Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
network security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(3/337)
Export
export all inquiry results
(5)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
Blumbergs, Bernhards
;
Vaarandi, Risto
MILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 2017
2017
/
p. 707-712
https://doi.org/10.1109/MILCOM.2017.8170785
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
2
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
3
journal article EST
/
journal article ENG
Kamerabasiertes Monitoring von Fischen in Deutschland und der Schweiz
Haas, Christian
;
Meyer, Matthias
;
Schmalz, Maria
;
Tuhtan, Jeffrey Andrew
WasserWirtschaft
2024
/
p. 19 - 29
https://doi.org/10.1007/s35147-024-2401-1
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
4
journal article EST
/
journal article ENG
Network IDS alert classification with active learning techniques
Vaarandi, Risto
;
Guerra-Manzanares, Alejandro
Journal of Information Security and Applications
2024
/
art. 103687
https://doi.org/10.1016/j.jisa.2023.103687
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
5
journal article EST
/
journal article ENG
Stream clustering guided supervised learning for classifying NIDS alerts
Vaarandi, Risto
;
Guerra Manzanares, Alejandro
Future generation computer systems
2024
/
p. 231-244 : ill
https://doi.org/10.1016/j.future.2024.01.032
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 5, displaying
1 - 5
keyword
331
1.
network security
2.
network security monitoring
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
cloud security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security strategies
17.
cyber-physical system security
18.
cyber-security
19.
data and information security
20.
data security
21.
development of security cameras
22.
digital security practices
23.
drinking water security
24.
economic security
25.
economic security of enterprise
26.
emotional security
27.
energy security
28.
energy security indicator
29.
Estonian information security standard
30.
graded security
31.
hardware security
32.
hardware security primitive
33.
high level of security
34.
Homeland security
35.
human security
36.
information security
37.
information security and privacy
38.
initial level of security
39.
internal security
40.
international security
41.
investment and innovation security
42.
IPv6 security
43.
IT security
44.
IT security management
45.
job security
46.
long-term security
47.
maritime cyber security
48.
maritime cyber security operations centers
49.
Maritime Security Operations Center (M-SOC)
50.
medium level of security
51.
metadata model for security measures
52.
Middle Eastern security
53.
Mobile security
54.
national cyber security strategy
55.
national security
56.
NATO. Science for Peace and Security Program
57.
OSCE (Organization for Security and Co-operation in Europe)
58.
passenger’s security
59.
policy-based routing security
60.
political and security cultures
61.
post-quantum security
62.
power system security
63.
quantitative security
64.
regional security
65.
RISC-V Security Verification
66.
Safety and Security in Sea Transportation
67.
safety and security testing
68.
security
69.
security adaptation
70.
security alert prioritization
71.
security analysis
72.
security and justice (AFSJ)
73.
Security and political science
74.
security and privacy
75.
security and privacy in smart grids
76.
Security Assertion
77.
Security Assertion Mining
78.
security closure
79.
Security Coverage
80.
security dataset
81.
security dilemma
82.
Security evaluation
83.
security evaluation instruments
84.
Security Level Evaluation
85.
Security limitations
86.
security log analysis
87.
security management
88.
security model
89.
security monitoring
90.
security notion
91.
security objectives
92.
security of data
93.
security of supply
94.
security operation center
95.
security operations center
96.
security patterns
97.
security policy
98.
security problem definition
99.
security proof
100.
security protocols
101.
security requirements
102.
security requirements engineering
103.
security research
104.
security risk assessment
105.
security risk management
106.
security risks
107.
security science and technology
108.
security strategies
109.
security systems for military objects
110.
security testing
111.
security training
112.
security verification
113.
security-by-design
114.
social security planning
115.
societal security
116.
software security
117.
software security level
118.
software security subcharacteristics
119.
sufficient level of security
120.
system of economic security
121.
system security
122.
terrorism security
123.
transmission System Security
124.
voting privacy and security
125.
active distribution network management
126.
Adaptive network-based fuzzy inference system (ANFIS)
127.
aec distribution network
128.
analytical flow network analysis
129.
analytical network process
130.
ANDROID network
131.
artificial neural network
132.
A-source network
133.
autoservice network
134.
Bayesian belief network (BBN)
135.
bayesian network (BN)
136.
Binarized Neural Network (BNN)
137.
building site network
138.
business network model
139.
cable network
140.
carbon nanotube network
141.
cascaded forward neural network (CFNN)
142.
cognitive body area network
143.
collaborative network
144.
computer network management
145.
computer network operations
146.
connection network codes
147.
Controller Area Network
148.
Convolutional Neural Network
149.
convolutional neural network (CNN)
150.
coolant network
151.
deep convolutional neural network
152.
deep learning network
153.
deep neural network
154.
deep neural network compression
155.
DH network
156.
distribution network
157.
distribution network
158.
district heat network
159.
district heating network
160.
electric network analysis
161.
electric network parameters
162.
electrical network
163.
emergency network
164.
Event Processing Network (EPN)
165.
Event Processing Network Model
166.
feedforward neural network (FFNN)
167.
flow network analysis
168.
flow network parameters
169.
flying inductor network
170.
Fully Convolutional Network (FCN)
171.
Generative Adversarial Network (GaN)
172.
global innovation network
173.
Graph Convolutional Neural Network (GCN)
174.
GraphSAGE (Graph Based Neural Network)
175.
heterogeneous network
176.
hydraulic network model
177.
hypar-network
178.
impedance network
179.
impedance network
180.
impedance source (IS) network
181.
Impedance Source Network
182.
impedance-source network
183.
in-network data processing
184.
innovation network
185.
innovation network agent
186.
joint network-channel coding
187.
knowledge network
188.
levelling network
189.
line impedance stabilization network
190.
linear Delta robots neural network based model
191.
local network alignment
192.
LSTM neural network
193.
lumped parameter network
194.
lumped parameter thermal network
195.
lumped-parameter thermal network
196.
Magnetically Coupled Impedance Source Network (MCIS)
197.
memory network
198.
Mesh Network
199.
modified network cohesion
200.
MRAN (minimum resource allocation network)
201.
nanosheets network
202.
NB-IoT network
203.
NetFlow based network monitoring
204.
network
205.
network access charges
206.
network analysis
207.
network anomaly detection
208.
network architecture
209.
network calculus
210.
network characteristics
211.
network communication technologies
212.
network constraint
213.
network disaggregation
214.
network dynamics
215.
network expansion planning
216.
network externality
217.
network forensics
218.
network function virtualization
219.
network functions virtualization (NFV)
220.
network games
221.
network governance
222.
network IDS alert classification
223.
network industries
224.
network industry
225.
network intrusion detection system
226.
network latencies
227.
network layer
228.
Network lifetime
229.
network measurement
230.
network monitoring
231.
network of co-authorships
232.
network on chip
233.
Network on Chip (NoC)
234.
network partners
235.
network protocol reverse engineering
236.
network protocols
237.
Network QoS
238.
network quality
239.
Network reliability
240.
network resilience
241.
network safety ranking
242.
network slicing
243.
network sparsification
244.
network studies
245.
network theory
246.
network topologies
247.
network topology
248.
network uncertainties
249.
Network visualization
250.
network-on-chip
251.
network-on-ReRAM
252.
network-testing
253.
neural network
254.
neural network architecture search
255.
neural network controller
256.
neural network modelling
257.
neural network models
258.
neural network positioning algorithms
259.
neural network predictive controller
260.
nitrogen-cycling network
261.
non-public network
262.
non-terrestrial network
263.
open value network
264.
partner network
265.
partner network
266.
partner network (PN)
267.
partner network maturity
268.
passive switched capacitor network
269.
PC-corr network
270.
peer to peer network
271.
performance dialogue network
272.
personal area network applications
273.
pervasive public safety network
274.
phosphotransfer network
275.
power delivery network
276.
power distribution network
277.
production in network
278.
proteomic network
279.
public safety network
280.
qZS network
281.
qualitative network analysis
282.
quasi-impedance-source network
283.
quasi-Z-source network
284.
Radial Basis Function Neural Network (RBFNN)
285.
radio access network
286.
radio access network (RAN)
287.
radio access network subslicing
288.
random resistor network
289.
recurrent neural network language model
290.
reluctance network (RN)
291.
research network
292.
Residual Neural Network
293.
road network
294.
roof network
295.
route network
296.
self organizing network
297.
smart distribution network
298.
SMEs network
299.
social network
300.
social network analysis
301.
software-defined network
302.
spiking neural network (SNN)
303.
stretchable network
304.
support network activities
305.
sustainable partner network
306.
sustainable partner network (SPN)
307.
switched capacitor inductor network (SCLN)
308.
Z-source network
309.
technology transfer network
310.
telecommunication network management
311.
telecommunication network performance
312.
Ternary Neural Network
313.
the influence of DHW consumption on dimensioning the DH network
314.
thermal network
315.
tide gauge network
316.
transformer-based neural network
317.
UAV-enabled network
318.
underwater sensor network
319.
Urban Network
320.
utility network
321.
value network analysis
322.
water distribution network
323.
wireless ad hoq network
324.
wireless body area network
325.
Wireless Body Area Network (WBAN)
326.
wireless network
327.
wireless sensor network
328.
wireless sensor network (WSN)
329.
wsn (wireless sensor network)
330.
3D graphene network
331.
3D network topology visualization
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
European Access Network
4.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
TalTech subject term
2
1.
Erasmus Student Network
2.
Islamic Public Value Network
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT