Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
network security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(3/314)
Export
export all inquiry results
(5)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
Blumbergs, Bernhards
;
Vaarandi, Risto
MILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 2017
2017
/
p. 707-712
https://doi.org/10.1109/MILCOM.2017.8170785
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
2
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
3
journal article EST
/
journal article ENG
Kamerabasiertes Monitoring von Fischen in Deutschland und der Schweiz
Haas, Christian
;
Meyer, Matthias
;
Schmalz, Maria
;
Tuhtan, Jeffrey Andrew
WasserWirtschaft
2024
/
p. 19 - 29
https://doi.org/10.1007/s35147-024-2401-1
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
4
journal article EST
/
journal article ENG
Network IDS alert classification with active learning techniques
Vaarandi, Risto
;
Guerra-Manzanares, Alejandro
Journal of Information Security and Applications
2024
/
art. 103687
https://doi.org/10.1016/j.jisa.2023.103687
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
5
journal article EST
/
journal article ENG
Stream clustering guided supervised learning for classifying NIDS alerts
Vaarandi, Risto
;
Guerra Manzanares, Alejandro
Future generation computer systems
2024
/
p. 231-244 : ill
https://doi.org/10.1016/j.future.2024.01.032
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 5, displaying
1 - 5
keyword
309
1.
network security
2.
network security monitoring
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security monitoring
15.
cyber security strategies
16.
cyber-security
17.
data and information security
18.
data security
19.
development of security cameras
20.
digital security practices
21.
drinking water security
22.
economic security
23.
economic security of enterprise
24.
emotional security
25.
energy security
26.
energy security indicator
27.
Estonian information security standard
28.
graded security
29.
hardware security
30.
hardware security primitive
31.
human security
32.
information security
33.
information security and privacy
34.
internal security
35.
international security
36.
investment and innovation security
37.
IPv6 security
38.
IT security
39.
IT security management
40.
job security
41.
long-term security
42.
metadata model for security measures
43.
Middle Eastern security
44.
Mobile security
45.
national cyber security strategy
46.
national security
47.
NATO. Science for Peace and Security Program
48.
OSCE (Organization for Security and Co-operation in Europe)
49.
passenger’s security
50.
policy-based routing security
51.
political and security cultures
52.
post-quantum security
53.
power system security
54.
quantitative security
55.
regional security
56.
RISC-V Security Verification
57.
safety and security testing
58.
security
59.
security adaptation
60.
security alert prioritization
61.
security analysis
62.
security and justice (AFSJ)
63.
Security and political science
64.
security and privacy
65.
security and privacy in smart grids
66.
Security Assertion Mining
67.
security closure
68.
Security Coverage
69.
security dataset
70.
security dilemma
71.
Security evaluation
72.
security evaluation instruments
73.
Security limitations
74.
security log analysis
75.
security management
76.
security model
77.
security monitoring
78.
security notion
79.
security objectives
80.
security of data
81.
security of supply
82.
security operation center
83.
security operations center
84.
security patterns
85.
security policy
86.
security problem definition
87.
security proof
88.
security protocols
89.
security requirements
90.
security requirements engineering
91.
security risk assessment
92.
security risk management
93.
security risks
94.
security science and technology
95.
security strategies
96.
security systems for military objects
97.
security testing
98.
security training
99.
security verification
100.
security-by-design
101.
social security planning
102.
societal security
103.
system of economic security
104.
system security
105.
terrorism security
106.
transmission System Security
107.
voting privacy and security
108.
active distribution network management
109.
Adaptive network-based fuzzy inference system (ANFIS)
110.
aec distribution network
111.
analytical flow network analysis
112.
analytical network process
113.
ANDROID network
114.
artificial neural network
115.
A-source network
116.
autoservice network
117.
Bayesian belief network (BBN)
118.
bayesian network (BN)
119.
Binarized Neural Network (BNN)
120.
building site network
121.
business network model
122.
cable network
123.
carbon nanotube network
124.
cascaded forward neural network (CFNN)
125.
cognitive body area network
126.
collaborative network
127.
computer network management
128.
computer network operations
129.
connection network codes
130.
Controller Area Network
131.
Convolutional Neural Network
132.
convolutional neural network (CNN)
133.
coolant network
134.
deep convolutional neural network
135.
deep learning network
136.
deep neural network
137.
deep neural network compression
138.
DH network
139.
distribution network
140.
distribution network
141.
district heat network
142.
district heating network
143.
electric network analysis
144.
electric network parameters
145.
electrical network
146.
emergency network
147.
Event Processing Network (EPN)
148.
Event Processing Network Model
149.
feedforward neural network (FFNN)
150.
flow network analysis
151.
flow network parameters
152.
Fully Convolutional Network (FCN)
153.
Generative Adversarial Network (GaN)
154.
global innovation network
155.
Graph Convolutional Neural Network (GCN)
156.
GraphSAGE (Graph Based Neural Network)
157.
heterogeneous network
158.
hydraulic network model
159.
hypar-network
160.
impedance network
161.
impedance network
162.
impedance source (IS) network
163.
Impedance Source Network
164.
impedance-source network
165.
in-network data processing
166.
innovation network
167.
innovation network agent
168.
joint network-channel coding
169.
knowledge network
170.
levelling network
171.
line impedance stabilization network
172.
linear Delta robots neural network based model
173.
LSTM neural network
174.
lumped parameter network
175.
lumped parameter thermal network
176.
lumped-parameter thermal network
177.
Magnetically Coupled Impedance Source Network (MCIS)
178.
memory network
179.
Mesh Network
180.
modified network cohesion
181.
MRAN (minimum resource allocation network)
182.
nanosheets network
183.
NB-IoT network
184.
NetFlow based network monitoring
185.
network
186.
network access charges
187.
network analysis
188.
network anomaly detection
189.
network architecture
190.
network calculus
191.
network characteristics
192.
network communication technologies
193.
network constraint
194.
network disaggregation
195.
network dynamics
196.
network expansion planning
197.
network forensics
198.
network function virtualization
199.
network functions virtualization (NFV)
200.
network games
201.
network governance
202.
network IDS alert classification
203.
network industries
204.
network industry
205.
network intrusion detection system
206.
network latencies
207.
network layer
208.
Network lifetime
209.
network measurement
210.
network monitoring
211.
network of co-authorships
212.
network on chip
213.
Network on Chip (NoC)
214.
network partners
215.
network protocol reverse engineering
216.
network protocols
217.
Network QoS
218.
network quality
219.
Network reliability
220.
network resilience
221.
network safety ranking
222.
network slicing
223.
network sparsification
224.
network studies
225.
network theory
226.
network topologies
227.
network topology
228.
network uncertainties
229.
Network visualization
230.
network-on-chip
231.
network-on-ReRAM
232.
network-testing
233.
neural network
234.
neural network architecture search
235.
neural network controller
236.
neural network modelling
237.
neural network positioning algorithms
238.
neural network predictive controller
239.
nitrogen-cycling network
240.
non-public network
241.
non-terrestrial network
242.
open value network
243.
partner network
244.
partner network
245.
partner network (PN)
246.
partner network maturity
247.
passive switched capacitor network
248.
PC-corr network
249.
peer to peer network
250.
performance dialogue network
251.
personal area network applications
252.
pervasive public safety network
253.
phosphotransfer network
254.
power delivery network
255.
power distribution network
256.
production in network
257.
proteomic network
258.
public safety network
259.
qZS network
260.
quasi-impedance-source network
261.
quasi-Z-source network
262.
Radial Basis Function Neural Network (RBFNN)
263.
radio access network
264.
radio access network (RAN)
265.
radio access network subslicing
266.
random resistor network
267.
recurrent neural network language model
268.
reluctance network (RN)
269.
research network
270.
Residual Neural Network
271.
road network
272.
roof network
273.
route network
274.
self organizing network
275.
smart distribution network
276.
SMEs network
277.
social network
278.
social network analysis
279.
software-defined network
280.
spiking neural network (SNN)
281.
stretchable network
282.
support network activities
283.
sustainable partner network
284.
sustainable partner network (SPN)
285.
switched capacitor inductor network (SCLN)
286.
Z-source network
287.
technology transfer network
288.
telecommunication network management
289.
telecommunication network performance
290.
Ternary Neural Network
291.
the influence of DHW consumption on dimensioning the DH network
292.
thermal network
293.
tide gauge network
294.
transformer-based neural network
295.
UAV-enabled network
296.
underwater sensor network
297.
Urban Network
298.
utility network
299.
value network analysis
300.
water distribution network
301.
wireless ad hoq network
302.
wireless body area network
303.
Wireless Body Area Network (WBAN)
304.
wireless network
305.
wireless sensor network
306.
wireless sensor network (WSN)
307.
wsn (wireless sensor network)
308.
3D graphene network
309.
3D network topology visualization
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
European Access Network
4.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
TalTech subject term
1
1.
Erasmus Student Network
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT