Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
intrusion detection system (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(1/119)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
EARLY: a tool for real-time security attack detection
Ahmad, Tanwir
;
Truscan, Dragos
;
Vain, Jüri
CyberSecurity in a DevOps Environment: From Requirements to Monitoring
2024
/
p. 225-251
https://doi.org/10.1007/978-3-031-42212-6_8
Article at Scopus
book article
2
book article EST
/
book article ENG
Technical Considerations for Open-Source Intrusion Detection System Integration in Marine Vehicle
Visky, Gabor
;
Khisteva, Dariana
;
Maennel, Olaf Manuel
Maritime Cybersecurity
2025
/
p. 143-160
https://doi.org/10.1007/978-3-031-87290-7_8
book article EST
/
book article ENG
Number of records 2, displaying
1 - 2
keyword
119
1.
intrusion detection system
2.
intrusion detection system (IDS)
3.
network intrusion detection system
4.
behaviour-based intrusion detection systems
5.
intrusion detection systems
6.
cyber intrusion detection
7.
early intrusion detection
8.
intrusion detection
9.
intrusion response system
10.
anomaly detection for system logs
11.
barotrauma detection system
12.
Barotrauma detection system sensors
13.
air intrusion
14.
intrusion
15.
saline intrusion blockage
16.
amoxicillin detection
17.
anomaly detection
18.
antibiotic detection
19.
antibiotics detection
20.
aspect detection
21.
asynchronous fault detection
22.
attack detection
23.
body detection
24.
botnet detection
25.
capacitively coupled conductivity detection
26.
change detection
27.
chemical detection
28.
community detection
29.
compu ter-aided detection(CAD)
30.
computer-aided detection
31.
computer‐aided detection
32.
contactless conductivity detection
33.
contactless conductivity detection (C4D)
34.
crack detection
35.
crash detection
36.
defect detection
37.
detection
38.
detection efficiency
39.
detection engineering
40.
detection mechanisms
41.
detection method
42.
detection methods
43.
detection of anomalous end user nodes
44.
detection of hydrogen isotopes
45.
distributed detection
46.
early detection
47.
energy detection
48.
error detection
49.
ESI-MS and IM detection
50.
Event detection
51.
extraction and detection methods
52.
face detection
53.
Face Manipulation Detection
54.
failure detection
55.
fall detection
56.
fault detection
57.
fault detection and diagnoses
58.
fault detection and diagnosis
59.
Fish detection
60.
fouling detection
61.
harmonic detection
62.
hepatitis C virus (HCV) detection
63.
hubs detection
64.
IED detection
65.
image-based crack detection
66.
indicident detection and response
67.
indirect UV absorbance detection
68.
island detection
69.
islanding detection
70.
label-free detection
71.
lane detection
72.
LED fluorescence detection
73.
leg detection
74.
light detection and ranging
75.
light detection and ranging (LiDAR)
76.
Light Detection and Ranging (LiDAR) point cloud
77.
limit of detection
78.
lock-in detection
79.
loop-closure detection
80.
malware detection
81.
marker detection
82.
mobile malware detection
83.
money laundering detection systems
84.
monitoring and detection
85.
multi-classed object detection
86.
Multi-valued Simulation for Hazard Detection in Digital Circuits
87.
mutant detection
88.
network anomaly detection
89.
nodules detection
90.
object detection
91.
oil-spill detection
92.
outlier’s detection methods
93.
outliers detection
94.
peak detection
95.
phytoplankton detection methods
96.
plagiarism detection
97.
position detection
98.
precursor detection
99.
protein detection
100.
proton detection
101.
radar detection
102.
ramp event detection
103.
recycled FPGA detection
104.
residual current detection
105.
robust detection
106.
scene text detection
107.
short-circuit detection
108.
small molecule detection
109.
speech activity detection
110.
Suicidal ideation detection
111.
synchronous detection
112.
topic detection
113.
tyre detection
114.
unmanned aerial vehicle detection systems
115.
unsupervised outlier detection
116.
UV detection
117.
vehicle detection
118.
vortex detection
119.
3D lane detection
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT