Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
data security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
3
Vaata veel..
(2/320)
Ekspordi
ekspordi kõik päringu tulemused
(3)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
raamat
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
raamat
2
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
3
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 3, kuvan
1 - 3
võtmesõna
317
1.
data security
2.
security of data
3.
metadata model for security measures
4.
security dataset
5.
ad-hoc sensor networks security
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security strategies
16.
cyber-security
17.
development of security cameras
18.
drinking water security
19.
economic security
20.
economic security of enterprise
21.
emotional security
22.
energy security
23.
energy security indicator
24.
graded security
25.
hardware security
26.
hardware security primitive
27.
human security
28.
information security
29.
internal security
30.
international security
31.
investment and innovation security
32.
IPv6 security
33.
IT security
34.
job security
35.
long-term security
36.
Middle Eastern security
37.
Mobile security
38.
national cyber security strategy
39.
national security
40.
NATO. Science for Peace and Security Program
41.
network security
42.
network security monitoring
43.
OSCE (Organization for Security and Co-operation in Europe)
44.
passenger’s security
45.
policy-based routing security
46.
political and security cultures
47.
post-quantum security
48.
power system security
49.
quantitative security
50.
regional security
51.
security
52.
security and privacy
53.
security and privacy in smart grids
54.
security closure
55.
Security Coverage
56.
security dilemma
57.
Security evaluation
58.
security log analysis
59.
security management
60.
security model
61.
security monitoring
62.
security notion
63.
security objectives
64.
security of supply
65.
security operation center
66.
security patterns
67.
security problem definition
68.
security proof
69.
security protocols
70.
security requirements
71.
security requirements engineering
72.
security risk assessment
73.
security risk management
74.
security strategies
75.
security systems for military objects
76.
security testing
77.
security training
78.
security verification
79.
social security planning
80.
societal security
81.
system of economic security
82.
system security
83.
terrorism security
84.
transmission System Security
85.
voting privacy and security
86.
accident data
87.
AIS data
88.
ALS data enhancements
89.
application data
90.
audio and visual data
91.
big data
92.
big data analysis
93.
big data analytics
94.
borehole data
95.
clinical data capture
96.
conceptual data model
97.
control and data path tests
98.
critical data studies
99.
cross-border data exchange
100.
data
101.
data assimilation
102.
data protection
103.
data acquisition
104.
data acquisition system
105.
data aggregation
106.
data alignment
107.
data analysis
108.
data analytics
109.
data anisotropy
110.
data annotation
111.
data assimilation
112.
data augmentation
113.
data center
114.
data centers
115.
data centres
116.
data classification
117.
data clustering
118.
data collection
119.
data commons
120.
data compression
121.
data conversion
122.
data copy
123.
data dictionaries
124.
data discovery
125.
Data dissemination
126.
Data distribution structure
127.
Data drift
128.
data driven planning
129.
data embassy
130.
data engineering
131.
data envelopment analysis
132.
data ethnography
133.
data exchange
134.
data exchange framework
135.
Data exchange layers
136.
data exchange platform
137.
data experts
138.
data filtering
139.
data flow languages
140.
data flow visualization
141.
data fusion
142.
data generative model
143.
data governance
144.
data integration
145.
data integrity
146.
data justice
147.
data lineage
148.
data logger
149.
data logistics
150.
data management
151.
data mappings
152.
Data Mart
153.
data mesh
154.
data mining
155.
data modeling
156.
data models
157.
data modem
158.
data noise
159.
data ownership
160.
data platform
161.
data privacy
162.
data processing
163.
data product
164.
data protection
165.
data quality
166.
data quality management
167.
data quality maturity model
168.
data rate
169.
data reuse
170.
data re-use
171.
data science
172.
data scraping
173.
data sets
174.
data simulation
175.
data simultaneity
176.
data sort
177.
data sources
178.
data storage
179.
data storage systems
180.
data stream mining
181.
data streams
182.
data studies
183.
data subject
184.
data synthesis
185.
data to decision
186.
data types
187.
data validity
188.
data valorization
189.
data warehouse
190.
data warenhouse
191.
data visualization
192.
data-centric construction
193.
data-centric systems
194.
data-controlled circuit partition
195.
data-controlled segmentation
196.
data-driven
197.
data-driven characterization
198.
Data-driven method
199.
data-driven modeling
200.
data-exchange infrastructures
201.
data-exchange solutions
202.
data‐fusion
203.
data-independent acquisition
204.
Data-information-knowledgewisdom (DIKW)
205.
data-intelligence
206.
data-mining
207.
data-science
208.
diagnostic data
209.
digital data exchange
210.
discrete data
211.
distributed data aggregation
212.
distributed data fusion
213.
distributed data mining
214.
distributed data mining (DDM)
215.
DNA microarray data
216.
educational data mining
217.
eventdriven data
218.
event-driven data
219.
experimental data
220.
exploratory data analysis
221.
false data injection attack
222.
field data
223.
financial data
224.
floating car data (FCD)
225.
FMI open data
226.
functional data analysis
227.
GDPR (General Data Protection Regulation)
228.
general data protection regulation
229.
global data hub
230.
GNSS-levelling data
231.
health data
232.
Health data anonymization
233.
health data interoperability
234.
healthcare data
235.
heterogeneous sensor data
236.
high-dimensional data
237.
high-frequency data
238.
high-level test data generation
239.
historical data
240.
hyperspectral data
241.
imbalanced data
242.
implications of energy data
243.
initial data
244.
in-network data processing
245.
insurance data
246.
knowledge discovery and data mining
247.
linked data
248.
linked open data
249.
linked open statistical data
250.
linked data
251.
lossless data compression
252.
low-pass data filtering
253.
Master Data Management
254.
medical claims data
255.
medical data
256.
Medical Data Reuse
257.
meta-data
258.
microplastic data uncertainty
259.
mobile phone big data
260.
mobile phone data
261.
mobile phone usage data
262.
mobile positioning data
263.
multisource data fusion
264.
multivariate data analysis
265.
Nigeria's National data protection regulation
266.
open data
267.
open data ecosystem
268.
open data format
269.
open data policies
270.
open government data
271.
open government data (OGD)
272.
OSM data
273.
oversharing personal data
274.
panel data
275.
parallel data processing
276.
passenger data
277.
personal data
278.
personal data disclosure
279.
personal data processing
280.
personal data protection
281.
Personal Data Protection Act
282.
point cloud data
283.
process and data modelling
284.
real-time data
285.
reconstruction of gap-free data
286.
remote data transmission
287.
satellite data
288.
sequential data
289.
small data machine learning
290.
smart data analytics
291.
smart meter data
292.
social media data
293.
Spatial data
294.
spatial data analysis
295.
statistical data
296.
stochastic image data
297.
structured data
298.
student data analysis
299.
supervised learning data
300.
supervisory control and data acquisition (SCADA)
301.
surrogate data
302.
sustainable data governance
303.
symbolic data
304.
symbolic data analysis
305.
synthetic data
306.
time-selective data fusion
307.
training data
308.
Transcriptome data
309.
tree-like data structures
310.
urban data
311.
urban data acquisition
312.
weather data
313.
web traffic data
314.
virtual data embassy
315.
Virtual Data Explorer
316.
18O data
317.
(big) data
märksõna
3
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Greenergy Data Centers
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT