Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
network security (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(3/316)
Export
export all inquiry results
(5)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
Blumbergs, Bernhards
;
Vaarandi, Risto
MILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 2017
2017
/
p. 707-712
https://doi.org/10.1109/MILCOM.2017.8170785
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
2
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
3
journal article EST
/
journal article ENG
Kamerabasiertes Monitoring von Fischen in Deutschland und der Schweiz
Haas, Christian
;
Meyer, Matthias
;
Schmalz, Maria
;
Tuhtan, Jeffrey Andrew
WasserWirtschaft
2024
/
p. 19 - 29
https://doi.org/10.1007/s35147-024-2401-1
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
4
journal article EST
/
journal article ENG
Network IDS alert classification with active learning techniques
Vaarandi, Risto
;
Guerra-Manzanares, Alejandro
Journal of Information Security and Applications
2024
/
art. 103687
https://doi.org/10.1016/j.jisa.2023.103687
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
5
journal article EST
/
journal article ENG
Stream clustering guided supervised learning for classifying NIDS alerts
Vaarandi, Risto
;
Guerra Manzanares, Alejandro
Future generation computer systems
2024
/
p. 231-244 : ill
https://doi.org/10.1016/j.future.2024.01.032
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 5, displaying
1 - 5
keyword
310
1.
network security
2.
network security monitoring
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security monitoring
15.
cyber security strategies
16.
cyber-security
17.
data and information security
18.
data security
19.
development of security cameras
20.
digital security practices
21.
drinking water security
22.
economic security
23.
economic security of enterprise
24.
emotional security
25.
energy security
26.
energy security indicator
27.
Estonian information security standard
28.
graded security
29.
hardware security
30.
hardware security primitive
31.
human security
32.
information security
33.
information security and privacy
34.
internal security
35.
international security
36.
investment and innovation security
37.
IPv6 security
38.
IT security
39.
IT security management
40.
job security
41.
long-term security
42.
metadata model for security measures
43.
Middle Eastern security
44.
Mobile security
45.
national cyber security strategy
46.
national security
47.
NATO. Science for Peace and Security Program
48.
OSCE (Organization for Security and Co-operation in Europe)
49.
passenger’s security
50.
policy-based routing security
51.
political and security cultures
52.
post-quantum security
53.
power system security
54.
quantitative security
55.
regional security
56.
RISC-V Security Verification
57.
Safety and Security in Sea Transportation
58.
safety and security testing
59.
security
60.
security adaptation
61.
security alert prioritization
62.
security analysis
63.
security and justice (AFSJ)
64.
Security and political science
65.
security and privacy
66.
security and privacy in smart grids
67.
Security Assertion Mining
68.
security closure
69.
Security Coverage
70.
security dataset
71.
security dilemma
72.
Security evaluation
73.
security evaluation instruments
74.
Security limitations
75.
security log analysis
76.
security management
77.
security model
78.
security monitoring
79.
security notion
80.
security objectives
81.
security of data
82.
security of supply
83.
security operation center
84.
security operations center
85.
security patterns
86.
security policy
87.
security problem definition
88.
security proof
89.
security protocols
90.
security requirements
91.
security requirements engineering
92.
security risk assessment
93.
security risk management
94.
security risks
95.
security science and technology
96.
security strategies
97.
security systems for military objects
98.
security testing
99.
security training
100.
security verification
101.
security-by-design
102.
social security planning
103.
societal security
104.
system of economic security
105.
system security
106.
terrorism security
107.
transmission System Security
108.
voting privacy and security
109.
active distribution network management
110.
Adaptive network-based fuzzy inference system (ANFIS)
111.
aec distribution network
112.
analytical flow network analysis
113.
analytical network process
114.
ANDROID network
115.
artificial neural network
116.
A-source network
117.
autoservice network
118.
Bayesian belief network (BBN)
119.
bayesian network (BN)
120.
Binarized Neural Network (BNN)
121.
building site network
122.
business network model
123.
cable network
124.
carbon nanotube network
125.
cascaded forward neural network (CFNN)
126.
cognitive body area network
127.
collaborative network
128.
computer network management
129.
computer network operations
130.
connection network codes
131.
Controller Area Network
132.
Convolutional Neural Network
133.
convolutional neural network (CNN)
134.
coolant network
135.
deep convolutional neural network
136.
deep learning network
137.
deep neural network
138.
deep neural network compression
139.
DH network
140.
distribution network
141.
distribution network
142.
district heat network
143.
district heating network
144.
electric network analysis
145.
electric network parameters
146.
electrical network
147.
emergency network
148.
Event Processing Network (EPN)
149.
Event Processing Network Model
150.
feedforward neural network (FFNN)
151.
flow network analysis
152.
flow network parameters
153.
Fully Convolutional Network (FCN)
154.
Generative Adversarial Network (GaN)
155.
global innovation network
156.
Graph Convolutional Neural Network (GCN)
157.
GraphSAGE (Graph Based Neural Network)
158.
heterogeneous network
159.
hydraulic network model
160.
hypar-network
161.
impedance network
162.
impedance network
163.
impedance source (IS) network
164.
Impedance Source Network
165.
impedance-source network
166.
in-network data processing
167.
innovation network
168.
innovation network agent
169.
joint network-channel coding
170.
knowledge network
171.
levelling network
172.
line impedance stabilization network
173.
linear Delta robots neural network based model
174.
LSTM neural network
175.
lumped parameter network
176.
lumped parameter thermal network
177.
lumped-parameter thermal network
178.
Magnetically Coupled Impedance Source Network (MCIS)
179.
memory network
180.
Mesh Network
181.
modified network cohesion
182.
MRAN (minimum resource allocation network)
183.
nanosheets network
184.
NB-IoT network
185.
NetFlow based network monitoring
186.
network
187.
network access charges
188.
network analysis
189.
network anomaly detection
190.
network architecture
191.
network calculus
192.
network characteristics
193.
network communication technologies
194.
network constraint
195.
network disaggregation
196.
network dynamics
197.
network expansion planning
198.
network forensics
199.
network function virtualization
200.
network functions virtualization (NFV)
201.
network games
202.
network governance
203.
network IDS alert classification
204.
network industries
205.
network industry
206.
network intrusion detection system
207.
network latencies
208.
network layer
209.
Network lifetime
210.
network measurement
211.
network monitoring
212.
network of co-authorships
213.
network on chip
214.
Network on Chip (NoC)
215.
network partners
216.
network protocol reverse engineering
217.
network protocols
218.
Network QoS
219.
network quality
220.
Network reliability
221.
network resilience
222.
network safety ranking
223.
network slicing
224.
network sparsification
225.
network studies
226.
network theory
227.
network topologies
228.
network topology
229.
network uncertainties
230.
Network visualization
231.
network-on-chip
232.
network-on-ReRAM
233.
network-testing
234.
neural network
235.
neural network architecture search
236.
neural network controller
237.
neural network modelling
238.
neural network positioning algorithms
239.
neural network predictive controller
240.
nitrogen-cycling network
241.
non-public network
242.
non-terrestrial network
243.
open value network
244.
partner network
245.
partner network
246.
partner network (PN)
247.
partner network maturity
248.
passive switched capacitor network
249.
PC-corr network
250.
peer to peer network
251.
performance dialogue network
252.
personal area network applications
253.
pervasive public safety network
254.
phosphotransfer network
255.
power delivery network
256.
power distribution network
257.
production in network
258.
proteomic network
259.
public safety network
260.
qZS network
261.
quasi-impedance-source network
262.
quasi-Z-source network
263.
Radial Basis Function Neural Network (RBFNN)
264.
radio access network
265.
radio access network (RAN)
266.
radio access network subslicing
267.
random resistor network
268.
recurrent neural network language model
269.
reluctance network (RN)
270.
research network
271.
Residual Neural Network
272.
road network
273.
roof network
274.
route network
275.
self organizing network
276.
smart distribution network
277.
SMEs network
278.
social network
279.
social network analysis
280.
software-defined network
281.
spiking neural network (SNN)
282.
stretchable network
283.
support network activities
284.
sustainable partner network
285.
sustainable partner network (SPN)
286.
switched capacitor inductor network (SCLN)
287.
Z-source network
288.
technology transfer network
289.
telecommunication network management
290.
telecommunication network performance
291.
Ternary Neural Network
292.
the influence of DHW consumption on dimensioning the DH network
293.
thermal network
294.
tide gauge network
295.
transformer-based neural network
296.
UAV-enabled network
297.
underwater sensor network
298.
Urban Network
299.
utility network
300.
value network analysis
301.
water distribution network
302.
wireless ad hoq network
303.
wireless body area network
304.
Wireless Body Area Network (WBAN)
305.
wireless network
306.
wireless sensor network
307.
wireless sensor network (WSN)
308.
wsn (wireless sensor network)
309.
3D graphene network
310.
3D network topology visualization
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
European Access Network
4.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
TalTech subject term
2
1.
Erasmus Student Network
2.
Islamic Public Value Network
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT