Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
discovery of attack scenarios (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(1/52)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
A stream clustering algorithm for classifying network IDS alerts
Vaarandi, Risto
Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings
2021
/
p. 14-19
https://doi.org/10.1109/CSR51186.2021.9527926
book article
Number of records 1, displaying
1 - 1
keyword
52
1.
discovery of attack scenarios
2.
attack detection
3.
attack graphs
4.
attack model
5.
attack sophistication
6.
attack trees
7.
attack vectors
8.
attack visualisation
9.
botnet attack
10.
corrosive attack
11.
cyber-attack
12.
cyber-attack pathways
13.
Denial of Service (DoS) attack
14.
DoS attack
15.
false data injection attack
16.
fault-injection attack
17.
ghost injection attack
18.
highly targeted attack
19.
iming side-channel attack
20.
Low-and-Slow DoS attack
21.
manufacturing-time attack
22.
oracle-less attack
23.
quantum attack
24.
ransomware attack
25.
removal attack
26.
Return of the Coppersmith’s Attack (ROCA)
27.
return of the Coppersmith’s attack vulnerability
28.
SAT attack
29.
SAT-based attack
30.
side-channel attack
31.
data discovery
32.
data mining and knowledge discovery
33.
direct discovery
34.
discovery
35.
discovery process
36.
drug discovery
37.
entrepreneurial discovery process
38.
identifier discovery
39.
knowledge discovery
40.
knowledge discovery and data mining
41.
knowledge discovery in databases
42.
mathematical discovery
43.
price-discovery mechanism
44.
reference discovery
45.
rule discovery
46.
scientific discovery
47.
application scenarios
48.
future scenarios
49.
renovation scenarios
50.
research and training scenarios
51.
scenarios
52.
socioeconomic scenarios
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT