default search action
Risto Vaarandi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Risto Vaarandi, Alejandro Guerra-Manzanares:
Stream clustering guided supervised learning for classifying NIDS alerts. Future Gener. Comput. Syst. 155: 231-244 (2024) - [j3]Risto Vaarandi, Alejandro Guerra-Manzanares:
Network IDS alert classification with active learning techniques. J. Inf. Secur. Appl. 81: 103687 (2024) - [c19]Gabor Visky, Aleksei Siganov, Muaan ur Rehman, Risto Vaarandi, Hayretdin Bahsi, Leonidas Tsiopoulos:
Hybrid Cybersecurity Research and Education Environment for Maritime Sector. CSR 2024: 644-651 - [c18]Gabor Visky, Adam Balint, Risto Vaarandi, Mauno Pihelgas, Olaf Maennel:
Open Source Intrusion Detection Systems' Performance Analysis Under Resource Constraints. SISY 2024: 201-208 - [i1]Risto Vaarandi, Hayretdin Bahsi:
Using Large Language Models for Template Detection from Security Event Logs. CoRR abs/2409.05045 (2024) - 2023
- [j2]Seyed Mohammad Hadi Mirsadeghi, Hayretdin Bahsi, Risto Vaarandi, Wissem Inoubli:
Learning From Few Cyber-Attacks: Addressing the Class Imbalance Problem in Machine Learning-Based Intrusion Detection in Software-Defined Networking. IEEE Access 11: 140428-140442 (2023) - [c17]Orkhan Gasimov, Risto Vaarandi, Mauno Pihelgas:
Comparative Analysis of Pattern Mining Algorithms for Event Logs. CSR 2023: 1-7 - 2022
- [c16]Risto Vaarandi, Sten Mäses:
How to Build a SOC on a Budget. CSR 2022: 171-177 - 2021
- [c15]Risto Vaarandi:
A Stream Clustering Algorithm for Classifying Network IDS Alerts. CSR 2021: 14-19
2010 – 2019
- 2018
- [c14]Risto Vaarandi, Bernhards Blumbergs, Markus Kont:
An unsupervised framework for detecting anomalous messages from syslog log files. NOMS 2018: 1-6 - 2017
- [c13]Chen Zhuge, Risto Vaarandi:
Efficient Event Log Mining with LogClusterC. BigDataSecurity/HPSC/IDS 2017: 261-266 - [c12]Bernhards Blumbergs, Risto Vaarandi:
Bbuzz: A bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis. MILCOM 2017: 707-712 - 2016
- [c11]Risto Vaarandi, Markus Kont, Mauno Pihelgas:
Event log analysis with the LogCluster tool. MILCOM 2016: 982-987 - [c10]Bernhards Blumbergs, Mauno Pihelgas, Markus Kont, Olaf Maennel, Risto Vaarandi:
Creating and Detecting IPv6 Transition Mechanism-Based Information Exfiltration Covert Channels. NordSec 2016: 85-100 - 2015
- [c9]Risto Vaarandi, Mauno Pihelgas:
LogCluster - A data clustering and pattern mining algorithm for event logs. CNSM 2015: 1-7 - [c8]Risto Vaarandi, Bernhards Blumbergs, Emin Çaliskan:
Simple event correlator - Best practices for creating scalable configurations. CogSIMA 2015: 96-100 - 2014
- [c7]Risto Vaarandi, Mauno Pihelgas:
Using Security Logs for Collecting and Reporting Technical Security Metrics. MILCOM 2014: 294-299 - 2013
- [c6]Risto Vaarandi:
Detecting anomalous network traffic in organizational private networks. CogSIMA 2013: 285-292 - 2010
- [c5]Risto Vaarandi, Karlis Podins:
Network IDS alert classification with frequent itemset mining and data clustering. CNSM 2010: 451-456
2000 – 2009
- 2008
- [c4]Risto Vaarandi:
Mining event logs with SLCT and LogHound. NOMS 2008: 1071-1074 - 2004
- [c3]Risto Vaarandi:
A Breadth-First Algorithm for Mining Frequent Patterns from Event Logs. INTELLCOMM 2004: 293-308 - 2003
- [c2]Risto Vaarandi:
A Clustering Algorithm for Logfile Data Sets. SPLST 2003: 152-162 - 2002
- [j1]Risto Vaarandi:
Platform Independent Tool for Local Event Correlation. Acta Cybern. 15(4): 705-723 (2002) - [c1]Risto Vaarandi:
Platform independent event correlation tool for network management. NOMS 2002: 907-909
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint