Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
attack detection (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(1/149)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Observer-based detection and identification of sensor attacks in networked CPSs
Chowdhury, Nilanjan Roy
;
Belikov, Juri
;
Baimel, Dmitry
;
Levron, Yoash
Automatica
2020
/
art. 109166, 13 p
https://doi.org/10.1016/j.automatica.2020.109166
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
149
1.
attack detection
2.
Side-Channel Attack Detection
3.
attack graphs
4.
attack model
5.
attack sophistication
6.
attack trees
7.
attack vectors
8.
attack visualisation
9.
botnet attack
10.
corrosive attack
11.
cyber-attack
12.
cyber-attack pathways
13.
Denial of Service (DoS) attack
14.
discovery of attack scenarios
15.
DoS attack
16.
false data injection attack
17.
fault-injection attack
18.
ghost injection attack
19.
highly targeted attack
20.
iming side-channel attack
21.
Low-and-Slow DoS attack
22.
manufacturing-time attack
23.
oracle-less attack
24.
quantum attack
25.
ransomware attack
26.
removal attack
27.
Return of the Coppersmith’s Attack (ROCA)
28.
return of the Coppersmith’s attack vulnerability
29.
SAT attack
30.
SAT-based attack
31.
side-channel attack
32.
amoxicillin detection
33.
anomaly detection
34.
anomaly detection for system logs
35.
antibiotic detection
36.
antibiotics detection
37.
aspect detection
38.
asynchronous fault detection
39.
barotrauma detection system
40.
Barotrauma detection system sensors
41.
behaviour-based intrusion detection systems
42.
body detection
43.
botnet detection
44.
capacitively coupled conductivity detection
45.
change detection
46.
chemical detection
47.
community detection
48.
compu ter-aided detection(CAD)
49.
computer-aided detection
50.
computer‐aided detection
51.
contactless conductivity detection
52.
contactless conductivity detection (C4D)
53.
crack detection
54.
crash detection
55.
cyber intrusion detection
56.
defect detection
57.
detection
58.
detection efficiency
59.
detection engineering
60.
detection mechanisms
61.
detection method
62.
detection methods
63.
detection of anomalous end user nodes
64.
detection of hydrogen isotopes
65.
distributed detection
66.
early detection
67.
early intrusion detection
68.
energy detection
69.
error detection
70.
ESI-MS and IM detection
71.
evaluation of explainable AI intrusion detection
72.
Event detection
73.
extraction and detection methods
74.
face detection
75.
Face Manipulation Detection
76.
failure detection
77.
fall detection
78.
fault detection
79.
fault detection and diagnoses
80.
fault detection and diagnosis
81.
Fish detection
82.
fouling detection
83.
harmonic detection
84.
health care IoMT intrusion detection
85.
hepatitis C virus (HCV) detection
86.
hubs detection
87.
IED detection
88.
image-based crack detection
89.
indicident detection and response
90.
indirect UV absorbance detection
91.
intrusion detection
92.
intrusion detection system
93.
intrusion detection system (IDS)
94.
intrusion detection systems
95.
island detection
96.
islanding detection
97.
label-free detection
98.
lane detection
99.
lane line detection
100.
LED fluorescence detection
101.
leg detection
102.
light detection and ranging
103.
light detection and ranging (LiDAR)
104.
Light Detection and Ranging (LiDAR) point cloud
105.
limit of detection
106.
lock-in detection
107.
loop-closure detection
108.
malware detection
109.
marker detection
110.
mobile malware detection
111.
money laundering detection systems
112.
monitoring and detection
113.
multi-classed object detection
114.
Multi-valued Simulation for Hazard Detection in Digital Circuits
115.
mutant detection
116.
network anomaly detection
117.
network intrusion detection system
118.
nodules detection
119.
object detection
120.
oil-spill detection
121.
outlier’s detection methods
122.
outliers detection
123.
peak detection
124.
phytoplankton detection methods
125.
plagiarism detection
126.
position detection
127.
precursor detection
128.
propaganda detection
129.
protein detection
130.
proton detection
131.
radar detection
132.
ramp event detection
133.
recycled FPGA detection
134.
residual current detection
135.
robust detection
136.
scene text detection
137.
short-circuit detection
138.
small molecule detection
139.
speech activity detection
140.
Suicidal ideation detection
141.
synchronous detection
142.
topic detection
143.
tyre detection
144.
unmanned aerial vehicle detection systems
145.
unsupervised outlier detection
146.
UV detection
147.
vehicle detection
148.
vortex detection
149.
3D lane detection
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT