Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
data security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
3
Vaata veel..
(2/345)
Ekspordi
ekspordi kõik päringu tulemused
(3)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
raamat
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
raamat
2
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
3
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 3, kuvan
1 - 3
võtmesõna
342
1.
data security
2.
security of data
3.
metadata model for security measures
4.
security dataset
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security strategies
17.
cyber-security
18.
development of security cameras
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
graded security
26.
hardware security
27.
hardware security primitive
28.
human security
29.
information security
30.
internal security
31.
international security
32.
investment and innovation security
33.
IPv6 security
34.
IT security
35.
IT security management
36.
job security
37.
long-term security
38.
Middle Eastern security
39.
Mobile security
40.
national cyber security strategy
41.
national security
42.
NATO. Science for Peace and Security Program
43.
network security
44.
network security monitoring
45.
OSCE (Organization for Security and Co-operation in Europe)
46.
passenger’s security
47.
policy-based routing security
48.
political and security cultures
49.
post-quantum security
50.
power system security
51.
quantitative security
52.
regional security
53.
RISC-V Security Verification
54.
security
55.
security and privacy
56.
security and privacy in smart grids
57.
Security Assertion Mining
58.
security closure
59.
Security Coverage
60.
security dilemma
61.
Security evaluation
62.
security log analysis
63.
security management
64.
security model
65.
security monitoring
66.
security notion
67.
security objectives
68.
security of supply
69.
security operation center
70.
security patterns
71.
security problem definition
72.
security proof
73.
security protocols
74.
security requirements
75.
security requirements engineering
76.
security risk assessment
77.
security risk management
78.
security strategies
79.
security systems for military objects
80.
security testing
81.
security training
82.
security verification
83.
social security planning
84.
societal security
85.
system of economic security
86.
system security
87.
terrorism security
88.
transmission System Security
89.
voting privacy and security
90.
accident data
91.
adversarial data perturbation
92.
AIS data
93.
Aligned data
94.
ALS data enhancements
95.
application data
96.
audio and visual data
97.
big data
98.
big data analysis
99.
big data analytics
100.
borehole data
101.
building lifecycle data
102.
call data record
103.
clinical data capture
104.
conceptual data model
105.
control and data path tests
106.
critical data studies
107.
cross-border data exchange
108.
data
109.
data assimilation
110.
data protection
111.
data acquisition
112.
data acquisition system
113.
data acquisition systems
114.
data aggregation
115.
data alignment
116.
data analysis
117.
data analytics
118.
data anisotropy
119.
data annotation
120.
data assimilation
121.
data attacks
122.
data augmentation
123.
data capabilities
124.
data capture
125.
data center
126.
data center (DC)
127.
data centers
128.
data centre
129.
data centres
130.
data classification
131.
data clustering
132.
data collection
133.
data commons
134.
data compression
135.
data conversion
136.
data copy
137.
data dictionaries
138.
data discovery
139.
Data dissemination
140.
Data distribution structure
141.
Data drift
142.
data driven planning
143.
data embassy
144.
data engineering
145.
data envelopment analysis
146.
data ethnography
147.
data exchange
148.
data exchange framework
149.
Data exchange layers
150.
data exchange platform
151.
data experts
152.
data filtering
153.
data flow languages
154.
data flow visualization
155.
data fusion
156.
data generative model
157.
data governance
158.
data integration
159.
data integrity
160.
data justice
161.
data lineage
162.
data logger
163.
data logistics
164.
data management
165.
data mappings
166.
Data Mart
167.
data mesh
168.
data mining
169.
data modeling
170.
data models
171.
data modem
172.
data noise
173.
data offloading
174.
data ownership
175.
data platform
176.
data privacy
177.
data processing
178.
data product
179.
data protection
180.
data quality
181.
data quality management
182.
data quality maturity model
183.
data rate
184.
data reuse
185.
data re-use
186.
data routing
187.
data science
188.
data scraping
189.
data sets
190.
data sharing
191.
data simulation
192.
data simultaneity
193.
data sort
194.
data sources
195.
data storage
196.
data storage systems
197.
data stream mining
198.
data streams
199.
data studies
200.
data subject
201.
data synthesis
202.
data to decision
203.
data types
204.
data validity
205.
data valorization
206.
data warehouse
207.
data warenhouse
208.
data visualization
209.
data-based computational psychiatry
210.
data-centric construction
211.
data-centric systems
212.
data-controlled circuit partition
213.
data-controlled segmentation
214.
data-driven
215.
data-driven characterization
216.
Data-driven method
217.
data-driven modeling
218.
data-exchange infrastructures
219.
data-exchange solutions
220.
data‐fusion
221.
data-independent acquisition
222.
Data-information-knowledgewisdom (DIKW)
223.
data-intelligence
224.
data-mining
225.
data-science
226.
diagnostic data
227.
digital data exchange
228.
discrete data
229.
distributed data aggregation
230.
distributed data fusion
231.
distributed data mining
232.
distributed data mining (DDM)
233.
DNA microarray data
234.
educational data mining
235.
eventdriven data
236.
event-driven data
237.
experimental data
238.
exploratory data analysis
239.
false data injection attack
240.
False data injection attack; Machine learning; Matlab; Python; State estimation; Sudden load change
241.
field data
242.
financial data
243.
floating car data (FCD)
244.
FMI open data
245.
functional data analysis
246.
GDPR (General Data Protection Regulation)
247.
general data protection regulation
248.
global data hub
249.
GNSS-levelling data
250.
health data
251.
Health data anonymization
252.
health data interoperability
253.
healthcare data
254.
heterogeneous sensor data
255.
high-dimensional data
256.
high-frequency data
257.
high-level test data generation
258.
historical data
259.
hyperspectral data
260.
imbalanced data
261.
implications of energy data
262.
initial data
263.
in-network data processing
264.
insurance data
265.
knowledge discovery and data mining
266.
linked data
267.
linked open data
268.
linked open statistical data
269.
linked data
270.
lossless data compression
271.
low-pass data filtering
272.
Master Data Management
273.
medical claims data
274.
medical data
275.
Medical Data Reuse
276.
meta-data
277.
microplastic data uncertainty
278.
mobile data
279.
mobile phone big data
280.
mobile phone data
281.
mobile phone usage data
282.
mobile positioning data
283.
multisource data fusion
284.
multivariate data analysis
285.
Nigeria's National data protection regulation
286.
open data
287.
open data ecosystem
288.
open data format
289.
open data policies
290.
open government data
291.
open government data (OGD)
292.
OSM data
293.
oversharing personal data
294.
panel data
295.
parallel data processing
296.
passenger data
297.
personal data
298.
personal data disclosure
299.
personal data processing
300.
personal data protection
301.
Personal Data Protection Act
302.
plan data
303.
point cloud data
304.
pollen data
305.
process and data modelling
306.
public data-set
307.
real-time data
308.
reconstruction of gap-free data
309.
remote data transmission
310.
satellite data
311.
semantic health data
312.
sequential data
313.
small data machine learning
314.
smart data analytics
315.
smart meter data
316.
social media data
317.
Spatial data
318.
spatial data analysis
319.
statistical data
320.
stochastic image data
321.
structured data
322.
student data analysis
323.
supervised learning data
324.
supervisory control and data acquisition (SCADA)
325.
surrogate data
326.
sustainable data governance
327.
symbolic data
328.
symbolic data analysis
329.
synthetic data
330.
time-selective data fusion
331.
training data
332.
Transcriptome data
333.
tree-like data structures
334.
urban data
335.
urban data acquisition
336.
weather data
337.
web traffic data
338.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
339.
virtual data embassy
340.
Virtual Data Explorer
341.
18O data
342.
(big) data
märksõna
3
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Greenergy Data Centers
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT