Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
attack detection (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(1/148)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Observer-based detection and identification of sensor attacks in networked CPSs
Chowdhury, Nilanjan Roy
;
Belikov, Juri
;
Baimel, Dmitry
;
Levron, Yoash
Automatica
2020
/
art. 109166, 13 p
https://doi.org/10.1016/j.automatica.2020.109166
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
148
1.
attack detection
2.
attack graphs
3.
attack model
4.
attack sophistication
5.
attack trees
6.
attack vectors
7.
attack visualisation
8.
botnet attack
9.
corrosive attack
10.
cyber-attack
11.
cyber-attack pathways
12.
Denial of Service (DoS) attack
13.
discovery of attack scenarios
14.
DoS attack
15.
false data injection attack
16.
fault-injection attack
17.
ghost injection attack
18.
highly targeted attack
19.
iming side-channel attack
20.
Low-and-Slow DoS attack
21.
manufacturing-time attack
22.
oracle-less attack
23.
quantum attack
24.
ransomware attack
25.
removal attack
26.
Return of the Coppersmith’s Attack (ROCA)
27.
return of the Coppersmith’s attack vulnerability
28.
SAT attack
29.
SAT-based attack
30.
side-channel attack
31.
amoxicillin detection
32.
anomaly detection
33.
anomaly detection for system logs
34.
antibiotic detection
35.
antibiotics detection
36.
aspect detection
37.
asynchronous fault detection
38.
barotrauma detection system
39.
Barotrauma detection system sensors
40.
behaviour-based intrusion detection systems
41.
body detection
42.
botnet detection
43.
capacitively coupled conductivity detection
44.
change detection
45.
chemical detection
46.
community detection
47.
compu ter-aided detection(CAD)
48.
computer-aided detection
49.
computer‐aided detection
50.
contactless conductivity detection
51.
contactless conductivity detection (C4D)
52.
crack detection
53.
crash detection
54.
cyber intrusion detection
55.
defect detection
56.
detection
57.
detection efficiency
58.
detection engineering
59.
detection mechanisms
60.
detection method
61.
detection methods
62.
detection of anomalous end user nodes
63.
detection of hydrogen isotopes
64.
distributed detection
65.
early detection
66.
early intrusion detection
67.
energy detection
68.
error detection
69.
ESI-MS and IM detection
70.
evaluation of explainable AI intrusion detection
71.
Event detection
72.
extraction and detection methods
73.
face detection
74.
Face Manipulation Detection
75.
failure detection
76.
fall detection
77.
fault detection
78.
fault detection and diagnoses
79.
fault detection and diagnosis
80.
Fish detection
81.
fouling detection
82.
harmonic detection
83.
health care IoMT intrusion detection
84.
hepatitis C virus (HCV) detection
85.
hubs detection
86.
IED detection
87.
image-based crack detection
88.
indicident detection and response
89.
indirect UV absorbance detection
90.
intrusion detection
91.
intrusion detection system
92.
intrusion detection system (IDS)
93.
intrusion detection systems
94.
island detection
95.
islanding detection
96.
label-free detection
97.
lane detection
98.
lane line detection
99.
LED fluorescence detection
100.
leg detection
101.
light detection and ranging
102.
light detection and ranging (LiDAR)
103.
Light Detection and Ranging (LiDAR) point cloud
104.
limit of detection
105.
lock-in detection
106.
loop-closure detection
107.
malware detection
108.
marker detection
109.
mobile malware detection
110.
money laundering detection systems
111.
monitoring and detection
112.
multi-classed object detection
113.
Multi-valued Simulation for Hazard Detection in Digital Circuits
114.
mutant detection
115.
network anomaly detection
116.
network intrusion detection system
117.
nodules detection
118.
object detection
119.
oil-spill detection
120.
outlier’s detection methods
121.
outliers detection
122.
peak detection
123.
phytoplankton detection methods
124.
plagiarism detection
125.
position detection
126.
precursor detection
127.
propaganda detection
128.
protein detection
129.
proton detection
130.
radar detection
131.
ramp event detection
132.
recycled FPGA detection
133.
residual current detection
134.
robust detection
135.
scene text detection
136.
short-circuit detection
137.
small molecule detection
138.
speech activity detection
139.
Suicidal ideation detection
140.
synchronous detection
141.
topic detection
142.
tyre detection
143.
unmanned aerial vehicle detection systems
144.
unsupervised outlier detection
145.
UV detection
146.
vehicle detection
147.
vortex detection
148.
3D lane detection
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT