Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
anomaly detection (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
11
Look more..
(1/137)
Export
export all inquiry results
(11)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
AIS data analysis: reality in the Sea of Echos
Visky, Gabor
;
Rohl, Alexander
;
Katsikas, Sokratis
;
Maennel, Olaf Manuel
2024 IEEE 49th Conference on Local Computer Networks (LCN)
2024
/
7 p
https://doi.org/10.1109/LCN60385.2024.10639765
Article at Scopus
Article at WOS
book article
Related publications
1
Cybersecurity for maritime operational technology: challenges, considerations, and solutions = Merendustehnoloogia küberturvalisus: väljakutsed, kaalutlused ja lahendused
2
book article
Anomalous File System Activity detection through Temporal Association rule mining
Reza, M.
;
Iman, H.
;
Chikul, Pavel
;
Jervan, Gert
;
Bahsi, Hayretdin
;
Ghasempouri, Tara
Proceedings of the 9th International Conference on Information Systems Security and Privacy ICISSP. Vol. 1
2023
/
p. 733-740
https://doi.org//10.5220/0000168400003405
book article
3
book article
MedBIoT : generation of an IoT Botnet Dataset in a medium-sized IoT network
Guerra Manzanares, Alejandro
;
Medina-Galindo, Jorge
;
Bahsi, Hayretdin
;
Nõmm, Sven
Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP : February 25-27, 2020, La Valletta, Malta. Vol. 1
2020
/
p. 207-218 : ill
https://doi.org/10.5220/0009187802070218
book article
Related publications
1
Machine learning-based detection and characterization of evolving threats in mobile and IoT Systems = Masinõppepõhine arenevate ohtude tuvastamine ning kirjeldamine mobiilseadmete ja värkvõrkude jaoks
4
journal article
Novel real-time in-step gait anomaly detection algorithms
Rostovski, Jakob
;
Krivošei, Andrei
;
Kuusik, Alar
;
Le Moullec, Yannick
;
Alam, Muhammad Mahtab
techrxiv.org
2024
https://doi.org/10.36227/techrxiv.171173236.66440239/v1
journal article
5
book article EST
/
book article ENG
Real-time gait anomaly detection using 1D-CNN and LSTM
Rostovski, Jakob
;
Ahmadilivani, Mohammad Hasan
;
Krivošei, Andrei
;
Kuusik, Alar
;
Alam, Muhammad Mahtab
Digital Health and Wireless Solutions : First Nordic Conference, NCDHWS 2024, Oulu, Finland, May 7–8, 2024 : Proceedings, Part II
2024
/
p. 260-278
https://doi.org/10.1007/978-3-031-59091-7_17
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
Related publications
1
Development of methods for real-time in-step anomaly detection in gait analysis = Reaalajaliste meetodite arendus sammusiseste kõrvalkallete tuvastamiseks kõnnianalüüsis
6
book article
Real-time gait anomaly detection using SVM time series classification
Rostovski, Jakob
;
Krivošei, Andrei
;
Kuusik, Alar
;
Alam, Muhammad Mahtab
;
Ahmadov, Ulvi
2023 International Wireless Communications and Mobile Computing (IWCMC)
2023
/
p. 1389-1394
https://doi.org/10.1109/IWCMC58020.2023.10182666
book article
Related publications
1
Development of methods for real-time in-step anomaly detection in gait analysis = Reaalajaliste meetodite arendus sammusiseste kõrvalkallete tuvastamiseks kõnnianalüüsis
7
book article EST
/
book article ENG
Signature-based approach to detecting malicious outgoing traffic
Petliak, Nataliia
;
Klots, Yurii
;
Titova, Vira
;
Cheshun, Viktor
;
Boyarchuk, Artem
IntelITSIS 2023: Intelligent Information Technologies & Systems of Information Security 2023 : proceedings of the 4th International Workshop on Intelligent Information Technologies & Systems of Information Security : Khmelnytskyi, Ukraine, March 22-24, 2023
2023
/
p. 486 - 506
https://ceur-ws.org/Vol-3373/paper33.pdf
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
8
book article
Statistical Analysis-Based Feature Selection for Anomaly Detection in AIS Dataset
Visky, Gabor
;
Vaarandi, Risto
;
Katsikas, Sokratis
;
Maennel, Olaf Manuel
2025 IEEE 23rd World Symposium on Applied Machine Intelligence and Informatics (SAMI)
2025
/
p. 000159-000164
https://doi.org//10.1109/SAMI63904.2025.10883201
book article
Related publications
1
Cybersecurity for maritime operational technology: challenges, considerations, and solutions = Merendustehnoloogia küberturvalisus: väljakutsed, kaalutlused ja lahendused
9
book article
Unsupervised anomaly based botnet detection in IoT networks
Nõmm, Sven
;
Bahsi, Hayretdin
17th IEEE International Conference on Machine Learning and Applications : ICMLA 2018, 17–20 December 2018, Orlando, Florida, USA : proceedings
2018
/
p. 1048-1053
https://doi.org/10.1109/ICMLA.2018.00171
book article
10
book article
Using Incremental Inductive Logic Programming for Learning Spoofing Attacks on Maritime Automatic Identification System Data
Benterki, Aboubaker Seddiq
;
Visky, Gabor
;
Vain, Jüri
;
Tsiopoulos, Leonidas
Maritime Cybersecurity
2025
/
p. 123-141
https://doi.org/10.1007/978-3-031-87290-7_7
book article
Related publications
1
Cybersecurity for maritime operational technology: challenges, considerations, and solutions = Merendustehnoloogia küberturvalisus: väljakutsed, kaalutlused ja lahendused
11
book article EST
/
book article ENG
Using MedBIoT dataset to build effective machine learning-based IoT botnet detection systems
Guerra Manzanares, Alejandro
;
Medina-Galindo, Jorge
;
Bahsi, Hayretdin
;
Nõmm, Sven
Information Systems Security and Privacy : 6th International Conference, ICISSP 2020, Valletta, Malta, February 25–27, 2020 : revised selected papers
2022
/
p. 222–243
https://doi.org/10.1007/978-3-030-94900-6_11
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
Related publications
1
Machine learning-based detection and characterization of evolving threats in mobile and IoT Systems = Masinõppepõhine arenevate ohtude tuvastamine ning kirjeldamine mobiilseadmete ja värkvõrkude jaoks
Number of records 11, displaying
1 - 11
keyword
137
1.
anomaly detection
2.
anomaly detection for system logs
3.
network anomaly detection
4.
cerium anomaly europium anomaly
5.
anomaly
6.
Bouguer anomaly
7.
Ce anomaly
8.
cerium anomaly
9.
europium anomaly
10.
gravity anomaly
11.
residual gravity anomaly
12.
Residual Terrain Model (RTM) anomaly
13.
residual terrain model anomaly
14.
wind anomaly
15.
AI-based fault detection
16.
amoxicillin detection
17.
antibiotic detection
18.
antibiotics detection
19.
aspect detection
20.
asynchronous fault detection
21.
attack detection
22.
barotrauma detection system
23.
Barotrauma detection system sensors
24.
behaviour-based intrusion detection systems
25.
body detection
26.
botnet detection
27.
capacitively coupled conductivity detection
28.
change detection
29.
chemical detection
30.
community detection
31.
compu ter-aided detection(CAD)
32.
computer-aided detection
33.
computer‐aided detection
34.
contactless conductivity detection
35.
contactless conductivity detection (C4D)
36.
crack detection
37.
crash detection
38.
cyber intrusion detection
39.
defect detection
40.
detection
41.
detection efficiency
42.
detection engineering
43.
detection mechanisms
44.
detection method
45.
detection methods
46.
detection of anomalous end user nodes
47.
detection of hydrogen isotopes
48.
distributed detection
49.
early detection
50.
early intrusion detection
51.
electronic warfare activity detection
52.
energy detection
53.
error detection
54.
ESI-MS and IM detection
55.
evaluation of explainable AI intrusion detection
56.
Event detection
57.
extraction and detection methods
58.
face detection
59.
Face Manipulation Detection
60.
failure detection
61.
fall detection
62.
fault detection
63.
fault detection and classification
64.
fault detection and diagnoses
65.
fault detection and diagnosis
66.
fault detection and diagnostics (FDD)
67.
Fish detection
68.
fouling detection
69.
harmonic detection
70.
health care IoMT intrusion detection
71.
hepatitis C virus (HCV) detection
72.
hubs detection
73.
hybrid fault detection
74.
IED detection
75.
image-based crack detection
76.
indicident detection and response
77.
indirect UV absorbance detection
78.
intrusion detection
79.
intrusion detection system (IDS)
80.
intrusion detection systems
81.
intrusion detection systems (IDS)
82.
island detection
83.
islanding detection
84.
label-free detection
85.
lane detection
86.
lane line detection
87.
LED fluorescence detection
88.
leg detection
89.
light detection and ranging
90.
light detection and ranging (LiDAR)
91.
Light Detection and Ranging (LiDAR) point cloud
92.
limit of detection
93.
lock-in detection
94.
loop-closure detection
95.
malware detection
96.
marker detection
97.
mobile malware detection
98.
money laundering detection systems
99.
monitoring and detection
100.
multi-classed object detection
101.
Multi-valued Simulation for Hazard Detection in Digital Circuits
102.
mutant detection
103.
network intrusion detection system
104.
nodules detection
105.
object detection
106.
oil-spill detection
107.
outlier’s detection methods
108.
outliers detection
109.
peak detection
110.
photovoltaic fault detection algorithms
111.
phytoplankton detection methods
112.
plagiarism detection
113.
position detection
114.
precursor detection
115.
propaganda detection
116.
protein detection
117.
proton detection
118.
radar detection
119.
ramp event detection
120.
recycled FPGA detection
121.
residual current detection
122.
robust detection
123.
scene text detection
124.
short-circuit detection
125.
Side-Channel Attack Detection
126.
small molecule detection
127.
speech activity detection
128.
Suicidal ideation detection
129.
synchronous detection
130.
topic detection
131.
tyre detection
132.
unmanned aerial vehicle detection systems
133.
unsupervised outlier detection
134.
UV detection
135.
vehicle detection
136.
vortex detection
137.
3D lane detection
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT