Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
data security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
3
Vaata veel..
(2/348)
Ekspordi
ekspordi kõik päringu tulemused
(3)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
raamat
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
raamat
2
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
3
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 3, kuvan
1 - 3
võtmesõna
345
1.
data security
2.
security of data
3.
metadata model for security measures
4.
security dataset
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security strategies
17.
cyber-security
18.
development of security cameras
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
graded security
26.
hardware security
27.
hardware security primitive
28.
human security
29.
information security
30.
internal security
31.
international security
32.
investment and innovation security
33.
IPv6 security
34.
IT security
35.
IT security management
36.
job security
37.
long-term security
38.
Middle Eastern security
39.
Mobile security
40.
national cyber security strategy
41.
national security
42.
NATO. Science for Peace and Security Program
43.
network security
44.
network security monitoring
45.
OSCE (Organization for Security and Co-operation in Europe)
46.
passenger’s security
47.
policy-based routing security
48.
political and security cultures
49.
post-quantum security
50.
power system security
51.
quantitative security
52.
regional security
53.
RISC-V Security Verification
54.
security
55.
security and justice (AFSJ)
56.
security and privacy
57.
security and privacy in smart grids
58.
Security Assertion Mining
59.
security closure
60.
Security Coverage
61.
security dilemma
62.
Security evaluation
63.
security log analysis
64.
security management
65.
security model
66.
security monitoring
67.
security notion
68.
security objectives
69.
security of supply
70.
security operation center
71.
security patterns
72.
security policy
73.
security problem definition
74.
security proof
75.
security protocols
76.
security requirements
77.
security requirements engineering
78.
security risk assessment
79.
security risk management
80.
security strategies
81.
security systems for military objects
82.
security testing
83.
security training
84.
security verification
85.
social security planning
86.
societal security
87.
system of economic security
88.
system security
89.
terrorism security
90.
transmission System Security
91.
voting privacy and security
92.
accident data
93.
adversarial data perturbation
94.
AIS data
95.
Aligned data
96.
ALS data enhancements
97.
application data
98.
audio and visual data
99.
big data
100.
big data analysis
101.
big data analytics
102.
borehole data
103.
building lifecycle data
104.
call data record
105.
clinical data capture
106.
conceptual data model
107.
control and data path tests
108.
critical data studies
109.
cross-border data exchange
110.
data
111.
data assimilation
112.
data protection
113.
data acquisition
114.
data acquisition system
115.
data acquisition systems
116.
data aggregation
117.
data alignment
118.
data analysis
119.
data analytics
120.
data anisotropy
121.
data annotation
122.
data assimilation
123.
data attacks
124.
data augmentation
125.
data capabilities
126.
data capture
127.
data center
128.
data center (DC)
129.
data centers
130.
data centre
131.
data centres
132.
data classification
133.
data clustering
134.
data collection
135.
data commons
136.
data compression
137.
data conversion
138.
data copy
139.
data dictionaries
140.
data discovery
141.
Data dissemination
142.
Data distribution structure
143.
Data drift
144.
data driven planning
145.
data embassy
146.
data engineering
147.
data envelopment analysis
148.
data ethnography
149.
data exchange
150.
data exchange framework
151.
Data exchange layers
152.
data exchange platform
153.
data experts
154.
data filtering
155.
data flow languages
156.
data flow visualization
157.
data fusion
158.
data generative model
159.
data governance
160.
data integration
161.
data integrity
162.
data justice
163.
data lineage
164.
data logger
165.
data logistics
166.
data management
167.
data mappings
168.
Data Mart
169.
data mesh
170.
data mining
171.
data modeling
172.
data models
173.
data modem
174.
data noise
175.
data offloading
176.
data ownership
177.
data platform
178.
data privacy
179.
data processing
180.
data product
181.
data protection
182.
data quality
183.
data quality management
184.
data quality maturity model
185.
data rate
186.
data reuse
187.
data re-use
188.
data routing
189.
data science
190.
data scraping
191.
data sets
192.
data sharing
193.
data simulation
194.
data simultaneity
195.
data sort
196.
data sources
197.
data storage
198.
data storage systems
199.
data stream mining
200.
data streams
201.
data studies
202.
data subject
203.
data synthesis
204.
data to decision
205.
data types
206.
data validity
207.
data valorization
208.
data warehouse
209.
data warenhouse
210.
data visualization
211.
data-based computational psychiatry
212.
data-centric construction
213.
data-centric systems
214.
data-controlled circuit partition
215.
data-controlled segmentation
216.
data-driven
217.
data-driven characterization
218.
Data-driven method
219.
data-driven modeling
220.
data-exchange infrastructures
221.
data-exchange solutions
222.
data‐fusion
223.
data-independent acquisition
224.
Data-information-knowledgewisdom (DIKW)
225.
data-intelligence
226.
data-mining
227.
data-science
228.
diagnostic data
229.
digital data exchange
230.
discrete data
231.
distributed data aggregation
232.
distributed data fusion
233.
distributed data mining
234.
distributed data mining (DDM)
235.
DNA microarray data
236.
educational data mining
237.
enterprise data analysis
238.
eventdriven data
239.
event-driven data
240.
experimental data
241.
exploratory data analysis
242.
false data injection attack
243.
field data
244.
financial data
245.
floating car data (FCD)
246.
FMI open data
247.
functional data analysis
248.
GDPR (General Data Protection Regulation)
249.
general data protection regulation
250.
global data hub
251.
GNSS-levelling data
252.
health data
253.
Health data anonymization
254.
health data interoperability
255.
healthcare data
256.
heterogeneous sensor data
257.
high-dimensional data
258.
high-frequency data
259.
high-level test data generation
260.
historical data
261.
hyperspectral data
262.
imbalanced data
263.
implications of energy data
264.
initial data
265.
in-network data processing
266.
insurance data
267.
knowledge discovery and data mining
268.
linked data
269.
linked open data
270.
linked open statistical data
271.
linked data
272.
lossless data compression
273.
low-pass data filtering
274.
Master Data Management
275.
medical claims data
276.
medical data
277.
Medical Data Reuse
278.
meta-data
279.
metered data
280.
microplastic data uncertainty
281.
mobile data
282.
mobile phone big data
283.
mobile phone data
284.
mobile phone usage data
285.
mobile positioning data
286.
multisource data fusion
287.
multivariate data analysis
288.
Nigeria's National data protection regulation
289.
open data
290.
open data ecosystem
291.
open data format
292.
open data policies
293.
open government data
294.
open government data (OGD)
295.
OSM data
296.
oversharing personal data
297.
panel data
298.
parallel data processing
299.
passenger data
300.
personal data
301.
personal data disclosure
302.
personal data processing
303.
personal data protection
304.
Personal Data Protection Act
305.
plan data
306.
point cloud data
307.
pollen data
308.
process and data modelling
309.
public data-set
310.
real-time data
311.
reconstruction of gap-free data
312.
remote data transmission
313.
satellite data
314.
semantic health data
315.
sequential data
316.
small data machine learning
317.
smart data analytics
318.
smart meter data
319.
social media data
320.
Spatial data
321.
spatial data analysis
322.
statistical data
323.
stochastic image data
324.
structured data
325.
student data analysis
326.
supervised learning data
327.
supervisory control and data acquisition (SCADA)
328.
surrogate data
329.
sustainable data governance
330.
symbolic data
331.
symbolic data analysis
332.
synthetic data
333.
time-selective data fusion
334.
training data
335.
Transcriptome data
336.
tree-like data structures
337.
urban data
338.
urban data acquisition
339.
weather data
340.
web traffic data
341.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
342.
virtual data embassy
343.
Virtual Data Explorer
344.
18O data
345.
(big) data
märksõna
3
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Greenergy Data Centers
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT