Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
detection methods (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(1/215)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Active learning-based mobile malware detection utilizing auto-labeling and data drift detection
Deng, Zhe
;
Hubert, Arthur
;
Ben Yahia, Sadok
;
Bahsi, Hayretdin
Proceedings of the 2024 IEEE International Conference on Cyber Security and Resilience, CSR 2024
2024
/
p. 146 - 151
https://doi.org/10.1109/CSR61664.2024.10679343
Article at Scopus
Article at WOS
book article
2
journal article
Revealing Stachybotrys-like fungal growth in buildings - Possible exposure highlighted through three case studies
Hintikka, Tuomas
;
Andersson, Maria A.
;
Marik, Tamás
;
Mikkola, Raimo
;
Andersson, Magnus
;
Kredics, László
;
Kurnitski, Jarek
;
Salonen, Heidi
Science of the total environment
2025
/
art. 178408
https://doi.org/10.1016/j.scitotenv.2025.178408
journal article
Number of records 2, displaying
1 - 2
keyword
215
1.
detection methods
2.
extraction and detection methods
3.
outlier’s detection methods
4.
phytoplankton detection methods
5.
amoxicillin detection
6.
anomaly detection
7.
anomaly detection for system logs
8.
antibiotic detection
9.
antibiotics detection
10.
aspect detection
11.
asynchronous fault detection
12.
attack detection
13.
barotrauma detection system
14.
behaviour-based intrusion detection systems
15.
body detection
16.
botnet detection
17.
capacitively coupled conductivity detection
18.
change detection
19.
chemical detection
20.
community detection
21.
compu ter-aided detection(CAD)
22.
computer-aided detection
23.
computer‐aided detection
24.
contactless conductivity detection
25.
contactless conductivity detection (C4D)
26.
crack detection
27.
crash detection
28.
cyber intrusion detection
29.
defect detection
30.
detection
31.
detection efficiency
32.
detection engineering
33.
detection method
34.
detection of anomalous end user nodes
35.
detection of hydrogen isotopes
36.
distributed detection
37.
early detection
38.
early intrusion detection
39.
energy detection
40.
error detection
41.
ESI-MS and IM detection
42.
Event detection
43.
face detection
44.
Face Manipulation Detection
45.
failure detection
46.
fall detection
47.
fault detection
48.
fault detection and diagnoses
49.
fault detection and diagnosis
50.
Fish detection
51.
fouling detection
52.
harmonic detection
53.
hepatitis C virus (HCV) detection
54.
hubs detection
55.
IED detection
56.
image-based crack detection
57.
indicident detection and response
58.
indirect UV absorbance detection
59.
intrusion detection
60.
intrusion detection system
61.
intrusion detection system (IDS)
62.
intrusion detection systems
63.
island detection
64.
islanding detection
65.
label-free detection
66.
LED fluorescence detection
67.
leg detection
68.
light detection and ranging
69.
light detection and ranging (LiDAR)
70.
Light Detection and Ranging (LiDAR) point cloud
71.
limit of detection
72.
lock-in detection
73.
loop-closure detection
74.
malware detection
75.
marker detection
76.
mobile malware detection
77.
money laundering detection systems
78.
monitoring and detection
79.
multi-classed object detection
80.
Multi-valued Simulation for Hazard Detection in Digital Circuits
81.
mutant detection
82.
network anomaly detection
83.
network intrusion detection system
84.
nodules detection
85.
object detection
86.
oil-spill detection
87.
outliers detection
88.
peak detection
89.
plagiarism detection
90.
position detection
91.
precursor detection
92.
protein detection
93.
proton detection
94.
radar detection
95.
ramp event detection
96.
recycled FPGA detection
97.
residual current detection
98.
robust detection
99.
scene text detection
100.
short-circuit detection
101.
small molecule detection
102.
speech activity detection
103.
Suicidal ideation detection
104.
synchronous detection
105.
tyre detection
106.
unmanned aerial vehicle detection systems
107.
unsupervised outlier detection
108.
UV detection
109.
vehicle detection
110.
vortex detection
111.
3D lane detection
112.
ab-initio methods
113.
active learning methods
114.
algebraic methods
115.
algebraic/geometric methods
116.
an ensemble of compression methods
117.
analysis methods
118.
analytical methods
119.
approximate methods
120.
approximation methods
121.
assessment methods
122.
Backstepping methods
123.
biology experimental methods
124.
calculation methods
125.
casting methods
126.
Cesaro methods
127.
chemometric methods
128.
computational design methods
129.
computational methods
130.
computer aided methods
131.
control methods
132.
decontamination methods
133.
deep learning methods
134.
Design and assessment methods
135.
design methods
136.
diagnostics methods
137.
didactic methods
138.
digital methods
139.
electronic structure methods
140.
ensemble methods
141.
Euler-Knopp methods
142.
excavation methods
143.
finite-element (FE) methods
144.
finite-element methods
145.
finite-element methods (FEM)
146.
flow assessment methods
147.
formal methods
148.
frontier methods
149.
Gauss-Newton-type methods
150.
Gauss–Newton-type methods
151.
generalized Nörlund methods
152.
geometric methods
153.
graphic methods
154.
integration methods
155.
interaction methods
156.
interactive teaching methods
157.
interpretation methods
158.
invasive methods
159.
inverse methods
160.
inverse methods for engineering applications
161.
linear and nonlinear unsupervised methods
162.
material characterization methods
163.
Mathematical methods
164.
matrix methods
165.
methods
166.
methods of measuring
167.
methods of study
168.
methods: data analysis
169.
Methods: statistical
170.
mixed methods
171.
mixed-methods
172.
model-free methods
173.
modulation methods
174.
Monte Carlo methods
175.
multi-criteria decision-making methods
176.
nearest neighbor methods
177.
numerical methods
178.
optimization methods
179.
physico-chemical methods
180.
plan-driven methods
181.
polynomial methods
182.
practical teaching methods
183.
prediction methods
184.
pseudospectral methods
185.
qualitative methods
186.
qualitative research methods
187.
quantitative methods
188.
regular matrix methods
189.
research methods
190.
reversal methods
191.
sampling methods
192.
selection methods
193.
separation methods
194.
shootthrough control methods
195.
shoot-through control methods
196.
stability prediction methods
197.
standardized methods
198.
state space methods
199.
Statistical methods
200.
statistics methods
201.
substation testing methods
202.
Taguchi methods
203.
teaching methods
204.
testing methods
205.
timber construction (construction methods)
206.
tracer gas methods
207.
transmission line matrix methods
208.
Tree-based methods
209.
variational methods
210.
verification methods
211.
visual methods
212.
visualization design and evaluation methods
213.
X-ray methods
214.
X-ray methods B
215.
finite element methods
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT