Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
detection methods (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(1/213)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Active learning-based mobile malware detection utilizing auto-labeling and data drift detection
Deng, Zhe
;
Hubert, Arthur
;
Ben Yahia, Sadok
;
Bahsi, Hayretdin
Proceedings of the 2024 IEEE International Conference on Cyber Security and Resilience, CSR 2024
2024
/
p. 146 - 151
https://doi.org/10.1109/CSR61664.2024.10679343
Article at Scopus
Article at WOS
book article
2
journal article
Revealing Stachybotrys-like fungal growth in buildings - Possible exposure highlighted through three case studies
Hintikka, Tuomas
;
Andersson, Maria A.
;
Marik, Tamás
;
Mikkola, Raimo
;
Andersson, Magnus
;
Kredics, László
;
Kurnitski, Jarek
;
Salonen, Heidi
Science of the total environment
2025
/
art. 178408
https://doi.org/10.1016/j.scitotenv.2025.178408
journal article
Number of records 2, displaying
1 - 2
keyword
213
1.
detection methods
2.
extraction and detection methods
3.
outlier’s detection methods
4.
phytoplankton detection methods
5.
amoxicillin detection
6.
anomaly detection
7.
anomaly detection for system logs
8.
antibiotic detection
9.
antibiotics detection
10.
aspect detection
11.
asynchronous fault detection
12.
attack detection
13.
barotrauma detection system
14.
behaviour-based intrusion detection systems
15.
body detection
16.
botnet detection
17.
capacitively coupled conductivity detection
18.
change detection
19.
chemical detection
20.
community detection
21.
compu ter-aided detection(CAD)
22.
computer-aided detection
23.
computer‐aided detection
24.
contactless conductivity detection
25.
contactless conductivity detection (C4D)
26.
crack detection
27.
crash detection
28.
cyber intrusion detection
29.
defect detection
30.
detection
31.
detection efficiency
32.
detection engineering
33.
detection method
34.
detection of anomalous end user nodes
35.
detection of hydrogen isotopes
36.
distributed detection
37.
early detection
38.
early intrusion detection
39.
energy detection
40.
error detection
41.
ESI-MS and IM detection
42.
Event detection
43.
face detection
44.
Face Manipulation Detection
45.
failure detection
46.
fall detection
47.
fault detection
48.
fault detection and diagnoses
49.
fault detection and diagnosis
50.
Fish detection
51.
fouling detection
52.
harmonic detection
53.
hepatitis C virus (HCV) detection
54.
hubs detection
55.
IED detection
56.
image-based crack detection
57.
indicident detection and response
58.
indirect UV absorbance detection
59.
intrusion detection
60.
intrusion detection system
61.
intrusion detection system (IDS)
62.
intrusion detection systems
63.
island detection
64.
islanding detection
65.
label-free detection
66.
LED fluorescence detection
67.
leg detection
68.
light detection and ranging
69.
light detection and ranging (LiDAR)
70.
Light Detection and Ranging (LiDAR) point cloud
71.
limit of detection
72.
lock-in detection
73.
loop-closure detection
74.
malware detection
75.
marker detection
76.
mobile malware detection
77.
money laundering detection systems
78.
monitoring and detection
79.
multi-classed object detection
80.
Multi-valued Simulation for Hazard Detection in Digital Circuits
81.
mutant detection
82.
network anomaly detection
83.
network intrusion detection system
84.
nodules detection
85.
object detection
86.
oil-spill detection
87.
outliers detection
88.
peak detection
89.
plagiarism detection
90.
position detection
91.
precursor detection
92.
protein detection
93.
proton detection
94.
radar detection
95.
ramp event detection
96.
recycled FPGA detection
97.
residual current detection
98.
robust detection
99.
scene text detection
100.
short-circuit detection
101.
small molecule detection
102.
speech activity detection
103.
Suicidal ideation detection
104.
synchronous detection
105.
tyre detection
106.
unmanned aerial vehicle detection systems
107.
unsupervised outlier detection
108.
UV detection
109.
vehicle detection
110.
vortex detection
111.
3D lane detection
112.
ab-initio methods
113.
active learning methods
114.
algebraic methods
115.
algebraic/geometric methods
116.
an ensemble of compression methods
117.
analysis methods
118.
analytical methods
119.
approximate methods
120.
approximation methods
121.
assessment methods
122.
Backstepping methods
123.
biology experimental methods
124.
calculation methods
125.
Cesaro methods
126.
chemometric methods
127.
computational design methods
128.
computational methods
129.
computer aided methods
130.
control methods
131.
decontamination methods
132.
deep learning methods
133.
Design and assessment methods
134.
design methods
135.
diagnostics methods
136.
didactic methods
137.
digital methods
138.
electronic structure methods
139.
ensemble methods
140.
Euler-Knopp methods
141.
excavation methods
142.
finite-element (FE) methods
143.
finite-element methods
144.
finite-element methods (FEM)
145.
flow assessment methods
146.
formal methods
147.
frontier methods
148.
Gauss-Newton-type methods
149.
Gauss–Newton-type methods
150.
generalized Nörlund methods
151.
geometric methods
152.
graphic methods
153.
integration methods
154.
interaction methods
155.
interactive teaching methods
156.
interpretation methods
157.
invasive methods
158.
inverse methods
159.
inverse methods for engineering applications
160.
linear and nonlinear unsupervised methods
161.
material characterization methods
162.
Mathematical methods
163.
matrix methods
164.
methods
165.
methods of measuring
166.
methods of study
167.
methods: data analysis
168.
Methods: statistical
169.
mixed methods
170.
mixed-methods
171.
model-free methods
172.
modulation methods
173.
Monte Carlo methods
174.
nearest neighbor methods
175.
numerical methods
176.
optimization methods
177.
physico-chemical methods
178.
plan-driven methods
179.
polynomial methods
180.
practical teaching methods
181.
prediction methods
182.
pseudospectral methods
183.
qualitative methods
184.
qualitative research methods
185.
quantitative methods
186.
regular matrix methods
187.
research methods
188.
reversal methods
189.
sampling methods
190.
selection methods
191.
separation methods
192.
shootthrough control methods
193.
shoot-through control methods
194.
stability prediction methods
195.
standardized methods
196.
state space methods
197.
Statistical methods
198.
statistics methods
199.
substation testing methods
200.
Taguchi methods
201.
teaching methods
202.
testing methods
203.
timber construction (construction methods)
204.
tracer gas methods
205.
transmission line matrix methods
206.
Tree-based methods
207.
variational methods
208.
verification methods
209.
visual methods
210.
visualization design and evaluation methods
211.
X-ray methods
212.
X-ray methods B
213.
finite element methods
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT