Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
indicident detection and response (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/179)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
How to build a SOC on a budget
Vaarandi, Risto
;
Mäses, Sten
2022 IEEE International Conference on Cyber Security and Resilience (CSR)
2022
/
p. 171-177 : ill
https://doi.org/10.1109/CSR54599.2022.9850281
artikkel kogumikus
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
178
1.
indicident detection and response
2.
acid stress response
3.
auxin response
4.
behavioural response
5.
cybersecurity incident response
6.
demand response
7.
demand response (DR)
8.
demand response programs
9.
demand-side response
10.
dynamic response
11.
emergency response
12.
EU Horizon 2020 research project GRACE (Integrated oil spill response actions and environmental effects)
13.
fast response time
14.
finite impulse response (FIR) filters
15.
finite impulse response filters
16.
frequency response
17.
frequency response analysis
18.
frequency response curves
19.
frequency response function
20.
frequency response interpretation
21.
gas response
22.
hormone response elements
23.
hygrothermal response
24.
incident response
25.
inertial response
26.
infinite impulse response (IIR) filters
27.
integrated demand response
28.
intrusion response system
29.
Item non-response
30.
marine oil spill response
31.
non-monotonic dose-response (NMDR)
32.
nonmonotonic time response (NMTR)
33.
pandemic response
34.
plankton response
35.
plant stress response
36.
post-buckling response
37.
post-ultimate response
38.
quasi-static structural response
39.
rapid response
40.
response
41.
response decision-making
42.
response simulation
43.
response surface methodology
44.
Response Surface Methodology (RSM)
45.
response surface modelling
46.
response time (RT)
47.
ship global response
48.
sparse impulse response
49.
spectral response
50.
steady state response
51.
stimulus-organism-response framework
52.
stimulus-organism-response theory
53.
Structural response
54.
transiet response
55.
trigger-response patterns
56.
unfolded protein response
57.
Unit non-response
58.
vegetation response
59.
volatility impulse response functions
60.
amoxicillin detection
61.
anomaly detection
62.
anomaly detection for system logs
63.
antibiotic detection
64.
antibiotics detection
65.
aspect detection
66.
asynchronous fault detection
67.
attack detection
68.
barotrauma detection system
69.
Barotrauma detection system sensors
70.
behaviour-based intrusion detection systems
71.
body detection
72.
botnet detection
73.
capacitively coupled conductivity detection
74.
change detection
75.
chemical detection
76.
community detection
77.
compu ter-aided detection(CAD)
78.
computer-aided detection
79.
computer‐aided detection
80.
contactless conductivity detection
81.
contactless conductivity detection (C4D)
82.
crack detection
83.
crash detection
84.
cyber intrusion detection
85.
defect detection
86.
detection
87.
detection efficiency
88.
detection engineering
89.
detection mechanisms
90.
detection method
91.
detection methods
92.
detection of anomalous end user nodes
93.
detection of hydrogen isotopes
94.
distributed detection
95.
early detection
96.
early intrusion detection
97.
energy detection
98.
error detection
99.
ESI-MS and IM detection
100.
evaluation of explainable AI intrusion detection
101.
Event detection
102.
extraction and detection methods
103.
face detection
104.
Face Manipulation Detection
105.
failure detection
106.
fall detection
107.
fault detection
108.
fault detection and diagnoses
109.
fault detection and diagnosis
110.
Fish detection
111.
fouling detection
112.
harmonic detection
113.
health care IoMT intrusion detection
114.
hepatitis C virus (HCV) detection
115.
hubs detection
116.
IED detection
117.
image-based crack detection
118.
indirect UV absorbance detection
119.
intrusion detection
120.
intrusion detection system
121.
intrusion detection system (IDS)
122.
intrusion detection systems
123.
island detection
124.
islanding detection
125.
label-free detection
126.
lane detection
127.
lane line detection
128.
LED fluorescence detection
129.
leg detection
130.
light detection and ranging
131.
light detection and ranging (LiDAR)
132.
Light Detection and Ranging (LiDAR) point cloud
133.
limit of detection
134.
lock-in detection
135.
loop-closure detection
136.
malware detection
137.
marker detection
138.
mobile malware detection
139.
money laundering detection systems
140.
monitoring and detection
141.
multi-classed object detection
142.
Multi-valued Simulation for Hazard Detection in Digital Circuits
143.
mutant detection
144.
network anomaly detection
145.
network intrusion detection system
146.
nodules detection
147.
object detection
148.
oil-spill detection
149.
outlier’s detection methods
150.
outliers detection
151.
peak detection
152.
phytoplankton detection methods
153.
plagiarism detection
154.
position detection
155.
precursor detection
156.
propaganda detection
157.
protein detection
158.
proton detection
159.
radar detection
160.
ramp event detection
161.
recycled FPGA detection
162.
residual current detection
163.
robust detection
164.
scene text detection
165.
short-circuit detection
166.
Side-Channel Attack Detection
167.
small molecule detection
168.
speech activity detection
169.
Suicidal ideation detection
170.
synchronous detection
171.
topic detection
172.
tyre detection
173.
unmanned aerial vehicle detection systems
174.
unsupervised outlier detection
175.
UV detection
176.
vehicle detection
177.
vortex detection
178.
3D lane detection
märksõna
1
1.
National Computer Security Incident Response Teams (N-CSIRTs)
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT