Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
network anomaly detection (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(3/342)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
Netflow based framework for identifying anomalous end user nodes
Vaarandi, Risto
;
Pihelgas, Mauno
Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020
2020
/
p. 448-456
https://doi.org/10.34190/ICCWS.20.035
artikkel kogumikus
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
338
1.
network anomaly detection
2.
anomaly detection
3.
anomaly detection for system logs
4.
cerium anomaly europium anomaly
5.
network intrusion detection system
6.
anomaly
7.
Bouguer anomaly
8.
Ce anomaly
9.
cerium anomaly
10.
europium anomaly
11.
gravity anomaly
12.
residual gravity anomaly
13.
Residual Terrain Model (RTM) anomaly
14.
residual terrain model anomaly
15.
wind anomaly
16.
amoxicillin detection
17.
antibiotic detection
18.
antibiotics detection
19.
aspect detection
20.
asynchronous fault detection
21.
attack detection
22.
barotrauma detection system
23.
Barotrauma detection system sensors
24.
behaviour-based intrusion detection systems
25.
body detection
26.
botnet detection
27.
capacitively coupled conductivity detection
28.
change detection
29.
chemical detection
30.
community detection
31.
compu ter-aided detection(CAD)
32.
computer-aided detection
33.
computer‐aided detection
34.
contactless conductivity detection
35.
contactless conductivity detection (C4D)
36.
crack detection
37.
crash detection
38.
cyber intrusion detection
39.
defect detection
40.
detection
41.
detection efficiency
42.
detection engineering
43.
detection mechanisms
44.
detection method
45.
detection methods
46.
detection of anomalous end user nodes
47.
detection of hydrogen isotopes
48.
distributed detection
49.
early detection
50.
early intrusion detection
51.
energy detection
52.
error detection
53.
ESI-MS and IM detection
54.
evaluation of explainable AI intrusion detection
55.
Event detection
56.
extraction and detection methods
57.
face detection
58.
Face Manipulation Detection
59.
failure detection
60.
fall detection
61.
fault detection
62.
fault detection and diagnoses
63.
fault detection and diagnosis
64.
Fish detection
65.
fouling detection
66.
harmonic detection
67.
health care IoMT intrusion detection
68.
hepatitis C virus (HCV) detection
69.
hubs detection
70.
IED detection
71.
image-based crack detection
72.
indicident detection and response
73.
indirect UV absorbance detection
74.
intrusion detection
75.
intrusion detection system (IDS)
76.
intrusion detection systems
77.
intrusion detection systems (IDS)
78.
island detection
79.
islanding detection
80.
label-free detection
81.
lane detection
82.
lane line detection
83.
LED fluorescence detection
84.
leg detection
85.
light detection and ranging
86.
light detection and ranging (LiDAR)
87.
Light Detection and Ranging (LiDAR) point cloud
88.
limit of detection
89.
lock-in detection
90.
loop-closure detection
91.
malware detection
92.
marker detection
93.
mobile malware detection
94.
money laundering detection systems
95.
monitoring and detection
96.
multi-classed object detection
97.
Multi-valued Simulation for Hazard Detection in Digital Circuits
98.
mutant detection
99.
nodules detection
100.
object detection
101.
oil-spill detection
102.
outlier’s detection methods
103.
outliers detection
104.
peak detection
105.
phytoplankton detection methods
106.
plagiarism detection
107.
position detection
108.
precursor detection
109.
propaganda detection
110.
protein detection
111.
proton detection
112.
radar detection
113.
ramp event detection
114.
recycled FPGA detection
115.
residual current detection
116.
robust detection
117.
scene text detection
118.
short-circuit detection
119.
Side-Channel Attack Detection
120.
small molecule detection
121.
speech activity detection
122.
Suicidal ideation detection
123.
synchronous detection
124.
topic detection
125.
tyre detection
126.
unmanned aerial vehicle detection systems
127.
unsupervised outlier detection
128.
UV detection
129.
vehicle detection
130.
vortex detection
131.
3D lane detection
132.
active distribution network management
133.
Adaptive network-based fuzzy inference system (ANFIS)
134.
aec distribution network
135.
analytical flow network analysis
136.
analytical network process
137.
ANDROID network
138.
artificial neural network
139.
A-source network
140.
autoservice network
141.
Bayesian belief network (BBN)
142.
bayesian network (BN)
143.
Binarized Neural Network (BNN)
144.
building site network
145.
business network model
146.
cable network
147.
carbon nanotube network
148.
cascaded forward neural network (CFNN)
149.
cognitive body area network
150.
collaborative network
151.
computer network management
152.
computer network operations
153.
connection network codes
154.
Controller Area Network
155.
Convolutional Neural Network
156.
convolutional neural network (CNN)
157.
coolant network
158.
deep convolutional neural network
159.
deep learning network
160.
deep neural network
161.
deep neural network compression
162.
DH network
163.
distribution network
164.
distribution network
165.
district heat network
166.
district heating network
167.
electric network analysis
168.
electric network parameters
169.
electrical network
170.
emergency network
171.
Event Processing Network (EPN)
172.
Event Processing Network Model
173.
feedforward neural network (FFNN)
174.
flow network analysis
175.
flow network parameters
176.
flying inductor network
177.
Fully Convolutional Network (FCN)
178.
Generative Adversarial Network (GaN)
179.
global innovation network
180.
Graph Convolutional Neural Network (GCN)
181.
GraphSAGE (Graph Based Neural Network)
182.
heterogeneous network
183.
hydraulic network model
184.
hypar-network
185.
impedance network
186.
impedance network
187.
impedance source (IS) network
188.
Impedance Source Network
189.
impedance-source network
190.
in-network data processing
191.
innovation network
192.
innovation network agent
193.
joint network-channel coding
194.
knowledge network
195.
levelling network
196.
line impedance stabilization network
197.
linear Delta robots neural network based model
198.
local network alignment
199.
LSTM neural network
200.
lumped parameter network
201.
lumped parameter thermal network
202.
lumped-parameter thermal network
203.
Magnetically Coupled Impedance Source Network (MCIS)
204.
memory network
205.
Mesh Network
206.
modified network cohesion
207.
MRAN (minimum resource allocation network)
208.
nanosheets network
209.
NB-IoT network
210.
NetFlow based network monitoring
211.
network
212.
network access charges
213.
network analysis
214.
network architecture
215.
network calculus
216.
network characteristics
217.
network communication technologies
218.
network constraint
219.
network disaggregation
220.
network dynamics
221.
network expansion planning
222.
network externality
223.
network forensics
224.
network function virtualization
225.
network functions virtualization (NFV)
226.
network games
227.
network governance
228.
network IDS alert classification
229.
network industries
230.
network industry
231.
network latencies
232.
network layer
233.
Network lifetime
234.
network measurement
235.
network monitoring
236.
network of co-authorships
237.
network on chip
238.
Network on Chip (NoC)
239.
network partners
240.
network protocol reverse engineering
241.
network protocols
242.
Network QoS
243.
network quality
244.
Network reliability
245.
network resilience
246.
network safety ranking
247.
network security
248.
network security monitoring
249.
network slicing
250.
network sparsification
251.
network studies
252.
network theory
253.
network topologies
254.
network topology
255.
network uncertainties
256.
Network visualization
257.
network-on-chip
258.
network-on-ReRAM
259.
network-testing
260.
neural network
261.
neural network architecture search
262.
neural network controller
263.
neural network modelling
264.
neural network models
265.
neural network positioning algorithms
266.
neural network predictive controller
267.
nitrogen-cycling network
268.
non-public network
269.
non-terrestrial network
270.
open value network
271.
partner network
272.
partner network
273.
partner network (PN)
274.
partner network maturity
275.
passive switched capacitor network
276.
PC-corr network
277.
peer to peer network
278.
performance dialogue network
279.
personal area network applications
280.
pervasive public safety network
281.
phosphotransfer network
282.
power delivery network
283.
power distribution network
284.
production in network
285.
proteomic network
286.
public safety network
287.
qZS network
288.
qualitative network analysis
289.
quasi-impedance-source network
290.
quasi-Z-source network
291.
Radial Basis Function Neural Network (RBFNN)
292.
radio access network
293.
radio access network (RAN)
294.
radio access network subslicing
295.
random resistor network
296.
recurrent neural network language model
297.
reluctance network (RN)
298.
research network
299.
Residual Neural Network
300.
road network
301.
roof network
302.
route network
303.
self organizing network
304.
smart distribution network
305.
SMEs network
306.
social network
307.
social network analysis
308.
software-defined network
309.
spiking neural network (SNN)
310.
stretchable network
311.
support network activities
312.
sustainable partner network
313.
sustainable partner network (SPN)
314.
switched capacitor inductor network (SCLN)
315.
Z-source network
316.
technology transfer network
317.
telecommunication network management
318.
telecommunication network performance
319.
Ternary Neural Network
320.
the influence of DHW consumption on dimensioning the DH network
321.
thermal network
322.
tide gauge network
323.
transformer-based neural network
324.
UAV-enabled network
325.
underwater sensor network
326.
Urban Network
327.
utility network
328.
value network analysis
329.
water distribution network
330.
wireless ad hoq network
331.
wireless body area network
332.
Wireless Body Area Network (WBAN)
333.
wireless network
334.
wireless sensor network
335.
wireless sensor network (WSN)
336.
wsn (wireless sensor network)
337.
3D graphene network
338.
3D network topology visualization
TTÜ märksõna
2
1.
Erasmus Student Network
2.
Islamic Public Value Network
märksõna
2
1.
European Access Network
2.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT