Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
network security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
5
Vaata veel..
(3/331)
Ekspordi
ekspordi kõik päringu tulemused
(5)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
Blumbergs, Bernhards
;
Vaarandi, Risto
MILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 2017
2017
/
p. 707-712
https://doi.org/10.1109/MILCOM.2017.8170785
Conference proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
2
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
3
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kamerabasiertes Monitoring von Fischen in Deutschland und der Schweiz
Haas, Christian
;
Meyer, Matthias
;
Schmalz, Maria
;
Tuhtan, Jeffrey Andrew
WasserWirtschaft
2024
/
p. 19 - 29
https://doi.org/10.1007/s35147-024-2401-1
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Network IDS alert classification with active learning techniques
Vaarandi, Risto
;
Guerra-Manzanares, Alejandro
Journal of Information Security and Applications
2024
/
art. 103687
https://doi.org/10.1016/j.jisa.2023.103687
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
5
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Stream clustering guided supervised learning for classifying NIDS alerts
Vaarandi, Risto
;
Guerra Manzanares, Alejandro
Future generation computer systems
2024
/
p. 231-244 : ill
https://doi.org/10.1016/j.future.2024.01.032
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 5, kuvan
1 - 5
võtmesõna
325
1.
network security
2.
network security monitoring
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security monitoring
15.
cyber security strategies
16.
cyber-security
17.
data and information security
18.
data security
19.
development of security cameras
20.
digital security practices
21.
drinking water security
22.
economic security
23.
economic security of enterprise
24.
emotional security
25.
energy security
26.
energy security indicator
27.
Estonian information security standard
28.
graded security
29.
hardware security
30.
hardware security primitive
31.
high level of security
32.
Homeland security
33.
human security
34.
information security
35.
information security and privacy
36.
initial level of security
37.
internal security
38.
international security
39.
investment and innovation security
40.
IPv6 security
41.
IT security
42.
IT security management
43.
job security
44.
long-term security
45.
maritime cyber security
46.
maritime cyber security operations centers
47.
Maritime Security Operations Center (M-SOC)
48.
medium level of security
49.
metadata model for security measures
50.
Middle Eastern security
51.
Mobile security
52.
national cyber security strategy
53.
national security
54.
NATO. Science for Peace and Security Program
55.
OSCE (Organization for Security and Co-operation in Europe)
56.
passenger’s security
57.
policy-based routing security
58.
political and security cultures
59.
post-quantum security
60.
power system security
61.
quantitative security
62.
regional security
63.
RISC-V Security Verification
64.
Safety and Security in Sea Transportation
65.
safety and security testing
66.
security
67.
security adaptation
68.
security alert prioritization
69.
security analysis
70.
security and justice (AFSJ)
71.
Security and political science
72.
security and privacy
73.
security and privacy in smart grids
74.
Security Assertion Mining
75.
security closure
76.
Security Coverage
77.
security dataset
78.
security dilemma
79.
Security evaluation
80.
security evaluation instruments
81.
Security Level Evaluation
82.
Security limitations
83.
security log analysis
84.
security management
85.
security model
86.
security monitoring
87.
security notion
88.
security objectives
89.
security of data
90.
security of supply
91.
security operation center
92.
security operations center
93.
security patterns
94.
security policy
95.
security problem definition
96.
security proof
97.
security protocols
98.
security requirements
99.
security requirements engineering
100.
security research
101.
security risk assessment
102.
security risk management
103.
security risks
104.
security science and technology
105.
security strategies
106.
security systems for military objects
107.
security testing
108.
security training
109.
security verification
110.
security-by-design
111.
social security planning
112.
societal security
113.
software security
114.
software security level
115.
software security subcharacteristics
116.
sufficient level of security
117.
system of economic security
118.
system security
119.
terrorism security
120.
transmission System Security
121.
voting privacy and security
122.
active distribution network management
123.
Adaptive network-based fuzzy inference system (ANFIS)
124.
aec distribution network
125.
analytical flow network analysis
126.
analytical network process
127.
ANDROID network
128.
artificial neural network
129.
A-source network
130.
autoservice network
131.
Bayesian belief network (BBN)
132.
bayesian network (BN)
133.
Binarized Neural Network (BNN)
134.
building site network
135.
business network model
136.
cable network
137.
carbon nanotube network
138.
cascaded forward neural network (CFNN)
139.
cognitive body area network
140.
collaborative network
141.
computer network management
142.
computer network operations
143.
connection network codes
144.
Controller Area Network
145.
Convolutional Neural Network
146.
convolutional neural network (CNN)
147.
coolant network
148.
deep convolutional neural network
149.
deep learning network
150.
deep neural network
151.
deep neural network compression
152.
DH network
153.
distribution network
154.
distribution network
155.
district heat network
156.
district heating network
157.
electric network analysis
158.
electric network parameters
159.
electrical network
160.
emergency network
161.
Event Processing Network (EPN)
162.
Event Processing Network Model
163.
feedforward neural network (FFNN)
164.
flow network analysis
165.
flow network parameters
166.
Fully Convolutional Network (FCN)
167.
Generative Adversarial Network (GaN)
168.
global innovation network
169.
Graph Convolutional Neural Network (GCN)
170.
GraphSAGE (Graph Based Neural Network)
171.
heterogeneous network
172.
hydraulic network model
173.
hypar-network
174.
impedance network
175.
impedance network
176.
impedance source (IS) network
177.
Impedance Source Network
178.
impedance-source network
179.
in-network data processing
180.
innovation network
181.
innovation network agent
182.
joint network-channel coding
183.
knowledge network
184.
levelling network
185.
line impedance stabilization network
186.
linear Delta robots neural network based model
187.
LSTM neural network
188.
lumped parameter network
189.
lumped parameter thermal network
190.
lumped-parameter thermal network
191.
Magnetically Coupled Impedance Source Network (MCIS)
192.
memory network
193.
Mesh Network
194.
modified network cohesion
195.
MRAN (minimum resource allocation network)
196.
nanosheets network
197.
NB-IoT network
198.
NetFlow based network monitoring
199.
network
200.
network access charges
201.
network analysis
202.
network anomaly detection
203.
network architecture
204.
network calculus
205.
network characteristics
206.
network communication technologies
207.
network constraint
208.
network disaggregation
209.
network dynamics
210.
network expansion planning
211.
network externality
212.
network forensics
213.
network function virtualization
214.
network functions virtualization (NFV)
215.
network games
216.
network governance
217.
network IDS alert classification
218.
network industries
219.
network industry
220.
network intrusion detection system
221.
network latencies
222.
network layer
223.
Network lifetime
224.
network measurement
225.
network monitoring
226.
network of co-authorships
227.
network on chip
228.
Network on Chip (NoC)
229.
network partners
230.
network protocol reverse engineering
231.
network protocols
232.
Network QoS
233.
network quality
234.
Network reliability
235.
network resilience
236.
network safety ranking
237.
network slicing
238.
network sparsification
239.
network studies
240.
network theory
241.
network topologies
242.
network topology
243.
network uncertainties
244.
Network visualization
245.
network-on-chip
246.
network-on-ReRAM
247.
network-testing
248.
neural network
249.
neural network architecture search
250.
neural network controller
251.
neural network modelling
252.
neural network models
253.
neural network positioning algorithms
254.
neural network predictive controller
255.
nitrogen-cycling network
256.
non-public network
257.
non-terrestrial network
258.
open value network
259.
partner network
260.
partner network
261.
partner network (PN)
262.
partner network maturity
263.
passive switched capacitor network
264.
PC-corr network
265.
peer to peer network
266.
performance dialogue network
267.
personal area network applications
268.
pervasive public safety network
269.
phosphotransfer network
270.
power delivery network
271.
power distribution network
272.
production in network
273.
proteomic network
274.
public safety network
275.
qZS network
276.
quasi-impedance-source network
277.
quasi-Z-source network
278.
Radial Basis Function Neural Network (RBFNN)
279.
radio access network
280.
radio access network (RAN)
281.
radio access network subslicing
282.
random resistor network
283.
recurrent neural network language model
284.
reluctance network (RN)
285.
research network
286.
Residual Neural Network
287.
road network
288.
roof network
289.
route network
290.
self organizing network
291.
smart distribution network
292.
SMEs network
293.
social network
294.
social network analysis
295.
software-defined network
296.
spiking neural network (SNN)
297.
stretchable network
298.
support network activities
299.
sustainable partner network
300.
sustainable partner network (SPN)
301.
switched capacitor inductor network (SCLN)
302.
Z-source network
303.
technology transfer network
304.
telecommunication network management
305.
telecommunication network performance
306.
Ternary Neural Network
307.
the influence of DHW consumption on dimensioning the DH network
308.
thermal network
309.
tide gauge network
310.
transformer-based neural network
311.
UAV-enabled network
312.
underwater sensor network
313.
Urban Network
314.
utility network
315.
value network analysis
316.
water distribution network
317.
wireless ad hoq network
318.
wireless body area network
319.
Wireless Body Area Network (WBAN)
320.
wireless network
321.
wireless sensor network
322.
wireless sensor network (WSN)
323.
wsn (wireless sensor network)
324.
3D graphene network
325.
3D network topology visualization
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
European Access Network
4.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
TTÜ märksõna
2
1.
Erasmus Student Network
2.
Islamic Public Value Network
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT