeria's National data protection regulation
356.
open data
357.
open data ecosystem
358.
open data format
359.
open data policies
360.
open government data
361.
open government data (OGD)
362.
open-data
363.
OSM data
364.
oversharing personal data
365.
panel data
366.
parallel data processing
367.
passenger data
368.
patient-generated health data (PGHD)
369.
personal data
370.
personal data disclosure
371.
personal data processing
372.
personal data protection
373.
Personal Data Protection Act
374.
plan data
375.
point cloud data
376.
pollen data
377.
process and data modelling
378.
Product Data Management (PDM)
379.
public data-set
380.
random data
381.
real-time data
382.
real-time data collection
383.
reconstruction of gap-free data
384.
reference architecture for global health data space
385.
remote data transmission
386.
satellite data
387.
semantic data modelling
388.
semantic health data
389.
sequential data
390.
small data machine learning
391.
small training data set
392.
smart data analytics
393.
smart meter data
394.
social media data
395.
Spatial data
396.
spatial data analysis
397.
statistical data
398.
stochastic image data
399.
structured data
400.
student data analysis
401.
supervised learning data
402.
supervisory control and data acquisition (SCADA)
403.
surrogate data
404.
sustainable data governance
405.
symbolic data
406.
symbolic data analysis
407.
synthetic data
408.
temperature historical data series
409.
time-selective data fusion
410.
training data
411.
Transcriptome data
412.
tree-like data structures
413.
underwater data center
414.
urban data
415.
urban data acquisition
416.
weather data
417.
web traffic data
418.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
419.
virtual data embassy
420.
Virtual Data Explorer
421.
18O data
422.
(big) data
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT