Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
detection methods (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(1/234)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Active learning-based mobile malware detection utilizing auto-labeling and data drift detection
Deng, Zhe
;
Hubert, Arthur
;
Ben Yahia, Sadok
;
Bahsi, Hayretdin
Proceedings of the 2024 IEEE International Conference on Cyber Security and Resilience, CSR 2024
2024
/
p. 146 - 151
https://doi.org/10.1109/CSR61664.2024.10679343
Article at Scopus
Article at WOS
book article
2
journal article
Revealing Stachybotrys-like fungal growth in buildings - Possible exposure highlighted through three case studies
Hintikka, Tuomas
;
Andersson, Maria A.
;
Marik, Tamás
;
Mikkola, Raimo
;
Andersson, Magnus
;
Kredics, László
;
Kurnitski, Jarek
;
Salonen, Heidi
Science of the total environment
2025
/
art. 178408
https://doi.org/10.1016/j.scitotenv.2025.178408
journal article
Number of records 2, displaying
1 - 2
keyword
234
1.
detection methods
2.
extraction and detection methods
3.
outlier’s detection methods
4.
phytoplankton detection methods
5.
AI-based fault detection
6.
amoxicillin detection
7.
anomaly detection
8.
anomaly detection for system logs
9.
antibiotic detection
10.
antibiotics detection
11.
aspect detection
12.
asynchronous fault detection
13.
attack detection
14.
barotrauma detection system
15.
Barotrauma detection system sensors
16.
behaviour-based intrusion detection systems
17.
body detection
18.
botnet detection
19.
capacitively coupled conductivity detection
20.
change detection
21.
chemical detection
22.
community detection
23.
compu ter-aided detection(CAD)
24.
computer-aided detection
25.
computer‐aided detection
26.
contactless conductivity detection
27.
contactless conductivity detection (C4D)
28.
crack detection
29.
crash detection
30.
cyber intrusion detection
31.
defect detection
32.
detection
33.
detection efficiency
34.
detection engineering
35.
detection mechanisms
36.
detection method
37.
detection of anomalous end user nodes
38.
detection of hydrogen isotopes
39.
distributed detection
40.
early detection
41.
early intrusion detection
42.
energy detection
43.
error detection
44.
ESI-MS and IM detection
45.
evaluation of explainable AI intrusion detection
46.
Event detection
47.
face detection
48.
Face Manipulation Detection
49.
failure detection
50.
fall detection
51.
fault detection
52.
fault detection and classification
53.
fault detection and diagnoses
54.
fault detection and diagnosis
55.
fault detection and diagnostics (FDD)
56.
Fish detection
57.
fouling detection
58.
harmonic detection
59.
health care IoMT intrusion detection
60.
hepatitis C virus (HCV) detection
61.
hubs detection
62.
hybrid fault detection
63.
IED detection
64.
image-based crack detection
65.
indicident detection and response
66.
indirect UV absorbance detection
67.
intrusion detection
68.
intrusion detection system (IDS)
69.
intrusion detection systems
70.
intrusion detection systems (IDS)
71.
island detection
72.
islanding detection
73.
label-free detection
74.
lane detection
75.
lane line detection
76.
LED fluorescence detection
77.
leg detection
78.
light detection and ranging
79.
light detection and ranging (LiDAR)
80.
Light Detection and Ranging (LiDAR) point cloud
81.
limit of detection
82.
lock-in detection
83.
loop-closure detection
84.
malware detection
85.
marker detection
86.
mobile malware detection
87.
money laundering detection systems
88.
monitoring and detection
89.
multi-classed object detection
90.
Multi-valued Simulation for Hazard Detection in Digital Circuits
91.
mutant detection
92.
network anomaly detection
93.
network intrusion detection system
94.
nodules detection
95.
object detection
96.
oil-spill detection
97.
outliers detection
98.
peak detection
99.
photovoltaic fault detection algorithms
100.
plagiarism detection
101.
position detection
102.
precursor detection
103.
propaganda detection
104.
protein detection
105.
proton detection
106.
radar detection
107.
ramp event detection
108.
recycled FPGA detection
109.
residual current detection
110.
robust detection
111.
scene text detection
112.
short-circuit detection
113.
Side-Channel Attack Detection
114.
small molecule detection
115.
speech activity detection
116.
Suicidal ideation detection
117.
synchronous detection
118.
topic detection
119.
tyre detection
120.
unmanned aerial vehicle detection systems
121.
unsupervised outlier detection
122.
UV detection
123.
vehicle detection
124.
vortex detection
125.
3D lane detection
126.
ab-initio methods
127.
active learning methods
128.
algebraic methods
129.
algebraic/geometric methods
130.
an ensemble of compression methods
131.
analysis methods
132.
analytical methods
133.
approximate methods
134.
approximation methods
135.
assessment methods
136.
Backstepping methods
137.
biology experimental methods
138.
calculation methods
139.
casting methods
140.
Cesaro methods
141.
chemometric methods
142.
computational design methods
143.
computational methods
144.
computer aided methods
145.
computer vision-based methods
146.
control methods
147.
decontamination methods
148.
deep learning methods
149.
Design and assessment methods
150.
design methods
151.
diagnostics methods
152.
didactic methods
153.
digital methods
154.
direct methods
155.
electronic structure methods
156.
ensemble methods
157.
Euler-Knopp methods
158.
excavation methods
159.
finite-element (FE) methods
160.
finite-element methods
161.
finite-element methods (FEM)
162.
finite-element methods (FEMs)
163.
flow assessment methods
164.
formal methods
165.
frontier methods
166.
Gauss-Newton-type methods
167.
Gauss–Newton-type methods
168.
generalized Nörlund methods
169.
geometric methods
170.
graphic methods
171.
hybrid methods
172.
integration methods
173.
interaction methods
174.
interactive teaching methods
175.
interpretation methods
176.
invasive methods
177.
inverse methods
178.
inverse methods for engineering applications
179.
linear and nonlinear unsupervised methods
180.
material characterization methods
181.
Mathematical methods
182.
matrix methods
183.
methods
184.
methods of measuring
185.
methods of study
186.
methods: data analysis
187.
Methods: statistical
188.
mixed methods
189.
mixed-methods
190.
model-free methods
191.
modulation methods
192.
Monte Carlo methods
193.
multi-criteria decision-making methods
194.
nearest neighbor methods
195.
numerical methods
196.
optic methods
197.
optimization methods
198.
physico-chemical methods
199.
plan-driven methods
200.
polynomial methods
201.
practical teaching methods
202.
prediction methods
203.
pseudospectral methods
204.
qualitative methods
205.
qualitative research methods
206.
quantitative methods
207.
regular matrix methods
208.
research methods
209.
reversal methods
210.
sampling methods
211.
selection methods
212.
separation methods
213.
shootthrough control methods
214.
shoot-through control methods
215.
stability prediction methods
216.
standardized methods
217.
state space methods
218.
Statistical methods
219.
statistics methods
220.
substation testing methods
221.
Taguchi methods
222.
teaching methods
223.
testing methods
224.
timber construction (construction methods)
225.
tracer gas methods
226.
transmission line matrix methods
227.
Tree-based methods
228.
variational methods
229.
verification methods
230.
visual methods
231.
visualization design and evaluation methods
232.
X-ray methods
233.
X-ray methods B
234.
finite element methods
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT