Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
detection methods (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(1/211)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Active learning-based mobile malware detection utilizing auto-labeling and data drift detection
Deng, Zhe
;
Hubert, Arthur
;
Ben Yahia, Sadok
;
Bahsi, Hayretdin
Proceedings of the 2024 IEEE International Conference on Cyber Security and Resilience, CSR 2024
2024
/
p. 146 - 151
https://doi.org/10.1109/CSR61664.2024.10679343
Article at Scopus
Article at WOS
book article
2
journal article
Revealing Stachybotrys-like fungal growth in buildings - Possible exposure highlighted through three case studies
Hintikka, Tuomas
;
Andersson, Maria A.
;
Marik, Tamás
;
Mikkola, Raimo
;
Andersson, Magnus
;
Kredics, László
;
Kurnitski, Jarek
;
Salonen, Heidi
Science of the total environment
2025
/
art. 178408
https://doi.org/10.1016/j.scitotenv.2025.178408
journal article
Number of records 2, displaying
1 - 2
keyword
211
1.
detection methods
2.
extraction and detection methods
3.
outlier’s detection methods
4.
phytoplankton detection methods
5.
amoxicillin detection
6.
anomaly detection
7.
anomaly detection for system logs
8.
antibiotic detection
9.
antibiotics detection
10.
aspect detection
11.
asynchronous fault detection
12.
attack detection
13.
barotrauma detection system
14.
behaviour-based intrusion detection systems
15.
body detection
16.
botnet detection
17.
capacitively coupled conductivity detection
18.
change detection
19.
chemical detection
20.
community detection
21.
compu ter-aided detection(CAD)
22.
computer-aided detection
23.
computer‐aided detection
24.
contactless conductivity detection
25.
contactless conductivity detection (C4D)
26.
crack detection
27.
crash detection
28.
cyber intrusion detection
29.
defect detection
30.
detection
31.
detection efficiency
32.
detection engineering
33.
detection method
34.
detection of anomalous end user nodes
35.
detection of hydrogen isotopes
36.
distributed detection
37.
early detection
38.
early intrusion detection
39.
energy detection
40.
error detection
41.
ESI-MS and IM detection
42.
Event detection
43.
face detection
44.
Face Manipulation Detection
45.
failure detection
46.
fall detection
47.
fault detection
48.
fault detection and diagnoses
49.
fault detection and diagnosis
50.
Fish detection
51.
fouling detection
52.
harmonic detection
53.
hepatitis C virus (HCV) detection
54.
hubs detection
55.
IED detection
56.
image-based crack detection
57.
indicident detection and response
58.
indirect UV absorbance detection
59.
intrusion detection
60.
intrusion detection system
61.
intrusion detection system (IDS)
62.
intrusion detection systems
63.
island detection
64.
islanding detection
65.
label-free detection
66.
LED fluorescence detection
67.
leg detection
68.
light detection and ranging
69.
light detection and ranging (LiDAR)
70.
Light Detection and Ranging (LiDAR) point cloud
71.
limit of detection
72.
lock-in detection
73.
loop-closure detection
74.
malware detection
75.
marker detection
76.
mobile malware detection
77.
money laundering detection systems
78.
monitoring and detection
79.
multi-classed object detection
80.
Multi-valued Simulation for Hazard Detection in Digital Circuits
81.
mutant detection
82.
network anomaly detection
83.
network intrusion detection system
84.
nodules detection
85.
object detection
86.
oil-spill detection
87.
outliers detection
88.
peak detection
89.
plagiarism detection
90.
position detection
91.
precursor detection
92.
protein detection
93.
proton detection
94.
radar detection
95.
ramp event detection
96.
recycled FPGA detection
97.
residual current detection
98.
robust detection
99.
scene text detection
100.
short-circuit detection
101.
small molecule detection
102.
speech activity detection
103.
Suicidal ideation detection
104.
synchronous detection
105.
tyre detection
106.
unmanned aerial vehicle detection systems
107.
unsupervised outlier detection
108.
UV detection
109.
vehicle detection
110.
vortex detection
111.
3D lane detection
112.
ab-initio methods
113.
active learning methods
114.
algebraic methods
115.
algebraic/geometric methods
116.
an ensemble of compression methods
117.
analysis methods
118.
analytical methods
119.
approximate methods
120.
approximation methods
121.
assessment methods
122.
Backstepping methods
123.
biology experimental methods
124.
calculation methods
125.
Cesaro methods
126.
chemometric methods
127.
computational design methods
128.
computational methods
129.
computer aided methods
130.
control methods
131.
decontamination methods
132.
Design and assessment methods
133.
design methods
134.
diagnostics methods
135.
didactic methods
136.
digital methods
137.
electronic structure methods
138.
ensemble methods
139.
Euler-Knopp methods
140.
excavation methods
141.
finite-element (FE) methods
142.
finite-element methods
143.
finite-element methods (FEM)
144.
flow assessment methods
145.
formal methods
146.
frontier methods
147.
Gauss-Newton-type methods
148.
Gauss–Newton-type methods
149.
generalized Nörlund methods
150.
geometric methods
151.
graphic methods
152.
integration methods
153.
interaction methods
154.
interactive teaching methods
155.
interpretation methods
156.
invasive methods
157.
inverse methods
158.
inverse methods for engineering applications
159.
linear and nonlinear unsupervised methods
160.
material characterization methods
161.
Mathematical methods
162.
matrix methods
163.
methods
164.
methods of measuring
165.
methods of study
166.
methods: data analysis
167.
Methods: statistical
168.
mixed methods
169.
mixed-methods
170.
model-free methods
171.
modulation methods
172.
Monte Carlo methods
173.
nearest neighbor methods
174.
numerical methods
175.
optimization methods
176.
physico-chemical methods
177.
plan-driven methods
178.
polynomial methods
179.
practical teaching methods
180.
prediction methods
181.
pseudospectral methods
182.
qualitative methods
183.
qualitative research methods
184.
quantitative methods
185.
regular matrix methods
186.
research methods
187.
sampling methods
188.
selection methods
189.
separation methods
190.
shootthrough control methods
191.
shoot-through control methods
192.
stability prediction methods
193.
standardized methods
194.
state space methods
195.
Statistical methods
196.
statistics methods
197.
substation testing methods
198.
Taguchi methods
199.
teaching methods
200.
testing methods
201.
timber construction (construction methods)
202.
tracer gas methods
203.
transmission line matrix methods
204.
Tree-based methods
205.
variational methods
206.
verification methods
207.
visual methods
208.
visualization design and evaluation methods
209.
X-ray methods
210.
X-ray methods B
211.
finite element methods
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT