Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
cyber intrusion detection (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/181)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Learning from few cyber-attacks : addressing the class imbalance problem in machine learning-based intrusion detection in software-defined networking
Mirsadeghi, Seyed Mohammad Hadi
;
Bahsi, Hayretdin
;
Vaarandi, Risto
;
Inoubli, Wissem
IEEE Access
2023
/
p. 140428 - 140442
https://doi.org/10.1109/ACCESS.2023.3341755
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
179
1.
cyber intrusion detection
2.
early intrusion detection
3.
intrusion detection
4.
intrusion detection system (IDS)
5.
intrusion detection systems
6.
air intrusion
7.
intrusion
8.
saline intrusion blockage
9.
autonomous vehicle cyber range
10.
cloud-based cyber-physical systems (C2PS)
11.
cognitive cyber warfare
12.
cyber
13.
Cyber “Maastricht”
14.
cyber architecture
15.
cyber attacks
16.
cyber battle damage assessment
17.
Cyber Bio-analytical Physical Systems (CBPSs)
18.
cyber challenge
19.
cyber command
20.
cyber conflict
21.
cyber contingency
22.
cyber crime
23.
cyber crime pathways
24.
cyber crime scripting
25.
Cyber crisis management
26.
cyber defence
27.
cyber defence exercise
28.
cyber defence exercises
29.
cyber defense education
30.
cyber defense exercise
31.
cyber defense exercises
32.
cyber dependence
33.
cyber diplomacy
34.
cyber exercise
35.
cyber hygiene
36.
cyber impact assessment
37.
cyber incidents
38.
cyber insurance
39.
cyber kill chain
40.
cyber operation
41.
cyber operations
42.
cyber physical energy systems
43.
cyber physical power system (CPPS)
44.
Cyber Physical Production System
45.
cyber physical production systems (CPPS)
46.
cyber physical system
47.
cyber power Europe
48.
cyber ranges
49.
cyber red teaming
50.
cyber resilience
51.
cyber risk
52.
cyber security
53.
cyber security education
54.
cyber security exercises
55.
cyber security strategies
56.
cyber situational awareness
57.
cyber stability
58.
cyber team communication
59.
cyber threat
60.
cyber threat communication
61.
cyber threats
62.
cyber war
63.
cyber warfare
64.
cyber warriors
65.
cyber weapons
66.
cyber-attack
67.
cyber-attack pathways
68.
cyber-insurance
69.
cyber-paternalism
70.
cyber-physical energy systems
71.
cyber-physical social system (CPSS)
72.
cyber-physical system
73.
Cyber-Physical System (CPS)
74.
cyber-physical system logistic robot
75.
cyber-physical systems
76.
Cyber-Physical Systems (CPS)
77.
cyber-security
78.
cyber-vulnerabilities
79.
EU cyber policy
80.
international cyber norms
81.
military cyber
82.
mobile cyber-physical system
83.
national cyber security strategy
84.
NATO Cyber Range
85.
perceived cyber risks and threats
86.
responsive cyber defence
87.
Socio-Cyber-Physical Systems
88.
technical cyber exercise
89.
amoxicillin detection
90.
anomaly detection
91.
anomaly detection for system logs
92.
antibiotic detection
93.
antibiotics detection
94.
aspect detection
95.
asynchronous fault detection
96.
attack detection
97.
barotrauma detection system
98.
body detection
99.
botnet detection
100.
capacitively coupled conductivity detection
101.
change detection
102.
chemical detection
103.
community detection
104.
compu ter-aided detection(CAD)
105.
computer-aided detection
106.
computer‐aided detection
107.
contactless conductivity detection
108.
contactless conductivity detection (C4D)
109.
crash detection
110.
defect detection
111.
detection
112.
detection efficiency
113.
detection engineering
114.
detection of anomalous end user nodes
115.
distributed detection
116.
early detection
117.
energy detection
118.
error detection
119.
ESI-MS and IM detection
120.
Event detection
121.
extraction and detection methods
122.
face detection
123.
Face Manipulation Detection
124.
failure detection
125.
fall detection
126.
fault detection
127.
fault detection and diagnoses
128.
fault detection and diagnosis
129.
Fish detection
130.
fouling detection
131.
hepatitis C virus (HCV) detection
132.
hubs detection
133.
IED detection
134.
indicident detection and response
135.
indirect UV absorbance detection
136.
island detection
137.
islanding detection
138.
label-free detection
139.
LED fluorescence detection
140.
leg detection
141.
light detection and ranging
142.
Light Detection and Ranging (LiDAR) point cloud
143.
limit of detection
144.
lock-in detection
145.
loop-closure detection
146.
malware detection
147.
marker detection
148.
mobile malware detection
149.
money laundering detection systems
150.
monitoring and detection
151.
multi-classed object detection
152.
mutant detection
153.
network anomaly detection
154.
nodules detection
155.
object detection
156.
oil-spill detection
157.
outlier’s detection methods
158.
outliers detection
159.
plagiarism detection
160.
position detection
161.
protein detection
162.
proton detection
163.
radar detection
164.
ramp event detection
165.
recycled FPGA detection
166.
robust detection
167.
scene text detection
168.
short-circuit detection
169.
small molecule detection
170.
speech activity detection
171.
Suicidal ideation detection
172.
synchronous detection
173.
tyre detection
174.
unmanned aerial vehicle detection systems
175.
unsupervised outlier detection
176.
UV detection
177.
vehicle detection
178.
vortex detection
179.
3D lane detection
märksõna
2
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT