Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
network security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(3/326)
Export
export all inquiry results
(5)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
Blumbergs, Bernhards
;
Vaarandi, Risto
MILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 2017
2017
/
p. 707-712
https://doi.org/10.1109/MILCOM.2017.8170785
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
2
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
3
journal article EST
/
journal article ENG
Kamerabasiertes Monitoring von Fischen in Deutschland und der Schweiz
Haas, Christian
;
Meyer, Matthias
;
Schmalz, Maria
;
Tuhtan, Jeffrey Andrew
WasserWirtschaft
2024
/
p. 19 - 29
https://doi.org/10.1007/s35147-024-2401-1
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
4
journal article EST
/
journal article ENG
Network IDS alert classification with active learning techniques
Vaarandi, Risto
;
Guerra-Manzanares, Alejandro
Journal of Information Security and Applications
2024
/
art. 103687
https://doi.org/10.1016/j.jisa.2023.103687
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
5
journal article EST
/
journal article ENG
Stream clustering guided supervised learning for classifying NIDS alerts
Vaarandi, Risto
;
Guerra Manzanares, Alejandro
Future generation computer systems
2024
/
p. 231-244 : ill
https://doi.org/10.1016/j.future.2024.01.032
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 5, displaying
1 - 5
keyword
320
1.
network security
2.
network security monitoring
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security monitoring
15.
cyber security strategies
16.
cyber-security
17.
data and information security
18.
data security
19.
development of security cameras
20.
digital security practices
21.
drinking water security
22.
economic security
23.
economic security of enterprise
24.
emotional security
25.
energy security
26.
energy security indicator
27.
Estonian information security standard
28.
graded security
29.
hardware security
30.
hardware security primitive
31.
high level of security
32.
Homeland security
33.
human security
34.
information security
35.
information security and privacy
36.
initial level of security
37.
internal security
38.
international security
39.
investment and innovation security
40.
IPv6 security
41.
IT security
42.
IT security management
43.
job security
44.
long-term security
45.
medium level of security
46.
metadata model for security measures
47.
Middle Eastern security
48.
Mobile security
49.
national cyber security strategy
50.
national security
51.
NATO. Science for Peace and Security Program
52.
OSCE (Organization for Security and Co-operation in Europe)
53.
passenger’s security
54.
policy-based routing security
55.
political and security cultures
56.
post-quantum security
57.
power system security
58.
quantitative security
59.
regional security
60.
RISC-V Security Verification
61.
Safety and Security in Sea Transportation
62.
safety and security testing
63.
security
64.
security adaptation
65.
security alert prioritization
66.
security analysis
67.
security and justice (AFSJ)
68.
Security and political science
69.
security and privacy
70.
security and privacy in smart grids
71.
Security Assertion Mining
72.
security closure
73.
Security Coverage
74.
security dataset
75.
security dilemma
76.
Security evaluation
77.
security evaluation instruments
78.
Security limitations
79.
security log analysis
80.
security management
81.
security model
82.
security monitoring
83.
security notion
84.
security objectives
85.
security of data
86.
security of supply
87.
security operation center
88.
security operations center
89.
security patterns
90.
security policy
91.
security problem definition
92.
security proof
93.
security protocols
94.
security requirements
95.
security requirements engineering
96.
security risk assessment
97.
security risk management
98.
security risks
99.
security science and technology
100.
security strategies
101.
security systems for military objects
102.
security testing
103.
security training
104.
security verification
105.
security-by-design
106.
social security planning
107.
societal security
108.
software security
109.
software security level
110.
software security subcharacteristics
111.
sufficient level of security
112.
system of economic security
113.
system security
114.
terrorism security
115.
transmission System Security
116.
voting privacy and security
117.
active distribution network management
118.
Adaptive network-based fuzzy inference system (ANFIS)
119.
aec distribution network
120.
analytical flow network analysis
121.
analytical network process
122.
ANDROID network
123.
artificial neural network
124.
A-source network
125.
autoservice network
126.
Bayesian belief network (BBN)
127.
bayesian network (BN)
128.
Binarized Neural Network (BNN)
129.
building site network
130.
business network model
131.
cable network
132.
carbon nanotube network
133.
cascaded forward neural network (CFNN)
134.
cognitive body area network
135.
collaborative network
136.
computer network management
137.
computer network operations
138.
connection network codes
139.
Controller Area Network
140.
Convolutional Neural Network
141.
convolutional neural network (CNN)
142.
coolant network
143.
deep convolutional neural network
144.
deep learning network
145.
deep neural network
146.
deep neural network compression
147.
DH network
148.
distribution network
149.
distribution network
150.
district heat network
151.
district heating network
152.
electric network analysis
153.
electric network parameters
154.
electrical network
155.
emergency network
156.
Event Processing Network (EPN)
157.
Event Processing Network Model
158.
feedforward neural network (FFNN)
159.
flow network analysis
160.
flow network parameters
161.
Fully Convolutional Network (FCN)
162.
Generative Adversarial Network (GaN)
163.
global innovation network
164.
Graph Convolutional Neural Network (GCN)
165.
GraphSAGE (Graph Based Neural Network)
166.
heterogeneous network
167.
hydraulic network model
168.
hypar-network
169.
impedance network
170.
impedance network
171.
impedance source (IS) network
172.
Impedance Source Network
173.
impedance-source network
174.
in-network data processing
175.
innovation network
176.
innovation network agent
177.
joint network-channel coding
178.
knowledge network
179.
levelling network
180.
line impedance stabilization network
181.
linear Delta robots neural network based model
182.
LSTM neural network
183.
lumped parameter network
184.
lumped parameter thermal network
185.
lumped-parameter thermal network
186.
Magnetically Coupled Impedance Source Network (MCIS)
187.
memory network
188.
Mesh Network
189.
modified network cohesion
190.
MRAN (minimum resource allocation network)
191.
nanosheets network
192.
NB-IoT network
193.
NetFlow based network monitoring
194.
network
195.
network access charges
196.
network analysis
197.
network anomaly detection
198.
network architecture
199.
network calculus
200.
network characteristics
201.
network communication technologies
202.
network constraint
203.
network disaggregation
204.
network dynamics
205.
network expansion planning
206.
network externality
207.
network forensics
208.
network function virtualization
209.
network functions virtualization (NFV)
210.
network games
211.
network governance
212.
network IDS alert classification
213.
network industries
214.
network industry
215.
network intrusion detection system
216.
network latencies
217.
network layer
218.
Network lifetime
219.
network measurement
220.
network monitoring
221.
network of co-authorships
222.
network on chip
223.
Network on Chip (NoC)
224.
network partners
225.
network protocol reverse engineering
226.
network protocols
227.
Network QoS
228.
network quality
229.
Network reliability
230.
network resilience
231.
network safety ranking
232.
network slicing
233.
network sparsification
234.
network studies
235.
network theory
236.
network topologies
237.
network topology
238.
network uncertainties
239.
Network visualization
240.
network-on-chip
241.
network-on-ReRAM
242.
network-testing
243.
neural network
244.
neural network architecture search
245.
neural network controller
246.
neural network modelling
247.
neural network models
248.
neural network positioning algorithms
249.
neural network predictive controller
250.
nitrogen-cycling network
251.
non-public network
252.
non-terrestrial network
253.
open value network
254.
partner network
255.
partner network
256.
partner network (PN)
257.
partner network maturity
258.
passive switched capacitor network
259.
PC-corr network
260.
peer to peer network
261.
performance dialogue network
262.
personal area network applications
263.
pervasive public safety network
264.
phosphotransfer network
265.
power delivery network
266.
power distribution network
267.
production in network
268.
proteomic network
269.
public safety network
270.
qZS network
271.
quasi-impedance-source network
272.
quasi-Z-source network
273.
Radial Basis Function Neural Network (RBFNN)
274.
radio access network
275.
radio access network (RAN)
276.
radio access network subslicing
277.
random resistor network
278.
recurrent neural network language model
279.
reluctance network (RN)
280.
research network
281.
Residual Neural Network
282.
road network
283.
roof network
284.
route network
285.
self organizing network
286.
smart distribution network
287.
SMEs network
288.
social network
289.
social network analysis
290.
software-defined network
291.
spiking neural network (SNN)
292.
stretchable network
293.
support network activities
294.
sustainable partner network
295.
sustainable partner network (SPN)
296.
switched capacitor inductor network (SCLN)
297.
Z-source network
298.
technology transfer network
299.
telecommunication network management
300.
telecommunication network performance
301.
Ternary Neural Network
302.
the influence of DHW consumption on dimensioning the DH network
303.
thermal network
304.
tide gauge network
305.
transformer-based neural network
306.
UAV-enabled network
307.
underwater sensor network
308.
Urban Network
309.
utility network
310.
value network analysis
311.
water distribution network
312.
wireless ad hoq network
313.
wireless body area network
314.
Wireless Body Area Network (WBAN)
315.
wireless network
316.
wireless sensor network
317.
wireless sensor network (WSN)
318.
wsn (wireless sensor network)
319.
3D graphene network
320.
3D network topology visualization
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
European Access Network
4.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
TalTech subject term
2
1.
Erasmus Student Network
2.
Islamic Public Value Network
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT