Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
network security (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(3/295)
Export
export all inquiry results
(5)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
Blumbergs, Bernhards
;
Vaarandi, Risto
MILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 2017
2017
/
p. 707-712
https://doi.org/10.1109/MILCOM.2017.8170785
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
2
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
3
journal article EST
/
journal article ENG
Kamerabasiertes Monitoring von Fischen in Deutschland und der Schweiz
Haas, Christian
;
Meyer, Matthias
;
Schmalz, Maria
;
Tuhtan, Jeffrey Andrew
WasserWirtschaft
2024
/
p. 19 - 29
https://doi.org/10.1007/s35147-024-2401-1
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
4
journal article EST
/
journal article ENG
Network IDS alert classification with active learning techniques
Vaarandi, Risto
;
Guerra-Manzanares, Alejandro
Journal of Information Security and Applications
2024
/
art. 103687
https://doi.org/10.1016/j.jisa.2023.103687
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
5
journal article EST
/
journal article ENG
Stream clustering guided supervised learning for classifying NIDS alerts
Vaarandi, Risto
;
Guerra Manzanares, Alejandro
Future generation computer systems
2024
/
p. 231-244 : ill
https://doi.org/10.1016/j.future.2024.01.032
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 5, displaying
1 - 5
keyword
290
1.
network security
2.
network security monitoring
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security strategies
15.
cyber-security
16.
data security
17.
development of security cameras
18.
drinking water security
19.
economic security
20.
economic security of enterprise
21.
emotional security
22.
energy security
23.
energy security indicator
24.
Estonian information security standard
25.
graded security
26.
hardware security
27.
hardware security primitive
28.
human security
29.
information security
30.
internal security
31.
international security
32.
investment and innovation security
33.
IPv6 security
34.
IT security
35.
IT security management
36.
job security
37.
long-term security
38.
metadata model for security measures
39.
Middle Eastern security
40.
Mobile security
41.
national cyber security strategy
42.
national security
43.
NATO. Science for Peace and Security Program
44.
OSCE (Organization for Security and Co-operation in Europe)
45.
passenger’s security
46.
policy-based routing security
47.
political and security cultures
48.
post-quantum security
49.
power system security
50.
quantitative security
51.
regional security
52.
RISC-V Security Verification
53.
safety and security testing
54.
security
55.
security adaptation
56.
security alert prioritization
57.
security analysis
58.
security and justice (AFSJ)
59.
security and privacy
60.
security and privacy in smart grids
61.
Security Assertion Mining
62.
security closure
63.
Security Coverage
64.
security dataset
65.
security dilemma
66.
Security evaluation
67.
security evaluation instruments
68.
security log analysis
69.
security management
70.
security model
71.
security monitoring
72.
security notion
73.
security objectives
74.
security of data
75.
security of supply
76.
security operation center
77.
security operations center
78.
security patterns
79.
security policy
80.
security problem definition
81.
security proof
82.
security protocols
83.
security requirements
84.
security requirements engineering
85.
security risk assessment
86.
security risk management
87.
security strategies
88.
security systems for military objects
89.
security testing
90.
security training
91.
security verification
92.
security-by-design
93.
social security planning
94.
societal security
95.
system of economic security
96.
system security
97.
terrorism security
98.
transmission System Security
99.
voting privacy and security
100.
active distribution network management
101.
Adaptive network-based fuzzy inference system (ANFIS)
102.
aec distribution network
103.
analytical flow network analysis
104.
analytical network process
105.
ANDROID network
106.
artificial neural network
107.
A-source network
108.
autoservice network
109.
Bayesian belief network (BBN)
110.
bayesian network (BN)
111.
Binarized Neural Network (BNN)
112.
building site network
113.
business network model
114.
cable network
115.
carbon nanotube network
116.
cascaded forward neural network (CFNN)
117.
cognitive body area network
118.
collaborative network
119.
computer network management
120.
computer network operations
121.
connection network codes
122.
Controller Area Network
123.
Convolutional Neural Network
124.
convolutional neural network (CNN)
125.
coolant network
126.
deep convolutional neural network
127.
deep learning network
128.
deep neural network
129.
deep neural network compression
130.
DH network
131.
distribution network
132.
distribution network
133.
district heat network
134.
district heating network
135.
electric network parameters
136.
electrical network
137.
emergency network
138.
Event Processing Network (EPN)
139.
Event Processing Network Model
140.
feedforward neural network (FFNN)
141.
flow network analysis
142.
flow network parameters
143.
Fully Convolutional Network (FCN)
144.
Generative Adversarial Network (GaN)
145.
global innovation network
146.
Graph Convolutional Neural Network (GCN)
147.
GraphSAGE (Graph Based Neural Network)
148.
heterogeneous network
149.
hydraulic network model
150.
hypar-network
151.
impedance network
152.
impedance network
153.
impedance source (IS) network
154.
Impedance Source Network
155.
impedance-source network
156.
in-network data processing
157.
innovation network
158.
innovation network agent
159.
joint network-channel coding
160.
knowledge network
161.
levelling network
162.
linear Delta robots neural network based model
163.
lumped parameter network
164.
lumped parameter thermal network
165.
lumped-parameter thermal network
166.
Magnetically Coupled Impedance Source Network (MCIS)
167.
memory network
168.
Mesh Network
169.
modified network cohesion
170.
MRAN (minimum resource allocation network)
171.
nanosheets network
172.
NB-IoT network
173.
NetFlow based network monitoring
174.
network
175.
network access charges
176.
network analysis
177.
network anomaly detection
178.
network architecture
179.
network calculus
180.
network characteristics
181.
network communication technologies
182.
network constraint
183.
network disaggregation
184.
network dynamics
185.
network expansion planning
186.
network forensics
187.
network function virtualization
188.
network functions virtualization (NFV)
189.
network games
190.
network governance
191.
network IDS alert classification
192.
network industries
193.
network industry
194.
network intrusion detection system
195.
network latencies
196.
network layer
197.
Network lifetime
198.
network measurement
199.
network monitoring
200.
network of co-authorships
201.
network on chip
202.
Network on Chip (NoC)
203.
network partners
204.
network protocol reverse engineering
205.
network protocols
206.
Network QoS
207.
network quality
208.
Network reliability
209.
network resilience
210.
network safety ranking
211.
network slicing
212.
network sparsification
213.
network studies
214.
network theory
215.
network topologies
216.
network topology
217.
network uncertainties
218.
Network visualization
219.
network-on-chip
220.
network-on-ReRAM
221.
network-testing
222.
neural network
223.
neural network architecture search
224.
neural network controller
225.
neural network modelling
226.
neural network predictive controller
227.
nitrogen-cycling network
228.
open value network
229.
partner network
230.
partner network
231.
partner network (PN)
232.
partner network maturity
233.
passive switched capacitor network
234.
PC-corr network
235.
peer to peer network
236.
performance dialogue network
237.
personal area network applications
238.
pervasive public safety network
239.
phosphotransfer network
240.
power delivery network
241.
power distribution network
242.
production in network
243.
proteomic network
244.
public safety network
245.
qZS network
246.
quasi-impedance-source network
247.
quasi-Z-source network
248.
Radial Basis Function Neural Network (RBFNN)
249.
radio access network (RAN)
250.
radio access network subslicing
251.
random resistor network
252.
recurrent neural network language model
253.
reluctance network (RN)
254.
research network
255.
road network
256.
roof network
257.
route network
258.
self organizing network
259.
smart distribution network
260.
SMEs network
261.
social network
262.
social network analysis
263.
software-defined network
264.
spiking neural network (SNN)
265.
stretchable network
266.
support network activities
267.
sustainable partner network
268.
sustainable partner network (SPN)
269.
switched capacitor inductor network (SCLN)
270.
Z-source network
271.
technology transfer network
272.
telecommunication network management
273.
telecommunication network performance
274.
Ternary Neural Network
275.
the influence of DHW consumption on dimensioning the DH network
276.
thermal network
277.
tide gauge network
278.
UAV-enabled network
279.
underwater sensor network
280.
utility network
281.
value network analysis
282.
water distribution network
283.
wireless ad hoq network
284.
wireless body area network
285.
Wireless Body Area Network (WBAN)
286.
wireless network
287.
wireless sensor network
288.
wsn (wireless sensor network)
289.
3D graphene network
290.
3D network topology visualization
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
European Access Network
4.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
TalTech subject term
1
1.
Erasmus Student Network
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT