Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
network security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(3/346)
Export
export all inquiry results
(5)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
Blumbergs, Bernhards
;
Vaarandi, Risto
MILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 2017
2017
/
p. 707-712
https://doi.org/10.1109/MILCOM.2017.8170785
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
2
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
3
journal article EST
/
journal article ENG
Kamerabasiertes Monitoring von Fischen in Deutschland und der Schweiz
Haas, Christian
;
Meyer, Matthias
;
Schmalz, Maria
;
Tuhtan, Jeffrey Andrew
WasserWirtschaft
2024
/
p. 19 - 29
https://doi.org/10.1007/s35147-024-2401-1
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
4
journal article EST
/
journal article ENG
Network IDS alert classification with active learning techniques
Vaarandi, Risto
;
Guerra-Manzanares, Alejandro
Journal of Information Security and Applications
2024
/
art. 103687
https://doi.org/10.1016/j.jisa.2023.103687
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
5
journal article EST
/
journal article ENG
Stream clustering guided supervised learning for classifying NIDS alerts
Vaarandi, Risto
;
Guerra Manzanares, Alejandro
Future generation computer systems
2024
/
p. 231-244 : ill
https://doi.org/10.1016/j.future.2024.01.032
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 5, displaying
1 - 5
keyword
340
1.
network security
2.
network security monitoring
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
cloud security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security monitoring in maritime
17.
cyber security strategies
18.
cyber-physical system security
19.
cyber-security
20.
data and information security
21.
data security
22.
development of security cameras
23.
digital security practices
24.
drinking water security
25.
economic security
26.
economic security of enterprise
27.
emotional security
28.
energy security
29.
energy security indicator
30.
Estonian information security standard
31.
graded security
32.
hardware security
33.
hardware security primitive
34.
high level of security
35.
Homeland security
36.
human security
37.
information security
38.
information security and privacy
39.
initial level of security
40.
internal security
41.
international security
42.
investment and innovation security
43.
IPv6 security
44.
IT security
45.
IT security management
46.
job security
47.
long-term security
48.
maritime cyber security
49.
maritime cyber security operations centers
50.
Maritime Security Operations Center (M-SOC)
51.
medium level of security
52.
metadata model for security measures
53.
Middle Eastern security
54.
Mobile security
55.
national cyber security strategy
56.
national security
57.
NATO. Science for Peace and Security Program
58.
OSCE (Organization for Security and Co-operation in Europe)
59.
passenger’s security
60.
policy-based routing security
61.
political and security cultures
62.
post-quantum security
63.
power system security
64.
quantitative security
65.
regional security
66.
RISC-V Security Verification
67.
safety and security in sea transportation
68.
safety and security testing
69.
security
70.
security adaptation
71.
security alert prioritization
72.
security analysis
73.
security and justice (AFSJ)
74.
Security and political science
75.
security and privacy
76.
security and privacy in smart grids
77.
Security Assertion
78.
Security Assertion Mining
79.
security closure
80.
Security Coverage
81.
security dataset
82.
security dilemma
83.
Security evaluation
84.
security evaluation instruments
85.
Security Level Evaluation
86.
Security limitations
87.
security log analysis
88.
security management
89.
security model
90.
security monitoring
91.
security notion
92.
security objectives
93.
security of data
94.
security of supply
95.
security operation center
96.
security operations center
97.
security patterns
98.
security policy
99.
security problem definition
100.
security proof
101.
security protocols
102.
security requirements
103.
security requirements engineering
104.
security research
105.
security risk assessment
106.
security risk management
107.
security risks
108.
security science and technology
109.
security strategies
110.
security systems for military objects
111.
security testing
112.
security training
113.
security verification
114.
security-by-design
115.
social security planning
116.
societal security
117.
software security
118.
software security level
119.
software security subcharacteristics
120.
sufficient level of security
121.
system of economic security
122.
system security
123.
terrorism security
124.
transmission System Security
125.
voting privacy and security
126.
active distribution network management
127.
Adaptive network-based fuzzy inference system (ANFIS)
128.
aec distribution network
129.
analytical flow network analysis
130.
analytical network process
131.
ANDROID network
132.
artificial neural network
133.
A-source network
134.
autoservice network
135.
back propagation neural network
136.
Bayesian belief network (BBN)
137.
bayesian network (BN)
138.
Binarized Neural Network (BNN)
139.
building site network
140.
business network model
141.
cable network
142.
carbon nanotube network
143.
cascaded forward neural network (CFNN)
144.
cognitive body area network
145.
collaborative network
146.
computer network management
147.
computer network operations
148.
connection network codes
149.
Controller Area Network
150.
Convolutional Neural Network
151.
convolutional neural network (CNN)
152.
coolant network
153.
decentralized content-addressable storage network
154.
deep convolutional neural network
155.
deep learning network
156.
deep neural network
157.
deep neural network compression
158.
deep Q-network
159.
DH network
160.
distribution network
161.
distribution network
162.
district heat network
163.
district heating network
164.
double deep Q-network
165.
dynamic network
166.
electric network analysis
167.
electric network parameters
168.
electrical network
169.
emergency network
170.
Event Processing Network (EPN)
171.
Event Processing Network Model
172.
feedforward neural network (FFNN)
173.
flow network analysis
174.
flow network parameters
175.
flying inductor network
176.
Fully Convolutional Network (FCN)
177.
Generative Adversarial Network (GaN)
178.
global innovation network
179.
global network alignment
180.
Graph Convolutional Neural Network (GCN)
181.
GraphSAGE (Graph Based Neural Network)
182.
heterogeneous network
183.
hydraulic network model
184.
hypar-network
185.
impedance network
186.
impedance network
187.
impedance source (IS) network
188.
Impedance Source Network
189.
impedance-source network
190.
in-network data processing
191.
innovation network
192.
innovation network agent
193.
joint network-channel coding
194.
knowledge network
195.
levelling network
196.
line impedance stabilization network
197.
linear Delta robots neural network based model
198.
local network alignment
199.
LSTM neural network
200.
lumped parameter network
201.
lumped parameter thermal network
202.
lumped-parameter thermal network
203.
Magnetically Coupled Impedance Source Network (MCIS)
204.
memory network
205.
Mesh Network
206.
modified network cohesion
207.
MRAN (minimum resource allocation network)
208.
nanosheets network
209.
NB-IoT network
210.
NetFlow based network monitoring
211.
network
212.
network access charges
213.
network analysis
214.
network anomaly detection
215.
network architecture
216.
network calculus
217.
network characteristics
218.
network communication technologies
219.
network constraint
220.
network disaggregation
221.
network dynamics
222.
network expansion planning
223.
network externality
224.
network forensics
225.
network function virtualization
226.
network functions virtualization (NFV)
227.
network games
228.
network governance
229.
network IDS alert classification
230.
network industries
231.
network industry
232.
network intrusion detection system
233.
network latencies
234.
network layer
235.
Network lifetime
236.
network measurement
237.
network monitoring
238.
network of co-authorships
239.
network on chip
240.
Network on Chip (NoC)
241.
network partners
242.
network planning
243.
network protocol reverse engineering
244.
network protocols
245.
Network QoS
246.
network quality
247.
Network reliability
248.
network resilience
249.
network safety ranking
250.
network slicing
251.
network sparsification
252.
network studies
253.
network theory
254.
network topologies
255.
network topology
256.
network uncertainties
257.
Network visualization
258.
network-on-chip
259.
network-on-ReRAM
260.
network-testing
261.
neural network
262.
neural network architecture search
263.
neural network controller
264.
neural network modelling
265.
neural network models
266.
neural network positioning algorithms
267.
neural network predictive controller
268.
nitrogen-cycling network
269.
non-public network
270.
non-terrestrial network
271.
open value network
272.
partner network
273.
partner network
274.
partner network (PN)
275.
partner network maturity
276.
passive switched capacitor network
277.
PC-corr network
278.
peer to peer network
279.
performance dialogue network
280.
personal area network applications
281.
pervasive public safety network
282.
phosphotransfer network
283.
power delivery network
284.
power distribution network
285.
production in network
286.
proteomic network
287.
public safety network
288.
qZS network
289.
qualitative network analysis
290.
quasi-impedance-source network
291.
quasi-Z-source network
292.
Radial Basis Function Neural Network (RBFNN)
293.
radio access network
294.
radio access network (RAN)
295.
radio access network subslicing
296.
random resistor network
297.
Recurrent Neural Network
298.
recurrent neural network language model
299.
reluctance network (RN)
300.
research network
301.
Residual Neural Network
302.
road network
303.
roof network
304.
route network
305.
self organizing network
306.
smart distribution network
307.
SMEs network
308.
social network
309.
social network analysis
310.
software-defined network
311.
spiking neural network (SNN)
312.
stretchable network
313.
support network activities
314.
sustainable partner network
315.
sustainable partner network (SPN)
316.
switched capacitor inductor network (SCLN)
317.
Z-source network
318.
technology transfer network
319.
telecommunication network management
320.
telecommunication network performance
321.
Ternary Neural Network
322.
the influence of DHW consumption on dimensioning the DH network
323.
thermal network
324.
tide gauge network
325.
transformer-based neural network
326.
UAV-enabled network
327.
underwater sensor network
328.
Urban Network
329.
utility network
330.
value network analysis
331.
water distribution network
332.
wireless ad hoq network
333.
wireless body area network
334.
Wireless Body Area Network (WBAN)
335.
wireless network
336.
wireless sensor network
337.
wireless sensor network (WSN)
338.
wsn (wireless sensor network)
339.
3D graphene network
340.
3D network topology visualization
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
European Access Network
4.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
TalTech subject term
2
1.
Erasmus Student Network
2.
Islamic Public Value Network
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT