Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
network security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
5
Vaata veel..
(3/340)
Ekspordi
ekspordi kõik päringu tulemused
(5)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
Blumbergs, Bernhards
;
Vaarandi, Risto
MILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 2017
2017
/
p. 707-712
https://doi.org/10.1109/MILCOM.2017.8170785
Conference proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
2
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
3
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kamerabasiertes Monitoring von Fischen in Deutschland und der Schweiz
Haas, Christian
;
Meyer, Matthias
;
Schmalz, Maria
;
Tuhtan, Jeffrey Andrew
WasserWirtschaft
2024
/
p. 19 - 29
https://doi.org/10.1007/s35147-024-2401-1
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Network IDS alert classification with active learning techniques
Vaarandi, Risto
;
Guerra-Manzanares, Alejandro
Journal of Information Security and Applications
2024
/
art. 103687
https://doi.org/10.1016/j.jisa.2023.103687
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
5
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Stream clustering guided supervised learning for classifying NIDS alerts
Vaarandi, Risto
;
Guerra Manzanares, Alejandro
Future generation computer systems
2024
/
p. 231-244 : ill
https://doi.org/10.1016/j.future.2024.01.032
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 5, kuvan
1 - 5
võtmesõna
334
1.
network security
2.
network security monitoring
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
cloud security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security monitoring in maritime
17.
cyber security strategies
18.
cyber-physical system security
19.
cyber-security
20.
data and information security
21.
data security
22.
development of security cameras
23.
digital security practices
24.
drinking water security
25.
economic security
26.
economic security of enterprise
27.
emotional security
28.
energy security
29.
energy security indicator
30.
Estonian information security standard
31.
graded security
32.
hardware security
33.
hardware security primitive
34.
high level of security
35.
Homeland security
36.
human security
37.
information security
38.
information security and privacy
39.
initial level of security
40.
internal security
41.
international security
42.
investment and innovation security
43.
IPv6 security
44.
IT security
45.
IT security management
46.
job security
47.
long-term security
48.
maritime cyber security
49.
maritime cyber security operations centers
50.
Maritime Security Operations Center (M-SOC)
51.
medium level of security
52.
metadata model for security measures
53.
Middle Eastern security
54.
Mobile security
55.
national cyber security strategy
56.
national security
57.
NATO. Science for Peace and Security Program
58.
OSCE (Organization for Security and Co-operation in Europe)
59.
passenger’s security
60.
policy-based routing security
61.
political and security cultures
62.
post-quantum security
63.
power system security
64.
quantitative security
65.
regional security
66.
RISC-V Security Verification
67.
Safety and Security in Sea Transportation
68.
safety and security testing
69.
security
70.
security adaptation
71.
security alert prioritization
72.
security analysis
73.
security and justice (AFSJ)
74.
Security and political science
75.
security and privacy
76.
security and privacy in smart grids
77.
Security Assertion
78.
Security Assertion Mining
79.
security closure
80.
Security Coverage
81.
security dataset
82.
security dilemma
83.
Security evaluation
84.
security evaluation instruments
85.
Security Level Evaluation
86.
Security limitations
87.
security log analysis
88.
security management
89.
security model
90.
security monitoring
91.
security notion
92.
security objectives
93.
security of data
94.
security of supply
95.
security operation center
96.
security operations center
97.
security patterns
98.
security policy
99.
security problem definition
100.
security proof
101.
security protocols
102.
security requirements
103.
security requirements engineering
104.
security research
105.
security risk assessment
106.
security risk management
107.
security risks
108.
security science and technology
109.
security strategies
110.
security systems for military objects
111.
security testing
112.
security training
113.
security verification
114.
security-by-design
115.
social security planning
116.
societal security
117.
software security
118.
software security level
119.
software security subcharacteristics
120.
sufficient level of security
121.
system of economic security
122.
system security
123.
terrorism security
124.
transmission System Security
125.
voting privacy and security
126.
active distribution network management
127.
Adaptive network-based fuzzy inference system (ANFIS)
128.
aec distribution network
129.
analytical flow network analysis
130.
analytical network process
131.
ANDROID network
132.
artificial neural network
133.
A-source network
134.
autoservice network
135.
back propagation neural network
136.
Bayesian belief network (BBN)
137.
bayesian network (BN)
138.
Binarized Neural Network (BNN)
139.
building site network
140.
business network model
141.
cable network
142.
carbon nanotube network
143.
cascaded forward neural network (CFNN)
144.
cognitive body area network
145.
collaborative network
146.
computer network management
147.
computer network operations
148.
connection network codes
149.
Controller Area Network
150.
Convolutional Neural Network
151.
convolutional neural network (CNN)
152.
coolant network
153.
deep convolutional neural network
154.
deep learning network
155.
deep neural network
156.
deep neural network compression
157.
DH network
158.
distribution network
159.
distribution network
160.
district heat network
161.
district heating network
162.
electric network analysis
163.
electric network parameters
164.
electrical network
165.
emergency network
166.
Event Processing Network (EPN)
167.
Event Processing Network Model
168.
feedforward neural network (FFNN)
169.
flow network analysis
170.
flow network parameters
171.
flying inductor network
172.
Fully Convolutional Network (FCN)
173.
Generative Adversarial Network (GaN)
174.
global innovation network
175.
Graph Convolutional Neural Network (GCN)
176.
GraphSAGE (Graph Based Neural Network)
177.
heterogeneous network
178.
hydraulic network model
179.
hypar-network
180.
impedance network
181.
impedance network
182.
impedance source (IS) network
183.
Impedance Source Network
184.
impedance-source network
185.
in-network data processing
186.
innovation network
187.
innovation network agent
188.
joint network-channel coding
189.
knowledge network
190.
levelling network
191.
line impedance stabilization network
192.
linear Delta robots neural network based model
193.
local network alignment
194.
LSTM neural network
195.
lumped parameter network
196.
lumped parameter thermal network
197.
lumped-parameter thermal network
198.
Magnetically Coupled Impedance Source Network (MCIS)
199.
memory network
200.
Mesh Network
201.
modified network cohesion
202.
MRAN (minimum resource allocation network)
203.
nanosheets network
204.
NB-IoT network
205.
NetFlow based network monitoring
206.
network
207.
network access charges
208.
network analysis
209.
network anomaly detection
210.
network architecture
211.
network calculus
212.
network characteristics
213.
network communication technologies
214.
network constraint
215.
network disaggregation
216.
network dynamics
217.
network expansion planning
218.
network externality
219.
network forensics
220.
network function virtualization
221.
network functions virtualization (NFV)
222.
network games
223.
network governance
224.
network IDS alert classification
225.
network industries
226.
network industry
227.
network intrusion detection system
228.
network latencies
229.
network layer
230.
Network lifetime
231.
network measurement
232.
network monitoring
233.
network of co-authorships
234.
network on chip
235.
Network on Chip (NoC)
236.
network partners
237.
network protocol reverse engineering
238.
network protocols
239.
Network QoS
240.
network quality
241.
Network reliability
242.
network resilience
243.
network safety ranking
244.
network slicing
245.
network sparsification
246.
network studies
247.
network theory
248.
network topologies
249.
network topology
250.
network uncertainties
251.
Network visualization
252.
network-on-chip
253.
network-on-ReRAM
254.
network-testing
255.
neural network
256.
neural network architecture search
257.
neural network controller
258.
neural network modelling
259.
neural network models
260.
neural network positioning algorithms
261.
neural network predictive controller
262.
nitrogen-cycling network
263.
non-public network
264.
non-terrestrial network
265.
open value network
266.
partner network
267.
partner network
268.
partner network (PN)
269.
partner network maturity
270.
passive switched capacitor network
271.
PC-corr network
272.
peer to peer network
273.
performance dialogue network
274.
personal area network applications
275.
pervasive public safety network
276.
phosphotransfer network
277.
power delivery network
278.
power distribution network
279.
production in network
280.
proteomic network
281.
public safety network
282.
qZS network
283.
qualitative network analysis
284.
quasi-impedance-source network
285.
quasi-Z-source network
286.
Radial Basis Function Neural Network (RBFNN)
287.
radio access network
288.
radio access network (RAN)
289.
radio access network subslicing
290.
random resistor network
291.
Recurrent Neural Network
292.
recurrent neural network language model
293.
reluctance network (RN)
294.
research network
295.
Residual Neural Network
296.
road network
297.
roof network
298.
route network
299.
self organizing network
300.
smart distribution network
301.
SMEs network
302.
social network
303.
social network analysis
304.
software-defined network
305.
spiking neural network (SNN)
306.
stretchable network
307.
support network activities
308.
sustainable partner network
309.
sustainable partner network (SPN)
310.
switched capacitor inductor network (SCLN)
311.
Z-source network
312.
technology transfer network
313.
telecommunication network management
314.
telecommunication network performance
315.
Ternary Neural Network
316.
the influence of DHW consumption on dimensioning the DH network
317.
thermal network
318.
tide gauge network
319.
transformer-based neural network
320.
UAV-enabled network
321.
underwater sensor network
322.
Urban Network
323.
utility network
324.
value network analysis
325.
water distribution network
326.
wireless ad hoq network
327.
wireless body area network
328.
Wireless Body Area Network (WBAN)
329.
wireless network
330.
wireless sensor network
331.
wireless sensor network (WSN)
332.
wsn (wireless sensor network)
333.
3D graphene network
334.
3D network topology visualization
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
European Access Network
4.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
TTÜ märksõna
2
1.
Erasmus Student Network
2.
Islamic Public Value Network
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT