Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
network intrusion detection system (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(1/131)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Evaluating Explainable AI for Deep Learning-Based Network Intrusion Detection System Alert Classification
Kalakoti, Rajesh
;
Vaarandi, Risto
;
Bahsi, Hayretdin
;
Nõmm, Sven
Proceedings of the 11th International Conference on Information Systems Security and Privacy (ICISSP 2025). Vol. 1
2025
/
p. 47-58 : ill
https://doi.org//10.5220/0013180700003899
book article
Related publications
1
Explainable artificial intelligence-based intrusion detection systems = Selgitaval tehisintellektil baseeruvad ründetuvastussüsteemid
2
journal article EST
/
journal article ENG
Stream clustering guided supervised learning for classifying NIDS alerts
Vaarandi, Risto
;
Guerra Manzanares, Alejandro
Future generation computer systems
2024
/
p. 231-244 : ill
https://doi.org/10.1016/j.future.2024.01.032
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 2, displaying
1 - 2
keyword
131
1.
network intrusion detection system
2.
intrusion detection system (IDS)
3.
behaviour-based intrusion detection systems
4.
cyber intrusion detection
5.
early intrusion detection
6.
evaluation of explainable AI intrusion detection
7.
health care IoMT intrusion detection
8.
intrusion detection
9.
intrusion detection systems
10.
intrusion detection systems (IDS)
11.
intrusion response system
12.
network anomaly detection
13.
anomaly detection for system logs
14.
barotrauma detection system
15.
Barotrauma detection system sensors
16.
Adaptive network-based fuzzy inference system (ANFIS)
17.
air intrusion
18.
intrusion
19.
saline intrusion blockage
20.
AI-based fault detection
21.
amoxicillin detection
22.
anomaly detection
23.
antibiotic detection
24.
antibiotics detection
25.
aspect detection
26.
asynchronous fault detection
27.
attack detection
28.
body detection
29.
botnet detection
30.
capacitively coupled conductivity detection
31.
change detection
32.
chemical detection
33.
community detection
34.
compu ter-aided detection(CAD)
35.
computer-aided detection
36.
computer‐aided detection
37.
contactless conductivity detection
38.
contactless conductivity detection (C4D)
39.
crack detection
40.
crash detection
41.
defect detection
42.
detection
43.
detection efficiency
44.
detection engineering
45.
detection mechanisms
46.
detection method
47.
detection methods
48.
detection of anomalous end user nodes
49.
detection of hydrogen isotopes
50.
distributed detection
51.
early detection
52.
electronic warfare activity detection
53.
energy detection
54.
error detection
55.
ESI-MS and IM detection
56.
Event detection
57.
extraction and detection methods
58.
face detection
59.
Face Manipulation Detection
60.
failure detection
61.
fall detection
62.
fault detection
63.
fault detection and classification
64.
fault detection and diagnoses
65.
fault detection and diagnosis
66.
fault detection and diagnostics (FDD)
67.
Fish detection
68.
fouling detection
69.
harmonic detection
70.
hepatitis C virus (HCV) detection
71.
hubs detection
72.
hybrid fault detection
73.
IED detection
74.
image-based crack detection
75.
indicident detection and response
76.
indirect UV absorbance detection
77.
island detection
78.
islanding detection
79.
label-free detection
80.
lane detection
81.
lane line detection
82.
LED fluorescence detection
83.
leg detection
84.
light detection and ranging
85.
light detection and ranging (LiDAR)
86.
Light Detection and Ranging (LiDAR) point cloud
87.
limit of detection
88.
lock-in detection
89.
loop-closure detection
90.
malware detection
91.
marker detection
92.
mobile malware detection
93.
money laundering detection systems
94.
monitoring and detection
95.
multi-classed object detection
96.
Multi-valued Simulation for Hazard Detection in Digital Circuits
97.
mutant detection
98.
nodules detection
99.
object detection
100.
oil-spill detection
101.
outlier’s detection methods
102.
outliers detection
103.
peak detection
104.
photovoltaic fault detection algorithms
105.
phytoplankton detection methods
106.
plagiarism detection
107.
position detection
108.
precursor detection
109.
propaganda detection
110.
protein detection
111.
proton detection
112.
radar detection
113.
ramp event detection
114.
recycled FPGA detection
115.
residual current detection
116.
robust detection
117.
scene text detection
118.
short-circuit detection
119.
Side-Channel Attack Detection
120.
small molecule detection
121.
speech activity detection
122.
Suicidal ideation detection
123.
synchronous detection
124.
topic detection
125.
tyre detection
126.
unmanned aerial vehicle detection systems
127.
unsupervised outlier detection
128.
UV detection
129.
vehicle detection
130.
vortex detection
131.
3D lane detection
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT