Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
data security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
3
Vaata veel..
(2/378)
Ekspordi
ekspordi kõik päringu tulemused
(3)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
raamat
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
raamat
2
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
3
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 3, kuvan
1 - 3
võtmesõna
375
1.
data security
2.
security of data
3.
metadata model for security measures
4.
security dataset
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security strategies
17.
cyber-security
18.
development of security cameras
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
Estonian information security standard
26.
graded security
27.
hardware security
28.
hardware security primitive
29.
human security
30.
information security
31.
internal security
32.
international security
33.
investment and innovation security
34.
IPv6 security
35.
IT security
36.
IT security management
37.
job security
38.
long-term security
39.
Middle Eastern security
40.
Mobile security
41.
national cyber security strategy
42.
national security
43.
NATO. Science for Peace and Security Program
44.
network security
45.
network security monitoring
46.
OSCE (Organization for Security and Co-operation in Europe)
47.
passenger’s security
48.
policy-based routing security
49.
political and security cultures
50.
post-quantum security
51.
power system security
52.
quantitative security
53.
regional security
54.
RISC-V Security Verification
55.
safety and security testing
56.
security
57.
security adaptation
58.
security alert prioritization
59.
security analysis
60.
security and justice (AFSJ)
61.
security and privacy
62.
security and privacy in smart grids
63.
Security Assertion Mining
64.
security closure
65.
Security Coverage
66.
security dilemma
67.
Security evaluation
68.
security evaluation instruments
69.
security log analysis
70.
security management
71.
security model
72.
security monitoring
73.
security notion
74.
security objectives
75.
security of supply
76.
security operation center
77.
security operations center
78.
security patterns
79.
security policy
80.
security problem definition
81.
security proof
82.
security protocols
83.
security requirements
84.
security requirements engineering
85.
security risk assessment
86.
security risk management
87.
security strategies
88.
security systems for military objects
89.
security testing
90.
security training
91.
security verification
92.
security-by-design
93.
social security planning
94.
societal security
95.
system of economic security
96.
system security
97.
terrorism security
98.
transmission System Security
99.
voting privacy and security
100.
accident data
101.
adversarial data perturbation
102.
AI-based data curation
103.
AIS data
104.
Aligned data
105.
ALS data enhancements
106.
Amazon Kinesis Data Analytics
107.
application data
108.
audio and visual data
109.
big data
110.
big data analysis
111.
big data analytics
112.
borehole data
113.
building lifecycle data
114.
call data record
115.
catalogue of data sources
116.
clinical data capture
117.
clinical data exchange
118.
compositional data
119.
conceptual data model
120.
control and data path tests
121.
critical data studies
122.
cross-border data exchange
123.
data
124.
data assimilation
125.
data protection
126.
data acquisition
127.
data acquisition system
128.
data acquisition systems
129.
data aggregation
130.
data alignment
131.
data analysis
132.
data analytics
133.
data anisotropy
134.
data annotation
135.
data assimilation
136.
data attacks
137.
data augmentation
138.
data capabilities
139.
data capture
140.
data center
141.
data center (DC)
142.
data centers
143.
data centre
144.
data centres
145.
data classification
146.
data clustering
147.
data collection
148.
data commons
149.
data compression
150.
data conversion
151.
data copy
152.
data dictionaries
153.
data discovery
154.
Data dissemination
155.
Data distribution structure
156.
Data drift
157.
data driven planning
158.
data embassy
159.
data engineering
160.
data envelopment analysis
161.
data ethnography
162.
data exchange
163.
data exchange framework
164.
Data exchange layers
165.
data exchange platform
166.
data experts
167.
data filtering
168.
data fitting approach
169.
data flow languages
170.
data flow visualization
171.
data fusion
172.
data generative model
173.
data governance
174.
data integration
175.
data integrity
176.
data intermediary
177.
data justice
178.
data labeling
179.
data lineage
180.
data logger
181.
data logistics
182.
data management
183.
data mappings
184.
Data Mart
185.
data mesh
186.
data mining
187.
data modeling
188.
data models
189.
data modem
190.
data noise
191.
data offloading
192.
data ownership
193.
data platform
194.
data privacy
195.
data processing
196.
data product
197.
data protection
198.
data quality
199.
data quality management
200.
data quality maturity model
201.
data rate
202.
data reuse
203.
data re-use
204.
data routing
205.
data science
206.
data scraping
207.
data set generation
208.
data sets
209.
data sharing
210.
data simulation
211.
data simultaneity
212.
data sort
213.
data sources
214.
data storage
215.
data storage systems
216.
data stream mining
217.
data streams
218.
data studies
219.
data subject
220.
data synthesis
221.
data to decision
222.
data types
223.
data validity
224.
data valorization
225.
data warehouse
226.
data warenhouse
227.
data visualization
228.
data-based computational psychiatry
229.
data-centric construction
230.
data-centric systems
231.
data-controlled circuit partition
232.
data-controlled segmentation
233.
data-driven
234.
data-driven characterization
235.
Data-driven method
236.
data-driven modeling
237.
data-exchange infrastructures
238.
data-exchange solutions
239.
data‐fusion
240.
data-independent acquisition
241.
Data-information-knowledgewisdom (DIKW)
242.
data-intelligence
243.
data-mining
244.
data-science
245.
diagnostic data
246.
digital data exchange
247.
discrete data
248.
distributed data aggregation
249.
distributed data fusion
250.
distributed data mining
251.
distributed data mining (DDM)
252.
DNA microarray data
253.
educational data mining
254.
enterprise data analysis
255.
European Health Data Space
256.
European Health Data Space (EHDS)
257.
eventdriven data
258.
event-driven data
259.
experimental data
260.
exploratory data analysis
261.
false data injection attack
262.
field data
263.
financial data
264.
floating car data (FCD)
265.
flood data platform
266.
FMI open data
267.
functional data analysis
268.
GDPR (General Data Protection Regulation)
269.
general data protection regulation
270.
genome data
271.
global data hub
272.
GNSS-levelling data
273.
health data
274.
health data accessibility
275.
Health data anonymization
276.
health data custodianship
277.
health data governance
278.
health data interoperability
279.
health data policy
280.
health data stewardship
281.
healthcare data
282.
heterogeneous sensor data
283.
high-dimensional data
284.
high-frequency data
285.
high-level test data generation
286.
historical data
287.
hyperspectral data
288.
imbalanced data
289.
implications of energy data
290.
initial data
291.
in-network data processing
292.
insurance data
293.
knowledge discovery and data mining
294.
linked data
295.
linked open data
296.
linked open statistical data
297.
linked data
298.
lossless data compression
299.
low-pass data filtering
300.
Master Data Management
301.
medical claims data
302.
medical data
303.
Medical Data Reuse
304.
meta-data
305.
metered data
306.
microplastic data uncertainty
307.
mobile data
308.
mobile phone big data
309.
mobile phone data
310.
mobile phone usage data
311.
mobile positioning data
312.
multisource data fusion
313.
multivariate data analysis
314.
Nigeria's National data protection regulation
315.
open data
316.
open data ecosystem
317.
open data format
318.
open data policies
319.
open government data
320.
open government data (OGD)
321.
OSM data
322.
oversharing personal data
323.
panel data
324.
parallel data processing
325.
passenger data
326.
patient-generated health data (PGHD)
327.
personal data
328.
personal data disclosure
329.
personal data processing
330.
personal data protection
331.
Personal Data Protection Act
332.
plan data
333.
point cloud data
334.
pollen data
335.
process and data modelling
336.
public data-set
337.
random data
338.
real-time data
339.
reconstruction of gap-free data
340.
reference architecture for global health data space
341.
remote data transmission
342.
satellite data
343.
semantic health data
344.
sequential data
345.
small data machine learning
346.
small training data set
347.
smart data analytics
348.
smart meter data
349.
social media data
350.
Spatial data
351.
spatial data analysis
352.
statistical data
353.
stochastic image data
354.
structured data
355.
student data analysis
356.
supervised learning data
357.
supervisory control and data acquisition (SCADA)
358.
surrogate data
359.
sustainable data governance
360.
symbolic data
361.
symbolic data analysis
362.
synthetic data
363.
time-selective data fusion
364.
training data
365.
Transcriptome data
366.
tree-like data structures
367.
urban data
368.
urban data acquisition
369.
weather data
370.
web traffic data
371.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
372.
virtual data embassy
373.
Virtual Data Explorer
374.
18O data
375.
(big) data
märksõna
3
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Greenergy Data Centers
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT