Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security of data (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/429)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Black-box separations and their adaptability to the non-uniform model
Buldas, Ahto
;
Niitsoo, Margus
Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings
2013
/
p. 152-167
https://doi.org/10.1007/978-3-642-39059-3_11
Conference Proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
2
artikkel kogumikus
A security verification template to assess cache architecture vulnerabilities
Ghasempouri, Tara
;
Raik, Jaan
;
Paul, Kolin
;
Reinbrecht, Cezar
;
Hamdioui, Said
;
Taouil, M.
2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), April 22nd – 24th 2020 Novi Sad, Serbia : Proceedings
2020
/
art. 9095707, 6 p
https://doi.org/10.1109/DDECS50862.2020.9095707
artikkel kogumikus
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
425
1.
security of data
2.
data security
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security monitoring
15.
cyber security strategies
16.
cyber-security
17.
development of security cameras
18.
digital security practices
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
Estonian information security standard
26.
graded security
27.
hardware security
28.
hardware security primitive
29.
human security
30.
information security
31.
information security and privacy
32.
internal security
33.
international security
34.
investment and innovation security
35.
IPv6 security
36.
IT security
37.
IT security management
38.
job security
39.
long-term security
40.
metadata model for security measures
41.
Middle Eastern security
42.
Mobile security
43.
national cyber security strategy
44.
national security
45.
NATO. Science for Peace and Security Program
46.
network security
47.
network security monitoring
48.
OSCE (Organization for Security and Co-operation in Europe)
49.
passenger’s security
50.
policy-based routing security
51.
political and security cultures
52.
post-quantum security
53.
power system security
54.
quantitative security
55.
regional security
56.
RISC-V Security Verification
57.
safety and security testing
58.
security
59.
security adaptation
60.
security alert prioritization
61.
security analysis
62.
security and justice (AFSJ)
63.
Security and political science
64.
security and privacy
65.
security and privacy in smart grids
66.
Security Assertion Mining
67.
security closure
68.
Security Coverage
69.
security dataset
70.
security dilemma
71.
Security evaluation
72.
security evaluation instruments
73.
Security limitations
74.
security log analysis
75.
security management
76.
security model
77.
security monitoring
78.
security notion
79.
security objectives
80.
security of supply
81.
security operation center
82.
security operations center
83.
security patterns
84.
security policy
85.
security problem definition
86.
security proof
87.
security protocols
88.
security requirements
89.
security requirements engineering
90.
security risk assessment
91.
security risk management
92.
security risks
93.
security strategies
94.
security systems for military objects
95.
security testing
96.
security training
97.
security verification
98.
security-by-design
99.
social security planning
100.
societal security
101.
system of economic security
102.
system security
103.
terrorism security
104.
transmission System Security
105.
voting privacy and security
106.
accident data
107.
adversarial data perturbation
108.
AI-based data curation
109.
AIS data
110.
Aligned data
111.
ALS data enhancements
112.
Amazon Kinesis Data Analytics
113.
application data
114.
audio and visual data
115.
big data
116.
big data analysis
117.
big data analytics
118.
big data science
119.
big geo-data
120.
borehole data
121.
building lifecycle data
122.
call data record
123.
catalogue of data sources
124.
cellular phone data
125.
clinical data capture
126.
clinical data exchange
127.
compositional data
128.
conceptual data model
129.
construction data management
130.
control and data path tests
131.
critical data studies
132.
cross-border data exchange
133.
data
134.
data assimilation
135.
data protection
136.
data acquisition
137.
data acquisition system
138.
data acquisition systems
139.
data aggregation
140.
data alignment
141.
data analysis
142.
data analytics
143.
data analytics and machine learning
144.
data anisotropy
145.
data annotation
146.
data assimilation
147.
data attacks
148.
data augmentation
149.
data breach handling
150.
data capabilities
151.
data capture
152.
data center
153.
data center (DC)
154.
data centers
155.
data centre
156.
data centres
157.
data classification
158.
data clustering
159.
data collection
160.
data commons
161.
data compression
162.
data conversion
163.
data copy
164.
data dictionaries
165.
data discovery
166.
Data dissemination
167.
Data distribution structure
168.
data donation
169.
Data drift
170.
data driven planning
171.
data dropouts
172.
data embassy
173.
data engineering
174.
data enrichment
175.
data envelopment analysis
176.
data ethnography
177.
data exchange
178.
data exchange framework
179.
Data exchange layers
180.
data exchange platform
181.
data experts
182.
data filtering
183.
data fitting approach
184.
data flow languages
185.
data flow visualization
186.
data flows
187.
data fusion
188.
data generative model
189.
data governance
190.
data governance act
191.
data hiding
192.
data integration
193.
data integrity
194.
data intermediary
195.
data Interoperability
196.
data justice
197.
data labeling
198.
data lineage
199.
data logger
200.
data logistics
201.
data management
202.
data mappings
203.
Data Mart
204.
Data Mart (DM)
205.
data mesh
206.
data migration
207.
data mining
208.
data modeling
209.
data models
210.
data modem
211.
data movements
212.
data noise
213.
data offloading
214.
data ownership
215.
data platform
216.
data privacy
217.
data processing
218.
data product
219.
data protection
220.
data quality
221.
data quality management
222.
data quality maturity model
223.
data rate
224.
data reuse
225.
data re-use
226.
data routing
227.
data science
228.
data scraping
229.
data set
230.
data set generation
231.
data sets
232.
data sharing
233.
data simulation
234.
data simultaneity
235.
data sort
236.
data sources
237.
data spaces
238.
data storage
239.
data storage systems
240.
data stream mining
241.
data streams
242.
data structures
243.
data studies
244.
data subject
245.
data subjects
246.
data synthesis
247.
data to decision
248.
data types
249.
data validity
250.
data valorization
251.
data warehouse
252.
data warenhouse
253.
data visualization
254.
data-augmentation
255.
data-based computational psychiatry
256.
data-centric construction
257.
data-centric systems
258.
data-controlled circuit partition
259.
data-controlled segmentation
260.
data-driven
261.
data-driven characterization
262.
data-driven condition monitoring
263.
data-driven control
264.
Data-driven decision-making
265.
data-driven imputation
266.
Data-driven method
267.
data-driven model
268.
data-driven modeling
269.
data-driven optimization
270.
data-driven public services
271.
data-driven techniques
272.
data-exchange infrastructures
273.
data-exchange solutions
274.
data-flow architecture
275.
data‐fusion
276.
data-independent acquisition
277.
Data-information-knowledgewisdom (DIKW)
278.
data-intelligence
279.
data-mining
280.
data-science
281.
diagnostic data
282.
digital data exchange
283.
discrete data
284.
distributed data aggregation
285.
distributed data fusion
286.
distributed data mining
287.
distributed data mining (DDM)
288.
distributional data
289.
DNA microarray data
290.
educational data mining
291.
enterprise data analysis
292.
European Health Data Space
293.
European Health Data Space (EHDS)
294.
eventdriven data
295.
event-driven data
296.
experimental data
297.
exploratory data analysis
298.
false data injection attack
299.
field data
300.
financial data
301.
floating car data (FCD)
302.
flood data platform
303.
FMI open data
304.
functional data analysis
305.
GDPR (General Data Protection Regulation)
306.
general data protection regulation
307.
genome data
308.
global data hub
309.
GNSS-levelling data
310.
GNSS-RO data
311.
GRUAN data
312.
health data
313.
health data accessibility
314.
Health data anonymization
315.
health data custodianship
316.
health data governance
317.
health data integrity and transparency
318.
health data interoperability
319.
health data policy
320.
health data stewardship
321.
healthcare data
322.
heterogeneous sensor data
323.
high-dimensional data
324.
high-frequency data
325.
high-level test data generation
326.
historical data
327.
hyperspectral data
328.
imbalanced data
329.
implications of energy data
330.
initial data
331.
initial data for AI
332.
initial data model
333.
in-network data processing
334.
insurance data
335.
knowledge discovery and data mining
336.
linked data
337.
linked open data
338.
linked open statistical data
339.
linked data
340.
lossless data compression
341.
low-pass data filtering
342.
Master Data Management
343.
medical claims data
344.
medical data
345.
Medical Data Reuse
346.
meta-data
347.
metered data
348.
methods: data analysis
349.
microplastic data uncertainty
350.
mobile data
351.
mobile phone big data
352.
mobile phone data
353.
mobile phone usage data
354.
mobile positioning data
355.
multisource data fusion
356.
multivariate data analysis
357.
Nigeria's National data protection regulation
358.
open data
359.
open data ecosystem
360.
open data format
361.
open data policies
362.
open government data
363.
open government data (OGD)
364.
open-data
365.
OSM data
366.
oversharing personal data
367.
panel data
368.
parallel data processing
369.
passenger data
370.
patient-generated health data (PGHD)
371.
personal data
372.
personal data disclosure
373.
personal data processing
374.
personal data protection
375.
Personal Data Protection Act
376.
plan data
377.
point cloud data
378.
pollen data
379.
process and data modelling
380.
Product Data Management (PDM)
381.
public data-set
382.
random data
383.
real-time data
384.
real-time data collection
385.
reconstruction of gap-free data
386.
reference architecture for global health data space
387.
remote data transmission
388.
satellite data
389.
semantic data modelling
390.
semantic health data
391.
sequential data
392.
small data machine learning
393.
small training data set
394.
smart data analytics
395.
smart meter data
396.
social media data
397.
Spatial data
398.
spatial data analysis
399.
statistical data
400.
stochastic image data
401.
structured data
402.
student data analysis
403.
supervised learning data
404.
supervisory control and data acquisition (SCADA)
405.
surrogate data
406.
sustainable data governance
407.
symbolic data
408.
symbolic data analysis
409.
synthetic data
410.
temperature historical data series
411.
three-way data
412.
time-selective data fusion
413.
training data
414.
Transcriptome data
415.
tree-like data structures
416.
underwater data center
417.
urban data
418.
urban data acquisition
419.
weather data
420.
web traffic data
421.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
422.
virtual data embassy
423.
Virtual Data Explorer
424.
18O data
425.
(big) data
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
AI powered Data Curation & Publishing Virtual Assistant (AIDAVA)
4.
Greenergy Data Centers
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT