Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security of data (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/467)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Black-box separations and their adaptability to the non-uniform model
Buldas, Ahto
;
Niitsoo, Margus
Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings
2013
/
p. 152-167
https://doi.org/10.1007/978-3-642-39059-3_11
Conference Proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
2
artikkel kogumikus
A security verification template to assess cache architecture vulnerabilities
Ghasempouri, Tara
;
Raik, Jaan
;
Paul, Kolin
;
Reinbrecht, Cezar
;
Hamdioui, Said
;
Taouil, M.
2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), April 22nd – 24th 2020 Novi Sad, Serbia : Proceedings
2020
/
art. 9095707, 6 p
https://doi.org/10.1109/DDECS50862.2020.9095707
artikkel kogumikus
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
463
1.
security of data
2.
data and information security
3.
data security
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security strategies
17.
cyber-security
18.
development of security cameras
19.
digital security practices
20.
drinking water security
21.
economic security
22.
economic security of enterprise
23.
emotional security
24.
energy security
25.
energy security indicator
26.
Estonian information security standard
27.
graded security
28.
hardware security
29.
hardware security primitive
30.
high level of security
31.
Homeland security
32.
human security
33.
information security
34.
information security and privacy
35.
initial level of security
36.
internal security
37.
international security
38.
investment and innovation security
39.
IPv6 security
40.
IT security
41.
IT security management
42.
job security
43.
long-term security
44.
maritime cyber security
45.
maritime cyber security operations centers
46.
Maritime Security Operations Center (M-SOC)
47.
medium level of security
48.
metadata model for security measures
49.
Middle Eastern security
50.
Mobile security
51.
national cyber security strategy
52.
national security
53.
NATO. Science for Peace and Security Program
54.
network security
55.
network security monitoring
56.
OSCE (Organization for Security and Co-operation in Europe)
57.
passenger’s security
58.
policy-based routing security
59.
political and security cultures
60.
post-quantum security
61.
power system security
62.
quantitative security
63.
regional security
64.
RISC-V Security Verification
65.
Safety and Security in Sea Transportation
66.
safety and security testing
67.
security
68.
security adaptation
69.
security alert prioritization
70.
security analysis
71.
security and justice (AFSJ)
72.
Security and political science
73.
security and privacy
74.
security and privacy in smart grids
75.
Security Assertion Mining
76.
security closure
77.
Security Coverage
78.
security dataset
79.
security dilemma
80.
Security evaluation
81.
security evaluation instruments
82.
Security limitations
83.
security log analysis
84.
security management
85.
security model
86.
security monitoring
87.
security notion
88.
security objectives
89.
security of supply
90.
security operation center
91.
security operations center
92.
security patterns
93.
security policy
94.
security problem definition
95.
security proof
96.
security protocols
97.
security requirements
98.
security requirements engineering
99.
security research
100.
security risk assessment
101.
security risk management
102.
security risks
103.
security science and technology
104.
security strategies
105.
security systems for military objects
106.
security testing
107.
security training
108.
security verification
109.
security-by-design
110.
social security planning
111.
societal security
112.
software security
113.
software security level
114.
software security subcharacteristics
115.
sufficient level of security
116.
system of economic security
117.
system security
118.
terrorism security
119.
transmission System Security
120.
voting privacy and security
121.
accident data
122.
adversarial data perturbation
123.
AI-based data curation
124.
AIS data
125.
AIS data format optimization
126.
Aligned data
127.
ALS data enhancements
128.
Amazon Kinesis Data Analytics
129.
application data
130.
audio and visual data
131.
big data
132.
big data analysis
133.
big data analytics
134.
big data science
135.
big geo-data
136.
borehole data
137.
building lifecycle data
138.
call data record
139.
catalogue of data sources
140.
cellular phone data
141.
clinical data capture
142.
clinical data exchange
143.
compositional data
144.
conceptual data model
145.
construction data management
146.
consumption data
147.
control and data path tests
148.
critical data studies
149.
cross-border data exchange
150.
data
151.
data assimilation
152.
data protection
153.
data acquisition
154.
data acquisition system
155.
data acquisition systems
156.
data aggregation
157.
data alignment
158.
Data Altruism
159.
Data Altruism Consent
160.
data analysis
161.
data analytics
162.
data analytics and machine learning
163.
data anisotropy
164.
data annotation
165.
data assimilation
166.
data attacks
167.
data augmentation
168.
data breach handling
169.
data capabilities
170.
data capture
171.
data center
172.
data center (DC)
173.
data center applications
174.
data centers
175.
data centre
176.
data centres
177.
data classification
178.
data clustering
179.
data collection
180.
data commons
181.
data compression
182.
data compression and normalization
183.
data conversion
184.
data copy
185.
data curation
186.
data curing
187.
data dictionaries
188.
data discovery
189.
Data dissemination
190.
Data distribution structure
191.
data donation
192.
Data drift
193.
data driven planning
194.
data dropouts
195.
Data Ecosystem
196.
data embassy
197.
data engineering
198.
data enrichment
199.
data envelopment analysis
200.
data ethnography
201.
data exchange
202.
data exchange framework
203.
Data exchange layers
204.
data exchange platform
205.
data experts
206.
data filtering
207.
data fitting approach
208.
data flow languages
209.
data flow visualization
210.
data flows
211.
data fusion
212.
data generative model
213.
data governance
214.
data governance act
215.
data harmonization
216.
data hiding
217.
data integration
218.
data integrity
219.
data intermediary
220.
data Interoperability
221.
data justice
222.
data labeling
223.
data limitations in public sector
224.
data lineage
225.
data literacy
226.
data logger
227.
data logistics
228.
data management
229.
data mappings
230.
Data Mart
231.
Data Mart (DM)
232.
data mesh
233.
data migration
234.
data mining
235.
data mining and knowledge discovery
236.
data modeling
237.
data models
238.
data modem
239.
data movements
240.
data noise
241.
data offloading
242.
data ownership
243.
data platform
244.
data privacy
245.
data processing
246.
data product
247.
data protection
248.
data publishing
249.
data quality
250.
data quality management
251.
data quality maturity model
252.
data rate
253.
data representativeness
254.
data reuse
255.
data re-use
256.
data routing
257.
data scarce environments
258.
data science
259.
data scraping
260.
data set
261.
data set generation
262.
data sets
263.
data sharing
264.
data simulation
265.
data simultaneity
266.
data sort
267.
data sources
268.
data spaces
269.
data storage
270.
data storage systems
271.
data stream mining
272.
data streams
273.
data structures
274.
data studies
275.
data subject
276.
data subjects
277.
data synthesis
278.
data to decision
279.
data types
280.
data validity
281.
data valorization
282.
data warehouse
283.
data warenhouse
284.
data visualization
285.
data-augmentation
286.
data-based computational psychiatry
287.
data-centric construction
288.
data-centric systems
289.
data-controlled circuit partition
290.
data-controlled segmentation
291.
data-driven
292.
data-driven characterization
293.
data-driven condition monitoring
294.
data-driven control
295.
Data-driven decision-making
296.
data-driven imputation
297.
Data-driven method
298.
data-driven model
299.
data-driven modeling
300.
data-driven optimization
301.
data-driven policy
302.
data-driven public services
303.
data-driven techniques
304.
data-exchange infrastructures
305.
data-exchange solutions
306.
data-flow architecture
307.
data‐fusion
308.
data-independent acquisition
309.
Data-information-knowledgewisdom (DIKW)
310.
data-intelligence
311.
data-mining
312.
data-science
313.
data-sharing
314.
diagnostic data
315.
digital data exchange
316.
discrete data
317.
distributed data aggregation
318.
distributed data fusion
319.
distributed data mining
320.
distributed data mining (DDM)
321.
distributional data
322.
DNA microarray data
323.
educational data mining
324.
educational data-mining
325.
empirical data
326.
enterprise data analysis
327.
European Health Data Space
328.
European Health Data Space (EHDS)
329.
eventdriven data
330.
event-driven data
331.
experimental data
332.
exploratory data analysis
333.
fair data
334.
false data injection attack
335.
field data
336.
financial data
337.
floating car data (FCD)
338.
flood data platform
339.
FMI open data
340.
functional data analysis
341.
GDPR (General Data Protection Regulation)
342.
general data protection regulation
343.
genome data
344.
global data hub
345.
GNSS-levelling data
346.
GNSS-RO data
347.
GRUAN data
348.
health data
349.
health data accessibility
350.
Health data anonymization
351.
health data custodianship
352.
health data governance
353.
health data integrity and transparency
354.
health data interoperability
355.
health data policy
356.
health data stewardship
357.
healthcare data
358.
heterogeneous sensor data
359.
high-dimensional data
360.
high-frequency data
361.
high-level test data generation
362.
historical data
363.
hyperspectral data
364.
imbalanced data
365.
implications of energy data
366.
initial data
367.
initial data for AI
368.
initial data model
369.
in-network data processing
370.
insurance data
371.
knowledge discovery and data mining
372.
linked data
373.
linked open data
374.
linked open statistical data
375.
linked data
376.
lossless data compression
377.
low-pass data filtering
378.
Master Data Management
379.
medical claims data
380.
medical data
381.
Medical Data Reuse
382.
meta-data
383.
metered data
384.
methods: data analysis
385.
microplastic data uncertainty
386.
mobile data
387.
mobile phone big data
388.
mobile phone data
389.
mobile phone usage data
390.
mobile positioning data
391.
multisource data fusion
392.
multivariate data analysis
393.
Nigeria's National data protection regulation
394.
open data
395.
open data ecosystem
396.
open data format
397.
open data policies
398.
open government data
399.
open government data (OGD)
400.
open-data
401.
open-data platform
402.
OSM data
403.
oversharing personal data
404.
panel data
405.
parallel data processing
406.
passenger data
407.
patient-generated health data (PGHD)
408.
personal data
409.
personal data disclosure
410.
personal data processing
411.
personal data protection
412.
Personal Data Protection Act
413.
plan data
414.
point cloud data
415.
pollen data
416.
process and data modelling
417.
Product Data Management (PDM)
418.
public data-set
419.
random data
420.
real-time data
421.
real-time data collection
422.
reconstruction of gap-free data
423.
reference architecture for global health data space
424.
remote data transmission
425.
satellite data
426.
semantic data modelling
427.
semantic health data
428.
sequential data
429.
small data machine learning
430.
small training data set
431.
smart data analytics
432.
smart meter data
433.
social media data
434.
Spatial data
435.
spatial data analysis
436.
statistical data
437.
stochastic image data
438.
structured data
439.
student data analysis
440.
supervised learning data
441.
supervisory control and data acquisition (SCADA)
442.
surrogate data
443.
sustainable data governance
444.
sustainable data storage
445.
symbolic data
446.
symbolic data analysis
447.
synthetic data
448.
temperature historical data series
449.
three-way data
450.
time-selective data fusion
451.
training data
452.
Transcriptome data
453.
tree-like data structures
454.
underwater data center
455.
urban data
456.
urban data acquisition
457.
weather data
458.
web traffic data
459.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
460.
virtual data embassy
461.
Virtual Data Explorer
462.
18O data
463.
(big) data
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT