Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
intrusion detection systems (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(1/124)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Data quality problem in AI-based network intrusion detection systems studies and a solution proposal
Halisdemir, Emre
;
Karacan, Hacer
;
Pihelgas, Mauno
;
Lepik, Toomas
;
Cho, Sungbaek
14th International Conference on Cyber Conflict : Keep Moving
2022
/
p. 367-383
https://ccdcoe.org/uploads/2022/06/CyCon_2022_book.pdf
book article
Number of records 1, displaying
1 - 1
keyword
124
1.
behaviour-based intrusion detection systems
2.
intrusion detection systems
3.
cyber intrusion detection
4.
early intrusion detection
5.
evaluation of explainable AI intrusion detection
6.
health care IoMT intrusion detection
7.
intrusion detection
8.
intrusion detection system
9.
intrusion detection system (IDS)
10.
network intrusion detection system
11.
money laundering detection systems
12.
unmanned aerial vehicle detection systems
13.
air intrusion
14.
intrusion
15.
intrusion response system
16.
saline intrusion blockage
17.
amoxicillin detection
18.
anomaly detection
19.
anomaly detection for system logs
20.
antibiotic detection
21.
antibiotics detection
22.
aspect detection
23.
asynchronous fault detection
24.
attack detection
25.
barotrauma detection system
26.
Barotrauma detection system sensors
27.
body detection
28.
botnet detection
29.
capacitively coupled conductivity detection
30.
change detection
31.
chemical detection
32.
community detection
33.
compu ter-aided detection(CAD)
34.
computer-aided detection
35.
computer‐aided detection
36.
contactless conductivity detection
37.
contactless conductivity detection (C4D)
38.
crack detection
39.
crash detection
40.
defect detection
41.
detection
42.
detection efficiency
43.
detection engineering
44.
detection mechanisms
45.
detection method
46.
detection methods
47.
detection of anomalous end user nodes
48.
detection of hydrogen isotopes
49.
distributed detection
50.
early detection
51.
energy detection
52.
error detection
53.
ESI-MS and IM detection
54.
Event detection
55.
extraction and detection methods
56.
face detection
57.
Face Manipulation Detection
58.
failure detection
59.
fall detection
60.
fault detection
61.
fault detection and diagnoses
62.
fault detection and diagnosis
63.
Fish detection
64.
fouling detection
65.
harmonic detection
66.
hepatitis C virus (HCV) detection
67.
hubs detection
68.
IED detection
69.
image-based crack detection
70.
indicident detection and response
71.
indirect UV absorbance detection
72.
island detection
73.
islanding detection
74.
label-free detection
75.
lane detection
76.
lane line detection
77.
LED fluorescence detection
78.
leg detection
79.
light detection and ranging
80.
light detection and ranging (LiDAR)
81.
Light Detection and Ranging (LiDAR) point cloud
82.
limit of detection
83.
lock-in detection
84.
loop-closure detection
85.
malware detection
86.
marker detection
87.
mobile malware detection
88.
monitoring and detection
89.
multi-classed object detection
90.
Multi-valued Simulation for Hazard Detection in Digital Circuits
91.
mutant detection
92.
network anomaly detection
93.
nodules detection
94.
object detection
95.
oil-spill detection
96.
outlier’s detection methods
97.
outliers detection
98.
peak detection
99.
phytoplankton detection methods
100.
plagiarism detection
101.
position detection
102.
precursor detection
103.
propaganda detection
104.
protein detection
105.
proton detection
106.
radar detection
107.
ramp event detection
108.
recycled FPGA detection
109.
residual current detection
110.
robust detection
111.
scene text detection
112.
short-circuit detection
113.
Side-Channel Attack Detection
114.
small molecule detection
115.
speech activity detection
116.
Suicidal ideation detection
117.
synchronous detection
118.
topic detection
119.
tyre detection
120.
unsupervised outlier detection
121.
UV detection
122.
vehicle detection
123.
vortex detection
124.
3D lane detection
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT