Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
cyber intrusion detection (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/237)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Learning from few cyber-attacks : addressing the class imbalance problem in machine learning-based intrusion detection in software-defined networking
Mirsadeghi, Seyed Mohammad Hadi
;
Bahsi, Hayretdin
;
Vaarandi, Risto
;
Inoubli, Wissem
IEEE Access
2023
/
p. 140428 - 140442
https://doi.org/10.1109/ACCESS.2023.3341755
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
233
1.
cyber intrusion detection
2.
behaviour-based intrusion detection systems
3.
early intrusion detection
4.
evaluation of explainable AI intrusion detection
5.
health care IoMT intrusion detection
6.
intrusion detection
7.
intrusion detection system (IDS)
8.
intrusion detection systems
9.
intrusion detection systems (IDS)
10.
network intrusion detection system
11.
air intrusion
12.
intrusion
13.
intrusion response system
14.
saline intrusion blockage
15.
automated cyber defense
16.
autonomous vehicle cyber range
17.
cloud-based cyber-physical systems (C2PS)
18.
cognitive cyber warfare
19.
cyber
20.
Cyber “Maastricht”
21.
cyber architecture
22.
cyber attacks
23.
cyber battle damage assessment
24.
Cyber Bio-analytical Physical Systems (CBPSs)
25.
cyber challenge
26.
cyber command
27.
Cyber Command organisational structure
28.
cyber conflict
29.
cyber contingency
30.
cyber crime
31.
cyber crime pathways
32.
cyber crime scripting
33.
Cyber crisis management
34.
cyber defence
35.
cyber defence exercise
36.
cyber defence exercises
37.
cyber defense education
38.
cyber defense exercise
39.
cyber defense exercises
40.
cyber dependence
41.
cyber diplomacy
42.
cyber exercise
43.
cyber hygiene
44.
cyber impact assessment
45.
cyber incidents
46.
cyber insurance
47.
cyber kill chain
48.
cyber operation
49.
cyber operation officer
50.
cyber operations
51.
cyber operations exercises
52.
cyber physical energy systems
53.
cyber physical power system (CPPS)
54.
Cyber Physical Production System
55.
cyber physical production systems (CPPS)
56.
cyber physical social system
57.
cyber physical social systems (cpss)
58.
cyber physical system
59.
Cyber Planning tool
60.
cyber power Europe
61.
cyber ranges
62.
cyber red teaming
63.
cyber resilience
64.
cyber resilience at sea
65.
cyber risk
66.
cyber risk management in shipping
67.
cyber security
68.
cyber security education
69.
cyber security exercises
70.
cyber security monitoring
71.
cyber security monitoring in maritime
72.
cyber security strategies
73.
cyber situational awareness
74.
cyber stability
75.
cyber team communication
76.
cyber threat
77.
cyber threat communication
78.
Cyber Threat Intelligence
79.
cyber threats
80.
cyber war
81.
cyber warfare
82.
cyber warriors
83.
cyber weapons
84.
cyber-attack
85.
cyber-attack pathways
86.
Cyber-attacks
87.
cyber-insurance
88.
cyber-paternalism
89.
cyber-physical energy systems
90.
cyber-physical social system (CPSS)
91.
cyber-physical system
92.
Cyber-Physical System (CPS)
93.
cyber-physical system logistic robot
94.
cyber-physical system security
95.
cyber-physical systems
96.
Cyber-Physical Systems (CPS)
97.
cyber-risks
98.
cyber-security
99.
cyber-space nexus
100.
cyber-vulnerabilities
101.
Defensive Cyber Operations
102.
EU cyber policy
103.
international cyber norms
104.
maritime cyber security
105.
maritime cyber security operations centers
106.
military cyber
107.
mobile cyber-physical system
108.
national cyber security strategy
109.
NATO cyber operations definitions
110.
NATO Cyber Range
111.
Offensive Cyber Operations
112.
perceived cyber risks and threats
113.
responsive cyber defence
114.
Socio-Cyber-Physical Systems
115.
space cyber range
116.
technical cyber exercise
117.
Visualising Cyber Planning
118.
AI-based fault detection
119.
amoxicillin detection
120.
anomaly detection
121.
anomaly detection for system logs
122.
antibiotic detection
123.
antibiotics detection
124.
aspect detection
125.
asynchronous fault detection
126.
attack detection
127.
barotrauma detection system
128.
Barotrauma detection system sensors
129.
body detection
130.
botnet detection
131.
capacitively coupled conductivity detection
132.
change detection
133.
chemical detection
134.
community detection
135.
compu ter-aided detection(CAD)
136.
computer-aided detection
137.
computer‐aided detection
138.
contactless conductivity detection
139.
contactless conductivity detection (C4D)
140.
crack detection
141.
crash detection
142.
defect detection
143.
detection
144.
detection efficiency
145.
detection engineering
146.
detection mechanisms
147.
detection method
148.
detection methods
149.
detection of anomalous end user nodes
150.
detection of hydrogen isotopes
151.
distributed detection
152.
early detection
153.
electronic warfare activity detection
154.
energy detection
155.
error detection
156.
ESI-MS and IM detection
157.
Event detection
158.
extraction and detection methods
159.
face detection
160.
Face Manipulation Detection
161.
failure detection
162.
fall detection
163.
fault detection
164.
fault detection and classification
165.
fault detection and diagnoses
166.
fault detection and diagnosis
167.
fault detection and diagnostics (FDD)
168.
Fish detection
169.
fouling detection
170.
harmonic detection
171.
hepatitis C virus (HCV) detection
172.
hubs detection
173.
hybrid fault detection
174.
IED detection
175.
image-based crack detection
176.
indicident detection and response
177.
indirect UV absorbance detection
178.
island detection
179.
islanding detection
180.
label-free detection
181.
lane detection
182.
lane line detection
183.
LED fluorescence detection
184.
leg detection
185.
light detection and ranging
186.
light detection and ranging (LiDAR)
187.
Light Detection and Ranging (LiDAR) point cloud
188.
limit of detection
189.
lock-in detection
190.
loop-closure detection
191.
malware detection
192.
marker detection
193.
mobile malware detection
194.
money laundering detection systems
195.
monitoring and detection
196.
multi-classed object detection
197.
Multi-valued Simulation for Hazard Detection in Digital Circuits
198.
mutant detection
199.
network anomaly detection
200.
nodules detection
201.
object detection
202.
oil-spill detection
203.
outlier’s detection methods
204.
outliers detection
205.
peak detection
206.
photovoltaic fault detection algorithms
207.
phytoplankton detection methods
208.
plagiarism detection
209.
position detection
210.
precursor detection
211.
propaganda detection
212.
protein detection
213.
proton detection
214.
radar detection
215.
ramp event detection
216.
recycled FPGA detection
217.
residual current detection
218.
robust detection
219.
scene text detection
220.
short-circuit detection
221.
Side-Channel Attack Detection
222.
small molecule detection
223.
speech activity detection
224.
Suicidal ideation detection
225.
synchronous detection
226.
topic detection
227.
tyre detection
228.
unmanned aerial vehicle detection systems
229.
unsupervised outlier detection
230.
UV detection
231.
vehicle detection
232.
vortex detection
233.
3D lane detection
märksõna
4
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT