Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security log analysis (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/103)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Event log analysis with the LogCluster tool
Vaarandi, Risto
;
Kont, Markus
;
Pihelgas, Mauno
2016 IEEE Military Communications Conference : MILCOM 2016 : Baltimore, MD, USA, November 1-3, 2016
2016
/
p. 982-987
https://doi.org/10.1109/MILCOM.2016.7795458
book article
Number of records 1, displaying
1 - 1
keyword
101
1.
security log analysis
2.
event log analysis
3.
log file analysis
4.
Doppler velocity log (DVL)
5.
event log clustering
6.
log collection
7.
log house
8.
log message
9.
log soaking
10.
log wall
11.
log-law
12.
pattern mining from log files
13.
time log
14.
Wooden log house
15.
ad-hoc sensor networks security
16.
Automatic Security Verification
17.
Blockchain security
18.
cache security
19.
communication system security
20.
comprehensive system of economic security
21.
computer security
22.
cooperative security dilemma
23.
cyber security
24.
cyber security education
25.
cyber security exercises
26.
cyber security strategies
27.
cyber-security
28.
data security
29.
development of security cameras
30.
drinking water security
31.
economic security
32.
economic security of enterprise
33.
emotional security
34.
energy security
35.
energy security indicator
36.
graded security
37.
hardware security
38.
hardware security primitive
39.
human security
40.
information security
41.
internal security
42.
international security
43.
investment and innovation security
44.
IPv6 security
45.
IT security
46.
job security
47.
long-term security
48.
metadata model for security measures
49.
Middle Eastern security
50.
Mobile security
51.
national cyber security strategy
52.
national security
53.
NATO. Science for Peace and Security Program
54.
network security
55.
network security monitoring
56.
OSCE (Organization for Security and Co-operation in Europe)
57.
passenger’s security
58.
policy-based routing security
59.
political and security cultures
60.
post-quantum security
61.
power system security
62.
quantitative security
63.
regional security
64.
RISC-V Security Verification
65.
security
66.
security and privacy
67.
security and privacy in smart grids
68.
Security Assertion Mining
69.
security closure
70.
Security Coverage
71.
security dataset
72.
security dilemma
73.
Security evaluation
74.
security management
75.
security model
76.
security monitoring
77.
security notion
78.
security objectives
79.
security of data
80.
security of supply
81.
security operation center
82.
security patterns
83.
security problem definition
84.
security proof
85.
security protocols
86.
security requirements
87.
security requirements engineering
88.
security risk assessment
89.
security risk management
90.
security strategies
91.
security systems for military objects
92.
security testing
93.
security training
94.
security verification
95.
social security planning
96.
societal security
97.
system of economic security
98.
system security
99.
terrorism security
100.
transmission System Security
101.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT