Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
network security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(3/304)
Export
export all inquiry results
(5)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
Blumbergs, Bernhards
;
Vaarandi, Risto
MILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 2017
2017
/
p. 707-712
https://doi.org/10.1109/MILCOM.2017.8170785
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
2
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
3
journal article EST
/
journal article ENG
Kamerabasiertes Monitoring von Fischen in Deutschland und der Schweiz
Haas, Christian
;
Meyer, Matthias
;
Schmalz, Maria
;
Tuhtan, Jeffrey Andrew
WasserWirtschaft
2024
/
p. 19 - 29
https://doi.org/10.1007/s35147-024-2401-1
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
4
journal article EST
/
journal article ENG
Network IDS alert classification with active learning techniques
Vaarandi, Risto
;
Guerra-Manzanares, Alejandro
Journal of Information Security and Applications
2024
/
art. 103687
https://doi.org/10.1016/j.jisa.2023.103687
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
5
journal article EST
/
journal article ENG
Stream clustering guided supervised learning for classifying NIDS alerts
Vaarandi, Risto
;
Guerra Manzanares, Alejandro
Future generation computer systems
2024
/
p. 231-244 : ill
https://doi.org/10.1016/j.future.2024.01.032
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 5, displaying
1 - 5
keyword
299
1.
network security
2.
network security monitoring
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security monitoring
15.
cyber security strategies
16.
cyber-security
17.
data security
18.
development of security cameras
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
Estonian information security standard
26.
graded security
27.
hardware security
28.
hardware security primitive
29.
human security
30.
information security
31.
information security and privacy
32.
internal security
33.
international security
34.
investment and innovation security
35.
IPv6 security
36.
IT security
37.
IT security management
38.
job security
39.
long-term security
40.
metadata model for security measures
41.
Middle Eastern security
42.
Mobile security
43.
national cyber security strategy
44.
national security
45.
NATO. Science for Peace and Security Program
46.
OSCE (Organization for Security and Co-operation in Europe)
47.
passenger’s security
48.
policy-based routing security
49.
political and security cultures
50.
post-quantum security
51.
power system security
52.
quantitative security
53.
regional security
54.
RISC-V Security Verification
55.
safety and security testing
56.
security
57.
security adaptation
58.
security alert prioritization
59.
security analysis
60.
security and justice (AFSJ)
61.
Security and political science
62.
security and privacy
63.
security and privacy in smart grids
64.
Security Assertion Mining
65.
security closure
66.
Security Coverage
67.
security dataset
68.
security dilemma
69.
Security evaluation
70.
security evaluation instruments
71.
Security limitations
72.
security log analysis
73.
security management
74.
security model
75.
security monitoring
76.
security notion
77.
security objectives
78.
security of data
79.
security of supply
80.
security operation center
81.
security operations center
82.
security patterns
83.
security policy
84.
security problem definition
85.
security proof
86.
security protocols
87.
security requirements
88.
security requirements engineering
89.
security risk assessment
90.
security risk management
91.
security risks
92.
security strategies
93.
security systems for military objects
94.
security testing
95.
security training
96.
security verification
97.
security-by-design
98.
social security planning
99.
societal security
100.
system of economic security
101.
system security
102.
terrorism security
103.
transmission System Security
104.
voting privacy and security
105.
active distribution network management
106.
Adaptive network-based fuzzy inference system (ANFIS)
107.
aec distribution network
108.
analytical flow network analysis
109.
analytical network process
110.
ANDROID network
111.
artificial neural network
112.
A-source network
113.
autoservice network
114.
Bayesian belief network (BBN)
115.
bayesian network (BN)
116.
Binarized Neural Network (BNN)
117.
building site network
118.
business network model
119.
cable network
120.
carbon nanotube network
121.
cascaded forward neural network (CFNN)
122.
cognitive body area network
123.
collaborative network
124.
computer network management
125.
computer network operations
126.
connection network codes
127.
Controller Area Network
128.
Convolutional Neural Network
129.
convolutional neural network (CNN)
130.
coolant network
131.
deep convolutional neural network
132.
deep learning network
133.
deep neural network
134.
deep neural network compression
135.
DH network
136.
distribution network
137.
distribution network
138.
district heat network
139.
district heating network
140.
electric network analysis
141.
electric network parameters
142.
electrical network
143.
emergency network
144.
Event Processing Network (EPN)
145.
Event Processing Network Model
146.
feedforward neural network (FFNN)
147.
flow network analysis
148.
flow network parameters
149.
Fully Convolutional Network (FCN)
150.
Generative Adversarial Network (GaN)
151.
global innovation network
152.
Graph Convolutional Neural Network (GCN)
153.
GraphSAGE (Graph Based Neural Network)
154.
heterogeneous network
155.
hydraulic network model
156.
hypar-network
157.
impedance network
158.
impedance network
159.
impedance source (IS) network
160.
Impedance Source Network
161.
impedance-source network
162.
in-network data processing
163.
innovation network
164.
innovation network agent
165.
joint network-channel coding
166.
knowledge network
167.
levelling network
168.
line impedance stabilization network
169.
linear Delta robots neural network based model
170.
lumped parameter network
171.
lumped parameter thermal network
172.
lumped-parameter thermal network
173.
Magnetically Coupled Impedance Source Network (MCIS)
174.
memory network
175.
Mesh Network
176.
modified network cohesion
177.
MRAN (minimum resource allocation network)
178.
nanosheets network
179.
NB-IoT network
180.
NetFlow based network monitoring
181.
network
182.
network access charges
183.
network analysis
184.
network anomaly detection
185.
network architecture
186.
network calculus
187.
network characteristics
188.
network communication technologies
189.
network constraint
190.
network disaggregation
191.
network dynamics
192.
network expansion planning
193.
network forensics
194.
network function virtualization
195.
network functions virtualization (NFV)
196.
network games
197.
network governance
198.
network IDS alert classification
199.
network industries
200.
network industry
201.
network intrusion detection system
202.
network latencies
203.
network layer
204.
Network lifetime
205.
network measurement
206.
network monitoring
207.
network of co-authorships
208.
network on chip
209.
Network on Chip (NoC)
210.
network partners
211.
network protocol reverse engineering
212.
network protocols
213.
Network QoS
214.
network quality
215.
Network reliability
216.
network resilience
217.
network safety ranking
218.
network slicing
219.
network sparsification
220.
network studies
221.
network theory
222.
network topologies
223.
network topology
224.
network uncertainties
225.
Network visualization
226.
network-on-chip
227.
network-on-ReRAM
228.
network-testing
229.
neural network
230.
neural network architecture search
231.
neural network controller
232.
neural network modelling
233.
neural network predictive controller
234.
nitrogen-cycling network
235.
open value network
236.
partner network
237.
partner network
238.
partner network (PN)
239.
partner network maturity
240.
passive switched capacitor network
241.
PC-corr network
242.
peer to peer network
243.
performance dialogue network
244.
personal area network applications
245.
pervasive public safety network
246.
phosphotransfer network
247.
power delivery network
248.
power distribution network
249.
production in network
250.
proteomic network
251.
public safety network
252.
qZS network
253.
quasi-impedance-source network
254.
quasi-Z-source network
255.
Radial Basis Function Neural Network (RBFNN)
256.
radio access network (RAN)
257.
radio access network subslicing
258.
random resistor network
259.
recurrent neural network language model
260.
reluctance network (RN)
261.
research network
262.
Residual Neural Network
263.
road network
264.
roof network
265.
route network
266.
self organizing network
267.
smart distribution network
268.
SMEs network
269.
social network
270.
social network analysis
271.
software-defined network
272.
spiking neural network (SNN)
273.
stretchable network
274.
support network activities
275.
sustainable partner network
276.
sustainable partner network (SPN)
277.
switched capacitor inductor network (SCLN)
278.
Z-source network
279.
technology transfer network
280.
telecommunication network management
281.
telecommunication network performance
282.
Ternary Neural Network
283.
the influence of DHW consumption on dimensioning the DH network
284.
thermal network
285.
tide gauge network
286.
UAV-enabled network
287.
underwater sensor network
288.
Urban Network
289.
utility network
290.
value network analysis
291.
water distribution network
292.
wireless ad hoq network
293.
wireless body area network
294.
Wireless Body Area Network (WBAN)
295.
wireless network
296.
wireless sensor network
297.
wsn (wireless sensor network)
298.
3D graphene network
299.
3D network topology visualization
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
European Access Network
4.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
TalTech subject term
1
1.
Erasmus Student Network
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT