Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
küberkuriteod (subject term)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
70
Look more..
(1/1)
Export
export all inquiry results
(70)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
26
journal article
Küberkuritegevuse tõkestamine infoühiskonnas
Kukrus, Ants
Riigikogu Toimetised
2004
/
lk. 101-108 : ill
journal article
27
newspaper article
Küberkuritegude büroo juhiks saab Ago Ambur
Eesti Päevaleht
2023
/
lk. 5
Küberkuritegude büroo juhiks saab Ago Ambur
newspaper article
28
journal article
Kübermaailmas on oluline probleeme ennetada
Sõmer, Tiia
Mente et Manu
2017
/
lk. 30-33 : fot
http://www.ttu.ee/public/m/mente-et-manu/MM_01_2017/index.html
https://artiklid.elnet.ee/record=b2811469*est
journal article
29
newspaper article
Küberpättide nõrkuseks võivad osutuda end tõestanud ärimudelid [Võrguväljaanne]
Sõmer, Tiia
novaator.err.ee
2022
"Küberpättide nõrkuseks võivad osutuda end tõestanud ärimudelid"
newspaper article
30
journal article
Küberruum ja muutuv maailm
Kukrus, Ants
A & A
2004
/
lk. 5-7
https://artiklid.elnet.ee/record=b1017268*est
journal article
31
newspaper article
Kübersõjas on haavatavad isegi ilma internetiühenduseta sihtmärgid
Piir, Rait
novaator.err.ee
2024
Kübersõjas on haavatavad isegi ilma internetiühenduseta sihtmärgid
newspaper article
32
newspaper article
Küberturbe ekspert: enim ohustab ettevõtet Taavi müügiosakonnast [Võrguväljaanne]
Kald, Indrek
ituudised.ee
2021
"Küberturbe ekspert: enim ohustab ettevõtet Taavi müügiosakonnast"
newspaper article
33
dissertation
Küberturbe haridus laevaohvitseride väljaõppes ning soovitused selle korraldamiseks : magistritöö
Roolaid, Lauri
2018
https://www.ester.ee/record=b5382048*est
https://www.ester.ee/record=b5382048*est
dissertation
34
newspaper article
Küberturvalisus. Tark ei torma: kui midagi on liiga hea, et olla tõsi, siis see ongi nii. Mida teada investeerimiskelmustest [Võrguväljaanne]
Sõmer, Tiia
Edasi.org : innustav ja hariv ajakiri
2021
Küberturvalisus. Tark ei torma: kui midagi on liiga hea, et olla tõsi, siis see ongi nii. Mida teada investeerimiskelmustest
newspaper article
35
newspaper article
Küberturvalisuse ekspert Urmas Ruuto: «Küberrünnakut saab toime panna ka kaugloetavate veemõõtjatega!»
postimees.ee
2023
Küberturvalisuse ekspert Urmas Ruuto: «Küberrünnakut saab toime panna ka kaugloetavate veemõõtjatega!»
newspaper article
36
newspaper article
Küberturvalisuse tippekspert Urmas Ruuto: “Küberrünnakut saab toime panna ka kaugloetavate veemõõtjatega”
Ruuto, Urmas
jarvateataja.postimees.ee
2023
Küberturvalisuse tippekspert Urmas Ruuto: “Küberrünnakut saab toime panna ka kaugloetavate veemõõtjatega”
newspaper article
37
book article EST
/
book article ENG
Late breaking results : Is reconfigurable-based obfuscation secure?
Ul Abideen, Zain
;
Pagliarini, Samuel
;
Aksoy, Levent
2025 Design, Automation & Test in Europe Conference (DATE)
2025
/
2 p
https://doi.org/10.23919/DATE64628.2025.10993007
Conference proceeding at Scopus
Article at Scopus
Conference proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
38
book article EST
/
book article ENG
Lightweight machine learning-based intrusion detection under class imbalance in smart grids
Saleh, Eman Salem Saadallah
;
Bahsi, Hayretdin
;
Chub, Andrii
2025 IEEE 66th International Scientific Conference on Power and Electrical Engineering of Riga Technical University (RTUCON)
2025
/
6 p
https://doi.org/10.1109/RTUCON67996.2025.11415103
book article EST
/
book article ENG
39
book article
Methodology for modelling financially motivated cyber crime
Sõmer, Tiia
16th International Conference on Cyber Warfare and Security (ICCWS 2021) : Online, 25 - 26 February 2021
2021
/
p. 326-335
http://toc.proceedings.com/58552webtoc.pdf?msclkid=97ad966dbea311ecb39e14df5abebf21
book article
Related publications
1
Modelling financially motivated cyber crime = Finantsiliselt motiveeritud küberkuritegevuse modelleerimine
40
book article
Mixed methods research approach and experimental procedure for measuring human factors in cybersecurity using phishing simulations
Mäses, Sten
;
Kikerpill, Kristjan
;
Jüristo, Kaspar
;
Maennel, Olaf Manuel
Abstracts of Papers Presented at the 18th European Conference on Research Methodology for Business and Management Studies : ECRM 2019, Hosted By Wits Business School Johannesburg, South Africa 20-21 June, 2019
2019
/
p. 30-31
"ECRM19"
book article
41
book article
Mixed methods research approach and experimental procedure for measuring human factors in cybersecurity using phishing simulations
Mäses, Sten
;
Kikerpill, Kristjan
;
Jüristo, Kaspar
;
Maennel, Olaf Manuel
ECRM 2019 - Proceedings of the 18th European Conference on Research Methodology for Business and Management Studies ; vol. 1
2019
/
p. 218-226
http://toc.proceedings.com/49537webtoc.pdf
book article
42
dissertation
Modelling financially motivated cyber crime = Finantsiliselt motiveeritud küberkuritegevuse modelleerimine
Sõmer, Tiia
2022
https://doi.org/10.23658/taltech.10/2022
https://www.ester.ee/record=b5491785*est
https://digikogu.taltech.ee/et/Item/5c41eec5-0c88-43c8-9294-c9f47e7c438b
dissertation
Related publications
5
Utilising journey mapping and crime scripting to combat cyber crime
Utilising journey mapping and crime scripting to combat cybercrime and cyber warfare attacks
Application of journey mapping and crime scripting to the phenomenon of trolling
Taxonomies of cybercrime : an overview and proposal to be used in mapping cyber criminal journeys
Methodology for modelling financially motivated cyber crime
43
journal article EST
/
journal article ENG
Mutual legal assistance & other mechanisms for accessing extraterritorially located data
Osula, Anna-Maria
Masaryk University Journal of Law and Technology
2015
/
p. 43-64
https://doi.org/10.5817/MUJLT2015-1-4
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
44
newspaper article
Nad ründasid Eestit, külvasid segadust USA-s, Ukrainas, Gruusias … Uue aja varisõdalasi tutvustab küberekspert Adrian Venables
Venables, Adrian Nicholas
digi.geenius.ee
2024
Nad ründasid Eestit, külvasid segadust USA-s, Ukrainas, Gruusias
newspaper article
45
journal article EST
/
journal article ENG
National cybersecurity : global and regional descriptive snapshots through the analysis of 161 countries
Serrano-Iova, Radu-Antonio
Halduskultuur
2025
/
p. 83-105
https://doi.org/10.32994/hk.v23i1-2.303
https://halduskultuur.eu/journal/index.php/HKAC/article/view/303/204
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
46
book article
National cybersecurity legislation : is there a magic formula?
Tikk, Eneken
Cybersecurity Best Practices : Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden
2018
/
p. 615-633
https://doi.org/10.1007/978-3-658-21655-9_42
book article
47
book article
Netflow based framework for identifying anomalous end user nodes
Vaarandi, Risto
;
Pihelgas, Mauno
Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020
2020
/
p. 448-456
https://doi.org/10.34190/ICCWS.20.035
book article
48
book article
A novel anonymous authentication and key agreement scheme for smart grid
Hammami, Hamza
;
Obaidat, Mohammad S.
;
Ben Yahia, Sadok
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 3: ICE-B, Lieusaint, Paris, France, July 8-10, 2020
2020
/
p. 357-362
https://doi.org/10.5220/0009824203570362
book article
49
book
Parabasis : Cyber-diplomacy in Stalemate
Tikk, Eneken
;
Kerttunen, Mika
2018
https://www.academia.edu/38195740/Tikk_Kerttunen_Parabasis_Cyber-diplomacy_in_stalemate.pdf
book
50
journal article
Raamatukogude roll ohutuma küberruumi loomisel
Kont, Kate-Riin
Raamatukogu
2022
/
lk. 22-25
https://www.ester.ee/record=b1817020*est
https://issuu.com/nlib/docs/2022_6_veeb
journal article
Number of records 70, displaying
26 - 50
previous
1
2
3
next
subject term
1
1.
küberkuriteod
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT