Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
attack detection (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(1/140)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Observer-based detection and identification of sensor attacks in networked CPSs
Chowdhury, Nilanjan Roy
;
Belikov, Juri
;
Baimel, Dmitry
;
Levron, Yoash
Automatica
2020
/
art. 109166, 13 p
https://doi.org/10.1016/j.automatica.2020.109166
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
140
1.
attack detection
2.
attack graphs
3.
attack model
4.
attack sophistication
5.
attack trees
6.
attack vectors
7.
attack visualisation
8.
botnet attack
9.
corrosive attack
10.
cyber-attack
11.
cyber-attack pathways
12.
Denial of Service (DoS) attack
13.
discovery of attack scenarios
14.
DoS attack
15.
false data injection attack
16.
fault-injection attack
17.
ghost injection attack
18.
highly targeted attack
19.
iming side-channel attack
20.
Low-and-Slow DoS attack
21.
manufacturing-time attack
22.
oracle-less attack
23.
quantum attack
24.
ransomware attack
25.
removal attack
26.
Return of the Coppersmith’s Attack (ROCA)
27.
return of the Coppersmith’s attack vulnerability
28.
SAT attack
29.
SAT-based attack
30.
side-channel attack
31.
amoxicillin detection
32.
anomaly detection
33.
anomaly detection for system logs
34.
antibiotic detection
35.
antibiotics detection
36.
aspect detection
37.
asynchronous fault detection
38.
barotrauma detection system
39.
behaviour-based intrusion detection systems
40.
body detection
41.
botnet detection
42.
capacitively coupled conductivity detection
43.
change detection
44.
chemical detection
45.
community detection
46.
compu ter-aided detection(CAD)
47.
computer-aided detection
48.
computer‐aided detection
49.
contactless conductivity detection
50.
contactless conductivity detection (C4D)
51.
crack detection
52.
crash detection
53.
cyber intrusion detection
54.
defect detection
55.
detection
56.
detection efficiency
57.
detection engineering
58.
detection method
59.
detection methods
60.
detection of anomalous end user nodes
61.
detection of hydrogen isotopes
62.
distributed detection
63.
early detection
64.
early intrusion detection
65.
energy detection
66.
error detection
67.
ESI-MS and IM detection
68.
Event detection
69.
extraction and detection methods
70.
face detection
71.
Face Manipulation Detection
72.
failure detection
73.
fall detection
74.
fault detection
75.
fault detection and diagnoses
76.
fault detection and diagnosis
77.
Fish detection
78.
fouling detection
79.
harmonic detection
80.
hepatitis C virus (HCV) detection
81.
hubs detection
82.
IED detection
83.
image-based crack detection
84.
indicident detection and response
85.
indirect UV absorbance detection
86.
intrusion detection
87.
intrusion detection system
88.
intrusion detection system (IDS)
89.
intrusion detection systems
90.
island detection
91.
islanding detection
92.
label-free detection
93.
LED fluorescence detection
94.
leg detection
95.
light detection and ranging
96.
light detection and ranging (LiDAR)
97.
Light Detection and Ranging (LiDAR) point cloud
98.
limit of detection
99.
lock-in detection
100.
loop-closure detection
101.
malware detection
102.
marker detection
103.
mobile malware detection
104.
money laundering detection systems
105.
monitoring and detection
106.
multi-classed object detection
107.
Multi-valued Simulation for Hazard Detection in Digital Circuits
108.
mutant detection
109.
network anomaly detection
110.
network intrusion detection system
111.
nodules detection
112.
object detection
113.
oil-spill detection
114.
outlier’s detection methods
115.
outliers detection
116.
peak detection
117.
phytoplankton detection methods
118.
plagiarism detection
119.
position detection
120.
precursor detection
121.
protein detection
122.
proton detection
123.
radar detection
124.
ramp event detection
125.
recycled FPGA detection
126.
residual current detection
127.
robust detection
128.
scene text detection
129.
short-circuit detection
130.
small molecule detection
131.
speech activity detection
132.
Suicidal ideation detection
133.
synchronous detection
134.
tyre detection
135.
unmanned aerial vehicle detection systems
136.
unsupervised outlier detection
137.
UV detection
138.
vehicle detection
139.
vortex detection
140.
3D lane detection
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT