Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
network security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(3/266)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
Blumbergs, Bernhards
;
Vaarandi, Risto
MILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 2017
2017
/
p. 707-712
https://doi.org/10.1109/MILCOM.2017.8170785
artikkel kogumikus
2
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
261
1.
network security
2.
network security monitoring
3.
ad-hoc sensor networks security
4.
Blockchain security
5.
cache security
6.
communication system security
7.
comprehensive system of economic security
8.
computer security
9.
cooperative security dilemma
10.
cyber security
11.
cyber security education
12.
cyber security exercises
13.
cyber security strategies
14.
cyber-security
15.
data security
16.
development of security cameras
17.
drinking water security
18.
economic security
19.
economic security of enterprise
20.
emotional security
21.
energy security
22.
energy security indicator
23.
graded security
24.
hardware security
25.
hardware security primitive
26.
human security
27.
information security
28.
internal security
29.
international security
30.
investment and innovation security
31.
IPv6 security
32.
IT security
33.
job security
34.
long-term security
35.
metadata model for security measures
36.
Middle Eastern security
37.
Mobile security
38.
national cyber security strategy
39.
national security
40.
NATO. Science for Peace and Security Program
41.
OSCE (Organization for Security and Co-operation in Europe)
42.
passenger’s security
43.
policy-based routing security
44.
political and security cultures
45.
post-quantum security
46.
power system security
47.
quantitative security
48.
regional security
49.
security
50.
security and privacy
51.
security and privacy in smart grids
52.
security closure
53.
Security Coverage
54.
security dataset
55.
security dilemma
56.
Security evaluation
57.
security log analysis
58.
security management
59.
security model
60.
security monitoring
61.
security notion
62.
security objectives
63.
security of data
64.
security of supply
65.
security operation center
66.
security patterns
67.
security problem definition
68.
security proof
69.
security protocols
70.
security requirements
71.
security requirements engineering
72.
security risk assessment
73.
security risk management
74.
security strategies
75.
security systems for military objects
76.
security testing
77.
security training
78.
security verification
79.
social security planning
80.
societal security
81.
system of economic security
82.
system security
83.
terrorism security
84.
transmission System Security
85.
voting privacy and security
86.
active distribution network management
87.
Adaptive network-based fuzzy inference system (ANFIS)
88.
analytical flow network analysis
89.
analytical network process
90.
ANDROID network
91.
artificial neural network
92.
Artificial neural network (ANN)
93.
A-source network
94.
autoservice network
95.
Bayesian belief network (BBN)
96.
Binarized Neural Network (BNN)
97.
building site network
98.
business network model
99.
cable network
100.
cascaded forward neural network (CFNN)
101.
cognitive body area network
102.
collaborative network
103.
computer network management
104.
computer network operations
105.
connection network codes
106.
Convolutional Neural Network
107.
convolutional neural network (CNN)
108.
coolant network
109.
deep convolutional neural network
110.
deep learning network
111.
deep neural network
112.
deep neural network compression
113.
DH network
114.
distribution network
115.
distribution network
116.
district heat network
117.
district heating network
118.
electric network parameters
119.
electrical network
120.
emergency network
121.
Event Processing Network (EPN)
122.
Event Processing Network Model
123.
feedforward neural network (FFNN)
124.
flow network analysis
125.
flow network parameters
126.
Fully Convolutional Network (FCN)
127.
Generative Adversarial Network (GaN)
128.
global innovation network
129.
Graph Convolutional Neural Network (GCN)
130.
GraphSAGE (Graph Based Neural Network)
131.
heterogeneous network
132.
hydraulic network model
133.
hypar-network
134.
impedance network
135.
impedance network
136.
impedance source (IS) network
137.
Impedance Source Network
138.
impedance-source network
139.
in-network data processing
140.
innovation network
141.
innovation network agent
142.
joint network-channel coding
143.
knowledge network
144.
levelling network
145.
lumped parameter network
146.
lumped parameter thermal network
147.
lumped-parameter thermal network
148.
Magnetically Coupled Impedance Source Network (MCIS)
149.
memory network
150.
Mesh Network
151.
modified network cohesion
152.
MRAN (minimum resource allocation network)
153.
nanosheets network
154.
NB-IoT network
155.
NetFlow based network monitoring
156.
network
157.
network access charges
158.
network analysis
159.
network anomaly detection
160.
network architecture
161.
network calculus
162.
network characteristics
163.
network communication technologies
164.
network constraint
165.
network expansion planning
166.
network forensics
167.
network function virtualization
168.
network functions virtualization (NFV)
169.
network games
170.
network governance
171.
network IDS alert classification
172.
network industries
173.
network industry
174.
network latencies
175.
network layer
176.
Network lifetime
177.
network measurement
178.
network monitoring
179.
network of co-authorships
180.
network on chip
181.
Network on Chip (NoC)
182.
network partners
183.
network protocol reverse engineering
184.
network protocols
185.
Network QoS
186.
network quality
187.
Network reliability
188.
network safety ranking
189.
network studies
190.
network theory
191.
network topologies
192.
network topology
193.
network uncertainties
194.
Network visualization
195.
network-on-chip
196.
network-on-ReRAM
197.
network-testing
198.
neural network
199.
neural network architecture search
200.
neural network controller
201.
neural network predictive controller
202.
nitrogen-cycling network
203.
open value network
204.
partner network
205.
partner network
206.
partner network (PN)
207.
partner network maturity
208.
passive switched capacitor network
209.
PC-corr network
210.
peer to peer network
211.
performance dialogue network
212.
personal area network applications
213.
pervasive public safety network
214.
phosphotransfer network
215.
power delivery network
216.
power distribution network
217.
production in network
218.
proteomic network
219.
public safety network
220.
qZS network
221.
quasi-impedance-source network
222.
quasi-Z-source network
223.
Radial Basis Function Neural Network (RBFNN)
224.
radio access network (RAN)
225.
radio access network subslicing
226.
random resistor network
227.
recurrent neural network language model
228.
reluctance network (RN)
229.
research network
230.
road network
231.
roof network
232.
route network
233.
self organizing network
234.
smart distribution network
235.
SMEs network
236.
social network
237.
social network analysis
238.
software-defined network
239.
support network activities
240.
sustainable partner network
241.
sustainable partner network (SPN)
242.
switched capacitor inductor network (SCLN)
243.
Z-source network
244.
technology transfer network
245.
telecommunication network management
246.
Ternary Neural Network
247.
the influence of DHW consumption on dimensioning the DH network
248.
thermal network
249.
tide gauge network
250.
underwater sensor network
251.
utility network
252.
value network analysis
253.
water distribution network
254.
wireless ad hoq network
255.
wireless body area network
256.
Wireless Body Area Network (WBAN)
257.
wireless network
258.
wireless sensor network
259.
wsn (wireless sensor network)
260.
3D graphene network
261.
3D network topology visualization
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
European Access Network
4.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
TTÜ märksõna
1
1.
Erasmus Student Network
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT