Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
network security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(3/336)
Export
export all inquiry results
(5)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
Blumbergs, Bernhards
;
Vaarandi, Risto
MILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 2017
2017
/
p. 707-712
https://doi.org/10.1109/MILCOM.2017.8170785
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
2
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
3
journal article EST
/
journal article ENG
Kamerabasiertes Monitoring von Fischen in Deutschland und der Schweiz
Haas, Christian
;
Meyer, Matthias
;
Schmalz, Maria
;
Tuhtan, Jeffrey Andrew
WasserWirtschaft
2024
/
p. 19 - 29
https://doi.org/10.1007/s35147-024-2401-1
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
4
journal article EST
/
journal article ENG
Network IDS alert classification with active learning techniques
Vaarandi, Risto
;
Guerra-Manzanares, Alejandro
Journal of Information Security and Applications
2024
/
art. 103687
https://doi.org/10.1016/j.jisa.2023.103687
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
5
journal article EST
/
journal article ENG
Stream clustering guided supervised learning for classifying NIDS alerts
Vaarandi, Risto
;
Guerra Manzanares, Alejandro
Future generation computer systems
2024
/
p. 231-244 : ill
https://doi.org/10.1016/j.future.2024.01.032
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 5, displaying
1 - 5
keyword
330
1.
network security
2.
network security monitoring
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
cloud security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security strategies
17.
cyber-physical system security
18.
cyber-security
19.
data and information security
20.
data security
21.
development of security cameras
22.
digital security practices
23.
drinking water security
24.
economic security
25.
economic security of enterprise
26.
emotional security
27.
energy security
28.
energy security indicator
29.
Estonian information security standard
30.
graded security
31.
hardware security
32.
hardware security primitive
33.
high level of security
34.
Homeland security
35.
human security
36.
information security
37.
information security and privacy
38.
initial level of security
39.
internal security
40.
international security
41.
investment and innovation security
42.
IPv6 security
43.
IT security
44.
IT security management
45.
job security
46.
long-term security
47.
maritime cyber security
48.
maritime cyber security operations centers
49.
Maritime Security Operations Center (M-SOC)
50.
medium level of security
51.
metadata model for security measures
52.
Middle Eastern security
53.
Mobile security
54.
national cyber security strategy
55.
national security
56.
NATO. Science for Peace and Security Program
57.
OSCE (Organization for Security and Co-operation in Europe)
58.
passenger’s security
59.
policy-based routing security
60.
political and security cultures
61.
post-quantum security
62.
power system security
63.
quantitative security
64.
regional security
65.
RISC-V Security Verification
66.
Safety and Security in Sea Transportation
67.
safety and security testing
68.
security
69.
security adaptation
70.
security alert prioritization
71.
security analysis
72.
security and justice (AFSJ)
73.
Security and political science
74.
security and privacy
75.
security and privacy in smart grids
76.
Security Assertion
77.
Security Assertion Mining
78.
security closure
79.
Security Coverage
80.
security dataset
81.
security dilemma
82.
Security evaluation
83.
security evaluation instruments
84.
Security Level Evaluation
85.
Security limitations
86.
security log analysis
87.
security management
88.
security model
89.
security monitoring
90.
security notion
91.
security objectives
92.
security of data
93.
security of supply
94.
security operation center
95.
security operations center
96.
security patterns
97.
security policy
98.
security problem definition
99.
security proof
100.
security protocols
101.
security requirements
102.
security requirements engineering
103.
security research
104.
security risk assessment
105.
security risk management
106.
security risks
107.
security science and technology
108.
security strategies
109.
security systems for military objects
110.
security testing
111.
security training
112.
security verification
113.
security-by-design
114.
social security planning
115.
societal security
116.
software security
117.
software security level
118.
software security subcharacteristics
119.
sufficient level of security
120.
system of economic security
121.
system security
122.
terrorism security
123.
transmission System Security
124.
voting privacy and security
125.
active distribution network management
126.
Adaptive network-based fuzzy inference system (ANFIS)
127.
aec distribution network
128.
analytical flow network analysis
129.
analytical network process
130.
ANDROID network
131.
artificial neural network
132.
A-source network
133.
autoservice network
134.
Bayesian belief network (BBN)
135.
bayesian network (BN)
136.
Binarized Neural Network (BNN)
137.
building site network
138.
business network model
139.
cable network
140.
carbon nanotube network
141.
cascaded forward neural network (CFNN)
142.
cognitive body area network
143.
collaborative network
144.
computer network management
145.
computer network operations
146.
connection network codes
147.
Controller Area Network
148.
Convolutional Neural Network
149.
convolutional neural network (CNN)
150.
coolant network
151.
deep convolutional neural network
152.
deep learning network
153.
deep neural network
154.
deep neural network compression
155.
DH network
156.
distribution network
157.
distribution network
158.
district heat network
159.
district heating network
160.
electric network analysis
161.
electric network parameters
162.
electrical network
163.
emergency network
164.
Event Processing Network (EPN)
165.
Event Processing Network Model
166.
feedforward neural network (FFNN)
167.
flow network analysis
168.
flow network parameters
169.
flying inductor network
170.
Fully Convolutional Network (FCN)
171.
Generative Adversarial Network (GaN)
172.
global innovation network
173.
Graph Convolutional Neural Network (GCN)
174.
GraphSAGE (Graph Based Neural Network)
175.
heterogeneous network
176.
hydraulic network model
177.
hypar-network
178.
impedance network
179.
impedance network
180.
impedance source (IS) network
181.
Impedance Source Network
182.
impedance-source network
183.
in-network data processing
184.
innovation network
185.
innovation network agent
186.
joint network-channel coding
187.
knowledge network
188.
levelling network
189.
line impedance stabilization network
190.
linear Delta robots neural network based model
191.
LSTM neural network
192.
lumped parameter network
193.
lumped parameter thermal network
194.
lumped-parameter thermal network
195.
Magnetically Coupled Impedance Source Network (MCIS)
196.
memory network
197.
Mesh Network
198.
modified network cohesion
199.
MRAN (minimum resource allocation network)
200.
nanosheets network
201.
NB-IoT network
202.
NetFlow based network monitoring
203.
network
204.
network access charges
205.
network analysis
206.
network anomaly detection
207.
network architecture
208.
network calculus
209.
network characteristics
210.
network communication technologies
211.
network constraint
212.
network disaggregation
213.
network dynamics
214.
network expansion planning
215.
network externality
216.
network forensics
217.
network function virtualization
218.
network functions virtualization (NFV)
219.
network games
220.
network governance
221.
network IDS alert classification
222.
network industries
223.
network industry
224.
network intrusion detection system
225.
network latencies
226.
network layer
227.
Network lifetime
228.
network measurement
229.
network monitoring
230.
network of co-authorships
231.
network on chip
232.
Network on Chip (NoC)
233.
network partners
234.
network protocol reverse engineering
235.
network protocols
236.
Network QoS
237.
network quality
238.
Network reliability
239.
network resilience
240.
network safety ranking
241.
network slicing
242.
network sparsification
243.
network studies
244.
network theory
245.
network topologies
246.
network topology
247.
network uncertainties
248.
Network visualization
249.
network-on-chip
250.
network-on-ReRAM
251.
network-testing
252.
neural network
253.
neural network architecture search
254.
neural network controller
255.
neural network modelling
256.
neural network models
257.
neural network positioning algorithms
258.
neural network predictive controller
259.
nitrogen-cycling network
260.
non-public network
261.
non-terrestrial network
262.
open value network
263.
partner network
264.
partner network
265.
partner network (PN)
266.
partner network maturity
267.
passive switched capacitor network
268.
PC-corr network
269.
peer to peer network
270.
performance dialogue network
271.
personal area network applications
272.
pervasive public safety network
273.
phosphotransfer network
274.
power delivery network
275.
power distribution network
276.
production in network
277.
proteomic network
278.
public safety network
279.
qZS network
280.
qualitative network analysis
281.
quasi-impedance-source network
282.
quasi-Z-source network
283.
Radial Basis Function Neural Network (RBFNN)
284.
radio access network
285.
radio access network (RAN)
286.
radio access network subslicing
287.
random resistor network
288.
recurrent neural network language model
289.
reluctance network (RN)
290.
research network
291.
Residual Neural Network
292.
road network
293.
roof network
294.
route network
295.
self organizing network
296.
smart distribution network
297.
SMEs network
298.
social network
299.
social network analysis
300.
software-defined network
301.
spiking neural network (SNN)
302.
stretchable network
303.
support network activities
304.
sustainable partner network
305.
sustainable partner network (SPN)
306.
switched capacitor inductor network (SCLN)
307.
Z-source network
308.
technology transfer network
309.
telecommunication network management
310.
telecommunication network performance
311.
Ternary Neural Network
312.
the influence of DHW consumption on dimensioning the DH network
313.
thermal network
314.
tide gauge network
315.
transformer-based neural network
316.
UAV-enabled network
317.
underwater sensor network
318.
Urban Network
319.
utility network
320.
value network analysis
321.
water distribution network
322.
wireless ad hoq network
323.
wireless body area network
324.
Wireless Body Area Network (WBAN)
325.
wireless network
326.
wireless sensor network
327.
wireless sensor network (WSN)
328.
wsn (wireless sensor network)
329.
3D graphene network
330.
3D network topology visualization
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
European Access Network
4.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
TalTech subject term
2
1.
Erasmus Student Network
2.
Islamic Public Value Network
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT