Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
network security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
5
Vaata veel..
(3/315)
Ekspordi
ekspordi kõik päringu tulemused
(5)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
Blumbergs, Bernhards
;
Vaarandi, Risto
MILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 2017
2017
/
p. 707-712
https://doi.org/10.1109/MILCOM.2017.8170785
Conference proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
2
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
3
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kamerabasiertes Monitoring von Fischen in Deutschland und der Schweiz
Haas, Christian
;
Meyer, Matthias
;
Schmalz, Maria
;
Tuhtan, Jeffrey Andrew
WasserWirtschaft
2024
/
p. 19 - 29
https://doi.org/10.1007/s35147-024-2401-1
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Network IDS alert classification with active learning techniques
Vaarandi, Risto
;
Guerra-Manzanares, Alejandro
Journal of Information Security and Applications
2024
/
art. 103687
https://doi.org/10.1016/j.jisa.2023.103687
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
5
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Stream clustering guided supervised learning for classifying NIDS alerts
Vaarandi, Risto
;
Guerra Manzanares, Alejandro
Future generation computer systems
2024
/
p. 231-244 : ill
https://doi.org/10.1016/j.future.2024.01.032
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 5, kuvan
1 - 5
võtmesõna
310
1.
network security
2.
network security monitoring
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security monitoring
15.
cyber security strategies
16.
cyber-security
17.
data and information security
18.
data security
19.
development of security cameras
20.
digital security practices
21.
drinking water security
22.
economic security
23.
economic security of enterprise
24.
emotional security
25.
energy security
26.
energy security indicator
27.
Estonian information security standard
28.
graded security
29.
hardware security
30.
hardware security primitive
31.
human security
32.
information security
33.
information security and privacy
34.
internal security
35.
international security
36.
investment and innovation security
37.
IPv6 security
38.
IT security
39.
IT security management
40.
job security
41.
long-term security
42.
metadata model for security measures
43.
Middle Eastern security
44.
Mobile security
45.
national cyber security strategy
46.
national security
47.
NATO. Science for Peace and Security Program
48.
OSCE (Organization for Security and Co-operation in Europe)
49.
passenger’s security
50.
policy-based routing security
51.
political and security cultures
52.
post-quantum security
53.
power system security
54.
quantitative security
55.
regional security
56.
RISC-V Security Verification
57.
Safety and Security in Sea Transportation
58.
safety and security testing
59.
security
60.
security adaptation
61.
security alert prioritization
62.
security analysis
63.
security and justice (AFSJ)
64.
Security and political science
65.
security and privacy
66.
security and privacy in smart grids
67.
Security Assertion Mining
68.
security closure
69.
Security Coverage
70.
security dataset
71.
security dilemma
72.
Security evaluation
73.
security evaluation instruments
74.
Security limitations
75.
security log analysis
76.
security management
77.
security model
78.
security monitoring
79.
security notion
80.
security objectives
81.
security of data
82.
security of supply
83.
security operation center
84.
security operations center
85.
security patterns
86.
security policy
87.
security problem definition
88.
security proof
89.
security protocols
90.
security requirements
91.
security requirements engineering
92.
security risk assessment
93.
security risk management
94.
security risks
95.
security science and technology
96.
security strategies
97.
security systems for military objects
98.
security testing
99.
security training
100.
security verification
101.
security-by-design
102.
social security planning
103.
societal security
104.
system of economic security
105.
system security
106.
terrorism security
107.
transmission System Security
108.
voting privacy and security
109.
active distribution network management
110.
Adaptive network-based fuzzy inference system (ANFIS)
111.
aec distribution network
112.
analytical flow network analysis
113.
analytical network process
114.
ANDROID network
115.
artificial neural network
116.
A-source network
117.
autoservice network
118.
Bayesian belief network (BBN)
119.
bayesian network (BN)
120.
Binarized Neural Network (BNN)
121.
building site network
122.
business network model
123.
cable network
124.
carbon nanotube network
125.
cascaded forward neural network (CFNN)
126.
cognitive body area network
127.
collaborative network
128.
computer network management
129.
computer network operations
130.
connection network codes
131.
Controller Area Network
132.
Convolutional Neural Network
133.
convolutional neural network (CNN)
134.
coolant network
135.
deep convolutional neural network
136.
deep learning network
137.
deep neural network
138.
deep neural network compression
139.
DH network
140.
distribution network
141.
distribution network
142.
district heat network
143.
district heating network
144.
electric network analysis
145.
electric network parameters
146.
electrical network
147.
emergency network
148.
Event Processing Network (EPN)
149.
Event Processing Network Model
150.
feedforward neural network (FFNN)
151.
flow network analysis
152.
flow network parameters
153.
Fully Convolutional Network (FCN)
154.
Generative Adversarial Network (GaN)
155.
global innovation network
156.
Graph Convolutional Neural Network (GCN)
157.
GraphSAGE (Graph Based Neural Network)
158.
heterogeneous network
159.
hydraulic network model
160.
hypar-network
161.
impedance network
162.
impedance network
163.
impedance source (IS) network
164.
Impedance Source Network
165.
impedance-source network
166.
in-network data processing
167.
innovation network
168.
innovation network agent
169.
joint network-channel coding
170.
knowledge network
171.
levelling network
172.
line impedance stabilization network
173.
linear Delta robots neural network based model
174.
LSTM neural network
175.
lumped parameter network
176.
lumped parameter thermal network
177.
lumped-parameter thermal network
178.
Magnetically Coupled Impedance Source Network (MCIS)
179.
memory network
180.
Mesh Network
181.
modified network cohesion
182.
MRAN (minimum resource allocation network)
183.
nanosheets network
184.
NB-IoT network
185.
NetFlow based network monitoring
186.
network
187.
network access charges
188.
network analysis
189.
network anomaly detection
190.
network architecture
191.
network calculus
192.
network characteristics
193.
network communication technologies
194.
network constraint
195.
network disaggregation
196.
network dynamics
197.
network expansion planning
198.
network forensics
199.
network function virtualization
200.
network functions virtualization (NFV)
201.
network games
202.
network governance
203.
network IDS alert classification
204.
network industries
205.
network industry
206.
network intrusion detection system
207.
network latencies
208.
network layer
209.
Network lifetime
210.
network measurement
211.
network monitoring
212.
network of co-authorships
213.
network on chip
214.
Network on Chip (NoC)
215.
network partners
216.
network protocol reverse engineering
217.
network protocols
218.
Network QoS
219.
network quality
220.
Network reliability
221.
network resilience
222.
network safety ranking
223.
network slicing
224.
network sparsification
225.
network studies
226.
network theory
227.
network topologies
228.
network topology
229.
network uncertainties
230.
Network visualization
231.
network-on-chip
232.
network-on-ReRAM
233.
network-testing
234.
neural network
235.
neural network architecture search
236.
neural network controller
237.
neural network modelling
238.
neural network positioning algorithms
239.
neural network predictive controller
240.
nitrogen-cycling network
241.
non-public network
242.
non-terrestrial network
243.
open value network
244.
partner network
245.
partner network
246.
partner network (PN)
247.
partner network maturity
248.
passive switched capacitor network
249.
PC-corr network
250.
peer to peer network
251.
performance dialogue network
252.
personal area network applications
253.
pervasive public safety network
254.
phosphotransfer network
255.
power delivery network
256.
power distribution network
257.
production in network
258.
proteomic network
259.
public safety network
260.
qZS network
261.
quasi-impedance-source network
262.
quasi-Z-source network
263.
Radial Basis Function Neural Network (RBFNN)
264.
radio access network
265.
radio access network (RAN)
266.
radio access network subslicing
267.
random resistor network
268.
recurrent neural network language model
269.
reluctance network (RN)
270.
research network
271.
Residual Neural Network
272.
road network
273.
roof network
274.
route network
275.
self organizing network
276.
smart distribution network
277.
SMEs network
278.
social network
279.
social network analysis
280.
software-defined network
281.
spiking neural network (SNN)
282.
stretchable network
283.
support network activities
284.
sustainable partner network
285.
sustainable partner network (SPN)
286.
switched capacitor inductor network (SCLN)
287.
Z-source network
288.
technology transfer network
289.
telecommunication network management
290.
telecommunication network performance
291.
Ternary Neural Network
292.
the influence of DHW consumption on dimensioning the DH network
293.
thermal network
294.
tide gauge network
295.
transformer-based neural network
296.
UAV-enabled network
297.
underwater sensor network
298.
Urban Network
299.
utility network
300.
value network analysis
301.
water distribution network
302.
wireless ad hoq network
303.
wireless body area network
304.
Wireless Body Area Network (WBAN)
305.
wireless network
306.
wireless sensor network
307.
wireless sensor network (WSN)
308.
wsn (wireless sensor network)
309.
3D graphene network
310.
3D network topology visualization
märksõna
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
European Access Network
4.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
TTÜ märksõna
1
1.
Erasmus Student Network
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT