Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
network security (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(3/331)
Export
export all inquiry results
(5)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
Blumbergs, Bernhards
;
Vaarandi, Risto
MILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 2017
2017
/
p. 707-712
https://doi.org/10.1109/MILCOM.2017.8170785
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
2
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
3
journal article EST
/
journal article ENG
Kamerabasiertes Monitoring von Fischen in Deutschland und der Schweiz
Haas, Christian
;
Meyer, Matthias
;
Schmalz, Maria
;
Tuhtan, Jeffrey Andrew
WasserWirtschaft
2024
/
p. 19 - 29
https://doi.org/10.1007/s35147-024-2401-1
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
4
journal article EST
/
journal article ENG
Network IDS alert classification with active learning techniques
Vaarandi, Risto
;
Guerra-Manzanares, Alejandro
Journal of Information Security and Applications
2024
/
art. 103687
https://doi.org/10.1016/j.jisa.2023.103687
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
5
journal article EST
/
journal article ENG
Stream clustering guided supervised learning for classifying NIDS alerts
Vaarandi, Risto
;
Guerra Manzanares, Alejandro
Future generation computer systems
2024
/
p. 231-244 : ill
https://doi.org/10.1016/j.future.2024.01.032
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 5, displaying
1 - 5
keyword
325
1.
network security
2.
network security monitoring
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security monitoring
15.
cyber security strategies
16.
cyber-security
17.
data and information security
18.
data security
19.
development of security cameras
20.
digital security practices
21.
drinking water security
22.
economic security
23.
economic security of enterprise
24.
emotional security
25.
energy security
26.
energy security indicator
27.
Estonian information security standard
28.
graded security
29.
hardware security
30.
hardware security primitive
31.
high level of security
32.
Homeland security
33.
human security
34.
information security
35.
information security and privacy
36.
initial level of security
37.
internal security
38.
international security
39.
investment and innovation security
40.
IPv6 security
41.
IT security
42.
IT security management
43.
job security
44.
long-term security
45.
maritime cyber security
46.
maritime cyber security operations centers
47.
Maritime Security Operations Center (M-SOC)
48.
medium level of security
49.
metadata model for security measures
50.
Middle Eastern security
51.
Mobile security
52.
national cyber security strategy
53.
national security
54.
NATO. Science for Peace and Security Program
55.
OSCE (Organization for Security and Co-operation in Europe)
56.
passenger’s security
57.
policy-based routing security
58.
political and security cultures
59.
post-quantum security
60.
power system security
61.
quantitative security
62.
regional security
63.
RISC-V Security Verification
64.
Safety and Security in Sea Transportation
65.
safety and security testing
66.
security
67.
security adaptation
68.
security alert prioritization
69.
security analysis
70.
security and justice (AFSJ)
71.
Security and political science
72.
security and privacy
73.
security and privacy in smart grids
74.
Security Assertion Mining
75.
security closure
76.
Security Coverage
77.
security dataset
78.
security dilemma
79.
Security evaluation
80.
security evaluation instruments
81.
Security Level Evaluation
82.
Security limitations
83.
security log analysis
84.
security management
85.
security model
86.
security monitoring
87.
security notion
88.
security objectives
89.
security of data
90.
security of supply
91.
security operation center
92.
security operations center
93.
security patterns
94.
security policy
95.
security problem definition
96.
security proof
97.
security protocols
98.
security requirements
99.
security requirements engineering
100.
security research
101.
security risk assessment
102.
security risk management
103.
security risks
104.
security science and technology
105.
security strategies
106.
security systems for military objects
107.
security testing
108.
security training
109.
security verification
110.
security-by-design
111.
social security planning
112.
societal security
113.
software security
114.
software security level
115.
software security subcharacteristics
116.
sufficient level of security
117.
system of economic security
118.
system security
119.
terrorism security
120.
transmission System Security
121.
voting privacy and security
122.
active distribution network management
123.
Adaptive network-based fuzzy inference system (ANFIS)
124.
aec distribution network
125.
analytical flow network analysis
126.
analytical network process
127.
ANDROID network
128.
artificial neural network
129.
A-source network
130.
autoservice network
131.
Bayesian belief network (BBN)
132.
bayesian network (BN)
133.
Binarized Neural Network (BNN)
134.
building site network
135.
business network model
136.
cable network
137.
carbon nanotube network
138.
cascaded forward neural network (CFNN)
139.
cognitive body area network
140.
collaborative network
141.
computer network management
142.
computer network operations
143.
connection network codes
144.
Controller Area Network
145.
Convolutional Neural Network
146.
convolutional neural network (CNN)
147.
coolant network
148.
deep convolutional neural network
149.
deep learning network
150.
deep neural network
151.
deep neural network compression
152.
DH network
153.
distribution network
154.
distribution network
155.
district heat network
156.
district heating network
157.
electric network analysis
158.
electric network parameters
159.
electrical network
160.
emergency network
161.
Event Processing Network (EPN)
162.
Event Processing Network Model
163.
feedforward neural network (FFNN)
164.
flow network analysis
165.
flow network parameters
166.
Fully Convolutional Network (FCN)
167.
Generative Adversarial Network (GaN)
168.
global innovation network
169.
Graph Convolutional Neural Network (GCN)
170.
GraphSAGE (Graph Based Neural Network)
171.
heterogeneous network
172.
hydraulic network model
173.
hypar-network
174.
impedance network
175.
impedance network
176.
impedance source (IS) network
177.
Impedance Source Network
178.
impedance-source network
179.
in-network data processing
180.
innovation network
181.
innovation network agent
182.
joint network-channel coding
183.
knowledge network
184.
levelling network
185.
line impedance stabilization network
186.
linear Delta robots neural network based model
187.
LSTM neural network
188.
lumped parameter network
189.
lumped parameter thermal network
190.
lumped-parameter thermal network
191.
Magnetically Coupled Impedance Source Network (MCIS)
192.
memory network
193.
Mesh Network
194.
modified network cohesion
195.
MRAN (minimum resource allocation network)
196.
nanosheets network
197.
NB-IoT network
198.
NetFlow based network monitoring
199.
network
200.
network access charges
201.
network analysis
202.
network anomaly detection
203.
network architecture
204.
network calculus
205.
network characteristics
206.
network communication technologies
207.
network constraint
208.
network disaggregation
209.
network dynamics
210.
network expansion planning
211.
network externality
212.
network forensics
213.
network function virtualization
214.
network functions virtualization (NFV)
215.
network games
216.
network governance
217.
network IDS alert classification
218.
network industries
219.
network industry
220.
network intrusion detection system
221.
network latencies
222.
network layer
223.
Network lifetime
224.
network measurement
225.
network monitoring
226.
network of co-authorships
227.
network on chip
228.
Network on Chip (NoC)
229.
network partners
230.
network protocol reverse engineering
231.
network protocols
232.
Network QoS
233.
network quality
234.
Network reliability
235.
network resilience
236.
network safety ranking
237.
network slicing
238.
network sparsification
239.
network studies
240.
network theory
241.
network topologies
242.
network topology
243.
network uncertainties
244.
Network visualization
245.
network-on-chip
246.
network-on-ReRAM
247.
network-testing
248.
neural network
249.
neural network architecture search
250.
neural network controller
251.
neural network modelling
252.
neural network models
253.
neural network positioning algorithms
254.
neural network predictive controller
255.
nitrogen-cycling network
256.
non-public network
257.
non-terrestrial network
258.
open value network
259.
partner network
260.
partner network
261.
partner network (PN)
262.
partner network maturity
263.
passive switched capacitor network
264.
PC-corr network
265.
peer to peer network
266.
performance dialogue network
267.
personal area network applications
268.
pervasive public safety network
269.
phosphotransfer network
270.
power delivery network
271.
power distribution network
272.
production in network
273.
proteomic network
274.
public safety network
275.
qZS network
276.
quasi-impedance-source network
277.
quasi-Z-source network
278.
Radial Basis Function Neural Network (RBFNN)
279.
radio access network
280.
radio access network (RAN)
281.
radio access network subslicing
282.
random resistor network
283.
recurrent neural network language model
284.
reluctance network (RN)
285.
research network
286.
Residual Neural Network
287.
road network
288.
roof network
289.
route network
290.
self organizing network
291.
smart distribution network
292.
SMEs network
293.
social network
294.
social network analysis
295.
software-defined network
296.
spiking neural network (SNN)
297.
stretchable network
298.
support network activities
299.
sustainable partner network
300.
sustainable partner network (SPN)
301.
switched capacitor inductor network (SCLN)
302.
Z-source network
303.
technology transfer network
304.
telecommunication network management
305.
telecommunication network performance
306.
Ternary Neural Network
307.
the influence of DHW consumption on dimensioning the DH network
308.
thermal network
309.
tide gauge network
310.
transformer-based neural network
311.
UAV-enabled network
312.
underwater sensor network
313.
Urban Network
314.
utility network
315.
value network analysis
316.
water distribution network
317.
wireless ad hoq network
318.
wireless body area network
319.
Wireless Body Area Network (WBAN)
320.
wireless network
321.
wireless sensor network
322.
wireless sensor network (WSN)
323.
wsn (wireless sensor network)
324.
3D graphene network
325.
3D network topology visualization
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
European Access Network
4.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
TalTech subject term
2
1.
Erasmus Student Network
2.
Islamic Public Value Network
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT