Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
data security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
4
Vaata veel..
(2/467)
Ekspordi
ekspordi kõik päringu tulemused
(4)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
raamat
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
raamat
2
artikkel kogumikus EST
/
artikkel kogumikus ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
3
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 4, kuvan
1 - 4
võtmesõna
463
1.
data security
2.
data and information security
3.
security of data
4.
metadata model for security measures
5.
security dataset
6.
ad-hoc sensor networks security
7.
Automatic Security Verification
8.
Blockchain security
9.
cache security
10.
communication system security
11.
comprehensive system of economic security
12.
computer security
13.
cooperative security dilemma
14.
cyber security
15.
cyber security education
16.
cyber security exercises
17.
cyber security monitoring
18.
cyber security strategies
19.
cyber-security
20.
development of security cameras
21.
digital security practices
22.
drinking water security
23.
economic security
24.
economic security of enterprise
25.
emotional security
26.
energy security
27.
energy security indicator
28.
Estonian information security standard
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
high level of security
33.
Homeland security
34.
human security
35.
information security
36.
information security and privacy
37.
initial level of security
38.
internal security
39.
international security
40.
investment and innovation security
41.
IPv6 security
42.
IT security
43.
IT security management
44.
job security
45.
long-term security
46.
maritime cyber security
47.
maritime cyber security operations centers
48.
Maritime Security Operations Center (M-SOC)
49.
medium level of security
50.
Middle Eastern security
51.
Mobile security
52.
national cyber security strategy
53.
national security
54.
NATO. Science for Peace and Security Program
55.
network security
56.
network security monitoring
57.
OSCE (Organization for Security and Co-operation in Europe)
58.
passenger’s security
59.
policy-based routing security
60.
political and security cultures
61.
post-quantum security
62.
power system security
63.
quantitative security
64.
regional security
65.
RISC-V Security Verification
66.
Safety and Security in Sea Transportation
67.
safety and security testing
68.
security
69.
security adaptation
70.
security alert prioritization
71.
security analysis
72.
security and justice (AFSJ)
73.
Security and political science
74.
security and privacy
75.
security and privacy in smart grids
76.
Security Assertion Mining
77.
security closure
78.
Security Coverage
79.
security dilemma
80.
Security evaluation
81.
security evaluation instruments
82.
Security limitations
83.
security log analysis
84.
security management
85.
security model
86.
security monitoring
87.
security notion
88.
security objectives
89.
security of supply
90.
security operation center
91.
security operations center
92.
security patterns
93.
security policy
94.
security problem definition
95.
security proof
96.
security protocols
97.
security requirements
98.
security requirements engineering
99.
security research
100.
security risk assessment
101.
security risk management
102.
security risks
103.
security science and technology
104.
security strategies
105.
security systems for military objects
106.
security testing
107.
security training
108.
security verification
109.
security-by-design
110.
social security planning
111.
societal security
112.
software security
113.
software security level
114.
software security subcharacteristics
115.
sufficient level of security
116.
system of economic security
117.
system security
118.
terrorism security
119.
transmission System Security
120.
voting privacy and security
121.
accident data
122.
adversarial data perturbation
123.
AI-based data curation
124.
AIS data
125.
AIS data format optimization
126.
Aligned data
127.
ALS data enhancements
128.
Amazon Kinesis Data Analytics
129.
application data
130.
audio and visual data
131.
big data
132.
big data analysis
133.
big data analytics
134.
big data science
135.
big geo-data
136.
borehole data
137.
building lifecycle data
138.
call data record
139.
catalogue of data sources
140.
cellular phone data
141.
clinical data capture
142.
clinical data exchange
143.
compositional data
144.
conceptual data model
145.
construction data management
146.
consumption data
147.
control and data path tests
148.
critical data studies
149.
cross-border data exchange
150.
data
151.
data assimilation
152.
data protection
153.
data acquisition
154.
data acquisition system
155.
data acquisition systems
156.
data aggregation
157.
data alignment
158.
Data Altruism
159.
Data Altruism Consent
160.
data analysis
161.
data analytics
162.
data analytics and machine learning
163.
data anisotropy
164.
data annotation
165.
data assimilation
166.
data attacks
167.
data augmentation
168.
data breach handling
169.
data capabilities
170.
data capture
171.
data center
172.
data center (DC)
173.
data center applications
174.
data centers
175.
data centre
176.
data centres
177.
data classification
178.
data clustering
179.
data collection
180.
data commons
181.
data compression
182.
data compression and normalization
183.
data conversion
184.
data copy
185.
data curation
186.
data curing
187.
data dictionaries
188.
data discovery
189.
Data dissemination
190.
Data distribution structure
191.
data donation
192.
Data drift
193.
data driven planning
194.
data dropouts
195.
Data Ecosystem
196.
data embassy
197.
data engineering
198.
data enrichment
199.
data envelopment analysis
200.
data ethnography
201.
data exchange
202.
data exchange framework
203.
Data exchange layers
204.
data exchange platform
205.
data experts
206.
data filtering
207.
data fitting approach
208.
data flow languages
209.
data flow visualization
210.
data flows
211.
data fusion
212.
data generative model
213.
data governance
214.
data governance act
215.
data harmonization
216.
data hiding
217.
data integration
218.
data integrity
219.
data intermediary
220.
data Interoperability
221.
data justice
222.
data labeling
223.
data limitations in public sector
224.
data lineage
225.
data literacy
226.
data logger
227.
data logistics
228.
data management
229.
data mappings
230.
Data Mart
231.
Data Mart (DM)
232.
data mesh
233.
data migration
234.
data mining
235.
data mining and knowledge discovery
236.
data modeling
237.
data models
238.
data modem
239.
data movements
240.
data noise
241.
data offloading
242.
data ownership
243.
data platform
244.
data privacy
245.
data processing
246.
data product
247.
data protection
248.
data publishing
249.
data quality
250.
data quality management
251.
data quality maturity model
252.
data rate
253.
data representativeness
254.
data reuse
255.
data re-use
256.
data routing
257.
data scarce environments
258.
data science
259.
data scraping
260.
data set
261.
data set generation
262.
data sets
263.
data sharing
264.
data simulation
265.
data simultaneity
266.
data sort
267.
data sources
268.
data spaces
269.
data storage
270.
data storage systems
271.
data stream mining
272.
data streams
273.
data structures
274.
data studies
275.
data subject
276.
data subjects
277.
data synthesis
278.
data to decision
279.
data types
280.
data validity
281.
data valorization
282.
data warehouse
283.
data warenhouse
284.
data visualization
285.
data-augmentation
286.
data-based computational psychiatry
287.
data-centric construction
288.
data-centric systems
289.
data-controlled circuit partition
290.
data-controlled segmentation
291.
data-driven
292.
data-driven characterization
293.
data-driven condition monitoring
294.
data-driven control
295.
Data-driven decision-making
296.
data-driven imputation
297.
Data-driven method
298.
data-driven model
299.
data-driven modeling
300.
data-driven optimization
301.
data-driven policy
302.
data-driven public services
303.
data-driven techniques
304.
data-exchange infrastructures
305.
data-exchange solutions
306.
data-flow architecture
307.
data‐fusion
308.
data-independent acquisition
309.
Data-information-knowledgewisdom (DIKW)
310.
data-intelligence
311.
data-mining
312.
data-science
313.
data-sharing
314.
diagnostic data
315.
digital data exchange
316.
discrete data
317.
distributed data aggregation
318.
distributed data fusion
319.
distributed data mining
320.
distributed data mining (DDM)
321.
distributional data
322.
DNA microarray data
323.
educational data mining
324.
educational data-mining
325.
empirical data
326.
enterprise data analysis
327.
European Health Data Space
328.
European Health Data Space (EHDS)
329.
eventdriven data
330.
event-driven data
331.
experimental data
332.
exploratory data analysis
333.
fair data
334.
false data injection attack
335.
field data
336.
financial data
337.
floating car data (FCD)
338.
flood data platform
339.
FMI open data
340.
functional data analysis
341.
GDPR (General Data Protection Regulation)
342.
general data protection regulation
343.
genome data
344.
global data hub
345.
GNSS-levelling data
346.
GNSS-RO data
347.
GRUAN data
348.
health data
349.
health data accessibility
350.
Health data anonymization
351.
health data custodianship
352.
health data governance
353.
health data integrity and transparency
354.
health data interoperability
355.
health data policy
356.
health data stewardship
357.
healthcare data
358.
heterogeneous sensor data
359.
high-dimensional data
360.
high-frequency data
361.
high-level test data generation
362.
historical data
363.
hyperspectral data
364.
imbalanced data
365.
implications of energy data
366.
initial data
367.
initial data for AI
368.
initial data model
369.
in-network data processing
370.
insurance data
371.
knowledge discovery and data mining
372.
linked data
373.
linked open data
374.
linked open statistical data
375.
linked data
376.
lossless data compression
377.
low-pass data filtering
378.
Master Data Management
379.
medical claims data
380.
medical data
381.
Medical Data Reuse
382.
meta-data
383.
metered data
384.
methods: data analysis
385.
microplastic data uncertainty
386.
mobile data
387.
mobile phone big data
388.
mobile phone data
389.
mobile phone usage data
390.
mobile positioning data
391.
multisource data fusion
392.
multivariate data analysis
393.
Nigeria's National data protection regulation
394.
open data
395.
open data ecosystem
396.
open data format
397.
open data policies
398.
open government data
399.
open government data (OGD)
400.
open-data
401.
open-data platform
402.
OSM data
403.
oversharing personal data
404.
panel data
405.
parallel data processing
406.
passenger data
407.
patient-generated health data (PGHD)
408.
personal data
409.
personal data disclosure
410.
personal data processing
411.
personal data protection
412.
Personal Data Protection Act
413.
plan data
414.
point cloud data
415.
pollen data
416.
process and data modelling
417.
Product Data Management (PDM)
418.
public data-set
419.
random data
420.
real-time data
421.
real-time data collection
422.
reconstruction of gap-free data
423.
reference architecture for global health data space
424.
remote data transmission
425.
satellite data
426.
semantic data modelling
427.
semantic health data
428.
sequential data
429.
small data machine learning
430.
small training data set
431.
smart data analytics
432.
smart meter data
433.
social media data
434.
Spatial data
435.
spatial data analysis
436.
statistical data
437.
stochastic image data
438.
structured data
439.
student data analysis
440.
supervised learning data
441.
supervisory control and data acquisition (SCADA)
442.
surrogate data
443.
sustainable data governance
444.
sustainable data storage
445.
symbolic data
446.
symbolic data analysis
447.
synthetic data
448.
temperature historical data series
449.
three-way data
450.
time-selective data fusion
451.
training data
452.
Transcriptome data
453.
tree-like data structures
454.
underwater data center
455.
urban data
456.
urban data acquisition
457.
weather data
458.
web traffic data
459.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
460.
virtual data embassy
461.
Virtual Data Explorer
462.
18O data
463.
(big) data
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT