Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
cyber intrusion detection (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/237)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Learning from few cyber-attacks : addressing the class imbalance problem in machine learning-based intrusion detection in software-defined networking
Mirsadeghi, Seyed Mohammad Hadi
;
Bahsi, Hayretdin
;
Vaarandi, Risto
;
Inoubli, Wissem
IEEE Access
2023
/
p. 140428 - 140442
https://doi.org/10.1109/ACCESS.2023.3341755
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
233
1.
cyber intrusion detection
2.
behaviour-based intrusion detection systems
3.
early intrusion detection
4.
evaluation of explainable AI intrusion detection
5.
health care IoMT intrusion detection
6.
intrusion detection
7.
intrusion detection system (IDS)
8.
intrusion detection systems
9.
intrusion detection systems (IDS)
10.
network intrusion detection system
11.
air intrusion
12.
intrusion
13.
intrusion response system
14.
saline intrusion blockage
15.
automated cyber defense
16.
autonomous vehicle cyber range
17.
cloud-based cyber-physical systems (C2PS)
18.
cognitive cyber warfare
19.
cyber
20.
Cyber “Maastricht”
21.
cyber architecture
22.
cyber attacks
23.
cyber battle damage assessment
24.
Cyber Bio-analytical Physical Systems (CBPSs)
25.
cyber challenge
26.
cyber command
27.
Cyber Command organisational structure
28.
cyber conflict
29.
cyber contingency
30.
cyber crime
31.
cyber crime pathways
32.
cyber crime scripting
33.
Cyber crisis management
34.
cyber defence
35.
cyber defence exercise
36.
cyber defence exercises
37.
cyber defense education
38.
cyber defense exercise
39.
cyber defense exercises
40.
cyber dependence
41.
cyber diplomacy
42.
cyber exercise
43.
cyber hygiene
44.
cyber impact assessment
45.
cyber incidents
46.
cyber insurance
47.
cyber kill chain
48.
cyber operation
49.
cyber operation officer
50.
cyber operations
51.
cyber operations exercises
52.
cyber physical energy systems
53.
cyber physical power system (CPPS)
54.
Cyber Physical Production System
55.
cyber physical production systems (CPPS)
56.
cyber physical social system
57.
cyber physical social systems (cpss)
58.
cyber physical system
59.
Cyber Planning tool
60.
cyber power Europe
61.
cyber ranges
62.
cyber red teaming
63.
cyber resilience
64.
cyber resilience at sea
65.
cyber risk
66.
cyber risk management in shipping
67.
cyber security
68.
cyber security education
69.
cyber security exercises
70.
cyber security monitoring
71.
cyber security monitoring in maritime
72.
cyber security strategies
73.
cyber situational awareness
74.
cyber stability
75.
cyber team communication
76.
cyber threat
77.
cyber threat communication
78.
Cyber Threat Intelligence
79.
cyber threats
80.
cyber war
81.
cyber warfare
82.
cyber warriors
83.
cyber weapons
84.
cyber-attack
85.
cyber-attack pathways
86.
Cyber-attacks
87.
cyber-insurance
88.
cyber-paternalism
89.
cyber-physical energy systems
90.
cyber-physical social system (CPSS)
91.
cyber-physical system
92.
Cyber-Physical System (CPS)
93.
cyber-physical system logistic robot
94.
cyber-physical system security
95.
cyber-physical systems
96.
Cyber-Physical Systems (CPS)
97.
cyber-risks
98.
cyber-security
99.
cyber-space nexus
100.
cyber-vulnerabilities
101.
Defensive Cyber Operations
102.
EU cyber policy
103.
international cyber norms
104.
maritime cyber security
105.
maritime cyber security operations centers
106.
military cyber
107.
mobile cyber-physical system
108.
national cyber security strategy
109.
NATO cyber operations definitions
110.
NATO Cyber Range
111.
Offensive Cyber Operations
112.
perceived cyber risks and threats
113.
responsive cyber defence
114.
Socio-Cyber-Physical Systems
115.
space cyber range
116.
technical cyber exercise
117.
Visualising Cyber Planning
118.
AI-based fault detection
119.
amoxicillin detection
120.
anomaly detection
121.
anomaly detection for system logs
122.
antibiotic detection
123.
antibiotics detection
124.
aspect detection
125.
asynchronous fault detection
126.
attack detection
127.
barotrauma detection system
128.
Barotrauma detection system sensors
129.
body detection
130.
botnet detection
131.
capacitively coupled conductivity detection
132.
change detection
133.
chemical detection
134.
community detection
135.
compu ter-aided detection(CAD)
136.
computer-aided detection
137.
computer‐aided detection
138.
contactless conductivity detection
139.
contactless conductivity detection (C4D)
140.
crack detection
141.
crash detection
142.
defect detection
143.
detection
144.
detection efficiency
145.
detection engineering
146.
detection mechanisms
147.
detection method
148.
detection methods
149.
detection of anomalous end user nodes
150.
detection of hydrogen isotopes
151.
distributed detection
152.
early detection
153.
electronic warfare activity detection
154.
energy detection
155.
error detection
156.
ESI-MS and IM detection
157.
Event detection
158.
extraction and detection methods
159.
face detection
160.
Face Manipulation Detection
161.
failure detection
162.
fall detection
163.
fault detection
164.
fault detection and classification
165.
fault detection and diagnoses
166.
fault detection and diagnosis
167.
fault detection and diagnostics (FDD)
168.
Fish detection
169.
fouling detection
170.
harmonic detection
171.
hepatitis C virus (HCV) detection
172.
hubs detection
173.
hybrid fault detection
174.
IED detection
175.
image-based crack detection
176.
indicident detection and response
177.
indirect UV absorbance detection
178.
island detection
179.
islanding detection
180.
label-free detection
181.
lane detection
182.
lane line detection
183.
LED fluorescence detection
184.
leg detection
185.
light detection and ranging
186.
light detection and ranging (LiDAR)
187.
Light Detection and Ranging (LiDAR) point cloud
188.
limit of detection
189.
lock-in detection
190.
loop-closure detection
191.
malware detection
192.
marker detection
193.
mobile malware detection
194.
money laundering detection systems
195.
monitoring and detection
196.
multi-classed object detection
197.
Multi-valued Simulation for Hazard Detection in Digital Circuits
198.
mutant detection
199.
network anomaly detection
200.
nodules detection
201.
object detection
202.
oil-spill detection
203.
outlier’s detection methods
204.
outliers detection
205.
peak detection
206.
photovoltaic fault detection algorithms
207.
phytoplankton detection methods
208.
plagiarism detection
209.
position detection
210.
precursor detection
211.
propaganda detection
212.
protein detection
213.
proton detection
214.
radar detection
215.
ramp event detection
216.
recycled FPGA detection
217.
residual current detection
218.
robust detection
219.
scene text detection
220.
short-circuit detection
221.
Side-Channel Attack Detection
222.
small molecule detection
223.
speech activity detection
224.
Suicidal ideation detection
225.
synchronous detection
226.
topic detection
227.
tyre detection
228.
unmanned aerial vehicle detection systems
229.
unsupervised outlier detection
230.
UV detection
231.
vehicle detection
232.
vortex detection
233.
3D lane detection
subject term
4
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT