Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
network security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(3/287)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
Blumbergs, Bernhards
;
Vaarandi, Risto
MILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 2017
2017
/
p. 707-712
https://doi.org/10.1109/MILCOM.2017.8170785
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
2
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
Number of records 2, displaying
1 - 2
keyword
282
1.
network security
2.
network security monitoring
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security strategies
15.
cyber-security
16.
data security
17.
development of security cameras
18.
drinking water security
19.
economic security
20.
economic security of enterprise
21.
emotional security
22.
energy security
23.
energy security indicator
24.
Estonian information security standard
25.
graded security
26.
hardware security
27.
hardware security primitive
28.
human security
29.
information security
30.
internal security
31.
international security
32.
investment and innovation security
33.
IPv6 security
34.
IT security
35.
IT security management
36.
job security
37.
long-term security
38.
metadata model for security measures
39.
Middle Eastern security
40.
Mobile security
41.
national cyber security strategy
42.
national security
43.
NATO. Science for Peace and Security Program
44.
OSCE (Organization for Security and Co-operation in Europe)
45.
passenger’s security
46.
policy-based routing security
47.
political and security cultures
48.
post-quantum security
49.
power system security
50.
quantitative security
51.
regional security
52.
RISC-V Security Verification
53.
security
54.
security adaptation
55.
security and justice (AFSJ)
56.
security and privacy
57.
security and privacy in smart grids
58.
Security Assertion Mining
59.
security closure
60.
Security Coverage
61.
security dataset
62.
security dilemma
63.
Security evaluation
64.
security evaluation instruments
65.
security log analysis
66.
security management
67.
security model
68.
security monitoring
69.
security notion
70.
security objectives
71.
security of data
72.
security of supply
73.
security operation center
74.
security patterns
75.
security policy
76.
security problem definition
77.
security proof
78.
security protocols
79.
security requirements
80.
security requirements engineering
81.
security risk assessment
82.
security risk management
83.
security strategies
84.
security systems for military objects
85.
security testing
86.
security training
87.
security verification
88.
social security planning
89.
societal security
90.
system of economic security
91.
system security
92.
terrorism security
93.
transmission System Security
94.
voting privacy and security
95.
active distribution network management
96.
Adaptive network-based fuzzy inference system (ANFIS)
97.
aec distribution network
98.
analytical flow network analysis
99.
analytical network process
100.
ANDROID network
101.
artificial neural network
102.
A-source network
103.
autoservice network
104.
Bayesian belief network (BBN)
105.
bayesian network (BN)
106.
Binarized Neural Network (BNN)
107.
building site network
108.
business network model
109.
cable network
110.
carbon nanotube network
111.
cascaded forward neural network (CFNN)
112.
cognitive body area network
113.
collaborative network
114.
computer network management
115.
computer network operations
116.
connection network codes
117.
Controller Area Network
118.
Convolutional Neural Network
119.
convolutional neural network (CNN)
120.
coolant network
121.
deep convolutional neural network
122.
deep learning network
123.
deep neural network
124.
deep neural network compression
125.
DH network
126.
distribution network
127.
distribution network
128.
district heat network
129.
district heating network
130.
electric network parameters
131.
electrical network
132.
emergency network
133.
Event Processing Network (EPN)
134.
Event Processing Network Model
135.
feedforward neural network (FFNN)
136.
flow network analysis
137.
flow network parameters
138.
Fully Convolutional Network (FCN)
139.
Generative Adversarial Network (GaN)
140.
global innovation network
141.
Graph Convolutional Neural Network (GCN)
142.
GraphSAGE (Graph Based Neural Network)
143.
heterogeneous network
144.
hydraulic network model
145.
hypar-network
146.
impedance network
147.
impedance network
148.
impedance source (IS) network
149.
Impedance Source Network
150.
impedance-source network
151.
in-network data processing
152.
innovation network
153.
innovation network agent
154.
joint network-channel coding
155.
knowledge network
156.
levelling network
157.
linear Delta robots neural network based model
158.
lumped parameter network
159.
lumped parameter thermal network
160.
lumped-parameter thermal network
161.
Magnetically Coupled Impedance Source Network (MCIS)
162.
memory network
163.
Mesh Network
164.
modified network cohesion
165.
MRAN (minimum resource allocation network)
166.
nanosheets network
167.
NB-IoT network
168.
NetFlow based network monitoring
169.
network
170.
network access charges
171.
network analysis
172.
network anomaly detection
173.
network architecture
174.
network calculus
175.
network characteristics
176.
network communication technologies
177.
network constraint
178.
network disaggregation
179.
network dynamics
180.
network expansion planning
181.
network forensics
182.
network function virtualization
183.
network functions virtualization (NFV)
184.
network games
185.
network governance
186.
network IDS alert classification
187.
network industries
188.
network industry
189.
network latencies
190.
network layer
191.
Network lifetime
192.
network measurement
193.
network monitoring
194.
network of co-authorships
195.
network on chip
196.
Network on Chip (NoC)
197.
network partners
198.
network protocol reverse engineering
199.
network protocols
200.
Network QoS
201.
network quality
202.
Network reliability
203.
network safety ranking
204.
network slicing
205.
network sparsification
206.
network studies
207.
network theory
208.
network topologies
209.
network topology
210.
network uncertainties
211.
Network visualization
212.
network-on-chip
213.
network-on-ReRAM
214.
network-testing
215.
neural network
216.
neural network architecture search
217.
neural network controller
218.
neural network predictive controller
219.
nitrogen-cycling network
220.
open value network
221.
partner network
222.
partner network
223.
partner network (PN)
224.
partner network maturity
225.
passive switched capacitor network
226.
PC-corr network
227.
peer to peer network
228.
performance dialogue network
229.
personal area network applications
230.
pervasive public safety network
231.
phosphotransfer network
232.
power delivery network
233.
power distribution network
234.
production in network
235.
proteomic network
236.
public safety network
237.
qZS network
238.
quasi-impedance-source network
239.
quasi-Z-source network
240.
Radial Basis Function Neural Network (RBFNN)
241.
radio access network (RAN)
242.
radio access network subslicing
243.
random resistor network
244.
recurrent neural network language model
245.
reluctance network (RN)
246.
research network
247.
road network
248.
roof network
249.
route network
250.
self organizing network
251.
smart distribution network
252.
SMEs network
253.
social network
254.
social network analysis
255.
software-defined network
256.
spiking neural network (SNN)
257.
stretchable network
258.
support network activities
259.
sustainable partner network
260.
sustainable partner network (SPN)
261.
switched capacitor inductor network (SCLN)
262.
Z-source network
263.
technology transfer network
264.
telecommunication network management
265.
telecommunication network performance
266.
Ternary Neural Network
267.
the influence of DHW consumption on dimensioning the DH network
268.
thermal network
269.
tide gauge network
270.
UAV-enabled network
271.
underwater sensor network
272.
utility network
273.
value network analysis
274.
water distribution network
275.
wireless ad hoq network
276.
wireless body area network
277.
Wireless Body Area Network (WBAN)
278.
wireless network
279.
wireless sensor network
280.
wsn (wireless sensor network)
281.
3D graphene network
282.
3D network topology visualization
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
European Access Network
4.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
TTÜ subject term
1
1.
Erasmus Student Network
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT