Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
network security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(3/265)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
Blumbergs, Bernhards
;
Vaarandi, Risto
MILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 2017
2017
/
p. 707-712
https://doi.org/10.1109/MILCOM.2017.8170785
book article
2
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
Number of records 2, displaying
1 - 2
keyword
260
1.
network security
2.
network security monitoring
3.
ad-hoc sensor networks security
4.
Blockchain security
5.
cache security
6.
communication system security
7.
comprehensive system of economic security
8.
computer security
9.
cooperative security dilemma
10.
cyber security
11.
cyber security education
12.
cyber security exercises
13.
cyber security strategies
14.
cyber-security
15.
data security
16.
development of security cameras
17.
drinking water security
18.
economic security
19.
economic security of enterprise
20.
emotional security
21.
energy security
22.
energy security indicator
23.
graded security
24.
hardware security
25.
hardware security primitive
26.
human security
27.
information security
28.
internal security
29.
international security
30.
investment and innovation security
31.
IPv6 security
32.
IT security
33.
job security
34.
long-term security
35.
metadata model for security measures
36.
Middle Eastern security
37.
Mobile security
38.
national cyber security strategy
39.
national security
40.
NATO. Science for Peace and Security Program
41.
OSCE (Organization for Security and Co-operation in Europe)
42.
passenger’s security
43.
policy-based routing security
44.
political and security cultures
45.
post-quantum security
46.
power system security
47.
quantitative security
48.
regional security
49.
security
50.
security and privacy
51.
security and privacy in smart grids
52.
security closure
53.
Security Coverage
54.
security dataset
55.
security dilemma
56.
Security evaluation
57.
security log analysis
58.
security management
59.
security model
60.
security monitoring
61.
security notion
62.
security objectives
63.
security of data
64.
security of supply
65.
security operation center
66.
security patterns
67.
security problem definition
68.
security proof
69.
security protocols
70.
security requirements
71.
security requirements engineering
72.
security risk assessment
73.
security risk management
74.
security strategies
75.
security systems for military objects
76.
security testing
77.
security training
78.
security verification
79.
social security planning
80.
societal security
81.
system of economic security
82.
system security
83.
terrorism security
84.
transmission System Security
85.
voting privacy and security
86.
active distribution network management
87.
Adaptive network-based fuzzy inference system (ANFIS)
88.
analytical flow network analysis
89.
analytical network process
90.
ANDROID network
91.
A-source network
92.
autoservice network
93.
Bayesian belief network (BBN)
94.
Binarized Neural Network (BNN)
95.
building site network
96.
business network model
97.
cable network
98.
cascaded forward neural network (CFNN)
99.
cognitive body area network
100.
collaborative network
101.
computer network management
102.
computer network operations
103.
connection network codes
104.
Convolutional Neural Network
105.
convolutional neural network (CNN)
106.
coolant network
107.
deep convolutional neural network
108.
deep learning network
109.
deep neural network
110.
deep neural network compression
111.
DH network
112.
distribution network
113.
distribution network
114.
district heat network
115.
district heating network
116.
electric network parameters
117.
electrical network
118.
emergency network
119.
Event Processing Network (EPN)
120.
Event Processing Network Model
121.
feedforward neural network (FFNN)
122.
flow network analysis
123.
flow network parameters
124.
Fully Convolutional Network (FCN)
125.
Generative Adversarial Network (GaN)
126.
global innovation network
127.
Graph Convolutional Neural Network (GCN)
128.
GraphSAGE (Graph Based Neural Network)
129.
heterogeneous network
130.
hydraulic network model
131.
hypar-network
132.
impedance network
133.
impedance network
134.
impedance source (IS) network
135.
Impedance Source Network
136.
impedance-source network
137.
in-network data processing
138.
innovation network
139.
innovation network agent
140.
joint network-channel coding
141.
knowledge network
142.
levelling network
143.
lumped parameter network
144.
lumped parameter thermal network
145.
lumped-parameter thermal network
146.
Magnetically Coupled Impedance Source Network (MCIS)
147.
memory network
148.
Mesh Network
149.
modified network cohesion
150.
MRAN (minimum resource allocation network)
151.
nanosheets network
152.
NB-IoT network
153.
NetFlow based network monitoring
154.
network
155.
network access charges
156.
network analysis
157.
network anomaly detection
158.
network architecture
159.
network calculus
160.
network characteristics
161.
network communication technologies
162.
network constraint
163.
network expansion planning
164.
network forensics
165.
network function virtualization
166.
network functions virtualization (NFV)
167.
network games
168.
network governance
169.
network IDS alert classification
170.
network industries
171.
network industry
172.
network latencies
173.
network layer
174.
Network lifetime
175.
network measurement
176.
network monitoring
177.
network of co-authorships
178.
network on chip
179.
Network on Chip (NoC)
180.
network partners
181.
network protocol reverse engineering
182.
network protocols
183.
Network QoS
184.
network quality
185.
Network reliability
186.
network safety ranking
187.
network studies
188.
network theory
189.
network topologies
190.
network topology
191.
network uncertainties
192.
Network visualization
193.
network-on-chip
194.
network-on-ReRAM
195.
network-testing
196.
neural network
197.
neural network architecture search
198.
neural network controller
199.
neural network predictive controller
200.
nitrogen-cycling network
201.
open value network
202.
partner network
203.
partner network
204.
partner network (PN)
205.
partner network maturity
206.
passive switched capacitor network
207.
PC-corr network
208.
peer to peer network
209.
performance dialogue network
210.
personal area network applications
211.
pervasive public safety network
212.
phosphotransfer network
213.
power delivery network
214.
power distribution network
215.
production in network
216.
proteomic network
217.
public safety network
218.
qZS network
219.
quasi-impedance-source network
220.
quasi-Z-source network
221.
Radial Basis Function Neural Network (RBFNN)
222.
radio access network (RAN)
223.
radio access network subslicing
224.
random resistor network
225.
recurrent neural network language model
226.
reluctance network (RN)
227.
research network
228.
road network
229.
roof network
230.
route network
231.
self organizing network
232.
smart distribution network
233.
SMEs network
234.
social network
235.
social network analysis
236.
software-defined network
237.
spiking neural network (SNN)
238.
support network activities
239.
sustainable partner network
240.
sustainable partner network (SPN)
241.
switched capacitor inductor network (SCLN)
242.
Z-source network
243.
technology transfer network
244.
telecommunication network management
245.
Ternary Neural Network
246.
the influence of DHW consumption on dimensioning the DH network
247.
thermal network
248.
tide gauge network
249.
underwater sensor network
250.
utility network
251.
value network analysis
252.
water distribution network
253.
wireless ad hoq network
254.
wireless body area network
255.
Wireless Body Area Network (WBAN)
256.
wireless network
257.
wireless sensor network
258.
wsn (wireless sensor network)
259.
3D graphene network
260.
3D network topology visualization
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
European Access Network
4.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
TTÜ subject term
1
1.
Erasmus Student Network
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT