Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
network security monitoring (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(3/454)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
A stream clustering algorithm for classifying network IDS alerts
Vaarandi, Risto
Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings
2021
/
p. 14-19
https://doi.org/10.1109/CSR51186.2021.9527926
book article
Number of records 1, displaying
1 - 1
keyword
443
1.
network security monitoring
2.
cyber security monitoring
3.
cyber security monitoring in maritime
4.
security monitoring
5.
network security
6.
NetFlow based network monitoring
7.
network monitoring
8.
ad-hoc sensor networks security
9.
Automatic Security Verification
10.
Blockchain security
11.
cache security
12.
cloud security
13.
communication system security
14.
comprehensive system of economic security
15.
computer security
16.
cooperative security dilemma
17.
cyber security
18.
cyber security education
19.
cyber security exercises
20.
cyber security strategies
21.
cyber-physical system security
22.
cyber-security
23.
data and information security
24.
data security
25.
development of security cameras
26.
digital security practices
27.
drinking water security
28.
economic security
29.
economic security of enterprise
30.
emotional security
31.
energy security
32.
energy security indicator
33.
Estonian information security standard
34.
graded security
35.
hardware security
36.
hardware security primitive
37.
high level of security
38.
Homeland security
39.
human security
40.
information security
41.
information security and privacy
42.
initial level of security
43.
internal security
44.
international security
45.
investment and innovation security
46.
IPv6 security
47.
IT security
48.
IT security management
49.
job security
50.
long-term security
51.
maritime cyber security
52.
maritime cyber security operations centers
53.
Maritime Security Operations Center (M-SOC)
54.
medium level of security
55.
metadata model for security measures
56.
Middle Eastern security
57.
Mobile security
58.
national cyber security strategy
59.
national security
60.
NATO. Science for Peace and Security Program
61.
OSCE (Organization for Security and Co-operation in Europe)
62.
passenger’s security
63.
policy-based routing security
64.
political and security cultures
65.
post-quantum security
66.
power system security
67.
quantitative security
68.
regional security
69.
RISC-V Security Verification
70.
Safety and Security in Sea Transportation
71.
safety and security testing
72.
security
73.
security adaptation
74.
security alert prioritization
75.
security analysis
76.
security and justice (AFSJ)
77.
Security and political science
78.
security and privacy
79.
security and privacy in smart grids
80.
Security Assertion
81.
Security Assertion Mining
82.
security closure
83.
Security Coverage
84.
security dataset
85.
security dilemma
86.
Security evaluation
87.
security evaluation instruments
88.
Security Level Evaluation
89.
Security limitations
90.
security log analysis
91.
security management
92.
security model
93.
security notion
94.
security objectives
95.
security of data
96.
security of supply
97.
security operation center
98.
security operations center
99.
security patterns
100.
security policy
101.
security problem definition
102.
security proof
103.
security protocols
104.
security requirements
105.
security requirements engineering
106.
security research
107.
security risk assessment
108.
security risk management
109.
security risks
110.
security science and technology
111.
security strategies
112.
security systems for military objects
113.
security testing
114.
security training
115.
security verification
116.
security-by-design
117.
social security planning
118.
societal security
119.
software security
120.
software security level
121.
software security subcharacteristics
122.
sufficient level of security
123.
system of economic security
124.
system security
125.
terrorism security
126.
transmission System Security
127.
voting privacy and security
128.
ambulatory blood pressure monitoring
129.
automated decision and monitoring mechanisms
130.
Baltic-wide HELCOM COMBINE monitoring program
131.
bi-directional fault monitoring devices
132.
biological monitoring
133.
biomedical monitoring
134.
biosignal monitoring
135.
cardiac monitoring
136.
CO2 monitoring
137.
coastal monitoring
138.
condition monitoring
139.
condition monitoring system
140.
continuous monitoring
141.
Copernicus Marine Environment Monitoring Service
142.
corporate performance monitoring system
143.
corrosion monitoring
144.
data-driven condition monitoring
145.
deformation monitoring
146.
diagnosis and performance monitoring
147.
Distributed flow monitoring
148.
distributed monitoring
149.
distributed online monitoring
150.
disturbance monitoring
151.
drone-based traffic monitoring
152.
drug monitoring
153.
e-monitoring
154.
Environmental compliance monitoring
155.
environmental monitoring
156.
fault monitoring
157.
field monitoring
158.
fish monitoring
159.
GHB monitoring
160.
groundwater monitoring
161.
haemodialysis monitoring
162.
health monitoring
163.
healthcare monitoring
164.
hemodialysis monitoring
165.
home blood pressure monitoring
166.
home monitoring
167.
industrial monitoring
168.
infrastructure monitoring
169.
in-situ monitoring
170.
integrated hemodynamic monitoring
171.
interactive monitoring
172.
IoT-based monitoring
173.
laboratory monitoring
174.
landfill monitoring
175.
load monitoring
176.
long term monitoring
177.
long-term monitoring
178.
machine condition monitoring
179.
machinery monitoring
180.
Magnetic induction monitoring
181.
marine microplastic monitoring
182.
marine monitoring
183.
monitoring
184.
monitoring and application design
185.
monitoring and detection
186.
monitoring and prognosis
187.
monitoring deformations
188.
monitoring program
189.
monitoring RIS3 observatory
190.
monitoring system
191.
monitoring the health patients
192.
Non-intrusive load monitoring
193.
non-intrusive load monitoring (NILM)
194.
ocean monitoring
195.
online monitoring
196.
on-line monitoring
197.
optical monitoring
198.
passive acoustic monitoring
199.
patient monitoring
200.
performance monitoring
201.
periodic monitoring
202.
pollen monitoring
203.
power quality monitoring
204.
PQM (Power Quality Monitoring)
205.
process monitoring
206.
production monitoring
207.
production monitoring system
208.
production monitoring system (PLM)
209.
production monitoring system (PMS)
210.
production monitoring systems (PMS)
211.
project-monitoring
212.
quality monitoring
213.
real time monitoring process
214.
real-time collision monitoring
215.
real-time monitoring
216.
remote monitoring
217.
remote patient monitoring
218.
respiratory monitoring
219.
RIS3 evaluation and monitoring
220.
road surface condition monitoring
221.
sea monitoring
222.
sensor respiratory monitoring
223.
smart materials with structural health monitoring capabilities
224.
SoC health monitoring
225.
stormwater monitoring
226.
structural health monitoring
227.
surface water monitoring
228.
susceptibility monitoring
229.
system monitoring
230.
terms—production environment monitoring
231.
the accuracy of monitoring in analysis of impact impulses
232.
The Baltic Monitoring and Forecasting Centre (BAL MFC)
233.
traffic behavior monitoring
234.
treatment monitoring
235.
water pollution monitoring
236.
water quality monitoring
237.
wearable health monitoring
238.
wide area monitoring
239.
active distribution network management
240.
Adaptive network-based fuzzy inference system (ANFIS)
241.
aec distribution network
242.
analytical flow network analysis
243.
analytical network process
244.
ANDROID network
245.
artificial neural network
246.
A-source network
247.
autoservice network
248.
Bayesian belief network (BBN)
249.
bayesian network (BN)
250.
Binarized Neural Network (BNN)
251.
building site network
252.
business network model
253.
cable network
254.
carbon nanotube network
255.
cascaded forward neural network (CFNN)
256.
cognitive body area network
257.
collaborative network
258.
computer network management
259.
computer network operations
260.
connection network codes
261.
Controller Area Network
262.
Convolutional Neural Network
263.
convolutional neural network (CNN)
264.
coolant network
265.
deep convolutional neural network
266.
deep learning network
267.
deep neural network
268.
deep neural network compression
269.
DH network
270.
distribution network
271.
distribution network
272.
district heat network
273.
district heating network
274.
electric network analysis
275.
electric network parameters
276.
electrical network
277.
emergency network
278.
Event Processing Network (EPN)
279.
Event Processing Network Model
280.
feedforward neural network (FFNN)
281.
flow network analysis
282.
flow network parameters
283.
flying inductor network
284.
Fully Convolutional Network (FCN)
285.
Generative Adversarial Network (GaN)
286.
global innovation network
287.
Graph Convolutional Neural Network (GCN)
288.
GraphSAGE (Graph Based Neural Network)
289.
heterogeneous network
290.
hydraulic network model
291.
hypar-network
292.
impedance network
293.
impedance network
294.
impedance source (IS) network
295.
Impedance Source Network
296.
impedance-source network
297.
in-network data processing
298.
innovation network
299.
innovation network agent
300.
joint network-channel coding
301.
knowledge network
302.
levelling network
303.
line impedance stabilization network
304.
linear Delta robots neural network based model
305.
local network alignment
306.
LSTM neural network
307.
lumped parameter network
308.
lumped parameter thermal network
309.
lumped-parameter thermal network
310.
Magnetically Coupled Impedance Source Network (MCIS)
311.
memory network
312.
Mesh Network
313.
modified network cohesion
314.
MRAN (minimum resource allocation network)
315.
nanosheets network
316.
NB-IoT network
317.
network
318.
network access charges
319.
network analysis
320.
network anomaly detection
321.
network architecture
322.
network calculus
323.
network characteristics
324.
network communication technologies
325.
network constraint
326.
network disaggregation
327.
network dynamics
328.
network expansion planning
329.
network externality
330.
network forensics
331.
network function virtualization
332.
network functions virtualization (NFV)
333.
network games
334.
network governance
335.
network IDS alert classification
336.
network industries
337.
network industry
338.
network intrusion detection system
339.
network latencies
340.
network layer
341.
Network lifetime
342.
network measurement
343.
network of co-authorships
344.
network on chip
345.
Network on Chip (NoC)
346.
network partners
347.
network protocol reverse engineering
348.
network protocols
349.
Network QoS
350.
network quality
351.
Network reliability
352.
network resilience
353.
network safety ranking
354.
network slicing
355.
network sparsification
356.
network studies
357.
network theory
358.
network topologies
359.
network topology
360.
network uncertainties
361.
Network visualization
362.
network-on-chip
363.
network-on-ReRAM
364.
network-testing
365.
neural network
366.
neural network architecture search
367.
neural network controller
368.
neural network modelling
369.
neural network models
370.
neural network positioning algorithms
371.
neural network predictive controller
372.
nitrogen-cycling network
373.
non-public network
374.
non-terrestrial network
375.
open value network
376.
partner network
377.
partner network
378.
partner network (PN)
379.
partner network maturity
380.
passive switched capacitor network
381.
PC-corr network
382.
peer to peer network
383.
performance dialogue network
384.
personal area network applications
385.
pervasive public safety network
386.
phosphotransfer network
387.
power delivery network
388.
power distribution network
389.
production in network
390.
proteomic network
391.
public safety network
392.
qZS network
393.
qualitative network analysis
394.
quasi-impedance-source network
395.
quasi-Z-source network
396.
Radial Basis Function Neural Network (RBFNN)
397.
radio access network
398.
radio access network (RAN)
399.
radio access network subslicing
400.
random resistor network
401.
recurrent neural network language model
402.
reluctance network (RN)
403.
research network
404.
Residual Neural Network
405.
road network
406.
roof network
407.
route network
408.
self organizing network
409.
smart distribution network
410.
SMEs network
411.
social network
412.
social network analysis
413.
software-defined network
414.
spiking neural network (SNN)
415.
stretchable network
416.
support network activities
417.
sustainable partner network
418.
sustainable partner network (SPN)
419.
switched capacitor inductor network (SCLN)
420.
Z-source network
421.
technology transfer network
422.
telecommunication network management
423.
telecommunication network performance
424.
Ternary Neural Network
425.
the influence of DHW consumption on dimensioning the DH network
426.
thermal network
427.
tide gauge network
428.
transformer-based neural network
429.
UAV-enabled network
430.
underwater sensor network
431.
Urban Network
432.
utility network
433.
value network analysis
434.
water distribution network
435.
wireless ad hoq network
436.
wireless body area network
437.
Wireless Body Area Network (WBAN)
438.
wireless network
439.
wireless sensor network
440.
wireless sensor network (WSN)
441.
wsn (wireless sensor network)
442.
3D graphene network
443.
3D network topology visualization
subject term
9
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Baltic Monitoring & Forecasting Centre (BAL-MFC)
4.
Baltic Monitoring & Forecasting Centre (BAL-MFC)
5.
Baltic Monitoring and Forecasting Center (BALMFC)
6.
Copernicus Marine Environment Monitoring Service (CMEMS)
7.
MyOcean Baltic Sea Monitoring and Forecasting Centre
8.
European Access Network
9.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
TalTech subject term
2
1.
Erasmus Student Network
2.
Islamic Public Value Network
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT