Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
data security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
3
Vaata veel..
(2/340)
Ekspordi
ekspordi kõik päringu tulemused
(3)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
raamat
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
raamat
2
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
3
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 3, kuvan
1 - 3
võtmesõna
337
1.
data security
2.
security of data
3.
metadata model for security measures
4.
security dataset
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security strategies
17.
cyber-security
18.
development of security cameras
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
graded security
26.
hardware security
27.
hardware security primitive
28.
human security
29.
information security
30.
internal security
31.
international security
32.
investment and innovation security
33.
IPv6 security
34.
IT security
35.
job security
36.
long-term security
37.
Middle Eastern security
38.
Mobile security
39.
national cyber security strategy
40.
national security
41.
NATO. Science for Peace and Security Program
42.
network security
43.
network security monitoring
44.
OSCE (Organization for Security and Co-operation in Europe)
45.
passenger’s security
46.
policy-based routing security
47.
political and security cultures
48.
post-quantum security
49.
power system security
50.
quantitative security
51.
regional security
52.
RISC-V Security Verification
53.
security
54.
security and privacy
55.
security and privacy in smart grids
56.
Security Assertion Mining
57.
security closure
58.
Security Coverage
59.
security dilemma
60.
Security evaluation
61.
security log analysis
62.
security management
63.
security model
64.
security monitoring
65.
security notion
66.
security objectives
67.
security of supply
68.
security operation center
69.
security patterns
70.
security problem definition
71.
security proof
72.
security protocols
73.
security requirements
74.
security requirements engineering
75.
security risk assessment
76.
security risk management
77.
security strategies
78.
security systems for military objects
79.
security testing
80.
security training
81.
security verification
82.
social security planning
83.
societal security
84.
system of economic security
85.
system security
86.
terrorism security
87.
transmission System Security
88.
voting privacy and security
89.
accident data
90.
adversarial data perturbation
91.
AIS data
92.
Aligned data
93.
ALS data enhancements
94.
application data
95.
audio and visual data
96.
big data
97.
big data analysis
98.
big data analytics
99.
borehole data
100.
building lifecycle data
101.
clinical data capture
102.
conceptual data model
103.
control and data path tests
104.
critical data studies
105.
cross-border data exchange
106.
data
107.
data assimilation
108.
data protection
109.
data acquisition
110.
data acquisition system
111.
data aggregation
112.
data alignment
113.
data analysis
114.
data analytics
115.
data anisotropy
116.
data annotation
117.
data assimilation
118.
data attacks
119.
data augmentation
120.
data capture
121.
data center
122.
data center (DC)
123.
data centers
124.
data centre
125.
data centres
126.
data classification
127.
data clustering
128.
data collection
129.
data commons
130.
data compression
131.
data conversion
132.
data copy
133.
data dictionaries
134.
data discovery
135.
Data dissemination
136.
Data distribution structure
137.
Data drift
138.
data driven planning
139.
data embassy
140.
data engineering
141.
data envelopment analysis
142.
data ethnography
143.
data exchange
144.
data exchange framework
145.
Data exchange layers
146.
data exchange platform
147.
data experts
148.
data filtering
149.
data flow languages
150.
data flow visualization
151.
data fusion
152.
data generative model
153.
data governance
154.
data integration
155.
data integrity
156.
data justice
157.
data lineage
158.
data logger
159.
data logistics
160.
data management
161.
data mappings
162.
Data Mart
163.
data mesh
164.
data mining
165.
data modeling
166.
data models
167.
data modem
168.
data noise
169.
data offloading
170.
data ownership
171.
data platform
172.
data privacy
173.
data processing
174.
data product
175.
data protection
176.
data quality
177.
data quality management
178.
data quality maturity model
179.
data rate
180.
data reuse
181.
data re-use
182.
data routing
183.
data science
184.
data scraping
185.
data sets
186.
data sharing
187.
data simulation
188.
data simultaneity
189.
data sort
190.
data sources
191.
data storage
192.
data storage systems
193.
data stream mining
194.
data streams
195.
data studies
196.
data subject
197.
data synthesis
198.
data to decision
199.
data types
200.
data validity
201.
data valorization
202.
data warehouse
203.
data warenhouse
204.
data visualization
205.
data-based computational psychiatry
206.
data-centric construction
207.
data-centric systems
208.
data-controlled circuit partition
209.
data-controlled segmentation
210.
data-driven
211.
data-driven characterization
212.
Data-driven method
213.
data-driven modeling
214.
data-exchange infrastructures
215.
data-exchange solutions
216.
data‐fusion
217.
data-independent acquisition
218.
Data-information-knowledgewisdom (DIKW)
219.
data-intelligence
220.
data-mining
221.
data-science
222.
diagnostic data
223.
digital data exchange
224.
discrete data
225.
distributed data aggregation
226.
distributed data fusion
227.
distributed data mining
228.
distributed data mining (DDM)
229.
DNA microarray data
230.
educational data mining
231.
eventdriven data
232.
event-driven data
233.
experimental data
234.
exploratory data analysis
235.
false data injection attack
236.
False data injection attack; Machine learning; Matlab; Python; State estimation; Sudden load change
237.
field data
238.
financial data
239.
floating car data (FCD)
240.
FMI open data
241.
functional data analysis
242.
GDPR (General Data Protection Regulation)
243.
general data protection regulation
244.
global data hub
245.
GNSS-levelling data
246.
health data
247.
Health data anonymization
248.
health data interoperability
249.
healthcare data
250.
heterogeneous sensor data
251.
high-dimensional data
252.
high-frequency data
253.
high-level test data generation
254.
historical data
255.
hyperspectral data
256.
imbalanced data
257.
implications of energy data
258.
initial data
259.
in-network data processing
260.
insurance data
261.
knowledge discovery and data mining
262.
linked data
263.
linked open data
264.
linked open statistical data
265.
linked data
266.
lossless data compression
267.
low-pass data filtering
268.
Master Data Management
269.
medical claims data
270.
medical data
271.
Medical Data Reuse
272.
meta-data
273.
microplastic data uncertainty
274.
mobile phone big data
275.
mobile phone data
276.
mobile phone usage data
277.
mobile positioning data
278.
multisource data fusion
279.
multivariate data analysis
280.
Nigeria's National data protection regulation
281.
open data
282.
open data ecosystem
283.
open data format
284.
open data policies
285.
open government data
286.
open government data (OGD)
287.
OSM data
288.
oversharing personal data
289.
panel data
290.
parallel data processing
291.
passenger data
292.
personal data
293.
personal data disclosure
294.
personal data processing
295.
personal data protection
296.
Personal Data Protection Act
297.
plan data
298.
point cloud data
299.
pollen data
300.
process and data modelling
301.
public data-set
302.
real-time data
303.
reconstruction of gap-free data
304.
remote data transmission
305.
satellite data
306.
semantic health data
307.
sequential data
308.
small data machine learning
309.
smart data analytics
310.
smart meter data
311.
social media data
312.
Spatial data
313.
spatial data analysis
314.
statistical data
315.
stochastic image data
316.
structured data
317.
student data analysis
318.
supervised learning data
319.
supervisory control and data acquisition (SCADA)
320.
surrogate data
321.
sustainable data governance
322.
symbolic data
323.
symbolic data analysis
324.
synthetic data
325.
time-selective data fusion
326.
training data
327.
Transcriptome data
328.
tree-like data structures
329.
urban data
330.
urban data acquisition
331.
weather data
332.
web traffic data
333.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
334.
virtual data embassy
335.
Virtual Data Explorer
336.
18O data
337.
(big) data
märksõna
3
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Greenergy Data Centers
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT