Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
anomaly detection (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
10
Look more..
(1/126)
Export
export all inquiry results
(10)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
AIS data analysis: reality in the Sea of Echos
Visky, Gabor
;
Rohl, Alexander
;
Katsikas, Sokratis
;
Maennel, Olaf Manuel
2024 IEEE 49th Conference on Local Computer Networks (LCN)
2024
/
7 p
https://doi.org/10.1109/LCN60385.2024.10639765
book article
2
book article
Anomalous File System Activity detection through Temporal Association rule mining
Reza, M.
;
Iman, H.
;
Chikul, Pavel
;
Jervan, Gert
;
Bahsi, Hayretdin
;
Ghasempouri, Tara
Proceedings of the 9th International Conference on Information Systems Security and Privacy ICISSP. Vol. 1
2023
/
p. 733-740
https://doi.org//10.5220/0000168400003405
book article
3
book article
MedBIoT : generation of an IoT Botnet Dataset in a medium-sized IoT network
Guerra Manzanares, Alejandro
;
Medina-Galindo, Jorge
;
Bahsi, Hayretdin
;
Nõmm, Sven
Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP : February 25-27, 2020, La Valletta, Malta. Vol. 1
2020
/
p. 207-218 : ill
https://doi.org/10.5220/0009187802070218
book article
Related publications
1
Machine learning-based detection and characterization of evolving threats in mobile and IoT Systems = Masinõppepõhine arenevate ohtude tuvastamine ning kirjeldamine mobiilseadmete ja värkvõrkude jaoks
4
journal article
Novel real-time in-step gait anomaly detection algorithms
Rostovski, Jakob
;
Krivošei, Andrei
;
Kuusik, Alar
;
Le Moullec, Yannick
;
Alam, Muhammad Mahtab
techrxiv.org
2024
https://doi.org/10.36227/techrxiv.171173236.66440239/v1
journal article
5
book article EST
/
book article ENG
Real-time gait anomaly detection using 1D-CNN and LSTM
Rostovski, Jakob
;
Ahmadilivani, Mohammad Hasan
;
Krivošei, Andrei
;
Kuusik, Alar
;
Alam, Muhammad Mahtab
Digital Health and Wireless Solutions : First Nordic Conference, NCDHWS 2024, Oulu, Finland, May 7–8, 2024 : Proceedings, Part II
2024
/
p. 260-278
https://doi.org/10.1007/978-3-031-59091-7_17
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
Related publications
1
Development of methods for real-time in-step anomaly detection in gait analysis = Reaalajaliste meetodite arendus sammusiseste kõrvalkallete tuvastamiseks kõnnianalüüsis
6
book article
Real-time gait anomaly detection using SVM time series classification
Rostovski, Jakob
;
Krivošei, Andrei
;
Kuusik, Alar
;
Alam, Muhammad Mahtab
;
Ahmadov, Ulvi
2023 International Wireless Communications and Mobile Computing (IWCMC)
2023
/
p. 1389-1394
https://doi.org/10.1109/IWCMC58020.2023.10182666
book article
Related publications
1
Development of methods for real-time in-step anomaly detection in gait analysis = Reaalajaliste meetodite arendus sammusiseste kõrvalkallete tuvastamiseks kõnnianalüüsis
7
book article EST
/
book article ENG
Signature-based approach to detecting malicious outgoing traffic
Petliak, Nataliia
;
Klots, Yurii
;
Titova, Vira
;
Cheshun, Viktor
;
Boyarchuk, Artem
IntelITSIS 2023: Intelligent Information Technologies & Systems of Information Security 2023 : proceedings of the 4th International Workshop on Intelligent Information Technologies & Systems of Information Security : Khmelnytskyi, Ukraine, March 22-24, 2023
2023
/
p. 486 - 506
https://ceur-ws.org/Vol-3373/paper33.pdf
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
8
book article
Unsupervised anomaly based botnet detection in IoT networks
Nõmm, Sven
;
Bahsi, Hayretdin
17th IEEE International Conference on Machine Learning and Applications : ICMLA 2018, 17–20 December 2018, Orlando, Florida, USA : proceedings
2018
/
p. 1048-1053
https://doi.org/10.1109/ICMLA.2018.00171
book article
9
book article
Using Incremental Inductive Logic Programming for Learning Spoofing Attacks on Maritime Automatic Identification System Data
Benterki, Aboubaker Seddiq
;
Visky, Gabor
;
Vain, Jüri
;
Tsiopoulos, Leonidas
Maritime Cybersecurity
2025
/
p. 123-141
https://doi.org/10.1007/978-3-031-87290-7_7
book article
10
book article EST
/
book article ENG
Using MedBIoT dataset to build effective machine learning-based IoT botnet detection systems
Guerra Manzanares, Alejandro
;
Medina-Galindo, Jorge
;
Bahsi, Hayretdin
;
Nõmm, Sven
Information Systems Security and Privacy : 6th International Conference, ICISSP 2020, Valletta, Malta, February 25–27, 2020 : revised selected papers
2022
/
p. 222–243
https://doi.org/10.1007/978-3-030-94900-6_11
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
Related publications
1
Machine learning-based detection and characterization of evolving threats in mobile and IoT Systems = Masinõppepõhine arenevate ohtude tuvastamine ning kirjeldamine mobiilseadmete ja värkvõrkude jaoks
Number of records 10, displaying
1 - 10
keyword
126
1.
anomaly detection
2.
anomaly detection for system logs
3.
network anomaly detection
4.
cerium anomaly europium anomaly
5.
anomaly
6.
Bouguer anomaly
7.
Ce anomaly
8.
cerium anomaly
9.
europium anomaly
10.
gravity anomaly
11.
residual gravity anomaly
12.
Residual Terrain Model (RTM) anomaly
13.
residual terrain model anomaly
14.
wind anomaly
15.
amoxicillin detection
16.
antibiotic detection
17.
antibiotics detection
18.
aspect detection
19.
asynchronous fault detection
20.
attack detection
21.
barotrauma detection system
22.
Barotrauma detection system sensors
23.
behaviour-based intrusion detection systems
24.
body detection
25.
botnet detection
26.
capacitively coupled conductivity detection
27.
change detection
28.
chemical detection
29.
community detection
30.
compu ter-aided detection(CAD)
31.
computer-aided detection
32.
computer‐aided detection
33.
contactless conductivity detection
34.
contactless conductivity detection (C4D)
35.
crack detection
36.
crash detection
37.
cyber intrusion detection
38.
defect detection
39.
detection
40.
detection efficiency
41.
detection engineering
42.
detection mechanisms
43.
detection method
44.
detection methods
45.
detection of anomalous end user nodes
46.
detection of hydrogen isotopes
47.
distributed detection
48.
early detection
49.
early intrusion detection
50.
energy detection
51.
error detection
52.
ESI-MS and IM detection
53.
Event detection
54.
extraction and detection methods
55.
face detection
56.
Face Manipulation Detection
57.
failure detection
58.
fall detection
59.
fault detection
60.
fault detection and diagnoses
61.
fault detection and diagnosis
62.
Fish detection
63.
fouling detection
64.
harmonic detection
65.
hepatitis C virus (HCV) detection
66.
hubs detection
67.
IED detection
68.
image-based crack detection
69.
indicident detection and response
70.
indirect UV absorbance detection
71.
intrusion detection
72.
intrusion detection system
73.
intrusion detection system (IDS)
74.
intrusion detection systems
75.
island detection
76.
islanding detection
77.
label-free detection
78.
lane detection
79.
LED fluorescence detection
80.
leg detection
81.
light detection and ranging
82.
light detection and ranging (LiDAR)
83.
Light Detection and Ranging (LiDAR) point cloud
84.
limit of detection
85.
lock-in detection
86.
loop-closure detection
87.
malware detection
88.
marker detection
89.
mobile malware detection
90.
money laundering detection systems
91.
monitoring and detection
92.
multi-classed object detection
93.
Multi-valued Simulation for Hazard Detection in Digital Circuits
94.
mutant detection
95.
network intrusion detection system
96.
nodules detection
97.
object detection
98.
oil-spill detection
99.
outlier’s detection methods
100.
outliers detection
101.
peak detection
102.
phytoplankton detection methods
103.
plagiarism detection
104.
position detection
105.
precursor detection
106.
protein detection
107.
proton detection
108.
radar detection
109.
ramp event detection
110.
recycled FPGA detection
111.
residual current detection
112.
robust detection
113.
scene text detection
114.
short-circuit detection
115.
small molecule detection
116.
speech activity detection
117.
Suicidal ideation detection
118.
synchronous detection
119.
topic detection
120.
tyre detection
121.
unmanned aerial vehicle detection systems
122.
unsupervised outlier detection
123.
UV detection
124.
vehicle detection
125.
vortex detection
126.
3D lane detection
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT