Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security dataset (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/133)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
DACA : automated attack scenarios and dataset generation
Korving, Frank
;
Vaarandi, Risto
Proceedings of the 18th International Conference on Cyber Warfare and Security, ICCWS 2023, a conference hosted by Towson University, Baltimore County, Maryland, USA, 9-10 March 2023
2023
/
p. 550-559 : ill
https://papers.academic-conferences.org/index.php/iccws/article/download/962/938
https://doi.org/10.34190/iccws.18.1.962
artikkel kogumikus
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
131
1.
security dataset
2.
accident dataset
3.
custom dataset
4.
dataset
5.
dataset balancing
6.
dataset collection framework
7.
handwriting dataset
8.
IDS dataset
9.
iseAuto Dataset
10.
open dataset
11.
Public dataset
12.
spider dataset
13.
ad-hoc sensor networks security
14.
Automatic Security Verification
15.
Blockchain security
16.
cache security
17.
communication system security
18.
comprehensive system of economic security
19.
computer security
20.
cooperative security dilemma
21.
cyber security
22.
cyber security education
23.
cyber security exercises
24.
cyber security monitoring
25.
cyber security strategies
26.
cyber-security
27.
data and information security
28.
data security
29.
development of security cameras
30.
digital security practices
31.
drinking water security
32.
economic security
33.
economic security of enterprise
34.
emotional security
35.
energy security
36.
energy security indicator
37.
Estonian information security standard
38.
graded security
39.
hardware security
40.
hardware security primitive
41.
high level of security
42.
Homeland security
43.
human security
44.
information security
45.
information security and privacy
46.
initial level of security
47.
internal security
48.
international security
49.
investment and innovation security
50.
IPv6 security
51.
IT security
52.
IT security management
53.
job security
54.
long-term security
55.
maritime cyber security
56.
maritime cyber security operations centers
57.
Maritime Security Operations Center (M-SOC)
58.
medium level of security
59.
metadata model for security measures
60.
Middle Eastern security
61.
Mobile security
62.
national cyber security strategy
63.
national security
64.
NATO. Science for Peace and Security Program
65.
network security
66.
network security monitoring
67.
OSCE (Organization for Security and Co-operation in Europe)
68.
passenger’s security
69.
policy-based routing security
70.
political and security cultures
71.
post-quantum security
72.
power system security
73.
quantitative security
74.
regional security
75.
RISC-V Security Verification
76.
Safety and Security in Sea Transportation
77.
safety and security testing
78.
security
79.
security adaptation
80.
security alert prioritization
81.
security analysis
82.
security and justice (AFSJ)
83.
Security and political science
84.
security and privacy
85.
security and privacy in smart grids
86.
Security Assertion Mining
87.
security closure
88.
Security Coverage
89.
security dilemma
90.
Security evaluation
91.
security evaluation instruments
92.
Security limitations
93.
security log analysis
94.
security management
95.
security model
96.
security monitoring
97.
security notion
98.
security objectives
99.
security of data
100.
security of supply
101.
security operation center
102.
security operations center
103.
security patterns
104.
security policy
105.
security problem definition
106.
security proof
107.
security protocols
108.
security requirements
109.
security requirements engineering
110.
security research
111.
security risk assessment
112.
security risk management
113.
security risks
114.
security science and technology
115.
security strategies
116.
security systems for military objects
117.
security testing
118.
security training
119.
security verification
120.
security-by-design
121.
social security planning
122.
societal security
123.
software security
124.
software security level
125.
software security subcharacteristics
126.
sufficient level of security
127.
system of economic security
128.
system security
129.
terrorism security
130.
transmission System Security
131.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT