Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
attack detection (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(1/157)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Observer-based detection and identification of sensor attacks in networked CPSs
Chowdhury, Nilanjan Roy
;
Belikov, Juri
;
Baimel, Dmitry
;
Levron, Yoash
Automatica
2020
/
art. 109166, 13 p
https://doi.org/10.1016/j.automatica.2020.109166
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
157
1.
attack detection
2.
Side-Channel Attack Detection
3.
attack graphs
4.
attack model
5.
attack sophistication
6.
attack trees
7.
attack vectors
8.
attack visualisation
9.
botnet attack
10.
corrosive attack
11.
cyber-attack
12.
cyber-attack pathways
13.
Denial of Service (DoS) attack
14.
discovery of attack scenarios
15.
DoS attack
16.
false data injection attack
17.
fault-injection attack
18.
ghost injection attack
19.
highly targeted attack
20.
iming side-channel attack
21.
Low-and-Slow DoS attack
22.
manufacturing-time attack
23.
Membership inference attack
24.
oracle-less attack
25.
quantum attack
26.
ransomware attack
27.
removal attack
28.
Return of the Coppersmith’s Attack (ROCA)
29.
return of the Coppersmith’s attack vulnerability
30.
SAT attack
31.
SAT-based attack
32.
side-channel attack
33.
timing attack
34.
AI-based fault detection
35.
amoxicillin detection
36.
anomaly detection
37.
anomaly detection for system logs
38.
antibiotic detection
39.
antibiotics detection
40.
aspect detection
41.
asynchronous fault detection
42.
barotrauma detection system
43.
Barotrauma detection system sensors
44.
behaviour-based intrusion detection systems
45.
body detection
46.
botnet detection
47.
capacitively coupled conductivity detection
48.
change detection
49.
chemical detection
50.
community detection
51.
compu ter-aided detection(CAD)
52.
computer-aided detection
53.
computer‐aided detection
54.
contactless conductivity detection
55.
contactless conductivity detection (C4D)
56.
crack detection
57.
crash detection
58.
cyber intrusion detection
59.
defect detection
60.
detection
61.
detection efficiency
62.
detection engineering
63.
detection mechanisms
64.
detection method
65.
detection methods
66.
detection of anomalous end user nodes
67.
detection of hydrogen isotopes
68.
distributed detection
69.
early detection
70.
early intrusion detection
71.
electronic warfare activity detection
72.
energy detection
73.
error detection
74.
ESI-MS and IM detection
75.
evaluation of explainable AI intrusion detection
76.
Event detection
77.
extraction and detection methods
78.
face detection
79.
Face Manipulation Detection
80.
failure detection
81.
fall detection
82.
fault detection
83.
fault detection and classification
84.
fault detection and diagnoses
85.
fault detection and diagnosis
86.
fault detection and diagnostics (FDD)
87.
Fish detection
88.
fouling detection
89.
harmonic detection
90.
health care IoMT intrusion detection
91.
hepatitis C virus (HCV) detection
92.
hubs detection
93.
hybrid fault detection
94.
IED detection
95.
image-based crack detection
96.
indicident detection and response
97.
indirect UV absorbance detection
98.
intrusion detection
99.
intrusion detection system (IDS)
100.
intrusion detection systems
101.
intrusion detection systems (IDS)
102.
island detection
103.
islanding detection
104.
label-free detection
105.
lane detection
106.
lane line detection
107.
LED fluorescence detection
108.
leg detection
109.
light detection and ranging
110.
light detection and ranging (LiDAR)
111.
Light Detection and Ranging (LiDAR) point cloud
112.
limit of detection
113.
lock-in detection
114.
loop-closure detection
115.
malware detection
116.
marker detection
117.
mobile malware detection
118.
money laundering detection systems
119.
monitoring and detection
120.
multi-classed object detection
121.
Multi-valued Simulation for Hazard Detection in Digital Circuits
122.
mutant detection
123.
network anomaly detection
124.
network intrusion detection system
125.
nodules detection
126.
object detection
127.
oil-spill detection
128.
outlier’s detection methods
129.
outliers detection
130.
peak detection
131.
photovoltaic fault detection algorithms
132.
phytoplankton detection methods
133.
plagiarism detection
134.
position detection
135.
precursor detection
136.
propaganda detection
137.
protein detection
138.
proton detection
139.
radar detection
140.
ramp event detection
141.
recycled FPGA detection
142.
residual current detection
143.
robust detection
144.
scene text detection
145.
short-circuit detection
146.
small molecule detection
147.
speech activity detection
148.
Suicidal ideation detection
149.
synchronous detection
150.
topic detection
151.
tyre detection
152.
unmanned aerial vehicle detection systems
153.
unsupervised outlier detection
154.
UV detection
155.
vehicle detection
156.
vortex detection
157.
3D lane detection
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT