Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
network security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(3/319)
Export
export all inquiry results
(5)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
Blumbergs, Bernhards
;
Vaarandi, Risto
MILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 2017
2017
/
p. 707-712
https://doi.org/10.1109/MILCOM.2017.8170785
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
2
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
3
journal article EST
/
journal article ENG
Kamerabasiertes Monitoring von Fischen in Deutschland und der Schweiz
Haas, Christian
;
Meyer, Matthias
;
Schmalz, Maria
;
Tuhtan, Jeffrey Andrew
WasserWirtschaft
2024
/
p. 19 - 29
https://doi.org/10.1007/s35147-024-2401-1
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
4
journal article EST
/
journal article ENG
Network IDS alert classification with active learning techniques
Vaarandi, Risto
;
Guerra-Manzanares, Alejandro
Journal of Information Security and Applications
2024
/
art. 103687
https://doi.org/10.1016/j.jisa.2023.103687
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
5
journal article EST
/
journal article ENG
Stream clustering guided supervised learning for classifying NIDS alerts
Vaarandi, Risto
;
Guerra Manzanares, Alejandro
Future generation computer systems
2024
/
p. 231-244 : ill
https://doi.org/10.1016/j.future.2024.01.032
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 5, displaying
1 - 5
keyword
313
1.
network security
2.
network security monitoring
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security monitoring
15.
cyber security strategies
16.
cyber-security
17.
data and information security
18.
data security
19.
development of security cameras
20.
digital security practices
21.
drinking water security
22.
economic security
23.
economic security of enterprise
24.
emotional security
25.
energy security
26.
energy security indicator
27.
Estonian information security standard
28.
graded security
29.
hardware security
30.
hardware security primitive
31.
Homeland security
32.
human security
33.
information security
34.
information security and privacy
35.
internal security
36.
international security
37.
investment and innovation security
38.
IPv6 security
39.
IT security
40.
IT security management
41.
job security
42.
long-term security
43.
metadata model for security measures
44.
Middle Eastern security
45.
Mobile security
46.
national cyber security strategy
47.
national security
48.
NATO. Science for Peace and Security Program
49.
OSCE (Organization for Security and Co-operation in Europe)
50.
passenger’s security
51.
policy-based routing security
52.
political and security cultures
53.
post-quantum security
54.
power system security
55.
quantitative security
56.
regional security
57.
RISC-V Security Verification
58.
Safety and Security in Sea Transportation
59.
safety and security testing
60.
security
61.
security adaptation
62.
security alert prioritization
63.
security analysis
64.
security and justice (AFSJ)
65.
Security and political science
66.
security and privacy
67.
security and privacy in smart grids
68.
Security Assertion Mining
69.
security closure
70.
Security Coverage
71.
security dataset
72.
security dilemma
73.
Security evaluation
74.
security evaluation instruments
75.
Security limitations
76.
security log analysis
77.
security management
78.
security model
79.
security monitoring
80.
security notion
81.
security objectives
82.
security of data
83.
security of supply
84.
security operation center
85.
security operations center
86.
security patterns
87.
security policy
88.
security problem definition
89.
security proof
90.
security protocols
91.
security requirements
92.
security requirements engineering
93.
security risk assessment
94.
security risk management
95.
security risks
96.
security science and technology
97.
security strategies
98.
security systems for military objects
99.
security testing
100.
security training
101.
security verification
102.
security-by-design
103.
social security planning
104.
societal security
105.
system of economic security
106.
system security
107.
terrorism security
108.
transmission System Security
109.
voting privacy and security
110.
active distribution network management
111.
Adaptive network-based fuzzy inference system (ANFIS)
112.
aec distribution network
113.
analytical flow network analysis
114.
analytical network process
115.
ANDROID network
116.
artificial neural network
117.
A-source network
118.
autoservice network
119.
Bayesian belief network (BBN)
120.
bayesian network (BN)
121.
Binarized Neural Network (BNN)
122.
building site network
123.
business network model
124.
cable network
125.
carbon nanotube network
126.
cascaded forward neural network (CFNN)
127.
cognitive body area network
128.
collaborative network
129.
computer network management
130.
computer network operations
131.
connection network codes
132.
Controller Area Network
133.
Convolutional Neural Network
134.
convolutional neural network (CNN)
135.
coolant network
136.
deep convolutional neural network
137.
deep learning network
138.
deep neural network
139.
deep neural network compression
140.
DH network
141.
distribution network
142.
distribution network
143.
district heat network
144.
district heating network
145.
electric network analysis
146.
electric network parameters
147.
electrical network
148.
emergency network
149.
Event Processing Network (EPN)
150.
Event Processing Network Model
151.
feedforward neural network (FFNN)
152.
flow network analysis
153.
flow network parameters
154.
Fully Convolutional Network (FCN)
155.
Generative Adversarial Network (GaN)
156.
global innovation network
157.
Graph Convolutional Neural Network (GCN)
158.
GraphSAGE (Graph Based Neural Network)
159.
heterogeneous network
160.
hydraulic network model
161.
hypar-network
162.
impedance network
163.
impedance network
164.
impedance source (IS) network
165.
Impedance Source Network
166.
impedance-source network
167.
in-network data processing
168.
innovation network
169.
innovation network agent
170.
joint network-channel coding
171.
knowledge network
172.
levelling network
173.
line impedance stabilization network
174.
linear Delta robots neural network based model
175.
LSTM neural network
176.
lumped parameter network
177.
lumped parameter thermal network
178.
lumped-parameter thermal network
179.
Magnetically Coupled Impedance Source Network (MCIS)
180.
memory network
181.
Mesh Network
182.
modified network cohesion
183.
MRAN (minimum resource allocation network)
184.
nanosheets network
185.
NB-IoT network
186.
NetFlow based network monitoring
187.
network
188.
network access charges
189.
network analysis
190.
network anomaly detection
191.
network architecture
192.
network calculus
193.
network characteristics
194.
network communication technologies
195.
network constraint
196.
network disaggregation
197.
network dynamics
198.
network expansion planning
199.
network externality
200.
network forensics
201.
network function virtualization
202.
network functions virtualization (NFV)
203.
network games
204.
network governance
205.
network IDS alert classification
206.
network industries
207.
network industry
208.
network intrusion detection system
209.
network latencies
210.
network layer
211.
Network lifetime
212.
network measurement
213.
network monitoring
214.
network of co-authorships
215.
network on chip
216.
Network on Chip (NoC)
217.
network partners
218.
network protocol reverse engineering
219.
network protocols
220.
Network QoS
221.
network quality
222.
Network reliability
223.
network resilience
224.
network safety ranking
225.
network slicing
226.
network sparsification
227.
network studies
228.
network theory
229.
network topologies
230.
network topology
231.
network uncertainties
232.
Network visualization
233.
network-on-chip
234.
network-on-ReRAM
235.
network-testing
236.
neural network
237.
neural network architecture search
238.
neural network controller
239.
neural network modelling
240.
neural network models
241.
neural network positioning algorithms
242.
neural network predictive controller
243.
nitrogen-cycling network
244.
non-public network
245.
non-terrestrial network
246.
open value network
247.
partner network
248.
partner network
249.
partner network (PN)
250.
partner network maturity
251.
passive switched capacitor network
252.
PC-corr network
253.
peer to peer network
254.
performance dialogue network
255.
personal area network applications
256.
pervasive public safety network
257.
phosphotransfer network
258.
power delivery network
259.
power distribution network
260.
production in network
261.
proteomic network
262.
public safety network
263.
qZS network
264.
quasi-impedance-source network
265.
quasi-Z-source network
266.
Radial Basis Function Neural Network (RBFNN)
267.
radio access network
268.
radio access network (RAN)
269.
radio access network subslicing
270.
random resistor network
271.
recurrent neural network language model
272.
reluctance network (RN)
273.
research network
274.
Residual Neural Network
275.
road network
276.
roof network
277.
route network
278.
self organizing network
279.
smart distribution network
280.
SMEs network
281.
social network
282.
social network analysis
283.
software-defined network
284.
spiking neural network (SNN)
285.
stretchable network
286.
support network activities
287.
sustainable partner network
288.
sustainable partner network (SPN)
289.
switched capacitor inductor network (SCLN)
290.
Z-source network
291.
technology transfer network
292.
telecommunication network management
293.
telecommunication network performance
294.
Ternary Neural Network
295.
the influence of DHW consumption on dimensioning the DH network
296.
thermal network
297.
tide gauge network
298.
transformer-based neural network
299.
UAV-enabled network
300.
underwater sensor network
301.
Urban Network
302.
utility network
303.
value network analysis
304.
water distribution network
305.
wireless ad hoq network
306.
wireless body area network
307.
Wireless Body Area Network (WBAN)
308.
wireless network
309.
wireless sensor network
310.
wireless sensor network (WSN)
311.
wsn (wireless sensor network)
312.
3D graphene network
313.
3D network topology visualization
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
European Access Network
4.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
TalTech subject term
2
1.
Erasmus Student Network
2.
Islamic Public Value Network
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT