Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
Computers and Security (source)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/113)
Export
export all inquiry results
(4)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Corrigendum to Concept drift and cross-device behavior: Challenges and implications for effective android malware detection Computers & Security, Volume 120, 102757 (Computers & Security (2022) 120, (S0167404822001523), (10.1016/j.cose.2022.102757))
Guerra-Manzanares, Alejandro
;
Luckner, Marcin
;
Bahsi, Hayretdin
Computers and Security
2023
/
art. 102998
https://doi.org/10.1016/j.cose.2022.102998
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
2
journal article EST
/
journal article ENG
Machine learning for android malware detection : mission accomplished? a comprehensive review of open challenges and future perspectives
Guerra-Manzanares, Alejandro
Computers and Security
2024
/
art. 103654
https://doi.org/10.1016/j.cose.2023.103654
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
3
journal article EST
/
journal article ENG
REACT: Autonomous intrusion response system for intelligent vehicles
Hamad, Mohammad
;
Finkenzeller, Andreas
;
Kühr, Michael
;
Roberts, Andrew James
;
Maennel, Olaf Manuel
;
Steinhorst, Sebastian
;
Prevelakis, Vassilis
Computers and security
2024
/
art. 104008, 17 p. : ill
https://doi.org/10.1016/j.cose.2024.104008
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
Cybersecurity testing and attack propagation analysis of autonomous driving software = Autonoomse sõiduki juhtimistarkvara küberturvalisuse testimine ja rünnakute leviku analüüs
4
journal article EST
/
journal article ENG
Threat modeling of industrial control systems: A systematic literature review
Khalil, Shaymaa Mamdouh
;
Bahsi, Hayretdin
;
Korõtko, Tarmo
Computers and security
2024
/
art. 103543, 19 p. : ill
https://doi.org/10.1016/j.cose.2023.103543
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 4, displaying
1 - 4
keyword
111
1.
computers
2.
computers and education
3.
computers in education
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security strategies
17.
cyber-security
18.
data and information security
19.
data security
20.
development of security cameras
21.
digital security practices
22.
drinking water security
23.
economic security
24.
economic security of enterprise
25.
emotional security
26.
energy security
27.
energy security indicator
28.
Estonian information security standard
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
human security
33.
information security
34.
information security and privacy
35.
internal security
36.
international security
37.
investment and innovation security
38.
IPv6 security
39.
IT security
40.
IT security management
41.
job security
42.
long-term security
43.
metadata model for security measures
44.
Middle Eastern security
45.
Mobile security
46.
national cyber security strategy
47.
national security
48.
NATO. Science for Peace and Security Program
49.
network security
50.
network security monitoring
51.
OSCE (Organization for Security and Co-operation in Europe)
52.
passenger’s security
53.
policy-based routing security
54.
political and security cultures
55.
post-quantum security
56.
power system security
57.
quantitative security
58.
regional security
59.
RISC-V Security Verification
60.
Safety and Security in Sea Transportation
61.
safety and security testing
62.
security
63.
security adaptation
64.
security alert prioritization
65.
security analysis
66.
security and justice (AFSJ)
67.
Security and political science
68.
security and privacy
69.
security and privacy in smart grids
70.
Security Assertion Mining
71.
security closure
72.
Security Coverage
73.
security dataset
74.
security dilemma
75.
Security evaluation
76.
security evaluation instruments
77.
Security limitations
78.
security log analysis
79.
security management
80.
security model
81.
security monitoring
82.
security notion
83.
security objectives
84.
security of data
85.
security of supply
86.
security operation center
87.
security operations center
88.
security patterns
89.
security policy
90.
security problem definition
91.
security proof
92.
security protocols
93.
security requirements
94.
security requirements engineering
95.
security risk assessment
96.
security risk management
97.
security risks
98.
security science and technology
99.
security strategies
100.
security systems for military objects
101.
security testing
102.
security training
103.
security verification
104.
security-by-design
105.
social security planning
106.
societal security
107.
system of economic security
108.
system security
109.
terrorism security
110.
transmission System Security
111.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT