Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
data security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
3
Vaata veel..
(2/318)
Ekspordi
ekspordi kõik päringu tulemused
(3)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
raamat
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
raamat
2
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
3
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 3, kuvan
1 - 3
võtmesõna
315
1.
data security
2.
security of data
3.
metadata model for security measures
4.
security dataset
5.
ad-hoc sensor networks security
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security strategies
16.
cyber-security
17.
development of security cameras
18.
drinking water security
19.
economic security
20.
economic security of enterprise
21.
emotional security
22.
energy security
23.
energy security indicator
24.
graded security
25.
hardware security
26.
hardware security primitive
27.
human security
28.
information security
29.
internal security
30.
international security
31.
investment and innovation security
32.
IPv6 security
33.
IT security
34.
job security
35.
long-term security
36.
Middle Eastern security
37.
Mobile security
38.
national cyber security strategy
39.
national security
40.
NATO. Science for Peace and Security Program
41.
network security
42.
network security monitoring
43.
OSCE (Organization for Security and Co-operation in Europe)
44.
passenger’s security
45.
policy-based routing security
46.
political and security cultures
47.
post-quantum security
48.
power system security
49.
quantitative security
50.
regional security
51.
security
52.
security and privacy
53.
security and privacy in smart grids
54.
security closure
55.
Security Coverage
56.
security dilemma
57.
Security evaluation
58.
security log analysis
59.
security management
60.
security model
61.
security monitoring
62.
security notion
63.
security objectives
64.
security of supply
65.
security operation center
66.
security patterns
67.
security problem definition
68.
security proof
69.
security protocols
70.
security requirements
71.
security requirements engineering
72.
security risk assessment
73.
security risk management
74.
security strategies
75.
security systems for military objects
76.
security testing
77.
security training
78.
security verification
79.
social security planning
80.
societal security
81.
system of economic security
82.
system security
83.
terrorism security
84.
transmission System Security
85.
voting privacy and security
86.
accident data
87.
AIS data
88.
ALS data enhancements
89.
application data
90.
audio and visual data
91.
big data
92.
big data analysis
93.
big data analytics
94.
borehole data
95.
clinical data capture
96.
conceptual data model
97.
control and data path tests
98.
critical data studies
99.
cross-border data exchange
100.
data
101.
data assimilation
102.
data protection
103.
data acquisition
104.
data acquisition system
105.
data aggregation
106.
data alignment
107.
data analysis
108.
data analytics
109.
data anisotropy
110.
data annotation
111.
data assimilation
112.
data augmentation
113.
data center
114.
data centers
115.
data centres
116.
data classification
117.
data clustering
118.
data collection
119.
data commons
120.
data compression
121.
data conversion
122.
data copy
123.
data dictionaries
124.
data discovery
125.
Data dissemination
126.
Data distribution structure
127.
Data drift
128.
data driven planning
129.
data embassy
130.
data engineering
131.
data envelopment analysis
132.
data ethnography
133.
data exchange
134.
data exchange framework
135.
Data exchange layers
136.
data exchange platform
137.
data experts
138.
data filtering
139.
data flow languages
140.
data flow visualization
141.
data fusion
142.
data generative model
143.
data governance
144.
data integration
145.
data integrity
146.
data justice
147.
data lineage
148.
data logger
149.
data logistics
150.
data management
151.
data mappings
152.
Data Mart
153.
data mesh
154.
data mining
155.
data modeling
156.
data models
157.
data modem
158.
data noise
159.
data ownership
160.
data platform
161.
data privacy
162.
data processing
163.
data product
164.
data protection
165.
data quality
166.
data quality management
167.
data quality maturity model
168.
data rate
169.
data reuse
170.
data re-use
171.
data science
172.
data scraping
173.
data sets
174.
data simulation
175.
data simultaneity
176.
data sort
177.
data sources
178.
data storage
179.
data storage systems
180.
data stream mining
181.
data streams
182.
data studies
183.
data subject
184.
data synthesis
185.
data to decision
186.
data types
187.
data validity
188.
data valorization
189.
data warehouse
190.
data warenhouse
191.
data visualization
192.
data-centric construction
193.
data-centric systems
194.
data-controlled circuit partition
195.
data-controlled segmentation
196.
data-driven
197.
data-driven characterization
198.
Data-driven method
199.
data-driven modeling
200.
data-exchange infrastructures
201.
data-exchange solutions
202.
data‐fusion
203.
data-independent acquisition
204.
Data-information-knowledgewisdom (DIKW)
205.
data-intelligence
206.
data-mining
207.
data-science
208.
diagnostic data
209.
digital data exchange
210.
discrete data
211.
distributed data aggregation
212.
distributed data fusion
213.
distributed data mining
214.
distributed data mining (DDM)
215.
DNA microarray data
216.
educational data mining
217.
eventdriven data
218.
event-driven data
219.
experimental data
220.
exploratory data analysis
221.
false data injection attack
222.
field data
223.
financial data
224.
floating car data (FCD)
225.
FMI open data
226.
functional data analysis
227.
GDPR (General Data Protection Regulation)
228.
general data protection regulation
229.
global data hub
230.
GNSS-levelling data
231.
health data
232.
Health data anonymization
233.
health data interoperability
234.
healthcare data
235.
heterogeneous sensor data
236.
high-dimensional data
237.
high-frequency data
238.
high-level test data generation
239.
historical data
240.
hyperspectral data
241.
imbalanced data
242.
implications of energy data
243.
initial data
244.
in-network data processing
245.
insurance data
246.
knowledge discovery and data mining
247.
linked data
248.
linked open data
249.
linked open statistical data
250.
linked data
251.
lossless data compression
252.
low-pass data filtering
253.
Master Data Management
254.
medical claims data
255.
Medical Data Reuse
256.
meta-data
257.
microplastic data uncertainty
258.
mobile phone big data
259.
mobile phone data
260.
mobile phone usage data
261.
mobile positioning data
262.
multisource data fusion
263.
multivariate data analysis
264.
Nigeria's National data protection regulation
265.
open data
266.
open data ecosystem
267.
open data format
268.
open data policies
269.
open government data
270.
open government data (OGD)
271.
OSM data
272.
oversharing personal data
273.
panel data
274.
parallel data processing
275.
passenger data
276.
personal data
277.
personal data disclosure
278.
personal data processing
279.
personal data protection
280.
Personal Data Protection Act
281.
point cloud data
282.
process and data modelling
283.
real-time data
284.
reconstruction of gap-free data
285.
remote data transmission
286.
satellite data
287.
sequential data
288.
small data machine learning
289.
smart data analytics
290.
smart meter data
291.
social media data
292.
Spatial data
293.
spatial data analysis
294.
statistical data
295.
stochastic image data
296.
structured data
297.
student data analysis
298.
supervised learning data
299.
supervisory control and data acquisition (SCADA)
300.
surrogate data
301.
sustainable data governance
302.
symbolic data
303.
symbolic data analysis
304.
synthetic data
305.
time-selective data fusion
306.
training data
307.
Transcriptome data
308.
tree-like data structures
309.
urban data
310.
urban data acquisition
311.
web traffic data
312.
virtual data embassy
313.
Virtual Data Explorer
314.
18O data
315.
(big) data
märksõna
3
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Greenergy Data Centers
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT