Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
network security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(3/294)
Export
export all inquiry results
(5)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
Blumbergs, Bernhards
;
Vaarandi, Risto
MILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 2017
2017
/
p. 707-712
https://doi.org/10.1109/MILCOM.2017.8170785
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
2
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
3
journal article EST
/
journal article ENG
Kamerabasiertes Monitoring von Fischen in Deutschland und der Schweiz
Haas, Christian
;
Meyer, Matthias
;
Schmalz, Maria
;
Tuhtan, Jeffrey Andrew
WasserWirtschaft
2024
/
p. 19 - 29
https://doi.org/10.1007/s35147-024-2401-1
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
4
journal article EST
/
journal article ENG
Network IDS alert classification with active learning techniques
Vaarandi, Risto
;
Guerra-Manzanares, Alejandro
Journal of Information Security and Applications
2024
/
art. 103687
https://doi.org/10.1016/j.jisa.2023.103687
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
5
journal article EST
/
journal article ENG
Stream clustering guided supervised learning for classifying NIDS alerts
Vaarandi, Risto
;
Guerra Manzanares, Alejandro
Future generation computer systems
2024
/
p. 231-244 : ill
https://doi.org/10.1016/j.future.2024.01.032
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 5, displaying
1 - 5
keyword
289
1.
network security
2.
network security monitoring
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security strategies
15.
cyber-security
16.
data security
17.
development of security cameras
18.
drinking water security
19.
economic security
20.
economic security of enterprise
21.
emotional security
22.
energy security
23.
energy security indicator
24.
Estonian information security standard
25.
graded security
26.
hardware security
27.
hardware security primitive
28.
human security
29.
information security
30.
internal security
31.
international security
32.
investment and innovation security
33.
IPv6 security
34.
IT security
35.
IT security management
36.
job security
37.
long-term security
38.
metadata model for security measures
39.
Middle Eastern security
40.
Mobile security
41.
national cyber security strategy
42.
national security
43.
NATO. Science for Peace and Security Program
44.
OSCE (Organization for Security and Co-operation in Europe)
45.
passenger’s security
46.
policy-based routing security
47.
political and security cultures
48.
post-quantum security
49.
power system security
50.
quantitative security
51.
regional security
52.
RISC-V Security Verification
53.
safety and security testing
54.
security
55.
security adaptation
56.
security alert prioritization
57.
security analysis
58.
security and justice (AFSJ)
59.
security and privacy
60.
security and privacy in smart grids
61.
Security Assertion Mining
62.
security closure
63.
Security Coverage
64.
security dataset
65.
security dilemma
66.
Security evaluation
67.
security evaluation instruments
68.
security log analysis
69.
security management
70.
security model
71.
security monitoring
72.
security notion
73.
security objectives
74.
security of data
75.
security of supply
76.
security operation center
77.
security operations center
78.
security patterns
79.
security policy
80.
security problem definition
81.
security proof
82.
security protocols
83.
security requirements
84.
security requirements engineering
85.
security risk assessment
86.
security risk management
87.
security strategies
88.
security systems for military objects
89.
security testing
90.
security training
91.
security verification
92.
security-by-design
93.
social security planning
94.
societal security
95.
system of economic security
96.
system security
97.
terrorism security
98.
transmission System Security
99.
voting privacy and security
100.
active distribution network management
101.
Adaptive network-based fuzzy inference system (ANFIS)
102.
aec distribution network
103.
analytical flow network analysis
104.
analytical network process
105.
ANDROID network
106.
artificial neural network
107.
A-source network
108.
autoservice network
109.
Bayesian belief network (BBN)
110.
bayesian network (BN)
111.
Binarized Neural Network (BNN)
112.
building site network
113.
business network model
114.
cable network
115.
carbon nanotube network
116.
cascaded forward neural network (CFNN)
117.
cognitive body area network
118.
collaborative network
119.
computer network management
120.
computer network operations
121.
connection network codes
122.
Controller Area Network
123.
Convolutional Neural Network
124.
convolutional neural network (CNN)
125.
coolant network
126.
deep convolutional neural network
127.
deep learning network
128.
deep neural network
129.
deep neural network compression
130.
DH network
131.
distribution network
132.
distribution network
133.
district heat network
134.
district heating network
135.
electric network parameters
136.
electrical network
137.
emergency network
138.
Event Processing Network (EPN)
139.
Event Processing Network Model
140.
feedforward neural network (FFNN)
141.
flow network analysis
142.
flow network parameters
143.
Fully Convolutional Network (FCN)
144.
Generative Adversarial Network (GaN)
145.
global innovation network
146.
Graph Convolutional Neural Network (GCN)
147.
GraphSAGE (Graph Based Neural Network)
148.
heterogeneous network
149.
hydraulic network model
150.
hypar-network
151.
impedance network
152.
impedance network
153.
impedance source (IS) network
154.
Impedance Source Network
155.
impedance-source network
156.
in-network data processing
157.
innovation network
158.
innovation network agent
159.
joint network-channel coding
160.
knowledge network
161.
levelling network
162.
linear Delta robots neural network based model
163.
lumped parameter network
164.
lumped parameter thermal network
165.
lumped-parameter thermal network
166.
Magnetically Coupled Impedance Source Network (MCIS)
167.
memory network
168.
Mesh Network
169.
modified network cohesion
170.
MRAN (minimum resource allocation network)
171.
nanosheets network
172.
NB-IoT network
173.
NetFlow based network monitoring
174.
network
175.
network access charges
176.
network analysis
177.
network anomaly detection
178.
network architecture
179.
network calculus
180.
network characteristics
181.
network communication technologies
182.
network constraint
183.
network disaggregation
184.
network dynamics
185.
network expansion planning
186.
network forensics
187.
network function virtualization
188.
network functions virtualization (NFV)
189.
network games
190.
network governance
191.
network IDS alert classification
192.
network industries
193.
network industry
194.
network intrusion detection system
195.
network latencies
196.
network layer
197.
Network lifetime
198.
network measurement
199.
network monitoring
200.
network of co-authorships
201.
network on chip
202.
Network on Chip (NoC)
203.
network partners
204.
network protocol reverse engineering
205.
network protocols
206.
Network QoS
207.
network quality
208.
Network reliability
209.
network safety ranking
210.
network slicing
211.
network sparsification
212.
network studies
213.
network theory
214.
network topologies
215.
network topology
216.
network uncertainties
217.
Network visualization
218.
network-on-chip
219.
network-on-ReRAM
220.
network-testing
221.
neural network
222.
neural network architecture search
223.
neural network controller
224.
neural network modelling
225.
neural network predictive controller
226.
nitrogen-cycling network
227.
open value network
228.
partner network
229.
partner network
230.
partner network (PN)
231.
partner network maturity
232.
passive switched capacitor network
233.
PC-corr network
234.
peer to peer network
235.
performance dialogue network
236.
personal area network applications
237.
pervasive public safety network
238.
phosphotransfer network
239.
power delivery network
240.
power distribution network
241.
production in network
242.
proteomic network
243.
public safety network
244.
qZS network
245.
quasi-impedance-source network
246.
quasi-Z-source network
247.
Radial Basis Function Neural Network (RBFNN)
248.
radio access network (RAN)
249.
radio access network subslicing
250.
random resistor network
251.
recurrent neural network language model
252.
reluctance network (RN)
253.
research network
254.
road network
255.
roof network
256.
route network
257.
self organizing network
258.
smart distribution network
259.
SMEs network
260.
social network
261.
social network analysis
262.
software-defined network
263.
spiking neural network (SNN)
264.
stretchable network
265.
support network activities
266.
sustainable partner network
267.
sustainable partner network (SPN)
268.
switched capacitor inductor network (SCLN)
269.
Z-source network
270.
technology transfer network
271.
telecommunication network management
272.
telecommunication network performance
273.
Ternary Neural Network
274.
the influence of DHW consumption on dimensioning the DH network
275.
thermal network
276.
tide gauge network
277.
UAV-enabled network
278.
underwater sensor network
279.
utility network
280.
value network analysis
281.
water distribution network
282.
wireless ad hoq network
283.
wireless body area network
284.
Wireless Body Area Network (WBAN)
285.
wireless network
286.
wireless sensor network
287.
wsn (wireless sensor network)
288.
3D graphene network
289.
3D network topology visualization
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
European Access Network
4.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
TTÜ subject term
1
1.
Erasmus Student Network
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT