Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
network security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(3/327)
Export
export all inquiry results
(5)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
Blumbergs, Bernhards
;
Vaarandi, Risto
MILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 2017
2017
/
p. 707-712
https://doi.org/10.1109/MILCOM.2017.8170785
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
2
book
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
book
3
journal article EST
/
journal article ENG
Kamerabasiertes Monitoring von Fischen in Deutschland und der Schweiz
Haas, Christian
;
Meyer, Matthias
;
Schmalz, Maria
;
Tuhtan, Jeffrey Andrew
WasserWirtschaft
2024
/
p. 19 - 29
https://doi.org/10.1007/s35147-024-2401-1
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
4
journal article EST
/
journal article ENG
Network IDS alert classification with active learning techniques
Vaarandi, Risto
;
Guerra-Manzanares, Alejandro
Journal of Information Security and Applications
2024
/
art. 103687
https://doi.org/10.1016/j.jisa.2023.103687
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
5
journal article EST
/
journal article ENG
Stream clustering guided supervised learning for classifying NIDS alerts
Vaarandi, Risto
;
Guerra Manzanares, Alejandro
Future generation computer systems
2024
/
p. 231-244 : ill
https://doi.org/10.1016/j.future.2024.01.032
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 5, displaying
1 - 5
keyword
321
1.
network security
2.
network security monitoring
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security monitoring
15.
cyber security strategies
16.
cyber-security
17.
data and information security
18.
data security
19.
development of security cameras
20.
digital security practices
21.
drinking water security
22.
economic security
23.
economic security of enterprise
24.
emotional security
25.
energy security
26.
energy security indicator
27.
Estonian information security standard
28.
graded security
29.
hardware security
30.
hardware security primitive
31.
high level of security
32.
Homeland security
33.
human security
34.
information security
35.
information security and privacy
36.
initial level of security
37.
internal security
38.
international security
39.
investment and innovation security
40.
IPv6 security
41.
IT security
42.
IT security management
43.
job security
44.
long-term security
45.
Maritime Security Operations Center (M-SOC)
46.
medium level of security
47.
metadata model for security measures
48.
Middle Eastern security
49.
Mobile security
50.
national cyber security strategy
51.
national security
52.
NATO. Science for Peace and Security Program
53.
OSCE (Organization for Security and Co-operation in Europe)
54.
passenger’s security
55.
policy-based routing security
56.
political and security cultures
57.
post-quantum security
58.
power system security
59.
quantitative security
60.
regional security
61.
RISC-V Security Verification
62.
Safety and Security in Sea Transportation
63.
safety and security testing
64.
security
65.
security adaptation
66.
security alert prioritization
67.
security analysis
68.
security and justice (AFSJ)
69.
Security and political science
70.
security and privacy
71.
security and privacy in smart grids
72.
Security Assertion Mining
73.
security closure
74.
Security Coverage
75.
security dataset
76.
security dilemma
77.
Security evaluation
78.
security evaluation instruments
79.
Security limitations
80.
security log analysis
81.
security management
82.
security model
83.
security monitoring
84.
security notion
85.
security objectives
86.
security of data
87.
security of supply
88.
security operation center
89.
security operations center
90.
security patterns
91.
security policy
92.
security problem definition
93.
security proof
94.
security protocols
95.
security requirements
96.
security requirements engineering
97.
security risk assessment
98.
security risk management
99.
security risks
100.
security science and technology
101.
security strategies
102.
security systems for military objects
103.
security testing
104.
security training
105.
security verification
106.
security-by-design
107.
social security planning
108.
societal security
109.
software security
110.
software security level
111.
software security subcharacteristics
112.
sufficient level of security
113.
system of economic security
114.
system security
115.
terrorism security
116.
transmission System Security
117.
voting privacy and security
118.
active distribution network management
119.
Adaptive network-based fuzzy inference system (ANFIS)
120.
aec distribution network
121.
analytical flow network analysis
122.
analytical network process
123.
ANDROID network
124.
artificial neural network
125.
A-source network
126.
autoservice network
127.
Bayesian belief network (BBN)
128.
bayesian network (BN)
129.
Binarized Neural Network (BNN)
130.
building site network
131.
business network model
132.
cable network
133.
carbon nanotube network
134.
cascaded forward neural network (CFNN)
135.
cognitive body area network
136.
collaborative network
137.
computer network management
138.
computer network operations
139.
connection network codes
140.
Controller Area Network
141.
Convolutional Neural Network
142.
convolutional neural network (CNN)
143.
coolant network
144.
deep convolutional neural network
145.
deep learning network
146.
deep neural network
147.
deep neural network compression
148.
DH network
149.
distribution network
150.
distribution network
151.
district heat network
152.
district heating network
153.
electric network analysis
154.
electric network parameters
155.
electrical network
156.
emergency network
157.
Event Processing Network (EPN)
158.
Event Processing Network Model
159.
feedforward neural network (FFNN)
160.
flow network analysis
161.
flow network parameters
162.
Fully Convolutional Network (FCN)
163.
Generative Adversarial Network (GaN)
164.
global innovation network
165.
Graph Convolutional Neural Network (GCN)
166.
GraphSAGE (Graph Based Neural Network)
167.
heterogeneous network
168.
hydraulic network model
169.
hypar-network
170.
impedance network
171.
impedance network
172.
impedance source (IS) network
173.
Impedance Source Network
174.
impedance-source network
175.
in-network data processing
176.
innovation network
177.
innovation network agent
178.
joint network-channel coding
179.
knowledge network
180.
levelling network
181.
line impedance stabilization network
182.
linear Delta robots neural network based model
183.
LSTM neural network
184.
lumped parameter network
185.
lumped parameter thermal network
186.
lumped-parameter thermal network
187.
Magnetically Coupled Impedance Source Network (MCIS)
188.
memory network
189.
Mesh Network
190.
modified network cohesion
191.
MRAN (minimum resource allocation network)
192.
nanosheets network
193.
NB-IoT network
194.
NetFlow based network monitoring
195.
network
196.
network access charges
197.
network analysis
198.
network anomaly detection
199.
network architecture
200.
network calculus
201.
network characteristics
202.
network communication technologies
203.
network constraint
204.
network disaggregation
205.
network dynamics
206.
network expansion planning
207.
network externality
208.
network forensics
209.
network function virtualization
210.
network functions virtualization (NFV)
211.
network games
212.
network governance
213.
network IDS alert classification
214.
network industries
215.
network industry
216.
network intrusion detection system
217.
network latencies
218.
network layer
219.
Network lifetime
220.
network measurement
221.
network monitoring
222.
network of co-authorships
223.
network on chip
224.
Network on Chip (NoC)
225.
network partners
226.
network protocol reverse engineering
227.
network protocols
228.
Network QoS
229.
network quality
230.
Network reliability
231.
network resilience
232.
network safety ranking
233.
network slicing
234.
network sparsification
235.
network studies
236.
network theory
237.
network topologies
238.
network topology
239.
network uncertainties
240.
Network visualization
241.
network-on-chip
242.
network-on-ReRAM
243.
network-testing
244.
neural network
245.
neural network architecture search
246.
neural network controller
247.
neural network modelling
248.
neural network models
249.
neural network positioning algorithms
250.
neural network predictive controller
251.
nitrogen-cycling network
252.
non-public network
253.
non-terrestrial network
254.
open value network
255.
partner network
256.
partner network
257.
partner network (PN)
258.
partner network maturity
259.
passive switched capacitor network
260.
PC-corr network
261.
peer to peer network
262.
performance dialogue network
263.
personal area network applications
264.
pervasive public safety network
265.
phosphotransfer network
266.
power delivery network
267.
power distribution network
268.
production in network
269.
proteomic network
270.
public safety network
271.
qZS network
272.
quasi-impedance-source network
273.
quasi-Z-source network
274.
Radial Basis Function Neural Network (RBFNN)
275.
radio access network
276.
radio access network (RAN)
277.
radio access network subslicing
278.
random resistor network
279.
recurrent neural network language model
280.
reluctance network (RN)
281.
research network
282.
Residual Neural Network
283.
road network
284.
roof network
285.
route network
286.
self organizing network
287.
smart distribution network
288.
SMEs network
289.
social network
290.
social network analysis
291.
software-defined network
292.
spiking neural network (SNN)
293.
stretchable network
294.
support network activities
295.
sustainable partner network
296.
sustainable partner network (SPN)
297.
switched capacitor inductor network (SCLN)
298.
Z-source network
299.
technology transfer network
300.
telecommunication network management
301.
telecommunication network performance
302.
Ternary Neural Network
303.
the influence of DHW consumption on dimensioning the DH network
304.
thermal network
305.
tide gauge network
306.
transformer-based neural network
307.
UAV-enabled network
308.
underwater sensor network
309.
Urban Network
310.
utility network
311.
value network analysis
312.
water distribution network
313.
wireless ad hoq network
314.
wireless body area network
315.
Wireless Body Area Network (WBAN)
316.
wireless network
317.
wireless sensor network
318.
wireless sensor network (WSN)
319.
wsn (wireless sensor network)
320.
3D graphene network
321.
3D network topology visualization
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
European Access Network
4.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
TalTech subject term
2
1.
Erasmus Student Network
2.
Islamic Public Value Network
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT