Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
data security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
4
Vaata veel..
(2/393)
Ekspordi
ekspordi kõik päringu tulemused
(4)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
raamat
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings
2021
https://doi.org/10.1007/978-3-030-87657-9
raamat
2
artikkel kogumikus EST
/
artikkel kogumikus ENG
A case study on data protection for a cloud- and AI-based homecare medical device
Bende, Philipp
;
Vovk, Olga
;
Caraveo, David
;
Pechmann, Ludwig
;
Leucker, Martin
Transactions on Petri Nets and Other Models of Concurrency XVII
2024
/
p. 138 - 161
https://doi.org/10.1007/978-3-662-68191-6_6
Conference Proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
3
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 4, kuvan
1 - 4
võtmesõna
389
1.
data security
2.
security of data
3.
metadata model for security measures
4.
security dataset
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
communication system security
10.
comprehensive system of economic security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security strategies
17.
cyber-security
18.
development of security cameras
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
Estonian information security standard
26.
graded security
27.
hardware security
28.
hardware security primitive
29.
human security
30.
information security
31.
internal security
32.
international security
33.
investment and innovation security
34.
IPv6 security
35.
IT security
36.
IT security management
37.
job security
38.
long-term security
39.
Middle Eastern security
40.
Mobile security
41.
national cyber security strategy
42.
national security
43.
NATO. Science for Peace and Security Program
44.
network security
45.
network security monitoring
46.
OSCE (Organization for Security and Co-operation in Europe)
47.
passenger’s security
48.
policy-based routing security
49.
political and security cultures
50.
post-quantum security
51.
power system security
52.
quantitative security
53.
regional security
54.
RISC-V Security Verification
55.
safety and security testing
56.
security
57.
security adaptation
58.
security alert prioritization
59.
security analysis
60.
security and justice (AFSJ)
61.
security and privacy
62.
security and privacy in smart grids
63.
Security Assertion Mining
64.
security closure
65.
Security Coverage
66.
security dilemma
67.
Security evaluation
68.
security evaluation instruments
69.
security log analysis
70.
security management
71.
security model
72.
security monitoring
73.
security notion
74.
security objectives
75.
security of supply
76.
security operation center
77.
security operations center
78.
security patterns
79.
security policy
80.
security problem definition
81.
security proof
82.
security protocols
83.
security requirements
84.
security requirements engineering
85.
security risk assessment
86.
security risk management
87.
security strategies
88.
security systems for military objects
89.
security testing
90.
security training
91.
security verification
92.
security-by-design
93.
social security planning
94.
societal security
95.
system of economic security
96.
system security
97.
terrorism security
98.
transmission System Security
99.
voting privacy and security
100.
accident data
101.
adversarial data perturbation
102.
AI-based data curation
103.
AIS data
104.
Aligned data
105.
ALS data enhancements
106.
Amazon Kinesis Data Analytics
107.
application data
108.
audio and visual data
109.
big data
110.
big data analysis
111.
big data analytics
112.
big data science
113.
big geo-data
114.
borehole data
115.
building lifecycle data
116.
call data record
117.
catalogue of data sources
118.
cellular phone data
119.
clinical data capture
120.
clinical data exchange
121.
compositional data
122.
conceptual data model
123.
control and data path tests
124.
critical data studies
125.
cross-border data exchange
126.
data
127.
data assimilation
128.
data protection
129.
data acquisition
130.
data acquisition system
131.
data acquisition systems
132.
data aggregation
133.
data alignment
134.
data analysis
135.
data analytics
136.
data anisotropy
137.
data annotation
138.
data assimilation
139.
data attacks
140.
data augmentation
141.
data breach handling
142.
data capabilities
143.
data capture
144.
data center
145.
data center (DC)
146.
data centers
147.
data centre
148.
data centres
149.
data classification
150.
data clustering
151.
data collection
152.
data commons
153.
data compression
154.
data conversion
155.
data copy
156.
data dictionaries
157.
data discovery
158.
Data dissemination
159.
Data distribution structure
160.
Data drift
161.
data driven planning
162.
data embassy
163.
data engineering
164.
data envelopment analysis
165.
data ethnography
166.
data exchange
167.
data exchange framework
168.
Data exchange layers
169.
data exchange platform
170.
data experts
171.
data filtering
172.
data fitting approach
173.
data flow languages
174.
data flow visualization
175.
data fusion
176.
data generative model
177.
data governance
178.
data hiding
179.
data integration
180.
data integrity
181.
data intermediary
182.
data Interoperability
183.
data justice
184.
data labeling
185.
data lineage
186.
data logger
187.
data logistics
188.
data management
189.
data mappings
190.
Data Mart
191.
Data Mart (DM)
192.
data mesh
193.
data mining
194.
data modeling
195.
data models
196.
data modem
197.
data noise
198.
data offloading
199.
data ownership
200.
data platform
201.
data privacy
202.
data processing
203.
data product
204.
data protection
205.
data quality
206.
data quality management
207.
data quality maturity model
208.
data rate
209.
data reuse
210.
data re-use
211.
data routing
212.
data science
213.
data scraping
214.
data set
215.
data set generation
216.
data sets
217.
data sharing
218.
data simulation
219.
data simultaneity
220.
data sort
221.
data sources
222.
data storage
223.
data storage systems
224.
data stream mining
225.
data streams
226.
data studies
227.
data subject
228.
data synthesis
229.
data to decision
230.
data types
231.
data validity
232.
data valorization
233.
data warehouse
234.
data warenhouse
235.
data visualization
236.
data-based computational psychiatry
237.
data-centric construction
238.
data-centric systems
239.
data-controlled circuit partition
240.
data-controlled segmentation
241.
data-driven
242.
data-driven characterization
243.
data-driven condition monitoring
244.
Data-driven method
245.
data-driven modeling
246.
data-exchange infrastructures
247.
data-exchange solutions
248.
data‐fusion
249.
data-independent acquisition
250.
Data-information-knowledgewisdom (DIKW)
251.
data-intelligence
252.
data-mining
253.
data-science
254.
diagnostic data
255.
digital data exchange
256.
discrete data
257.
distributed data aggregation
258.
distributed data fusion
259.
distributed data mining
260.
distributed data mining (DDM)
261.
DNA microarray data
262.
educational data mining
263.
enterprise data analysis
264.
European Health Data Space
265.
European Health Data Space (EHDS)
266.
eventdriven data
267.
event-driven data
268.
experimental data
269.
exploratory data analysis
270.
false data injection attack
271.
field data
272.
financial data
273.
floating car data (FCD)
274.
flood data platform
275.
FMI open data
276.
functional data analysis
277.
GDPR (General Data Protection Regulation)
278.
general data protection regulation
279.
genome data
280.
global data hub
281.
GNSS-levelling data
282.
health data
283.
health data accessibility
284.
Health data anonymization
285.
health data custodianship
286.
health data governance
287.
health data interoperability
288.
health data policy
289.
health data stewardship
290.
healthcare data
291.
heterogeneous sensor data
292.
high-dimensional data
293.
high-frequency data
294.
high-level test data generation
295.
historical data
296.
hyperspectral data
297.
imbalanced data
298.
implications of energy data
299.
initial data
300.
in-network data processing
301.
insurance data
302.
knowledge discovery and data mining
303.
linked data
304.
linked open data
305.
linked open statistical data
306.
linked data
307.
lossless data compression
308.
low-pass data filtering
309.
Master Data Management
310.
medical claims data
311.
medical data
312.
Medical Data Reuse
313.
meta-data
314.
metered data
315.
methods: data analysis
316.
microplastic data uncertainty
317.
mobile data
318.
mobile phone big data
319.
mobile phone data
320.
mobile phone usage data
321.
mobile positioning data
322.
multisource data fusion
323.
multivariate data analysis
324.
Nigeria's National data protection regulation
325.
open data
326.
open data ecosystem
327.
open data format
328.
open data policies
329.
open government data
330.
open government data (OGD)
331.
OSM data
332.
oversharing personal data
333.
panel data
334.
parallel data processing
335.
passenger data
336.
patient-generated health data (PGHD)
337.
personal data
338.
personal data disclosure
339.
personal data processing
340.
personal data protection
341.
Personal Data Protection Act
342.
plan data
343.
point cloud data
344.
pollen data
345.
process and data modelling
346.
Product Data Management (PDM)
347.
public data-set
348.
random data
349.
real-time data
350.
reconstruction of gap-free data
351.
reference architecture for global health data space
352.
remote data transmission
353.
satellite data
354.
semantic data modelling
355.
semantic health data
356.
sequential data
357.
small data machine learning
358.
small training data set
359.
smart data analytics
360.
smart meter data
361.
social media data
362.
Spatial data
363.
spatial data analysis
364.
statistical data
365.
stochastic image data
366.
structured data
367.
student data analysis
368.
supervised learning data
369.
supervisory control and data acquisition (SCADA)
370.
surrogate data
371.
sustainable data governance
372.
symbolic data
373.
symbolic data analysis
374.
synthetic data
375.
temperature historical data series
376.
time-selective data fusion
377.
training data
378.
Transcriptome data
379.
tree-like data structures
380.
underwater data center
381.
urban data
382.
urban data acquisition
383.
weather data
384.
web traffic data
385.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
386.
virtual data embassy
387.
Virtual Data Explorer
388.
18O data
389.
(big) data
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT