Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
network security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
5
Vaata veel..
(3/330)
Ekspordi
ekspordi kõik päringu tulemused
(5)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
Blumbergs, Bernhards
;
Vaarandi, Risto
MILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 2017
2017
/
p. 707-712
https://doi.org/10.1109/MILCOM.2017.8170785
Conference proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
2
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
3
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kamerabasiertes Monitoring von Fischen in Deutschland und der Schweiz
Haas, Christian
;
Meyer, Matthias
;
Schmalz, Maria
;
Tuhtan, Jeffrey Andrew
WasserWirtschaft
2024
/
p. 19 - 29
https://doi.org/10.1007/s35147-024-2401-1
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Network IDS alert classification with active learning techniques
Vaarandi, Risto
;
Guerra-Manzanares, Alejandro
Journal of Information Security and Applications
2024
/
art. 103687
https://doi.org/10.1016/j.jisa.2023.103687
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
5
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Stream clustering guided supervised learning for classifying NIDS alerts
Vaarandi, Risto
;
Guerra Manzanares, Alejandro
Future generation computer systems
2024
/
p. 231-244 : ill
https://doi.org/10.1016/j.future.2024.01.032
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 5, kuvan
1 - 5
võtmesõna
324
1.
network security
2.
network security monitoring
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security monitoring
15.
cyber security strategies
16.
cyber-security
17.
data and information security
18.
data security
19.
development of security cameras
20.
digital security practices
21.
drinking water security
22.
economic security
23.
economic security of enterprise
24.
emotional security
25.
energy security
26.
energy security indicator
27.
Estonian information security standard
28.
graded security
29.
hardware security
30.
hardware security primitive
31.
high level of security
32.
Homeland security
33.
human security
34.
information security
35.
information security and privacy
36.
initial level of security
37.
internal security
38.
international security
39.
investment and innovation security
40.
IPv6 security
41.
IT security
42.
IT security management
43.
job security
44.
long-term security
45.
maritime cyber security
46.
maritime cyber security operations centers
47.
Maritime Security Operations Center (M-SOC)
48.
medium level of security
49.
metadata model for security measures
50.
Middle Eastern security
51.
Mobile security
52.
national cyber security strategy
53.
national security
54.
NATO. Science for Peace and Security Program
55.
OSCE (Organization for Security and Co-operation in Europe)
56.
passenger’s security
57.
policy-based routing security
58.
political and security cultures
59.
post-quantum security
60.
power system security
61.
quantitative security
62.
regional security
63.
RISC-V Security Verification
64.
Safety and Security in Sea Transportation
65.
safety and security testing
66.
security
67.
security adaptation
68.
security alert prioritization
69.
security analysis
70.
security and justice (AFSJ)
71.
Security and political science
72.
security and privacy
73.
security and privacy in smart grids
74.
Security Assertion Mining
75.
security closure
76.
Security Coverage
77.
security dataset
78.
security dilemma
79.
Security evaluation
80.
security evaluation instruments
81.
Security limitations
82.
security log analysis
83.
security management
84.
security model
85.
security monitoring
86.
security notion
87.
security objectives
88.
security of data
89.
security of supply
90.
security operation center
91.
security operations center
92.
security patterns
93.
security policy
94.
security problem definition
95.
security proof
96.
security protocols
97.
security requirements
98.
security requirements engineering
99.
security research
100.
security risk assessment
101.
security risk management
102.
security risks
103.
security science and technology
104.
security strategies
105.
security systems for military objects
106.
security testing
107.
security training
108.
security verification
109.
security-by-design
110.
social security planning
111.
societal security
112.
software security
113.
software security level
114.
software security subcharacteristics
115.
sufficient level of security
116.
system of economic security
117.
system security
118.
terrorism security
119.
transmission System Security
120.
voting privacy and security
121.
active distribution network management
122.
Adaptive network-based fuzzy inference system (ANFIS)
123.
aec distribution network
124.
analytical flow network analysis
125.
analytical network process
126.
ANDROID network
127.
artificial neural network
128.
A-source network
129.
autoservice network
130.
Bayesian belief network (BBN)
131.
bayesian network (BN)
132.
Binarized Neural Network (BNN)
133.
building site network
134.
business network model
135.
cable network
136.
carbon nanotube network
137.
cascaded forward neural network (CFNN)
138.
cognitive body area network
139.
collaborative network
140.
computer network management
141.
computer network operations
142.
connection network codes
143.
Controller Area Network
144.
Convolutional Neural Network
145.
convolutional neural network (CNN)
146.
coolant network
147.
deep convolutional neural network
148.
deep learning network
149.
deep neural network
150.
deep neural network compression
151.
DH network
152.
distribution network
153.
distribution network
154.
district heat network
155.
district heating network
156.
electric network analysis
157.
electric network parameters
158.
electrical network
159.
emergency network
160.
Event Processing Network (EPN)
161.
Event Processing Network Model
162.
feedforward neural network (FFNN)
163.
flow network analysis
164.
flow network parameters
165.
Fully Convolutional Network (FCN)
166.
Generative Adversarial Network (GaN)
167.
global innovation network
168.
Graph Convolutional Neural Network (GCN)
169.
GraphSAGE (Graph Based Neural Network)
170.
heterogeneous network
171.
hydraulic network model
172.
hypar-network
173.
impedance network
174.
impedance network
175.
impedance source (IS) network
176.
Impedance Source Network
177.
impedance-source network
178.
in-network data processing
179.
innovation network
180.
innovation network agent
181.
joint network-channel coding
182.
knowledge network
183.
levelling network
184.
line impedance stabilization network
185.
linear Delta robots neural network based model
186.
LSTM neural network
187.
lumped parameter network
188.
lumped parameter thermal network
189.
lumped-parameter thermal network
190.
Magnetically Coupled Impedance Source Network (MCIS)
191.
memory network
192.
Mesh Network
193.
modified network cohesion
194.
MRAN (minimum resource allocation network)
195.
nanosheets network
196.
NB-IoT network
197.
NetFlow based network monitoring
198.
network
199.
network access charges
200.
network analysis
201.
network anomaly detection
202.
network architecture
203.
network calculus
204.
network characteristics
205.
network communication technologies
206.
network constraint
207.
network disaggregation
208.
network dynamics
209.
network expansion planning
210.
network externality
211.
network forensics
212.
network function virtualization
213.
network functions virtualization (NFV)
214.
network games
215.
network governance
216.
network IDS alert classification
217.
network industries
218.
network industry
219.
network intrusion detection system
220.
network latencies
221.
network layer
222.
Network lifetime
223.
network measurement
224.
network monitoring
225.
network of co-authorships
226.
network on chip
227.
Network on Chip (NoC)
228.
network partners
229.
network protocol reverse engineering
230.
network protocols
231.
Network QoS
232.
network quality
233.
Network reliability
234.
network resilience
235.
network safety ranking
236.
network slicing
237.
network sparsification
238.
network studies
239.
network theory
240.
network topologies
241.
network topology
242.
network uncertainties
243.
Network visualization
244.
network-on-chip
245.
network-on-ReRAM
246.
network-testing
247.
neural network
248.
neural network architecture search
249.
neural network controller
250.
neural network modelling
251.
neural network models
252.
neural network positioning algorithms
253.
neural network predictive controller
254.
nitrogen-cycling network
255.
non-public network
256.
non-terrestrial network
257.
open value network
258.
partner network
259.
partner network
260.
partner network (PN)
261.
partner network maturity
262.
passive switched capacitor network
263.
PC-corr network
264.
peer to peer network
265.
performance dialogue network
266.
personal area network applications
267.
pervasive public safety network
268.
phosphotransfer network
269.
power delivery network
270.
power distribution network
271.
production in network
272.
proteomic network
273.
public safety network
274.
qZS network
275.
quasi-impedance-source network
276.
quasi-Z-source network
277.
Radial Basis Function Neural Network (RBFNN)
278.
radio access network
279.
radio access network (RAN)
280.
radio access network subslicing
281.
random resistor network
282.
recurrent neural network language model
283.
reluctance network (RN)
284.
research network
285.
Residual Neural Network
286.
road network
287.
roof network
288.
route network
289.
self organizing network
290.
smart distribution network
291.
SMEs network
292.
social network
293.
social network analysis
294.
software-defined network
295.
spiking neural network (SNN)
296.
stretchable network
297.
support network activities
298.
sustainable partner network
299.
sustainable partner network (SPN)
300.
switched capacitor inductor network (SCLN)
301.
Z-source network
302.
technology transfer network
303.
telecommunication network management
304.
telecommunication network performance
305.
Ternary Neural Network
306.
the influence of DHW consumption on dimensioning the DH network
307.
thermal network
308.
tide gauge network
309.
transformer-based neural network
310.
UAV-enabled network
311.
underwater sensor network
312.
Urban Network
313.
utility network
314.
value network analysis
315.
water distribution network
316.
wireless ad hoq network
317.
wireless body area network
318.
Wireless Body Area Network (WBAN)
319.
wireless network
320.
wireless sensor network
321.
wireless sensor network (WSN)
322.
wsn (wireless sensor network)
323.
3D graphene network
324.
3D network topology visualization
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
European Access Network
4.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
TTÜ märksõna
2
1.
Erasmus Student Network
2.
Islamic Public Value Network
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT