Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
network security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
6
Vaata veel..
(3/347)
Ekspordi
ekspordi kõik päringu tulemused
(6)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
Blumbergs, Bernhards
;
Vaarandi, Risto
MILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 2017
2017
/
p. 707-712
https://doi.org/10.1109/MILCOM.2017.8170785
Conference proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
2
artikkel kogumikus EST
/
artikkel kogumikus ENG
Does fault tolerance safeguard DNNs against bitfiip attacks? A case study
Ahmadilivani, Mohammad Hasan
;
Kobayashi, Yuto
;
Raik, Jaan
;
Daneshtalab, Masoud
;
Jenihhin, Maksim
2025 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)
2025
/
p. 1-4
https://doi.org/10.1109/DFT66274.2025.11257506
Conference proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
3
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kamerabasiertes Monitoring von Fischen in Deutschland und der Schweiz
Haas, Christian
;
Meyer, Matthias
;
Schmalz, Maria
;
Tuhtan, Jeffrey Andrew
WasserWirtschaft
2024
/
p. 19 - 29
https://doi.org/10.1007/s35147-024-2401-1
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
5
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Network IDS alert classification with active learning techniques
Vaarandi, Risto
;
Guerra-Manzanares, Alejandro
Journal of Information Security and Applications
2024
/
art. 103687
https://doi.org/10.1016/j.jisa.2023.103687
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
6
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Stream clustering guided supervised learning for classifying NIDS alerts
Vaarandi, Risto
;
Guerra Manzanares, Alejandro
Future generation computer systems
2024
/
p. 231-244 : ill
https://doi.org/10.1016/j.future.2024.01.032
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 6, kuvan
1 - 6
võtmesõna
341
1.
network security
2.
network security monitoring
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
cloud security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security monitoring in maritime
17.
cyber security strategies
18.
cyber-physical system security
19.
cyber-security
20.
data and information security
21.
data security
22.
development of security cameras
23.
digital security practices
24.
drinking water security
25.
economic security
26.
economic security of enterprise
27.
emotional security
28.
energy security
29.
energy security indicator
30.
Estonian information security standard
31.
graded security
32.
hardware security
33.
hardware security primitive
34.
high level of security
35.
Homeland security
36.
human security
37.
information security
38.
information security and privacy
39.
initial level of security
40.
internal security
41.
international security
42.
investment and innovation security
43.
IPv6 security
44.
IT security
45.
IT security management
46.
job security
47.
long-term security
48.
maritime cyber security
49.
maritime cyber security operations centers
50.
Maritime Security Operations Center (M-SOC)
51.
medium level of security
52.
metadata model for security measures
53.
Middle Eastern security
54.
Mobile security
55.
national cyber security strategy
56.
national security
57.
NATO. Science for Peace and Security Program
58.
OSCE (Organization for Security and Co-operation in Europe)
59.
passenger’s security
60.
policy-based routing security
61.
political and security cultures
62.
post-quantum security
63.
power system security
64.
quantitative security
65.
regional security
66.
RISC-V Security Verification
67.
safety and security in sea transportation
68.
safety and security testing
69.
security
70.
security adaptation
71.
security alert prioritization
72.
security analysis
73.
security and justice (AFSJ)
74.
Security and political science
75.
security and privacy
76.
security and privacy in smart grids
77.
Security Assertion
78.
Security Assertion Mining
79.
security closure
80.
Security Coverage
81.
security dataset
82.
security dilemma
83.
Security evaluation
84.
security evaluation instruments
85.
Security Level Evaluation
86.
Security limitations
87.
security log analysis
88.
security management
89.
security model
90.
security monitoring
91.
security notion
92.
security objectives
93.
security of data
94.
security of supply
95.
security operation center
96.
security operations center
97.
security patterns
98.
security policy
99.
security problem definition
100.
security proof
101.
security protocols
102.
security requirements
103.
security requirements engineering
104.
security research
105.
security risk assessment
106.
security risk management
107.
security risks
108.
security science and technology
109.
security strategies
110.
security systems
111.
security systems for military objects
112.
security testing
113.
security training
114.
security verification
115.
security-by-design
116.
social security planning
117.
societal security
118.
software security
119.
software security level
120.
software security subcharacteristics
121.
sufficient level of security
122.
system of economic security
123.
system security
124.
terrorism security
125.
transmission System Security
126.
voting privacy and security
127.
active distribution network management
128.
Adaptive network-based fuzzy inference system (ANFIS)
129.
aec distribution network
130.
analytical flow network analysis
131.
analytical network process
132.
ANDROID network
133.
artificial neural network
134.
A-source network
135.
autoservice network
136.
back propagation neural network
137.
Bayesian belief network (BBN)
138.
bayesian network (BN)
139.
Binarized Neural Network (BNN)
140.
building site network
141.
business network model
142.
cable network
143.
carbon nanotube network
144.
cascaded forward neural network (CFNN)
145.
cognitive body area network
146.
collaborative network
147.
computer network management
148.
computer network operations
149.
connection network codes
150.
Controller Area Network
151.
Convolutional Neural Network
152.
convolutional neural network (CNN)
153.
coolant network
154.
decentralized content-addressable storage network
155.
deep convolutional neural network
156.
deep learning network
157.
deep neural network
158.
deep neural network compression
159.
deep Q-network
160.
DH network
161.
distribution network
162.
distribution network
163.
district heat network
164.
district heating network
165.
double deep Q-network
166.
dynamic network
167.
electric network analysis
168.
electric network parameters
169.
electrical network
170.
emergency network
171.
Event Processing Network (EPN)
172.
Event Processing Network Model
173.
feedforward neural network (FFNN)
174.
flow network analysis
175.
flow network parameters
176.
flying inductor network
177.
Fully Convolutional Network (FCN)
178.
Generative Adversarial Network (GaN)
179.
global innovation network
180.
global network alignment
181.
Graph Convolutional Neural Network (GCN)
182.
GraphSAGE (Graph Based Neural Network)
183.
heterogeneous network
184.
hydraulic network model
185.
hypar-network
186.
impedance network
187.
impedance network
188.
impedance source (IS) network
189.
Impedance Source Network
190.
impedance-source network
191.
in-network data processing
192.
innovation network
193.
innovation network agent
194.
joint network-channel coding
195.
knowledge network
196.
levelling network
197.
line impedance stabilization network
198.
linear Delta robots neural network based model
199.
local network alignment
200.
LSTM neural network
201.
lumped parameter network
202.
lumped parameter thermal network
203.
lumped-parameter thermal network
204.
Magnetically Coupled Impedance Source Network (MCIS)
205.
memory network
206.
Mesh Network
207.
modified network cohesion
208.
MRAN (minimum resource allocation network)
209.
nanosheets network
210.
NB-IoT network
211.
NetFlow based network monitoring
212.
network
213.
network access charges
214.
network analysis
215.
network anomaly detection
216.
network architecture
217.
network calculus
218.
network characteristics
219.
network communication technologies
220.
network constraint
221.
network disaggregation
222.
network dynamics
223.
network expansion planning
224.
network externality
225.
network forensics
226.
network function virtualization
227.
network functions virtualization (NFV)
228.
network games
229.
network governance
230.
network IDS alert classification
231.
network industries
232.
network industry
233.
network intrusion detection system
234.
network latencies
235.
network layer
236.
Network lifetime
237.
network measurement
238.
network monitoring
239.
network of co-authorships
240.
network on chip
241.
Network on Chip (NoC)
242.
network partners
243.
network planning
244.
network protocol reverse engineering
245.
network protocols
246.
Network QoS
247.
network quality
248.
Network reliability
249.
network resilience
250.
network safety ranking
251.
network slicing
252.
network sparsification
253.
network studies
254.
network theory
255.
network topologies
256.
network topology
257.
network uncertainties
258.
Network visualization
259.
network-on-chip
260.
network-on-ReRAM
261.
network-testing
262.
neural network
263.
neural network architecture search
264.
neural network controller
265.
neural network modelling
266.
neural network models
267.
neural network positioning algorithms
268.
neural network predictive controller
269.
nitrogen-cycling network
270.
non-public network
271.
non-terrestrial network
272.
open value network
273.
partner network
274.
partner network
275.
partner network (PN)
276.
partner network maturity
277.
passive switched capacitor network
278.
PC-corr network
279.
peer to peer network
280.
performance dialogue network
281.
personal area network applications
282.
pervasive public safety network
283.
phosphotransfer network
284.
power delivery network
285.
power distribution network
286.
production in network
287.
proteomic network
288.
public safety network
289.
qZS network
290.
qualitative network analysis
291.
quasi-impedance-source network
292.
quasi-Z-source network
293.
Radial Basis Function Neural Network (RBFNN)
294.
radio access network
295.
radio access network (RAN)
296.
radio access network subslicing
297.
random resistor network
298.
Recurrent Neural Network
299.
recurrent neural network language model
300.
reluctance network (RN)
301.
research network
302.
Residual Neural Network
303.
road network
304.
roof network
305.
route network
306.
self organizing network
307.
smart distribution network
308.
SMEs network
309.
social network
310.
social network analysis
311.
software-defined network
312.
spiking neural network (SNN)
313.
stretchable network
314.
support network activities
315.
sustainable partner network
316.
sustainable partner network (SPN)
317.
switched capacitor inductor network (SCLN)
318.
Z-source network
319.
technology transfer network
320.
telecommunication network management
321.
telecommunication network performance
322.
Ternary Neural Network
323.
the influence of DHW consumption on dimensioning the DH network
324.
thermal network
325.
tide gauge network
326.
transformer-based neural network
327.
UAV-enabled network
328.
underwater sensor network
329.
Urban Network
330.
utility network
331.
value network analysis
332.
water distribution network
333.
wireless ad hoq network
334.
wireless body area network
335.
Wireless Body Area Network (WBAN)
336.
wireless network
337.
wireless sensor network
338.
wireless sensor network (WSN)
339.
wsn (wireless sensor network)
340.
3D graphene network
341.
3D network topology visualization
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
European Access Network
4.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
TTÜ märksõna
2
1.
Erasmus Student Network
2.
Islamic Public Value Network
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT