Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
anomaly detection (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
10
Look more..
(1/129)
Export
export all inquiry results
(10)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
AIS data analysis: reality in the Sea of Echos
Visky, Gabor
;
Rohl, Alexander
;
Katsikas, Sokratis
;
Maennel, Olaf Manuel
2024 IEEE 49th Conference on Local Computer Networks (LCN)
2024
/
7 p
https://doi.org/10.1109/LCN60385.2024.10639765
book article
2
book article
Anomalous File System Activity detection through Temporal Association rule mining
Reza, M.
;
Iman, H.
;
Chikul, Pavel
;
Jervan, Gert
;
Bahsi, Hayretdin
;
Ghasempouri, Tara
Proceedings of the 9th International Conference on Information Systems Security and Privacy ICISSP. Vol. 1
2023
/
p. 733-740
https://doi.org//10.5220/0000168400003405
book article
3
book article
MedBIoT : generation of an IoT Botnet Dataset in a medium-sized IoT network
Guerra Manzanares, Alejandro
;
Medina-Galindo, Jorge
;
Bahsi, Hayretdin
;
Nõmm, Sven
Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP : February 25-27, 2020, La Valletta, Malta. Vol. 1
2020
/
p. 207-218 : ill
https://doi.org/10.5220/0009187802070218
book article
Related publications
1
Machine learning-based detection and characterization of evolving threats in mobile and IoT Systems = Masinõppepõhine arenevate ohtude tuvastamine ning kirjeldamine mobiilseadmete ja värkvõrkude jaoks
4
journal article
Novel real-time in-step gait anomaly detection algorithms
Rostovski, Jakob
;
Krivošei, Andrei
;
Kuusik, Alar
;
Le Moullec, Yannick
;
Alam, Muhammad Mahtab
techrxiv.org
2024
https://doi.org/10.36227/techrxiv.171173236.66440239/v1
journal article
5
book article EST
/
book article ENG
Real-time gait anomaly detection using 1D-CNN and LSTM
Rostovski, Jakob
;
Ahmadilivani, Mohammad Hasan
;
Krivošei, Andrei
;
Kuusik, Alar
;
Alam, Muhammad Mahtab
Digital Health and Wireless Solutions : First Nordic Conference, NCDHWS 2024, Oulu, Finland, May 7–8, 2024 : Proceedings, Part II
2024
/
p. 260-278
https://doi.org/10.1007/978-3-031-59091-7_17
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
Related publications
1
Development of methods for real-time in-step anomaly detection in gait analysis = Reaalajaliste meetodite arendus sammusiseste kõrvalkallete tuvastamiseks kõnnianalüüsis
6
book article
Real-time gait anomaly detection using SVM time series classification
Rostovski, Jakob
;
Krivošei, Andrei
;
Kuusik, Alar
;
Alam, Muhammad Mahtab
;
Ahmadov, Ulvi
2023 International Wireless Communications and Mobile Computing (IWCMC)
2023
/
p. 1389-1394
https://doi.org/10.1109/IWCMC58020.2023.10182666
book article
Related publications
1
Development of methods for real-time in-step anomaly detection in gait analysis = Reaalajaliste meetodite arendus sammusiseste kõrvalkallete tuvastamiseks kõnnianalüüsis
7
book article EST
/
book article ENG
Signature-based approach to detecting malicious outgoing traffic
Petliak, Nataliia
;
Klots, Yurii
;
Titova, Vira
;
Cheshun, Viktor
;
Boyarchuk, Artem
IntelITSIS 2023: Intelligent Information Technologies & Systems of Information Security 2023 : proceedings of the 4th International Workshop on Intelligent Information Technologies & Systems of Information Security : Khmelnytskyi, Ukraine, March 22-24, 2023
2023
/
p. 486 - 506
https://ceur-ws.org/Vol-3373/paper33.pdf
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
8
book article
Unsupervised anomaly based botnet detection in IoT networks
Nõmm, Sven
;
Bahsi, Hayretdin
17th IEEE International Conference on Machine Learning and Applications : ICMLA 2018, 17–20 December 2018, Orlando, Florida, USA : proceedings
2018
/
p. 1048-1053
https://doi.org/10.1109/ICMLA.2018.00171
book article
9
book article
Using Incremental Inductive Logic Programming for Learning Spoofing Attacks on Maritime Automatic Identification System Data
Benterki, Aboubaker Seddiq
;
Visky, Gabor
;
Vain, Jüri
;
Tsiopoulos, Leonidas
Maritime Cybersecurity
2025
/
p. 123-141
https://doi.org/10.1007/978-3-031-87290-7_7
book article
10
book article EST
/
book article ENG
Using MedBIoT dataset to build effective machine learning-based IoT botnet detection systems
Guerra Manzanares, Alejandro
;
Medina-Galindo, Jorge
;
Bahsi, Hayretdin
;
Nõmm, Sven
Information Systems Security and Privacy : 6th International Conference, ICISSP 2020, Valletta, Malta, February 25–27, 2020 : revised selected papers
2022
/
p. 222–243
https://doi.org/10.1007/978-3-030-94900-6_11
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
Related publications
1
Machine learning-based detection and characterization of evolving threats in mobile and IoT Systems = Masinõppepõhine arenevate ohtude tuvastamine ning kirjeldamine mobiilseadmete ja värkvõrkude jaoks
Number of records 10, displaying
1 - 10
keyword
129
1.
anomaly detection
2.
anomaly detection for system logs
3.
network anomaly detection
4.
cerium anomaly europium anomaly
5.
anomaly
6.
Bouguer anomaly
7.
Ce anomaly
8.
cerium anomaly
9.
europium anomaly
10.
gravity anomaly
11.
residual gravity anomaly
12.
Residual Terrain Model (RTM) anomaly
13.
residual terrain model anomaly
14.
wind anomaly
15.
amoxicillin detection
16.
antibiotic detection
17.
antibiotics detection
18.
aspect detection
19.
asynchronous fault detection
20.
attack detection
21.
barotrauma detection system
22.
Barotrauma detection system sensors
23.
behaviour-based intrusion detection systems
24.
body detection
25.
botnet detection
26.
capacitively coupled conductivity detection
27.
change detection
28.
chemical detection
29.
community detection
30.
compu ter-aided detection(CAD)
31.
computer-aided detection
32.
computer‐aided detection
33.
contactless conductivity detection
34.
contactless conductivity detection (C4D)
35.
crack detection
36.
crash detection
37.
cyber intrusion detection
38.
defect detection
39.
detection
40.
detection efficiency
41.
detection engineering
42.
detection mechanisms
43.
detection method
44.
detection methods
45.
detection of anomalous end user nodes
46.
detection of hydrogen isotopes
47.
distributed detection
48.
early detection
49.
early intrusion detection
50.
energy detection
51.
error detection
52.
ESI-MS and IM detection
53.
evaluation of explainable AI intrusion detection
54.
Event detection
55.
extraction and detection methods
56.
face detection
57.
Face Manipulation Detection
58.
failure detection
59.
fall detection
60.
fault detection
61.
fault detection and diagnoses
62.
fault detection and diagnosis
63.
Fish detection
64.
fouling detection
65.
harmonic detection
66.
health care IoMT intrusion detection
67.
hepatitis C virus (HCV) detection
68.
hubs detection
69.
IED detection
70.
image-based crack detection
71.
indicident detection and response
72.
indirect UV absorbance detection
73.
intrusion detection
74.
intrusion detection system
75.
intrusion detection system (IDS)
76.
intrusion detection systems
77.
island detection
78.
islanding detection
79.
label-free detection
80.
lane detection
81.
lane line detection
82.
LED fluorescence detection
83.
leg detection
84.
light detection and ranging
85.
light detection and ranging (LiDAR)
86.
Light Detection and Ranging (LiDAR) point cloud
87.
limit of detection
88.
lock-in detection
89.
loop-closure detection
90.
malware detection
91.
marker detection
92.
mobile malware detection
93.
money laundering detection systems
94.
monitoring and detection
95.
multi-classed object detection
96.
Multi-valued Simulation for Hazard Detection in Digital Circuits
97.
mutant detection
98.
network intrusion detection system
99.
nodules detection
100.
object detection
101.
oil-spill detection
102.
outlier’s detection methods
103.
outliers detection
104.
peak detection
105.
phytoplankton detection methods
106.
plagiarism detection
107.
position detection
108.
precursor detection
109.
protein detection
110.
proton detection
111.
radar detection
112.
ramp event detection
113.
recycled FPGA detection
114.
residual current detection
115.
robust detection
116.
scene text detection
117.
short-circuit detection
118.
small molecule detection
119.
speech activity detection
120.
Suicidal ideation detection
121.
synchronous detection
122.
topic detection
123.
tyre detection
124.
unmanned aerial vehicle detection systems
125.
unsupervised outlier detection
126.
UV detection
127.
vehicle detection
128.
vortex detection
129.
3D lane detection
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT