Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security of data (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/481)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Black-box separations and their adaptability to the non-uniform model
Buldas, Ahto
;
Niitsoo, Margus
Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings
2013
/
p. 152-167
https://doi.org/10.1007/978-3-642-39059-3_11
Conference Proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
2
artikkel kogumikus
A security verification template to assess cache architecture vulnerabilities
Ghasempouri, Tara
;
Raik, Jaan
;
Paul, Kolin
;
Reinbrecht, Cezar
;
Hamdioui, Said
;
Taouil, M.
2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), April 22nd – 24th 2020 Novi Sad, Serbia : Proceedings
2020
/
art. 9095707, 6 p
https://doi.org/10.1109/DDECS50862.2020.9095707
artikkel kogumikus
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
477
1.
security of data
2.
data and information security
3.
data security
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
cloud security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security monitoring
17.
cyber security monitoring in maritime
18.
cyber security strategies
19.
cyber-physical system security
20.
cyber-security
21.
development of security cameras
22.
digital security practices
23.
drinking water security
24.
economic security
25.
economic security of enterprise
26.
emotional security
27.
energy security
28.
energy security indicator
29.
Estonian information security standard
30.
graded security
31.
hardware security
32.
hardware security primitive
33.
high level of security
34.
Homeland security
35.
human security
36.
information security
37.
information security and privacy
38.
initial level of security
39.
internal security
40.
international security
41.
investment and innovation security
42.
IPv6 security
43.
IT security
44.
IT security management
45.
job security
46.
long-term security
47.
maritime cyber security
48.
maritime cyber security operations centers
49.
Maritime Security Operations Center (M-SOC)
50.
medium level of security
51.
metadata model for security measures
52.
Middle Eastern security
53.
Mobile security
54.
national cyber security strategy
55.
national security
56.
NATO. Science for Peace and Security Program
57.
network security
58.
network security monitoring
59.
OSCE (Organization for Security and Co-operation in Europe)
60.
passenger’s security
61.
policy-based routing security
62.
political and security cultures
63.
post-quantum security
64.
power system security
65.
quantitative security
66.
regional security
67.
RISC-V Security Verification
68.
Safety and Security in Sea Transportation
69.
safety and security testing
70.
security
71.
security adaptation
72.
security alert prioritization
73.
security analysis
74.
security and justice (AFSJ)
75.
Security and political science
76.
security and privacy
77.
security and privacy in smart grids
78.
Security Assertion
79.
Security Assertion Mining
80.
security closure
81.
Security Coverage
82.
security dataset
83.
security dilemma
84.
Security evaluation
85.
security evaluation instruments
86.
Security Level Evaluation
87.
Security limitations
88.
security log analysis
89.
security management
90.
security model
91.
security monitoring
92.
security notion
93.
security objectives
94.
security of supply
95.
security operation center
96.
security operations center
97.
security patterns
98.
security policy
99.
security problem definition
100.
security proof
101.
security protocols
102.
security requirements
103.
security requirements engineering
104.
security research
105.
security risk assessment
106.
security risk management
107.
security risks
108.
security science and technology
109.
security strategies
110.
security systems for military objects
111.
security testing
112.
security training
113.
security verification
114.
security-by-design
115.
social security planning
116.
societal security
117.
software security
118.
software security level
119.
software security subcharacteristics
120.
sufficient level of security
121.
system of economic security
122.
system security
123.
terrorism security
124.
transmission System Security
125.
voting privacy and security
126.
accident data
127.
adversarial data perturbation
128.
AI data centers
129.
AI-based data curation
130.
AIS data
131.
AIS data format optimization
132.
Aligned data
133.
ALS data enhancements
134.
Amazon Kinesis Data Analytics
135.
application data
136.
audio and visual data
137.
big data
138.
big data analysis
139.
big data analytics
140.
big data science
141.
big geo-data
142.
borehole data
143.
building lifecycle data
144.
call data record
145.
catalogue of data sources
146.
cellular phone data
147.
clinical data capture
148.
clinical data exchange
149.
compositional data
150.
conceptual data model
151.
construction data management
152.
consumption data
153.
control and data path tests
154.
critical data studies
155.
cross-border data exchange
156.
data
157.
data assimilation
158.
data protection
159.
data acquisition
160.
data acquisition efficiency
161.
data acquisition system
162.
data acquisition systems
163.
data aggregation
164.
data alignment
165.
Data Altruism
166.
Data Altruism Consent
167.
data analysis
168.
data analytics
169.
data analytics and machine learning
170.
data anisotropy
171.
data annotation
172.
data assimilation
173.
data attacks
174.
data augmentation
175.
data breach handling
176.
data capabilities
177.
data capture
178.
data center
179.
data center (DC)
180.
data center applications
181.
data centers
182.
data centre
183.
data centres
184.
data classification
185.
data clustering
186.
data collection
187.
data commons
188.
data compression
189.
data compression and normalization
190.
data conversion
191.
data copy
192.
data curation
193.
data curing
194.
data dictionaries
195.
data discovery
196.
Data dissemination
197.
Data distribution structure
198.
data donation
199.
Data drift
200.
data driven planning
201.
data dropouts
202.
Data Ecosystem
203.
data embassy
204.
data engineering
205.
data enrichment
206.
data envelopment analysis
207.
data ethnography
208.
data exchange
209.
data exchange framework
210.
Data exchange layers
211.
data exchange platform
212.
data experts
213.
data filtering
214.
data fitting approach
215.
data flow diagram
216.
data flow languages
217.
data flow visualization
218.
data flows
219.
data fusion
220.
data generative model
221.
data governance
222.
data governance act
223.
data harmonization
224.
data hiding
225.
data integration
226.
data integrity
227.
data intermediary
228.
data Interoperability
229.
data justice
230.
data labeling
231.
data limitations in public sector
232.
data lineage
233.
data literacy
234.
data logger
235.
data logistics
236.
data management
237.
data mappings
238.
Data Mart
239.
Data Mart (DM)
240.
data mesh
241.
data migration
242.
data mining
243.
data mining and knowledge discovery
244.
data modeling
245.
data models
246.
data modem
247.
data movements
248.
data noise
249.
data offloading
250.
data ownership
251.
data platform
252.
data privacy
253.
data processing
254.
data product
255.
data protection
256.
data publishing
257.
data quality
258.
data quality management
259.
data quality maturity model
260.
data rate
261.
data representativeness
262.
data reuse
263.
data re-use
264.
data routing
265.
data scarce environments
266.
data science
267.
data scraping
268.
data set
269.
data set generation
270.
data sets
271.
data sharing
272.
data simulation
273.
data simultaneity
274.
data sort
275.
data sources
276.
data spaces
277.
data storage
278.
data storage systems
279.
data stream mining
280.
data streams
281.
data structures
282.
data studies
283.
data subject
284.
data subjects
285.
data synthesis
286.
data to decision
287.
data types
288.
data validity
289.
data valorization
290.
data warehouse
291.
data warenhouse
292.
data visualization
293.
data-augmentation
294.
data-based computational psychiatry
295.
data-centric construction
296.
data-centric systems
297.
data-controlled circuit partition
298.
data-controlled segmentation
299.
data-driven
300.
data-driven characterization
301.
data-driven condition monitoring
302.
data-driven control
303.
Data-driven decision-making
304.
data-driven diagnostics
305.
data-driven imputation
306.
Data-driven method
307.
data-driven model
308.
data-driven modeling
309.
data-driven optimization
310.
data-driven policy
311.
data-driven public services
312.
data-driven strategic planning
313.
data-driven techniques
314.
data-exchange infrastructures
315.
data-exchange solutions
316.
data-flow architecture
317.
data‐fusion
318.
data-independent acquisition
319.
Data-information-knowledgewisdom (DIKW)
320.
data-intelligence
321.
data-mining
322.
data-science
323.
data-sharing
324.
diagnostic data
325.
digital data exchange
326.
discrete data
327.
distributed data aggregation
328.
distributed data fusion
329.
distributed data mining
330.
distributed data mining (DDM)
331.
distributional data
332.
DNA microarray data
333.
educational data mining
334.
educational data-mining
335.
empirical data
336.
enterprise data analysis
337.
European Health Data Space
338.
European Health Data Space (EHDS)
339.
eventdriven data
340.
event-driven data
341.
experimental data
342.
exploratory data analysis
343.
fair data
344.
false data injection attack
345.
field data
346.
financial data
347.
floating car data (FCD)
348.
flood data platform
349.
FMI open data
350.
functional data analysis
351.
GDPR (General Data Protection Regulation)
352.
general data protection regulation
353.
genome data
354.
global data hub
355.
GNSS-levelling data
356.
GNSS-RO data
357.
GRUAN data
358.
health data
359.
health data accessibility
360.
Health data anonymization
361.
health data custodianship
362.
health data governance
363.
health data integrity and transparency
364.
health data interoperability
365.
health data policy
366.
health data stewardship
367.
healthcare data
368.
heat meter data
369.
heterogeneous data
370.
heterogeneous sensor data
371.
high-dimensional data
372.
high-frequency data
373.
high-level test data generation
374.
historical data
375.
hyperspectral data
376.
imbalanced data
377.
implications of energy data
378.
initial data
379.
initial data for AI
380.
initial data model
381.
in-network data processing
382.
insurance data
383.
knowledge discovery and data mining
384.
linked data
385.
linked open data
386.
linked open statistical data
387.
linked data
388.
lossless data compression
389.
low-pass data filtering
390.
Master Data Management
391.
medical claims data
392.
medical data
393.
Medical Data Reuse
394.
meta-data
395.
metered data
396.
methods: data analysis
397.
microplastic data uncertainty
398.
mobile data
399.
mobile phone big data
400.
mobile phone data
401.
mobile phone usage data
402.
mobile positioning data
403.
multisource data fusion
404.
multivariate data analysis
405.
Nigeria's National data protection regulation
406.
on/off-chain data storages
407.
open data
408.
open data ecosystem
409.
open data format
410.
open data policies
411.
open government data
412.
open government data (OGD)
413.
open-data
414.
open-data platform
415.
OSM data
416.
oversharing personal data
417.
panel data
418.
parallel data processing
419.
passenger data
420.
patient-generated health data (PGHD)
421.
personal data
422.
personal data disclosure
423.
personal data processing
424.
personal data protection
425.
Personal Data Protection Act
426.
plan data
427.
point cloud data
428.
pollen data
429.
process and data modelling
430.
Product Data Management (PDM)
431.
public data-set
432.
random data
433.
real-time data
434.
real-time data collection
435.
reconstruction of gap-free data
436.
reference architecture for global health data space
437.
remote data transmission
438.
satellite data
439.
semantic data modelling
440.
semantic health data
441.
sensitive data
442.
sequential data
443.
small data machine learning
444.
small training data set
445.
smart data analytics
446.
smart meter data
447.
social media data
448.
Spatial data
449.
spatial data analysis
450.
statistical data
451.
stochastic image data
452.
structured data
453.
student data analysis
454.
supervised learning data
455.
supervisory control and data acquisition (SCADA)
456.
surrogate data
457.
sustainable data governance
458.
sustainable data storage
459.
symbolic data
460.
symbolic data analysis
461.
synthetic data
462.
temperature historical data series
463.
three-way data
464.
time-selective data fusion
465.
training data
466.
Transcriptome data
467.
tree-like data structures
468.
underwater data center
469.
urban data
470.
urban data acquisition
471.
weather data
472.
web traffic data
473.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
474.
virtual data embassy
475.
Virtual Data Explorer
476.
18O data
477.
(big) data
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT