Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security of data (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/465)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Black-box separations and their adaptability to the non-uniform model
Buldas, Ahto
;
Niitsoo, Margus
Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings
2013
/
p. 152-167
https://doi.org/10.1007/978-3-642-39059-3_11
Conference Proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
2
artikkel kogumikus
A security verification template to assess cache architecture vulnerabilities
Ghasempouri, Tara
;
Raik, Jaan
;
Paul, Kolin
;
Reinbrecht, Cezar
;
Hamdioui, Said
;
Taouil, M.
2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), April 22nd – 24th 2020 Novi Sad, Serbia : Proceedings
2020
/
art. 9095707, 6 p
https://doi.org/10.1109/DDECS50862.2020.9095707
artikkel kogumikus
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
461
1.
security of data
2.
data and information security
3.
data security
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security strategies
17.
cyber-security
18.
development of security cameras
19.
digital security practices
20.
drinking water security
21.
economic security
22.
economic security of enterprise
23.
emotional security
24.
energy security
25.
energy security indicator
26.
Estonian information security standard
27.
graded security
28.
hardware security
29.
hardware security primitive
30.
high level of security
31.
Homeland security
32.
human security
33.
information security
34.
information security and privacy
35.
initial level of security
36.
internal security
37.
international security
38.
investment and innovation security
39.
IPv6 security
40.
IT security
41.
IT security management
42.
job security
43.
long-term security
44.
maritime cyber security
45.
maritime cyber security operations centers
46.
Maritime Security Operations Center (M-SOC)
47.
medium level of security
48.
metadata model for security measures
49.
Middle Eastern security
50.
Mobile security
51.
national cyber security strategy
52.
national security
53.
NATO. Science for Peace and Security Program
54.
network security
55.
network security monitoring
56.
OSCE (Organization for Security and Co-operation in Europe)
57.
passenger’s security
58.
policy-based routing security
59.
political and security cultures
60.
post-quantum security
61.
power system security
62.
quantitative security
63.
regional security
64.
RISC-V Security Verification
65.
Safety and Security in Sea Transportation
66.
safety and security testing
67.
security
68.
security adaptation
69.
security alert prioritization
70.
security analysis
71.
security and justice (AFSJ)
72.
Security and political science
73.
security and privacy
74.
security and privacy in smart grids
75.
Security Assertion Mining
76.
security closure
77.
Security Coverage
78.
security dataset
79.
security dilemma
80.
Security evaluation
81.
security evaluation instruments
82.
Security limitations
83.
security log analysis
84.
security management
85.
security model
86.
security monitoring
87.
security notion
88.
security objectives
89.
security of supply
90.
security operation center
91.
security operations center
92.
security patterns
93.
security policy
94.
security problem definition
95.
security proof
96.
security protocols
97.
security requirements
98.
security requirements engineering
99.
security research
100.
security risk assessment
101.
security risk management
102.
security risks
103.
security science and technology
104.
security strategies
105.
security systems for military objects
106.
security testing
107.
security training
108.
security verification
109.
security-by-design
110.
social security planning
111.
societal security
112.
software security
113.
software security level
114.
software security subcharacteristics
115.
sufficient level of security
116.
system of economic security
117.
system security
118.
terrorism security
119.
transmission System Security
120.
voting privacy and security
121.
accident data
122.
adversarial data perturbation
123.
AI-based data curation
124.
AIS data
125.
AIS data format optimization
126.
Aligned data
127.
ALS data enhancements
128.
Amazon Kinesis Data Analytics
129.
application data
130.
audio and visual data
131.
big data
132.
big data analysis
133.
big data analytics
134.
big data science
135.
big geo-data
136.
borehole data
137.
building lifecycle data
138.
call data record
139.
catalogue of data sources
140.
cellular phone data
141.
clinical data capture
142.
clinical data exchange
143.
compositional data
144.
conceptual data model
145.
construction data management
146.
control and data path tests
147.
critical data studies
148.
cross-border data exchange
149.
data
150.
data assimilation
151.
data protection
152.
data acquisition
153.
data acquisition system
154.
data acquisition systems
155.
data aggregation
156.
data alignment
157.
Data Altruism
158.
Data Altruism Consent
159.
data analysis
160.
data analytics
161.
data analytics and machine learning
162.
data anisotropy
163.
data annotation
164.
data assimilation
165.
data attacks
166.
data augmentation
167.
data breach handling
168.
data capabilities
169.
data capture
170.
data center
171.
data center (DC)
172.
data center applications
173.
data centers
174.
data centre
175.
data centres
176.
data classification
177.
data clustering
178.
data collection
179.
data commons
180.
data compression
181.
data compression and normalization
182.
data conversion
183.
data copy
184.
data curation
185.
data curing
186.
data dictionaries
187.
data discovery
188.
Data dissemination
189.
Data distribution structure
190.
data donation
191.
Data drift
192.
data driven planning
193.
data dropouts
194.
Data Ecosystem
195.
data embassy
196.
data engineering
197.
data enrichment
198.
data envelopment analysis
199.
data ethnography
200.
data exchange
201.
data exchange framework
202.
Data exchange layers
203.
data exchange platform
204.
data experts
205.
data filtering
206.
data fitting approach
207.
data flow languages
208.
data flow visualization
209.
data flows
210.
data fusion
211.
data generative model
212.
data governance
213.
data governance act
214.
data harmonization
215.
data hiding
216.
data integration
217.
data integrity
218.
data intermediary
219.
data Interoperability
220.
data justice
221.
data labeling
222.
data limitations in public sector
223.
data lineage
224.
data literacy
225.
data logger
226.
data logistics
227.
data management
228.
data mappings
229.
Data Mart
230.
Data Mart (DM)
231.
data mesh
232.
data migration
233.
data mining
234.
data mining and knowledge discovery
235.
data modeling
236.
data models
237.
data modem
238.
data movements
239.
data noise
240.
data offloading
241.
data ownership
242.
data platform
243.
data privacy
244.
data processing
245.
data product
246.
data protection
247.
data publishing
248.
data quality
249.
data quality management
250.
data quality maturity model
251.
data rate
252.
data representativeness
253.
data reuse
254.
data re-use
255.
data routing
256.
data scarce environments
257.
data science
258.
data scraping
259.
data set
260.
data set generation
261.
data sets
262.
data sharing
263.
data simulation
264.
data simultaneity
265.
data sort
266.
data sources
267.
data spaces
268.
data storage
269.
data storage systems
270.
data stream mining
271.
data streams
272.
data structures
273.
data studies
274.
data subject
275.
data subjects
276.
data synthesis
277.
data to decision
278.
data types
279.
data validity
280.
data valorization
281.
data warehouse
282.
data warenhouse
283.
data visualization
284.
data-augmentation
285.
data-based computational psychiatry
286.
data-centric construction
287.
data-centric systems
288.
data-controlled circuit partition
289.
data-controlled segmentation
290.
data-driven
291.
data-driven characterization
292.
data-driven condition monitoring
293.
data-driven control
294.
Data-driven decision-making
295.
data-driven imputation
296.
Data-driven method
297.
data-driven model
298.
data-driven modeling
299.
data-driven optimization
300.
data-driven policy
301.
data-driven public services
302.
data-driven techniques
303.
data-exchange infrastructures
304.
data-exchange solutions
305.
data-flow architecture
306.
data‐fusion
307.
data-independent acquisition
308.
Data-information-knowledgewisdom (DIKW)
309.
data-intelligence
310.
data-mining
311.
data-science
312.
data-sharing
313.
diagnostic data
314.
digital data exchange
315.
discrete data
316.
distributed data aggregation
317.
distributed data fusion
318.
distributed data mining
319.
distributed data mining (DDM)
320.
distributional data
321.
DNA microarray data
322.
educational data mining
323.
educational data-mining
324.
enterprise data analysis
325.
European Health Data Space
326.
European Health Data Space (EHDS)
327.
eventdriven data
328.
event-driven data
329.
experimental data
330.
exploratory data analysis
331.
fair data
332.
false data injection attack
333.
field data
334.
financial data
335.
floating car data (FCD)
336.
flood data platform
337.
FMI open data
338.
functional data analysis
339.
GDPR (General Data Protection Regulation)
340.
general data protection regulation
341.
genome data
342.
global data hub
343.
GNSS-levelling data
344.
GNSS-RO data
345.
GRUAN data
346.
health data
347.
health data accessibility
348.
Health data anonymization
349.
health data custodianship
350.
health data governance
351.
health data integrity and transparency
352.
health data interoperability
353.
health data policy
354.
health data stewardship
355.
healthcare data
356.
heterogeneous sensor data
357.
high-dimensional data
358.
high-frequency data
359.
high-level test data generation
360.
historical data
361.
hyperspectral data
362.
imbalanced data
363.
implications of energy data
364.
initial data
365.
initial data for AI
366.
initial data model
367.
in-network data processing
368.
insurance data
369.
knowledge discovery and data mining
370.
linked data
371.
linked open data
372.
linked open statistical data
373.
linked data
374.
lossless data compression
375.
low-pass data filtering
376.
Master Data Management
377.
medical claims data
378.
medical data
379.
Medical Data Reuse
380.
meta-data
381.
metered data
382.
methods: data analysis
383.
microplastic data uncertainty
384.
mobile data
385.
mobile phone big data
386.
mobile phone data
387.
mobile phone usage data
388.
mobile positioning data
389.
multisource data fusion
390.
multivariate data analysis
391.
Nigeria's National data protection regulation
392.
open data
393.
open data ecosystem
394.
open data format
395.
open data policies
396.
open government data
397.
open government data (OGD)
398.
open-data
399.
open-data platform
400.
OSM data
401.
oversharing personal data
402.
panel data
403.
parallel data processing
404.
passenger data
405.
patient-generated health data (PGHD)
406.
personal data
407.
personal data disclosure
408.
personal data processing
409.
personal data protection
410.
Personal Data Protection Act
411.
plan data
412.
point cloud data
413.
pollen data
414.
process and data modelling
415.
Product Data Management (PDM)
416.
public data-set
417.
random data
418.
real-time data
419.
real-time data collection
420.
reconstruction of gap-free data
421.
reference architecture for global health data space
422.
remote data transmission
423.
satellite data
424.
semantic data modelling
425.
semantic health data
426.
sequential data
427.
small data machine learning
428.
small training data set
429.
smart data analytics
430.
smart meter data
431.
social media data
432.
Spatial data
433.
spatial data analysis
434.
statistical data
435.
stochastic image data
436.
structured data
437.
student data analysis
438.
supervised learning data
439.
supervisory control and data acquisition (SCADA)
440.
surrogate data
441.
sustainable data governance
442.
sustainable data storage
443.
symbolic data
444.
symbolic data analysis
445.
synthetic data
446.
temperature historical data series
447.
three-way data
448.
time-selective data fusion
449.
training data
450.
Transcriptome data
451.
tree-like data structures
452.
underwater data center
453.
urban data
454.
urban data acquisition
455.
weather data
456.
web traffic data
457.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
458.
virtual data embassy
459.
Virtual Data Explorer
460.
18O data
461.
(big) data
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT