Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
network security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(3/334)
Export
export all inquiry results
(5)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
Blumbergs, Bernhards
;
Vaarandi, Risto
MILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 2017
2017
/
p. 707-712
https://doi.org/10.1109/MILCOM.2017.8170785
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
2
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
3
journal article EST
/
journal article ENG
Kamerabasiertes Monitoring von Fischen in Deutschland und der Schweiz
Haas, Christian
;
Meyer, Matthias
;
Schmalz, Maria
;
Tuhtan, Jeffrey Andrew
WasserWirtschaft
2024
/
p. 19 - 29
https://doi.org/10.1007/s35147-024-2401-1
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
4
journal article EST
/
journal article ENG
Network IDS alert classification with active learning techniques
Vaarandi, Risto
;
Guerra-Manzanares, Alejandro
Journal of Information Security and Applications
2024
/
art. 103687
https://doi.org/10.1016/j.jisa.2023.103687
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
5
journal article EST
/
journal article ENG
Stream clustering guided supervised learning for classifying NIDS alerts
Vaarandi, Risto
;
Guerra Manzanares, Alejandro
Future generation computer systems
2024
/
p. 231-244 : ill
https://doi.org/10.1016/j.future.2024.01.032
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 5, displaying
1 - 5
keyword
328
1.
network security
2.
network security monitoring
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
cloud security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security strategies
17.
cyber-security
18.
data and information security
19.
data security
20.
development of security cameras
21.
digital security practices
22.
drinking water security
23.
economic security
24.
economic security of enterprise
25.
emotional security
26.
energy security
27.
energy security indicator
28.
Estonian information security standard
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
high level of security
33.
Homeland security
34.
human security
35.
information security
36.
information security and privacy
37.
initial level of security
38.
internal security
39.
international security
40.
investment and innovation security
41.
IPv6 security
42.
IT security
43.
IT security management
44.
job security
45.
long-term security
46.
maritime cyber security
47.
maritime cyber security operations centers
48.
Maritime Security Operations Center (M-SOC)
49.
medium level of security
50.
metadata model for security measures
51.
Middle Eastern security
52.
Mobile security
53.
national cyber security strategy
54.
national security
55.
NATO. Science for Peace and Security Program
56.
OSCE (Organization for Security and Co-operation in Europe)
57.
passenger’s security
58.
policy-based routing security
59.
political and security cultures
60.
post-quantum security
61.
power system security
62.
quantitative security
63.
regional security
64.
RISC-V Security Verification
65.
Safety and Security in Sea Transportation
66.
safety and security testing
67.
security
68.
security adaptation
69.
security alert prioritization
70.
security analysis
71.
security and justice (AFSJ)
72.
Security and political science
73.
security and privacy
74.
security and privacy in smart grids
75.
Security Assertion
76.
Security Assertion Mining
77.
security closure
78.
Security Coverage
79.
security dataset
80.
security dilemma
81.
Security evaluation
82.
security evaluation instruments
83.
Security Level Evaluation
84.
Security limitations
85.
security log analysis
86.
security management
87.
security model
88.
security monitoring
89.
security notion
90.
security objectives
91.
security of data
92.
security of supply
93.
security operation center
94.
security operations center
95.
security patterns
96.
security policy
97.
security problem definition
98.
security proof
99.
security protocols
100.
security requirements
101.
security requirements engineering
102.
security research
103.
security risk assessment
104.
security risk management
105.
security risks
106.
security science and technology
107.
security strategies
108.
security systems for military objects
109.
security testing
110.
security training
111.
security verification
112.
security-by-design
113.
social security planning
114.
societal security
115.
software security
116.
software security level
117.
software security subcharacteristics
118.
sufficient level of security
119.
system of economic security
120.
system security
121.
terrorism security
122.
transmission System Security
123.
voting privacy and security
124.
active distribution network management
125.
Adaptive network-based fuzzy inference system (ANFIS)
126.
aec distribution network
127.
analytical flow network analysis
128.
analytical network process
129.
ANDROID network
130.
artificial neural network
131.
A-source network
132.
autoservice network
133.
Bayesian belief network (BBN)
134.
bayesian network (BN)
135.
Binarized Neural Network (BNN)
136.
building site network
137.
business network model
138.
cable network
139.
carbon nanotube network
140.
cascaded forward neural network (CFNN)
141.
cognitive body area network
142.
collaborative network
143.
computer network management
144.
computer network operations
145.
connection network codes
146.
Controller Area Network
147.
Convolutional Neural Network
148.
convolutional neural network (CNN)
149.
coolant network
150.
deep convolutional neural network
151.
deep learning network
152.
deep neural network
153.
deep neural network compression
154.
DH network
155.
distribution network
156.
distribution network
157.
district heat network
158.
district heating network
159.
electric network analysis
160.
electric network parameters
161.
electrical network
162.
emergency network
163.
Event Processing Network (EPN)
164.
Event Processing Network Model
165.
feedforward neural network (FFNN)
166.
flow network analysis
167.
flow network parameters
168.
Fully Convolutional Network (FCN)
169.
Generative Adversarial Network (GaN)
170.
global innovation network
171.
Graph Convolutional Neural Network (GCN)
172.
GraphSAGE (Graph Based Neural Network)
173.
heterogeneous network
174.
hydraulic network model
175.
hypar-network
176.
impedance network
177.
impedance network
178.
impedance source (IS) network
179.
Impedance Source Network
180.
impedance-source network
181.
in-network data processing
182.
innovation network
183.
innovation network agent
184.
joint network-channel coding
185.
knowledge network
186.
levelling network
187.
line impedance stabilization network
188.
linear Delta robots neural network based model
189.
LSTM neural network
190.
lumped parameter network
191.
lumped parameter thermal network
192.
lumped-parameter thermal network
193.
Magnetically Coupled Impedance Source Network (MCIS)
194.
memory network
195.
Mesh Network
196.
modified network cohesion
197.
MRAN (minimum resource allocation network)
198.
nanosheets network
199.
NB-IoT network
200.
NetFlow based network monitoring
201.
network
202.
network access charges
203.
network analysis
204.
network anomaly detection
205.
network architecture
206.
network calculus
207.
network characteristics
208.
network communication technologies
209.
network constraint
210.
network disaggregation
211.
network dynamics
212.
network expansion planning
213.
network externality
214.
network forensics
215.
network function virtualization
216.
network functions virtualization (NFV)
217.
network games
218.
network governance
219.
network IDS alert classification
220.
network industries
221.
network industry
222.
network intrusion detection system
223.
network latencies
224.
network layer
225.
Network lifetime
226.
network measurement
227.
network monitoring
228.
network of co-authorships
229.
network on chip
230.
Network on Chip (NoC)
231.
network partners
232.
network protocol reverse engineering
233.
network protocols
234.
Network QoS
235.
network quality
236.
Network reliability
237.
network resilience
238.
network safety ranking
239.
network slicing
240.
network sparsification
241.
network studies
242.
network theory
243.
network topologies
244.
network topology
245.
network uncertainties
246.
Network visualization
247.
network-on-chip
248.
network-on-ReRAM
249.
network-testing
250.
neural network
251.
neural network architecture search
252.
neural network controller
253.
neural network modelling
254.
neural network models
255.
neural network positioning algorithms
256.
neural network predictive controller
257.
nitrogen-cycling network
258.
non-public network
259.
non-terrestrial network
260.
open value network
261.
partner network
262.
partner network
263.
partner network (PN)
264.
partner network maturity
265.
passive switched capacitor network
266.
PC-corr network
267.
peer to peer network
268.
performance dialogue network
269.
personal area network applications
270.
pervasive public safety network
271.
phosphotransfer network
272.
power delivery network
273.
power distribution network
274.
production in network
275.
proteomic network
276.
public safety network
277.
qZS network
278.
qualitative network analysis
279.
quasi-impedance-source network
280.
quasi-Z-source network
281.
Radial Basis Function Neural Network (RBFNN)
282.
radio access network
283.
radio access network (RAN)
284.
radio access network subslicing
285.
random resistor network
286.
recurrent neural network language model
287.
reluctance network (RN)
288.
research network
289.
Residual Neural Network
290.
road network
291.
roof network
292.
route network
293.
self organizing network
294.
smart distribution network
295.
SMEs network
296.
social network
297.
social network analysis
298.
software-defined network
299.
spiking neural network (SNN)
300.
stretchable network
301.
support network activities
302.
sustainable partner network
303.
sustainable partner network (SPN)
304.
switched capacitor inductor network (SCLN)
305.
Z-source network
306.
technology transfer network
307.
telecommunication network management
308.
telecommunication network performance
309.
Ternary Neural Network
310.
the influence of DHW consumption on dimensioning the DH network
311.
thermal network
312.
tide gauge network
313.
transformer-based neural network
314.
UAV-enabled network
315.
underwater sensor network
316.
Urban Network
317.
utility network
318.
value network analysis
319.
water distribution network
320.
wireless ad hoq network
321.
wireless body area network
322.
Wireless Body Area Network (WBAN)
323.
wireless network
324.
wireless sensor network
325.
wireless sensor network (WSN)
326.
wsn (wireless sensor network)
327.
3D graphene network
328.
3D network topology visualization
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
European Access Network
4.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
TalTech subject term
2
1.
Erasmus Student Network
2.
Islamic Public Value Network
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT