Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
computer network operations (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(3/293)
Export
export all inquiry results
(5)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
Blumbergs, Bernhards
;
Vaarandi, Risto
MILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 2017
2017
/
p. 707-712
https://doi.org/10.1109/MILCOM.2017.8170785
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
2
book article EST
/
book article ENG
Creating and detecting IPv6 transition mechanism-based information exfiltration covert channels
Blumbergs, Bernhards
;
Pihelgas, Mauno
;
Kont, Markus
;
Maennel, Olaf Manuel
;
Vaarandi, Risto
Secure IT Systems : 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016 : proceedings
2016
/
p. 85-100 : ill
https://doi.org/10.1007/978-3-319-47560-8_6
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
book article EST
/
book article ENG
3
book article
Crossed swords : a cyber red team oriented technical exercise
Blumbergs, Bernhards
;
Ottis, Rain
;
Vaarandi, Risto
Proceedings of the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 2019
2019
/
p. 37-44
https://www.scopus.com/record/display.uri?eid=2-s2.0-85070019446&origin=inward&txGid=b3ce06db78a90b7b9e8a79c0d7b1f9c7
book article
4
book article
A cyber red team oriented technical exercise
Blumbergs, Bernhards
;
Ottis, Rain
;
Vaarandi, Risto
Abstracts and conference materials for the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 2019
2019
/
p. 10-11
https://www.academic-conferences.org/conferences/eccws/eccws-future-and-past/
book article
5
book article
Remote exploit development for cyber red team computer network operations targeting industrial control systems
Blumbergs, Bernhards
Proceedings of the 5th International Conference on Information Systems Security and Privacy : ICISSP 2019 : February 23-25, 2019, Prague, Czech Republic. Vol. 1
2019
/
p. 88-99 : ill
https://doi.org/10.5220/0007310300880099
book article
Number of records 5, displaying
1 - 5
keyword
287
1.
computer network operations
2.
computer network management
3.
algebraic operations
4.
Clean port operations
5.
commercial operations
6.
cyber operations
7.
cyberspace operations planning
8.
Defensive Cyber Operations
9.
digital operations
10.
energy consumption of construction operations
11.
influence operations
12.
Municipal Operations Center
13.
Offensive Cyber Operations
14.
operations research
15.
psychological operations
16.
security operations center
17.
supply chain operations reference (SCOR)
18.
supply chain operations reference (SCOR) model
19.
Sweedler operations
20.
term operations
21.
active distribution network management
22.
Adaptive network-based fuzzy inference system (ANFIS)
23.
aec distribution network
24.
analytical flow network analysis
25.
analytical network process
26.
ANDROID network
27.
artificial neural network
28.
A-source network
29.
autoservice network
30.
Bayesian belief network (BBN)
31.
bayesian network (BN)
32.
Binarized Neural Network (BNN)
33.
building site network
34.
business network model
35.
cable network
36.
carbon nanotube network
37.
cascaded forward neural network (CFNN)
38.
cognitive body area network
39.
collaborative network
40.
connection network codes
41.
Controller Area Network
42.
Convolutional Neural Network
43.
convolutional neural network (CNN)
44.
coolant network
45.
deep convolutional neural network
46.
deep learning network
47.
deep neural network
48.
deep neural network compression
49.
DH network
50.
distribution network
51.
distribution network
52.
district heat network
53.
district heating network
54.
electric network parameters
55.
electrical network
56.
emergency network
57.
Event Processing Network (EPN)
58.
Event Processing Network Model
59.
feedforward neural network (FFNN)
60.
flow network analysis
61.
flow network parameters
62.
Fully Convolutional Network (FCN)
63.
Generative Adversarial Network (GaN)
64.
global innovation network
65.
Graph Convolutional Neural Network (GCN)
66.
GraphSAGE (Graph Based Neural Network)
67.
heterogeneous network
68.
hydraulic network model
69.
hypar-network
70.
impedance network
71.
impedance network
72.
impedance source (IS) network
73.
Impedance Source Network
74.
impedance-source network
75.
in-network data processing
76.
innovation network
77.
innovation network agent
78.
joint network-channel coding
79.
knowledge network
80.
levelling network
81.
linear Delta robots neural network based model
82.
lumped parameter network
83.
lumped parameter thermal network
84.
lumped-parameter thermal network
85.
Magnetically Coupled Impedance Source Network (MCIS)
86.
memory network
87.
Mesh Network
88.
modified network cohesion
89.
MRAN (minimum resource allocation network)
90.
nanosheets network
91.
NB-IoT network
92.
NetFlow based network monitoring
93.
network
94.
network access charges
95.
network analysis
96.
network anomaly detection
97.
network architecture
98.
network calculus
99.
network characteristics
100.
network communication technologies
101.
network constraint
102.
network disaggregation
103.
network dynamics
104.
network expansion planning
105.
network forensics
106.
network function virtualization
107.
network functions virtualization (NFV)
108.
network games
109.
network governance
110.
network IDS alert classification
111.
network industries
112.
network industry
113.
network intrusion detection system
114.
network latencies
115.
network layer
116.
Network lifetime
117.
network measurement
118.
network monitoring
119.
network of co-authorships
120.
network on chip
121.
Network on Chip (NoC)
122.
network partners
123.
network protocol reverse engineering
124.
network protocols
125.
Network QoS
126.
network quality
127.
Network reliability
128.
network safety ranking
129.
network security
130.
network security monitoring
131.
network slicing
132.
network sparsification
133.
network studies
134.
network theory
135.
network topologies
136.
network topology
137.
network uncertainties
138.
Network visualization
139.
network-on-chip
140.
network-on-ReRAM
141.
network-testing
142.
neural network
143.
neural network architecture search
144.
neural network controller
145.
neural network predictive controller
146.
nitrogen-cycling network
147.
open value network
148.
partner network
149.
partner network
150.
partner network (PN)
151.
partner network maturity
152.
passive switched capacitor network
153.
PC-corr network
154.
peer to peer network
155.
performance dialogue network
156.
personal area network applications
157.
pervasive public safety network
158.
phosphotransfer network
159.
power delivery network
160.
power distribution network
161.
production in network
162.
proteomic network
163.
public safety network
164.
qZS network
165.
quasi-impedance-source network
166.
quasi-Z-source network
167.
Radial Basis Function Neural Network (RBFNN)
168.
radio access network (RAN)
169.
radio access network subslicing
170.
random resistor network
171.
recurrent neural network language model
172.
reluctance network (RN)
173.
research network
174.
road network
175.
roof network
176.
route network
177.
self organizing network
178.
smart distribution network
179.
SMEs network
180.
social network
181.
social network analysis
182.
software-defined network
183.
spiking neural network (SNN)
184.
stretchable network
185.
support network activities
186.
sustainable partner network
187.
sustainable partner network (SPN)
188.
switched capacitor inductor network (SCLN)
189.
Z-source network
190.
technology transfer network
191.
telecommunication network management
192.
telecommunication network performance
193.
Ternary Neural Network
194.
the influence of DHW consumption on dimensioning the DH network
195.
thermal network
196.
tide gauge network
197.
UAV-enabled network
198.
underwater sensor network
199.
utility network
200.
value network analysis
201.
water distribution network
202.
wireless ad hoq network
203.
wireless body area network
204.
Wireless Body Area Network (WBAN)
205.
wireless network
206.
wireless sensor network
207.
wsn (wireless sensor network)
208.
3D graphene network
209.
3D network topology visualization
210.
computer
211.
computer aided design
212.
computer aided diagnosis
213.
computer aided diagnostics
214.
computer aided instruction
215.
computer aided language translation
216.
computer aided manufacturing
217.
computer aided testing
218.
computer algebra
219.
computer algebra system
220.
computer and education
221.
computer anxiety
222.
computer architecture
223.
computer assisted language learning
224.
computer based learning
225.
computer circuits
226.
computer control
227.
Computer crime
228.
computer education
229.
computer engineering
230.
computer engineerng
231.
computer game
232.
computer graphics
233.
computer hardware
234.
computer integrated manufacturing
235.
computer networks
236.
computer pipelines
237.
computer programming
238.
computer programs
239.
computer science
240.
computer science basics
241.
computer science education
242.
computer security
243.
computer simulation
244.
computer simulation environments
245.
computer simulations
246.
computer software
247.
computer softwaregraph theory
248.
computer systems
249.
Computer systems organization
250.
computer terminals
251.
computer vision
252.
computer workers
253.
computer-aided anthropometry
254.
computer-aided architectural design (CAAD)
255.
computer‐aided assessment
256.
computer-aided design
257.
computer-aided detection
258.
computer‐aided detection
259.
computer-aided diagnosis
260.
computer-aided drawing (CAD)
261.
computer-aided engineering
262.
computer-aided teaching
263.
Computer-Aided Tuning
264.
computer-aided tuning (CAT)
265.
computer-assisted language learning (CALL)
266.
computer-oriented technologies
267.
computer-supported decision-making
268.
computer-use
269.
control engineering computer applications
270.
distributed computer systems
271.
education in computer engineering
272.
fifth generation computer
273.
gateways (computer networks)
274.
high-performance computer systems
275.
human computer interaction
276.
human computer interaction (HCI)
277.
human-computer interaction
278.
Human-Computer Interaction (HCI)
279.
human-computer trust
280.
interactive computer graphics
281.
laptop computer
282.
logic in computer science
283.
single board computer
284.
single-board computer
285.
structure computer analysis
286.
ubiquitous computer technology
287.
Web and computer-based learning
subject term
5
1.
European Access Network
2.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
3.
Baltic Computer Systems
4.
Estonian Summer School on Computer and Systems Science, 2023
5.
National Computer Security Incident Response Teams (N-CSIRTs)
TTÜ subject term
1
1.
Erasmus Student Network
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT