Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
network security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(3/329)
Export
export all inquiry results
(5)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
Blumbergs, Bernhards
;
Vaarandi, Risto
MILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 2017
2017
/
p. 707-712
https://doi.org/10.1109/MILCOM.2017.8170785
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
2
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
3
journal article EST
/
journal article ENG
Kamerabasiertes Monitoring von Fischen in Deutschland und der Schweiz
Haas, Christian
;
Meyer, Matthias
;
Schmalz, Maria
;
Tuhtan, Jeffrey Andrew
WasserWirtschaft
2024
/
p. 19 - 29
https://doi.org/10.1007/s35147-024-2401-1
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
4
journal article EST
/
journal article ENG
Network IDS alert classification with active learning techniques
Vaarandi, Risto
;
Guerra-Manzanares, Alejandro
Journal of Information Security and Applications
2024
/
art. 103687
https://doi.org/10.1016/j.jisa.2023.103687
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
5
journal article EST
/
journal article ENG
Stream clustering guided supervised learning for classifying NIDS alerts
Vaarandi, Risto
;
Guerra Manzanares, Alejandro
Future generation computer systems
2024
/
p. 231-244 : ill
https://doi.org/10.1016/j.future.2024.01.032
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 5, displaying
1 - 5
keyword
323
1.
network security
2.
network security monitoring
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security monitoring
15.
cyber security strategies
16.
cyber-security
17.
data and information security
18.
data security
19.
development of security cameras
20.
digital security practices
21.
drinking water security
22.
economic security
23.
economic security of enterprise
24.
emotional security
25.
energy security
26.
energy security indicator
27.
Estonian information security standard
28.
graded security
29.
hardware security
30.
hardware security primitive
31.
high level of security
32.
Homeland security
33.
human security
34.
information security
35.
information security and privacy
36.
initial level of security
37.
internal security
38.
international security
39.
investment and innovation security
40.
IPv6 security
41.
IT security
42.
IT security management
43.
job security
44.
long-term security
45.
maritime cyber security
46.
maritime cyber security operations centers
47.
Maritime Security Operations Center (M-SOC)
48.
medium level of security
49.
metadata model for security measures
50.
Middle Eastern security
51.
Mobile security
52.
national cyber security strategy
53.
national security
54.
NATO. Science for Peace and Security Program
55.
OSCE (Organization for Security and Co-operation in Europe)
56.
passenger’s security
57.
policy-based routing security
58.
political and security cultures
59.
post-quantum security
60.
power system security
61.
quantitative security
62.
regional security
63.
RISC-V Security Verification
64.
Safety and Security in Sea Transportation
65.
safety and security testing
66.
security
67.
security adaptation
68.
security alert prioritization
69.
security analysis
70.
security and justice (AFSJ)
71.
Security and political science
72.
security and privacy
73.
security and privacy in smart grids
74.
Security Assertion Mining
75.
security closure
76.
Security Coverage
77.
security dataset
78.
security dilemma
79.
Security evaluation
80.
security evaluation instruments
81.
Security limitations
82.
security log analysis
83.
security management
84.
security model
85.
security monitoring
86.
security notion
87.
security objectives
88.
security of data
89.
security of supply
90.
security operation center
91.
security operations center
92.
security patterns
93.
security policy
94.
security problem definition
95.
security proof
96.
security protocols
97.
security requirements
98.
security requirements engineering
99.
security risk assessment
100.
security risk management
101.
security risks
102.
security science and technology
103.
security strategies
104.
security systems for military objects
105.
security testing
106.
security training
107.
security verification
108.
security-by-design
109.
social security planning
110.
societal security
111.
software security
112.
software security level
113.
software security subcharacteristics
114.
sufficient level of security
115.
system of economic security
116.
system security
117.
terrorism security
118.
transmission System Security
119.
voting privacy and security
120.
active distribution network management
121.
Adaptive network-based fuzzy inference system (ANFIS)
122.
aec distribution network
123.
analytical flow network analysis
124.
analytical network process
125.
ANDROID network
126.
artificial neural network
127.
A-source network
128.
autoservice network
129.
Bayesian belief network (BBN)
130.
bayesian network (BN)
131.
Binarized Neural Network (BNN)
132.
building site network
133.
business network model
134.
cable network
135.
carbon nanotube network
136.
cascaded forward neural network (CFNN)
137.
cognitive body area network
138.
collaborative network
139.
computer network management
140.
computer network operations
141.
connection network codes
142.
Controller Area Network
143.
Convolutional Neural Network
144.
convolutional neural network (CNN)
145.
coolant network
146.
deep convolutional neural network
147.
deep learning network
148.
deep neural network
149.
deep neural network compression
150.
DH network
151.
distribution network
152.
distribution network
153.
district heat network
154.
district heating network
155.
electric network analysis
156.
electric network parameters
157.
electrical network
158.
emergency network
159.
Event Processing Network (EPN)
160.
Event Processing Network Model
161.
feedforward neural network (FFNN)
162.
flow network analysis
163.
flow network parameters
164.
Fully Convolutional Network (FCN)
165.
Generative Adversarial Network (GaN)
166.
global innovation network
167.
Graph Convolutional Neural Network (GCN)
168.
GraphSAGE (Graph Based Neural Network)
169.
heterogeneous network
170.
hydraulic network model
171.
hypar-network
172.
impedance network
173.
impedance network
174.
impedance source (IS) network
175.
Impedance Source Network
176.
impedance-source network
177.
in-network data processing
178.
innovation network
179.
innovation network agent
180.
joint network-channel coding
181.
knowledge network
182.
levelling network
183.
line impedance stabilization network
184.
linear Delta robots neural network based model
185.
LSTM neural network
186.
lumped parameter network
187.
lumped parameter thermal network
188.
lumped-parameter thermal network
189.
Magnetically Coupled Impedance Source Network (MCIS)
190.
memory network
191.
Mesh Network
192.
modified network cohesion
193.
MRAN (minimum resource allocation network)
194.
nanosheets network
195.
NB-IoT network
196.
NetFlow based network monitoring
197.
network
198.
network access charges
199.
network analysis
200.
network anomaly detection
201.
network architecture
202.
network calculus
203.
network characteristics
204.
network communication technologies
205.
network constraint
206.
network disaggregation
207.
network dynamics
208.
network expansion planning
209.
network externality
210.
network forensics
211.
network function virtualization
212.
network functions virtualization (NFV)
213.
network games
214.
network governance
215.
network IDS alert classification
216.
network industries
217.
network industry
218.
network intrusion detection system
219.
network latencies
220.
network layer
221.
Network lifetime
222.
network measurement
223.
network monitoring
224.
network of co-authorships
225.
network on chip
226.
Network on Chip (NoC)
227.
network partners
228.
network protocol reverse engineering
229.
network protocols
230.
Network QoS
231.
network quality
232.
Network reliability
233.
network resilience
234.
network safety ranking
235.
network slicing
236.
network sparsification
237.
network studies
238.
network theory
239.
network topologies
240.
network topology
241.
network uncertainties
242.
Network visualization
243.
network-on-chip
244.
network-on-ReRAM
245.
network-testing
246.
neural network
247.
neural network architecture search
248.
neural network controller
249.
neural network modelling
250.
neural network models
251.
neural network positioning algorithms
252.
neural network predictive controller
253.
nitrogen-cycling network
254.
non-public network
255.
non-terrestrial network
256.
open value network
257.
partner network
258.
partner network
259.
partner network (PN)
260.
partner network maturity
261.
passive switched capacitor network
262.
PC-corr network
263.
peer to peer network
264.
performance dialogue network
265.
personal area network applications
266.
pervasive public safety network
267.
phosphotransfer network
268.
power delivery network
269.
power distribution network
270.
production in network
271.
proteomic network
272.
public safety network
273.
qZS network
274.
quasi-impedance-source network
275.
quasi-Z-source network
276.
Radial Basis Function Neural Network (RBFNN)
277.
radio access network
278.
radio access network (RAN)
279.
radio access network subslicing
280.
random resistor network
281.
recurrent neural network language model
282.
reluctance network (RN)
283.
research network
284.
Residual Neural Network
285.
road network
286.
roof network
287.
route network
288.
self organizing network
289.
smart distribution network
290.
SMEs network
291.
social network
292.
social network analysis
293.
software-defined network
294.
spiking neural network (SNN)
295.
stretchable network
296.
support network activities
297.
sustainable partner network
298.
sustainable partner network (SPN)
299.
switched capacitor inductor network (SCLN)
300.
Z-source network
301.
technology transfer network
302.
telecommunication network management
303.
telecommunication network performance
304.
Ternary Neural Network
305.
the influence of DHW consumption on dimensioning the DH network
306.
thermal network
307.
tide gauge network
308.
transformer-based neural network
309.
UAV-enabled network
310.
underwater sensor network
311.
Urban Network
312.
utility network
313.
value network analysis
314.
water distribution network
315.
wireless ad hoq network
316.
wireless body area network
317.
Wireless Body Area Network (WBAN)
318.
wireless network
319.
wireless sensor network
320.
wireless sensor network (WSN)
321.
wsn (wireless sensor network)
322.
3D graphene network
323.
3D network topology visualization
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
European Access Network
4.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
TalTech subject term
2
1.
Erasmus Student Network
2.
Islamic Public Value Network
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT