Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
küberturve (subject term)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
555
Look more..
(1/1)
Export
export all inquiry results
(555)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
301
book article EST
/
book article ENG
Lightweight monitoring scheme for flooding DoS Attack detection in multi-tenant MPSoCs
Chaves Arroyave, Cesar Giovanni
;
Sepulveda, Johanna
;
Hollstein, Thomas
2021 IEEE International Symposium on Circuits and Systems (ISCAS), Daegu, Korea May 22-28, 2021 : proceedings
2021
/
5 p
https://doi.org/10.1109/ISCAS51556.2021.9401153
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
Related publications
1
Bandwidth Reduction DoS attacks in Multi-Tenant NoC-based MPSoCs : detection and avoidance strategies = Ribalaiuse vähendamise DoS-rünnakud mitme rentnikuga NoC-põhiste MPSoC-de puhul : tuvastamise ja vältimise strateegiad
302
book article
Lightweight testbed for IEC61162-450-related cyber security research
Visky, Gabor
;
Katsikas, Sokratis
;
Maennel, Olaf Manuel
2024 IEEE International Conference on Cyber Security and Resilience (CSR) : proceedings
2024
/
p. 638-643
https://doi.org/10.1109/CSR61664.2024.10679439
book article
303
book article
Lizards in the street! Introducing cybersecurity awareness in a digital literacy context
Frydenberg, Mark
;
Lorenz, Birgy
EDSIGCON Proceedings 2019 : Cleveland Ohio, November 6-9, 2019
2019
/
Art. n4936, 13 p. : ill
http://proc.iscap.info/2019/pdf/4936.pdf
book article
304
book article EST
/
book article ENG
A live virtual simulator for teaching cybersecurity to information technology students
Ernits, Margus
;
Kikkas, Kaido
Learning and Collaboration Technologies : Third International Conference, LCT 2016, held as part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016 : proceedings
2016
/
p. 474-486 : ill
https://doi.org/10.1007/978-3-319-39483-1_43
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
book article EST
/
book article ENG
305
journal article EST
/
journal article ENG
LSPR23: A novel IDS dataset from the largest live-fire cybersecurity exercise
Dijk, Allard
;
Halisdemir, Emre
;
Melella, Cosimo
;
Schu, Alari
;
Pihelgas, Mauno
;
Meier, Roland
Journal of Information Security and Applications
2024
/
art. 103847, 14, p. : ill
https://doi.org/10.1016/j.jisa.2024.103847
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
306
dissertation
Machine learning-based detection and characterization of evolving threats in mobile and IoT Systems = Masinõppepõhine arenevate ohtude tuvastamine ning kirjeldamine mobiilseadmete ja värkvõrkude jaoks
Guerra Manzanares, Alejandro
2022
https://doi.org/10.23658/taltech.54/2022
https://digikogu.taltech.ee/et/Item/f56ae778-e5a5-4147-a8e4-4833e08fa789
https://www.ester.ee/record=b5511898*est
dissertation
Related publications
14
Hybrid feature selection models for machine learning based botnet detection in IoT networks
In-depth feature selection and ranking for automated detection of mobile malware
Time-frame analysis of system calls behavior in machine learning-based mobile malware detection
Towards the integration of a post-hoc interpretation step into the machine learning workflow for IoT botnet detection
MedBIoT : generation of an IoT Botnet Dataset in a medium-sized IoT network
KronoDroid : time-based hybrid-featured dataset for effective android malware detection and characterization
Android malware concept drift using system calls : detection, characterization and challenges
Concept drift and cross-device behavior : challenges and implications for effective android malware detection
Cross-device behavioral consistency : benchmarking and implications for effective android malware detection
Leveraging the first line of defense : a study on the evolution and usage of android security permissions for enhanced android malware detection
On the relativity of time : implications and challenges of data drift on long-term effective android malware detection
Using MedBIoT dataset to build effective machine learning-based IoT botnet detection systems
On the application of active learning for efficient and effective Iot botnet detection
On the application of active learning to handle data evolution in Android malware detection
307
newspaper article
Majandusjulgeolek Eesti restart 2021 : 14. aprillil veebikonverents
Postimees
2021
/
Lk. 25
https://dea.digar.ee/article/postimees/2021/03/25/21.1
newspaper article
308
book article
Making the Cyber Mercenary - Autonomous Weapons Systems and Common Article 1 of the Geneva Conventions
Kajander, Aleksi Oskar Johannes
;
Tsybulenko, Evhen
;
Kasper, Agnes
2020 12th International Conference on Cyber Conflict : 20/20 vision : the next decade
2020
/
p. 79-95
https://ieeexplore.ieee.org/abstract/document/9131722
https://www.ester.ee/record=b5303919*est
book article
309
book article
Managing security risks in E-voting over the Internet
Tepandi, Jaak
;
Martens, Tarvi
E-challenges-2006
2006
/
p. 100
book article
310
book article
Mapping cyber attacks on the internet of medical things : a taxonomic review
Kondeti, Venkatesh
;
Bahsi, Hayretdin
2024 19th Annual System of Systems Engineering Conference (SoSE)
2024
/
p. 84 - 91
https://doi.org/10.1109/SOSE62659.2024.10620925
Article at Scopus
Article at WOS
book article
311
book article EST
/
book article ENG
Mapping requirements specifications into a formalized blockchain-enabled authentication protocol for secured personal identity assurance
Leiding, Benjamin
;
Norta, Alexander
Future Data and Security Engineering : 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 - December 1, 2017 : proceedings
2017
/
p. 181-196 : ill
https://doi.org/10.1007/978-3-319-70004-5_13
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
312
journal article
Maritime cyber-insurance : The Norwegian case : [abstract]
Franke, Ulrik
;
Langfeldt Friberg, Even
;
Bahsi, Hayretdin
International Journal of Critical Infrastructures
2022
/
p. 267–286
https://doi.org/10.1504/IJCIS.2022.10046729
journal article
313
journal article EST
/
journal article ENG
Maritime cyber-insurance: the Norwegian case
Franke, Ulrik
;
Friberg, Even Langfeldt
;
Bahşi, Hayretdin
International Journal of Critical Infrastructures
2022
/
p. 267-286
https://doi.org/10.1504/ijcis.2022.125816
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
314
book EST
/
book ENG
Maritime Cybersecurity
2025
https://doi.org/10.1007/978-3-031-87290-7
book EST
/
book ENG
315
book article EST
/
book article ENG
Mental model mapping method for cybersecurity
Kullman, Kaur
;
Buchanan, Laurin
;
Komlodi, Anita
;
Engel, Don
HCI for Cybersecurity, Privacy and Trust : Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : Proceedings
2020
/
p. 458-470
https://doi.org/10.1007/978-3-030-50309-3_30
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
Related publications
1
Interactive stereoscopically perceivable multidimensional data visualizations for cybersecurity = Interaktiivsed, ruumiliselt tajutavad, mitmemõõtelised andmekuvad küberturbele
316
journal article
Merendus sektoris on küberhügieen olulisem kui kunagi varem
Tampere, Uku
Teejuht : maal, vees ja õhus : Transpordiameti digiajakiri
2024
/
lk. 14-17 : fot
https://digiajakiri.transpordiamet.ee/view/434325528/14/
journal article
317
book article
Messung, Prüfung und Nachweis von IT-Sicherheit
Skierka-Canton, Isabel
IT-Sicherheitsrecht : Praxishandbuch
2021
/
S. 154−180
https://www.nomos-shop.de/en/nomos/title/it-sicherheitsrecht-id-86855/
book article
Related publications
1
Securing digital government : towards governance mechanisms for e-state resilience = Digitaalse valitsuse turvalisus : valitsemismehhanismid e-riigi vastupidavuse tagamiseks
318
book article
Metamorphic testing for verification and fault localization in industrial control systems
Sudheerbabu, Gaadha
;
Ahmad, Tanwir
;
Truscan, Dragos
;
Vain, Jüri
CyberSecurity in a DevOps Environment: From Requirements to Monitoring
2023
/
p. 127 - 159
https://doi.org/10.1007/978-3-031-42212-6_5
Article at Scopus
book article
319
book article EST
/
book article ENG
A method for adding cyberethical behaviour measurements to computer science homework assignments
Mäses, Sten
;
Aitsam, Heleri
;
Randmann, Liina
19th Koli Calling Conference on Computing Education Research Koli Calling 2019 : November 21-24, 2019, Koli, Finland : proceedings
2019
/
5 p. : ill
https://doi.org/10.1145/3364510.3364529
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
320
book article EST
/
book article ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
321
book article
A method for teaching Open Source Intelligence (OSINT) using personalised cloud-based exercises
Yari, Saber
;
Mäses, Sten
;
Maennel, Olaf Manuel
Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020
2020
/
p. 480−489
https://doi.org/10.34190/ICCWS.20.091
book article
322
book article
Methodology for modelling financially motivated cyber crime
Sõmer, Tiia
16th International Conference on Cyber Warfare and Security (ICCWS 2021) : Online, 25 - 26 February 2021
2021
/
p. 326-335
http://toc.proceedings.com/58552webtoc.pdf?msclkid=97ad966dbea311ecb39e14df5abebf21
book article
Related publications
1
Modelling financially motivated cyber crime = Finantsiliselt motiveeritud küberkuritegevuse modelleerimine
323
newspaper article
Miks Facebook ei tööta? Põhjuseks võib olla ebaõnnestunud tarkvarauuendus [Võrguväljaanne]
Veedla, Alice
delfi.ee
2021
"Miks Facebook ei tööta? Põhjuseks võib olla ebaõnnestunud tarkvarauuendus "
newspaper article
324
newspaper article
Millise küberohu toovad autonoomsetele sõidukitele kaasa 5G+ ja 6G?
am.ee
2025
https://www.am.ee/node/9250
newspaper article
325
newspaper article
Millist küberstrateegiat Eesti vajab?
Lorenz, Birgy
Äripäev
2018
/
Lk. 12
https://dea.digar.ee/article/aripaev/2018/06/22/18.3
newspaper article
Number of records 555, displaying
301 - 325
previous
9
10
11
12
13
14
15
16
17
18
next
subject term
1
1.
küberturve
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT