Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber intrusion detection (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/228)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Learning from few cyber-attacks : addressing the class imbalance problem in machine learning-based intrusion detection in software-defined networking
Mirsadeghi, Seyed Mohammad Hadi
;
Bahsi, Hayretdin
;
Vaarandi, Risto
;
Inoubli, Wissem
IEEE Access
2023
/
p. 140428 - 140442
https://doi.org/10.1109/ACCESS.2023.3341755
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
224
1.
cyber intrusion detection
2.
behaviour-based intrusion detection systems
3.
early intrusion detection
4.
evaluation of explainable AI intrusion detection
5.
health care IoMT intrusion detection
6.
intrusion detection
7.
intrusion detection system
8.
intrusion detection system (IDS)
9.
intrusion detection systems
10.
network intrusion detection system
11.
air intrusion
12.
intrusion
13.
intrusion response system
14.
saline intrusion blockage
15.
autonomous vehicle cyber range
16.
cloud-based cyber-physical systems (C2PS)
17.
cognitive cyber warfare
18.
cyber
19.
Cyber “Maastricht”
20.
cyber architecture
21.
cyber attacks
22.
cyber battle damage assessment
23.
Cyber Bio-analytical Physical Systems (CBPSs)
24.
cyber challenge
25.
cyber command
26.
Cyber Command organisational structure
27.
cyber conflict
28.
cyber contingency
29.
cyber crime
30.
cyber crime pathways
31.
cyber crime scripting
32.
Cyber crisis management
33.
cyber defence
34.
cyber defence exercise
35.
cyber defence exercises
36.
cyber defense education
37.
cyber defense exercise
38.
cyber defense exercises
39.
cyber dependence
40.
cyber diplomacy
41.
cyber exercise
42.
cyber hygiene
43.
cyber impact assessment
44.
cyber incidents
45.
cyber insurance
46.
cyber kill chain
47.
cyber operation
48.
cyber operation officer
49.
cyber operations
50.
cyber operations exercises
51.
cyber physical energy systems
52.
cyber physical power system (CPPS)
53.
Cyber Physical Production System
54.
cyber physical production systems (CPPS)
55.
cyber physical social system
56.
cyber physical social systems (cpss)
57.
cyber physical system
58.
Cyber Planning tool
59.
cyber power Europe
60.
cyber ranges
61.
cyber red teaming
62.
cyber resilience
63.
cyber resilience at sea
64.
cyber risk
65.
cyber risk management in shipping
66.
cyber security
67.
cyber security education
68.
cyber security exercises
69.
cyber security monitoring
70.
cyber security strategies
71.
cyber situational awareness
72.
cyber stability
73.
cyber team communication
74.
cyber threat
75.
cyber threat communication
76.
Cyber Threat Intelligence
77.
cyber threats
78.
cyber war
79.
cyber warfare
80.
cyber warriors
81.
cyber weapons
82.
cyber-attack
83.
cyber-attack pathways
84.
Cyber-attacks
85.
cyber-insurance
86.
cyber-paternalism
87.
cyber-physical energy systems
88.
cyber-physical social system (CPSS)
89.
cyber-physical system
90.
Cyber-Physical System (CPS)
91.
cyber-physical system logistic robot
92.
cyber-physical systems
93.
Cyber-Physical Systems (CPS)
94.
cyber-risks
95.
cyber-security
96.
cyber-space nexus
97.
cyber-vulnerabilities
98.
Defensive Cyber Operations
99.
EU cyber policy
100.
international cyber norms
101.
maritime cyber security
102.
maritime cyber security operations centers
103.
military cyber
104.
mobile cyber-physical system
105.
national cyber security strategy
106.
NATO cyber operations definitions
107.
NATO Cyber Range
108.
Offensive Cyber Operations
109.
perceived cyber risks and threats
110.
responsive cyber defence
111.
Socio-Cyber-Physical Systems
112.
space cyber range
113.
technical cyber exercise
114.
Visualising Cyber Planning
115.
amoxicillin detection
116.
anomaly detection
117.
anomaly detection for system logs
118.
antibiotic detection
119.
antibiotics detection
120.
aspect detection
121.
asynchronous fault detection
122.
attack detection
123.
barotrauma detection system
124.
Barotrauma detection system sensors
125.
body detection
126.
botnet detection
127.
capacitively coupled conductivity detection
128.
change detection
129.
chemical detection
130.
community detection
131.
compu ter-aided detection(CAD)
132.
computer-aided detection
133.
computer‐aided detection
134.
contactless conductivity detection
135.
contactless conductivity detection (C4D)
136.
crack detection
137.
crash detection
138.
defect detection
139.
detection
140.
detection efficiency
141.
detection engineering
142.
detection mechanisms
143.
detection method
144.
detection methods
145.
detection of anomalous end user nodes
146.
detection of hydrogen isotopes
147.
distributed detection
148.
early detection
149.
energy detection
150.
error detection
151.
ESI-MS and IM detection
152.
Event detection
153.
extraction and detection methods
154.
face detection
155.
Face Manipulation Detection
156.
failure detection
157.
fall detection
158.
fault detection
159.
fault detection and diagnoses
160.
fault detection and diagnosis
161.
Fish detection
162.
fouling detection
163.
harmonic detection
164.
hepatitis C virus (HCV) detection
165.
hubs detection
166.
IED detection
167.
image-based crack detection
168.
indicident detection and response
169.
indirect UV absorbance detection
170.
island detection
171.
islanding detection
172.
label-free detection
173.
lane detection
174.
lane line detection
175.
LED fluorescence detection
176.
leg detection
177.
light detection and ranging
178.
light detection and ranging (LiDAR)
179.
Light Detection and Ranging (LiDAR) point cloud
180.
limit of detection
181.
lock-in detection
182.
loop-closure detection
183.
malware detection
184.
marker detection
185.
mobile malware detection
186.
money laundering detection systems
187.
monitoring and detection
188.
multi-classed object detection
189.
Multi-valued Simulation for Hazard Detection in Digital Circuits
190.
mutant detection
191.
network anomaly detection
192.
nodules detection
193.
object detection
194.
oil-spill detection
195.
outlier’s detection methods
196.
outliers detection
197.
peak detection
198.
phytoplankton detection methods
199.
plagiarism detection
200.
position detection
201.
precursor detection
202.
propaganda detection
203.
protein detection
204.
proton detection
205.
radar detection
206.
ramp event detection
207.
recycled FPGA detection
208.
residual current detection
209.
robust detection
210.
scene text detection
211.
short-circuit detection
212.
Side-Channel Attack Detection
213.
small molecule detection
214.
speech activity detection
215.
Suicidal ideation detection
216.
synchronous detection
217.
topic detection
218.
tyre detection
219.
unmanned aerial vehicle detection systems
220.
unsupervised outlier detection
221.
UV detection
222.
vehicle detection
223.
vortex detection
224.
3D lane detection
subject term
4
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT