Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
intrusion detection system (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(1/115)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
EARLY: a tool for real-time security attack detection
Ahmad, Tanwir
;
Truscan, Dragos
;
Vain, Jüri
CyberSecurity in a DevOps Environment: From Requirements to Monitoring
2024
/
p. 225-251
https://doi.org/10.1007/978-3-031-42212-6_8
Article at Scopus
book article
2
book article EST
/
book article ENG
Technical Considerations for Open-Source Intrusion Detection System Integration in Marine Vehicle
Visky, Gabor
;
Khisteva, Dariana
;
Maennel, Olaf Manuel
Maritime Cybersecurity
2025
/
p. 143-160
https://doi.org/10.1007/978-3-031-87290-7_8
book article EST
/
book article ENG
Number of records 2, displaying
1 - 2
keyword
115
1.
intrusion detection system
2.
intrusion detection system (IDS)
3.
network intrusion detection system
4.
behaviour-based intrusion detection systems
5.
intrusion detection systems
6.
cyber intrusion detection
7.
early intrusion detection
8.
intrusion detection
9.
intrusion response system
10.
anomaly detection for system logs
11.
barotrauma detection system
12.
air intrusion
13.
intrusion
14.
saline intrusion blockage
15.
amoxicillin detection
16.
anomaly detection
17.
antibiotic detection
18.
antibiotics detection
19.
aspect detection
20.
asynchronous fault detection
21.
attack detection
22.
body detection
23.
botnet detection
24.
capacitively coupled conductivity detection
25.
change detection
26.
chemical detection
27.
community detection
28.
compu ter-aided detection(CAD)
29.
computer-aided detection
30.
computer‐aided detection
31.
contactless conductivity detection
32.
contactless conductivity detection (C4D)
33.
crack detection
34.
crash detection
35.
defect detection
36.
detection
37.
detection efficiency
38.
detection engineering
39.
detection method
40.
detection methods
41.
detection of anomalous end user nodes
42.
detection of hydrogen isotopes
43.
distributed detection
44.
early detection
45.
energy detection
46.
error detection
47.
ESI-MS and IM detection
48.
Event detection
49.
extraction and detection methods
50.
face detection
51.
Face Manipulation Detection
52.
failure detection
53.
fall detection
54.
fault detection
55.
fault detection and diagnoses
56.
fault detection and diagnosis
57.
Fish detection
58.
fouling detection
59.
harmonic detection
60.
hepatitis C virus (HCV) detection
61.
hubs detection
62.
IED detection
63.
image-based crack detection
64.
indicident detection and response
65.
indirect UV absorbance detection
66.
island detection
67.
islanding detection
68.
label-free detection
69.
LED fluorescence detection
70.
leg detection
71.
light detection and ranging
72.
light detection and ranging (LiDAR)
73.
Light Detection and Ranging (LiDAR) point cloud
74.
limit of detection
75.
lock-in detection
76.
loop-closure detection
77.
malware detection
78.
marker detection
79.
mobile malware detection
80.
money laundering detection systems
81.
monitoring and detection
82.
multi-classed object detection
83.
Multi-valued Simulation for Hazard Detection in Digital Circuits
84.
mutant detection
85.
network anomaly detection
86.
nodules detection
87.
object detection
88.
oil-spill detection
89.
outlier’s detection methods
90.
outliers detection
91.
peak detection
92.
phytoplankton detection methods
93.
plagiarism detection
94.
position detection
95.
precursor detection
96.
protein detection
97.
proton detection
98.
radar detection
99.
ramp event detection
100.
recycled FPGA detection
101.
residual current detection
102.
robust detection
103.
scene text detection
104.
short-circuit detection
105.
small molecule detection
106.
speech activity detection
107.
Suicidal ideation detection
108.
synchronous detection
109.
tyre detection
110.
unmanned aerial vehicle detection systems
111.
unsupervised outlier detection
112.
UV detection
113.
vehicle detection
114.
vortex detection
115.
3D lane detection
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT