Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber intrusion detection (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/222)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Learning from few cyber-attacks : addressing the class imbalance problem in machine learning-based intrusion detection in software-defined networking
Mirsadeghi, Seyed Mohammad Hadi
;
Bahsi, Hayretdin
;
Vaarandi, Risto
;
Inoubli, Wissem
IEEE Access
2023
/
p. 140428 - 140442
https://doi.org/10.1109/ACCESS.2023.3341755
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
219
1.
cyber intrusion detection
2.
behaviour-based intrusion detection systems
3.
early intrusion detection
4.
evaluation of explainable AI intrusion detection
5.
health care IoMT intrusion detection
6.
intrusion detection
7.
intrusion detection system
8.
intrusion detection system (IDS)
9.
intrusion detection systems
10.
network intrusion detection system
11.
air intrusion
12.
intrusion
13.
intrusion response system
14.
saline intrusion blockage
15.
autonomous vehicle cyber range
16.
cloud-based cyber-physical systems (C2PS)
17.
cognitive cyber warfare
18.
cyber
19.
Cyber “Maastricht”
20.
cyber architecture
21.
cyber attacks
22.
cyber battle damage assessment
23.
Cyber Bio-analytical Physical Systems (CBPSs)
24.
cyber challenge
25.
cyber command
26.
Cyber Command organisational structure
27.
cyber conflict
28.
cyber contingency
29.
cyber crime
30.
cyber crime pathways
31.
cyber crime scripting
32.
Cyber crisis management
33.
cyber defence
34.
cyber defence exercise
35.
cyber defence exercises
36.
cyber defense education
37.
cyber defense exercise
38.
cyber defense exercises
39.
cyber dependence
40.
cyber diplomacy
41.
cyber exercise
42.
cyber hygiene
43.
cyber impact assessment
44.
cyber incidents
45.
cyber insurance
46.
cyber kill chain
47.
cyber operation
48.
cyber operation officer
49.
cyber operations
50.
cyber operations exercises
51.
cyber physical energy systems
52.
cyber physical power system (CPPS)
53.
Cyber Physical Production System
54.
cyber physical production systems (CPPS)
55.
cyber physical social system
56.
cyber physical social systems (cpss)
57.
cyber physical system
58.
Cyber Planning tool
59.
cyber power Europe
60.
cyber ranges
61.
cyber red teaming
62.
cyber resilience
63.
cyber risk
64.
cyber security
65.
cyber security education
66.
cyber security exercises
67.
cyber security monitoring
68.
cyber security strategies
69.
cyber situational awareness
70.
cyber stability
71.
cyber team communication
72.
cyber threat
73.
cyber threat communication
74.
Cyber Threat Intelligence
75.
cyber threats
76.
cyber war
77.
cyber warfare
78.
cyber warriors
79.
cyber weapons
80.
cyber-attack
81.
cyber-attack pathways
82.
Cyber-attacks
83.
cyber-insurance
84.
cyber-paternalism
85.
cyber-physical energy systems
86.
cyber-physical social system (CPSS)
87.
cyber-physical system
88.
Cyber-Physical System (CPS)
89.
cyber-physical system logistic robot
90.
cyber-physical systems
91.
Cyber-Physical Systems (CPS)
92.
cyber-risks
93.
cyber-security
94.
cyber-space nexus
95.
cyber-vulnerabilities
96.
Defensive Cyber Operations
97.
EU cyber policy
98.
international cyber norms
99.
military cyber
100.
mobile cyber-physical system
101.
national cyber security strategy
102.
NATO cyber operations definitions
103.
NATO Cyber Range
104.
Offensive Cyber Operations
105.
perceived cyber risks and threats
106.
responsive cyber defence
107.
Socio-Cyber-Physical Systems
108.
space cyber range
109.
technical cyber exercise
110.
Visualising Cyber Planning
111.
amoxicillin detection
112.
anomaly detection
113.
anomaly detection for system logs
114.
antibiotic detection
115.
antibiotics detection
116.
aspect detection
117.
asynchronous fault detection
118.
attack detection
119.
barotrauma detection system
120.
Barotrauma detection system sensors
121.
body detection
122.
botnet detection
123.
capacitively coupled conductivity detection
124.
change detection
125.
chemical detection
126.
community detection
127.
compu ter-aided detection(CAD)
128.
computer-aided detection
129.
computer‐aided detection
130.
contactless conductivity detection
131.
contactless conductivity detection (C4D)
132.
crack detection
133.
crash detection
134.
defect detection
135.
detection
136.
detection efficiency
137.
detection engineering
138.
detection mechanisms
139.
detection method
140.
detection methods
141.
detection of anomalous end user nodes
142.
detection of hydrogen isotopes
143.
distributed detection
144.
early detection
145.
energy detection
146.
error detection
147.
ESI-MS and IM detection
148.
Event detection
149.
extraction and detection methods
150.
face detection
151.
Face Manipulation Detection
152.
failure detection
153.
fall detection
154.
fault detection
155.
fault detection and diagnoses
156.
fault detection and diagnosis
157.
Fish detection
158.
fouling detection
159.
harmonic detection
160.
hepatitis C virus (HCV) detection
161.
hubs detection
162.
IED detection
163.
image-based crack detection
164.
indicident detection and response
165.
indirect UV absorbance detection
166.
island detection
167.
islanding detection
168.
label-free detection
169.
lane detection
170.
lane line detection
171.
LED fluorescence detection
172.
leg detection
173.
light detection and ranging
174.
light detection and ranging (LiDAR)
175.
Light Detection and Ranging (LiDAR) point cloud
176.
limit of detection
177.
lock-in detection
178.
loop-closure detection
179.
malware detection
180.
marker detection
181.
mobile malware detection
182.
money laundering detection systems
183.
monitoring and detection
184.
multi-classed object detection
185.
Multi-valued Simulation for Hazard Detection in Digital Circuits
186.
mutant detection
187.
network anomaly detection
188.
nodules detection
189.
object detection
190.
oil-spill detection
191.
outlier’s detection methods
192.
outliers detection
193.
peak detection
194.
phytoplankton detection methods
195.
plagiarism detection
196.
position detection
197.
precursor detection
198.
propaganda detection
199.
protein detection
200.
proton detection
201.
radar detection
202.
ramp event detection
203.
recycled FPGA detection
204.
residual current detection
205.
robust detection
206.
scene text detection
207.
short-circuit detection
208.
small molecule detection
209.
speech activity detection
210.
Suicidal ideation detection
211.
synchronous detection
212.
topic detection
213.
tyre detection
214.
unmanned aerial vehicle detection systems
215.
unsupervised outlier detection
216.
UV detection
217.
vehicle detection
218.
vortex detection
219.
3D lane detection
subject term
3
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT