Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
detection methods (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(1/202)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Active learning-based mobile malware detection utilizing auto-labeling and data drift detection
Deng, Zhe
;
Hubert, Arthur
;
Ben Yahia, Sadok
;
Bahsi, Hayretdin
Proceedings of the 2024 IEEE International Conference on Cyber Security and Resilience, CSR 2024
2024
/
p. 146 - 151
https://doi.org/10.1109/CSR61664.2024.10679343
Article at Scopus
Article at WOS
book article
2
journal article
Revealing Stachybotrys-like fungal growth in buildings - Possible exposure highlighted through three case studies
Hintikka, Tuomas
;
Andersson, Maria A.
;
Marik, Tamás
;
Mikkola, Raimo
;
Andersson, Magnus
;
Kredics, László
;
Kurnitski, Jarek
;
Salonen, Heidi
Science of the total environment
2025
/
art. 178408
https://doi.org/10.1016/j.scitotenv.2025.178408
journal article
Number of records 2, displaying
1 - 2
keyword
202
1.
detection methods
2.
extraction and detection methods
3.
outlier’s detection methods
4.
phytoplankton detection methods
5.
amoxicillin detection
6.
anomaly detection
7.
anomaly detection for system logs
8.
antibiotic detection
9.
antibiotics detection
10.
aspect detection
11.
asynchronous fault detection
12.
attack detection
13.
barotrauma detection system
14.
behaviour-based intrusion detection systems
15.
body detection
16.
botnet detection
17.
capacitively coupled conductivity detection
18.
change detection
19.
chemical detection
20.
community detection
21.
compu ter-aided detection(CAD)
22.
computer-aided detection
23.
computer‐aided detection
24.
contactless conductivity detection
25.
contactless conductivity detection (C4D)
26.
crack detection
27.
crash detection
28.
cyber intrusion detection
29.
defect detection
30.
detection
31.
detection efficiency
32.
detection engineering
33.
detection of anomalous end user nodes
34.
detection of hydrogen isotopes
35.
distributed detection
36.
early detection
37.
early intrusion detection
38.
energy detection
39.
error detection
40.
ESI-MS and IM detection
41.
Event detection
42.
face detection
43.
Face Manipulation Detection
44.
failure detection
45.
fall detection
46.
fault detection
47.
fault detection and diagnoses
48.
fault detection and diagnosis
49.
Fish detection
50.
fouling detection
51.
harmonic detection
52.
hepatitis C virus (HCV) detection
53.
hubs detection
54.
IED detection
55.
image-based crack detection
56.
indicident detection and response
57.
indirect UV absorbance detection
58.
intrusion detection
59.
intrusion detection system
60.
intrusion detection system (IDS)
61.
intrusion detection systems
62.
island detection
63.
islanding detection
64.
label-free detection
65.
LED fluorescence detection
66.
leg detection
67.
light detection and ranging
68.
light detection and ranging (LiDAR)
69.
Light Detection and Ranging (LiDAR) point cloud
70.
limit of detection
71.
lock-in detection
72.
loop-closure detection
73.
malware detection
74.
marker detection
75.
mobile malware detection
76.
money laundering detection systems
77.
monitoring and detection
78.
multi-classed object detection
79.
mutant detection
80.
network anomaly detection
81.
network intrusion detection system
82.
nodules detection
83.
object detection
84.
oil-spill detection
85.
outliers detection
86.
peak detection
87.
plagiarism detection
88.
position detection
89.
protein detection
90.
proton detection
91.
radar detection
92.
ramp event detection
93.
recycled FPGA detection
94.
residual current detection
95.
robust detection
96.
scene text detection
97.
short-circuit detection
98.
small molecule detection
99.
speech activity detection
100.
Suicidal ideation detection
101.
synchronous detection
102.
tyre detection
103.
unmanned aerial vehicle detection systems
104.
unsupervised outlier detection
105.
UV detection
106.
vehicle detection
107.
vortex detection
108.
3D lane detection
109.
ab-initio methods
110.
active learning methods
111.
algebraic methods
112.
algebraic/geometric methods
113.
an ensemble of compression methods
114.
analysis methods
115.
analytical methods
116.
approximate methods
117.
approximation methods
118.
assessment methods
119.
Backstepping methods
120.
biology experimental methods
121.
calculation methods
122.
Cesaro methods
123.
chemometric methods
124.
computational design methods
125.
control methods
126.
decontamination methods
127.
Design and assessment methods
128.
design methods
129.
diagnostics methods
130.
didactic methods
131.
digital methods
132.
electronic structure methods
133.
Euler-Knopp methods
134.
excavation methods
135.
finite-element (FE) methods
136.
finite-element methods
137.
finite-element methods (FEM)
138.
flow assessment methods
139.
formal methods
140.
frontier methods
141.
Gauss-Newton-type methods
142.
Gauss–Newton-type methods
143.
generalized Nörlund methods
144.
geometric methods
145.
integration methods
146.
interaction methods
147.
interactive teaching methods
148.
interpretation methods
149.
invasive methods
150.
inverse methods
151.
inverse methods for engineering applications
152.
linear and nonlinear unsupervised methods
153.
material characterization methods
154.
Mathematical methods
155.
matrix methods
156.
methods
157.
methods of measuring
158.
methods of study
159.
Methods: statistical
160.
mixed methods
161.
mixed-methods
162.
model-free methods
163.
modulation methods
164.
Monte Carlo methods
165.
nearest neighbor methods
166.
numerical methods
167.
optimization methods
168.
physico-chemical methods
169.
plan-driven methods
170.
polynomial methods
171.
practical teaching methods
172.
prediction methods
173.
pseudospectral methods
174.
qualitative methods
175.
qualitative research methods
176.
quantitative methods
177.
regular matrix methods
178.
research methods
179.
sampling methods
180.
selection methods
181.
separation methods
182.
shootthrough control methods
183.
shoot-through control methods
184.
stability prediction methods
185.
standardized methods
186.
state space methods
187.
Statistical methods
188.
statistics methods
189.
substation testing methods
190.
Taguchi methods
191.
teaching methods
192.
testing methods
193.
timber construction (construction methods)
194.
tracer gas methods
195.
transmission line matrix methods
196.
variational methods
197.
verification methods
198.
visual methods
199.
visualization design and evaluation methods
200.
X-ray methods
201.
X-ray methods B
202.
finite element methods
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT