Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
network security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(3/282)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
Blumbergs, Bernhards
;
Vaarandi, Risto
MILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 2017
2017
/
p. 707-712
https://doi.org/10.1109/MILCOM.2017.8170785
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
2
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
Number of records 2, displaying
1 - 2
keyword
277
1.
network security
2.
network security monitoring
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security strategies
15.
cyber-security
16.
data security
17.
development of security cameras
18.
drinking water security
19.
economic security
20.
economic security of enterprise
21.
emotional security
22.
energy security
23.
energy security indicator
24.
graded security
25.
hardware security
26.
hardware security primitive
27.
human security
28.
information security
29.
internal security
30.
international security
31.
investment and innovation security
32.
IPv6 security
33.
IT security
34.
IT security management
35.
job security
36.
long-term security
37.
metadata model for security measures
38.
Middle Eastern security
39.
Mobile security
40.
national cyber security strategy
41.
national security
42.
NATO. Science for Peace and Security Program
43.
OSCE (Organization for Security and Co-operation in Europe)
44.
passenger’s security
45.
policy-based routing security
46.
political and security cultures
47.
post-quantum security
48.
power system security
49.
quantitative security
50.
regional security
51.
RISC-V Security Verification
52.
security
53.
security and justice (AFSJ)
54.
security and privacy
55.
security and privacy in smart grids
56.
Security Assertion Mining
57.
security closure
58.
Security Coverage
59.
security dataset
60.
security dilemma
61.
Security evaluation
62.
security log analysis
63.
security management
64.
security model
65.
security monitoring
66.
security notion
67.
security objectives
68.
security of data
69.
security of supply
70.
security operation center
71.
security patterns
72.
security policy
73.
security problem definition
74.
security proof
75.
security protocols
76.
security requirements
77.
security requirements engineering
78.
security risk assessment
79.
security risk management
80.
security strategies
81.
security systems for military objects
82.
security testing
83.
security training
84.
security verification
85.
social security planning
86.
societal security
87.
system of economic security
88.
system security
89.
terrorism security
90.
transmission System Security
91.
voting privacy and security
92.
active distribution network management
93.
Adaptive network-based fuzzy inference system (ANFIS)
94.
aec distribution network
95.
analytical flow network analysis
96.
analytical network process
97.
ANDROID network
98.
artificial neural network
99.
A-source network
100.
autoservice network
101.
Bayesian belief network (BBN)
102.
bayesian network (BN)
103.
Binarized Neural Network (BNN)
104.
building site network
105.
business network model
106.
cable network
107.
carbon nanotube network
108.
cascaded forward neural network (CFNN)
109.
cognitive body area network
110.
collaborative network
111.
computer network management
112.
computer network operations
113.
connection network codes
114.
Convolutional Neural Network
115.
convolutional neural network (CNN)
116.
coolant network
117.
deep convolutional neural network
118.
deep learning network
119.
deep neural network
120.
deep neural network compression
121.
DH network
122.
distribution network
123.
distribution network
124.
district heat network
125.
district heating network
126.
electric network parameters
127.
electrical network
128.
emergency network
129.
Event Processing Network (EPN)
130.
Event Processing Network Model
131.
feedforward neural network (FFNN)
132.
flow network analysis
133.
flow network parameters
134.
Fully Convolutional Network (FCN)
135.
Generative Adversarial Network (GaN)
136.
global innovation network
137.
Graph Convolutional Neural Network (GCN)
138.
GraphSAGE (Graph Based Neural Network)
139.
heterogeneous network
140.
hydraulic network model
141.
hypar-network
142.
impedance network
143.
impedance network
144.
impedance source (IS) network
145.
Impedance Source Network
146.
impedance-source network
147.
in-network data processing
148.
innovation network
149.
innovation network agent
150.
joint network-channel coding
151.
knowledge network
152.
levelling network
153.
linear Delta robots neural network based model
154.
lumped parameter network
155.
lumped parameter thermal network
156.
lumped-parameter thermal network
157.
Magnetically Coupled Impedance Source Network (MCIS)
158.
memory network
159.
Mesh Network
160.
modified network cohesion
161.
MRAN (minimum resource allocation network)
162.
nanosheets network
163.
NB-IoT network
164.
NetFlow based network monitoring
165.
network
166.
network access charges
167.
network analysis
168.
network anomaly detection
169.
network architecture
170.
network calculus
171.
network characteristics
172.
network communication technologies
173.
network constraint
174.
network disaggregation
175.
network dynamics
176.
network expansion planning
177.
network forensics
178.
network function virtualization
179.
network functions virtualization (NFV)
180.
network games
181.
network governance
182.
network IDS alert classification
183.
network industries
184.
network industry
185.
network latencies
186.
network layer
187.
Network lifetime
188.
network measurement
189.
network monitoring
190.
network of co-authorships
191.
network on chip
192.
Network on Chip (NoC)
193.
network partners
194.
network protocol reverse engineering
195.
network protocols
196.
Network QoS
197.
network quality
198.
Network reliability
199.
network safety ranking
200.
network slicing
201.
network sparsification
202.
network studies
203.
network theory
204.
network topologies
205.
network topology
206.
network uncertainties
207.
Network visualization
208.
network-on-chip
209.
network-on-ReRAM
210.
network-testing
211.
neural network
212.
neural network architecture search
213.
neural network controller
214.
neural network predictive controller
215.
nitrogen-cycling network
216.
open value network
217.
partner network
218.
partner network
219.
partner network (PN)
220.
partner network maturity
221.
passive switched capacitor network
222.
PC-corr network
223.
peer to peer network
224.
performance dialogue network
225.
personal area network applications
226.
pervasive public safety network
227.
phosphotransfer network
228.
power delivery network
229.
power distribution network
230.
production in network
231.
proteomic network
232.
public safety network
233.
qZS network
234.
quasi-impedance-source network
235.
quasi-Z-source network
236.
Radial Basis Function Neural Network (RBFNN)
237.
radio access network (RAN)
238.
radio access network subslicing
239.
random resistor network
240.
recurrent neural network language model
241.
reluctance network (RN)
242.
research network
243.
road network
244.
roof network
245.
route network
246.
self organizing network
247.
smart distribution network
248.
SMEs network
249.
social network
250.
social network analysis
251.
software-defined network
252.
spiking neural network (SNN)
253.
stretchable network
254.
support network activities
255.
sustainable partner network
256.
sustainable partner network (SPN)
257.
switched capacitor inductor network (SCLN)
258.
Z-source network
259.
technology transfer network
260.
telecommunication network management
261.
telecommunication network performance
262.
Ternary Neural Network
263.
the influence of DHW consumption on dimensioning the DH network
264.
thermal network
265.
tide gauge network
266.
underwater sensor network
267.
utility network
268.
value network analysis
269.
water distribution network
270.
wireless ad hoq network
271.
wireless body area network
272.
Wireless Body Area Network (WBAN)
273.
wireless network
274.
wireless sensor network
275.
wsn (wireless sensor network)
276.
3D graphene network
277.
3D network topology visualization
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
European Access Network
4.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
TTÜ subject term
1
1.
Erasmus Student Network
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT