Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
küberturve (subject term)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
556
Look more..
(1/1)
Export
export all inquiry results
(556)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
426
book article EST
/
book article ENG
Signature-based approach to detecting malicious outgoing traffic
Petliak, Nataliia
;
Klots, Yurii
;
Titova, Vira
;
Cheshun, Viktor
;
Boyarchuk, Artem
IntelITSIS 2023: Intelligent Information Technologies & Systems of Information Security 2023 : proceedings of the 4th International Workshop on Intelligent Information Technologies & Systems of Information Security : Khmelnytskyi, Ukraine, March 22-24, 2023
2023
/
p. 486 - 506
https://ceur-ws.org/Vol-3373/paper33.pdf
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
427
book article
Simulating a cyber-attack on an autonomous sea surface vessel's rudder controller
Astrov, Igor
;
Bauk, Sanja
2024 13th Mediterranean Conference on Embedded Computing (MECO), 11-14 June 2024, Budva, Montenegro
2024
/
7 p. : ill
https://doi.org/10.1109/MECO62516.2024.10577872
Article at Scopus
Article at WOS
book article
428
book article
Simulating a cyber-attack on an autonomous sea surface vessel's rudder controller
Astrov, Igor
;
Bauk, Sanja
2024 13th Mediterranean Conference on Embedded Computing, MECO 2024
2024
/
1 p.
https://journals.scholarsportal.info/browse/26379511
book article
429
book article EST
/
book article ENG
Situational states influence on team workload demands in cyber defense exercise
Ask, Torvald F.
;
Sütterlin, Stefan
;
Knox, Benjamin James
;
Lugo, Ricardo Gregorio
HCI International 2021 - late breaking papers : cognition, inclusion, learning, and culture : 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021 : proceedings
2021
/
p. 3-20 : ill
https://doi.org/10.1007/978-3-030-90328-2_1
Conference proceeding at Scopus
Article at Scopus
Conference proceeding at WOS
Article at WOS
book article EST
/
book article ENG
430
journal article EST
/
journal article ENG
Small unmanned surface vessels — a review and critical analysis of relations to safety and safety assurance of larger autonomous ships
Bolbot, Victor
;
Sandru, Andrei
;
Saarniniemi, Ture
;
Puolakka, Otto
;
Kujala, Pentti Jouko Sakari
;
Valdez Banda, Osiris A.
Journal of marine science and engineering
2023
/
art. 2387, 38 p. : ill
https://doi.org/10.3390/jmse11122387
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
431
dissertation
Software technology for cyber security simulations = Tarkvaratehnika küberturbe simulatsioonide jaoks
Ojamaa, Andres
2016
http://www.ester.ee/record=b4640099*est
dissertation
432
book article
Space as NATO’s operational domain : the case of the cyberthreats against GNSS
Zarkan Cesari, Laetitia
;
Carlo, Antonio
;
Roux, Lucille
;
Toukebri, Raina
;
Pelin Manti, Nebile
IAC 2021 congress proceedings
2021
/
art. 66298
https://dl.iafastro.directory/event/IAC-2021/paper/66298/
book article
433
dissertation
Specialized cyber red team responsive computer network operations = Vastutegevusele orienteeritud punase meeskonna küberoperatsioonid
Blumbergs, Bernhards
2019
https://digi.lib.ttu.ee/i/?12015
dissertation
434
book article
‘Spill Over’ and ‘Fail Forward’ in the EU’s Cybersecurity Regulations
Kasper, Agnes
;
Osula, Anna-Maria
Digital development of the European Union : an interdisciplinary perspective
2023
/
p. 21-44 : ill
https://doi.org/10.1007/978-3-031-27312-4_3
https://www.ester.ee/record=b5557935*est
book article
435
book article
Standing Committee on Cyber Security
Mõtus, Leo
Estonian Academy of Sciences year book = Annales Academiae Scientiarum Estonicae 2013
2014
/
p. 44-45
book article
436
book article
Status Detector for Fuzzing-Based Vulnerability Mining of IEC 61850 Protocol
Visky, Gabor
;
Lavrenovs, Arturs
;
Maennel, Olaf Manuel
Proceeding of the 20th European Conference on Cyber Warfare and Security
2021
/
p. 454-461
https://doi.org/10.34190/EWS.21.007
book article
437
book article EST
/
book article ENG
Stenmap : framework for evaluating cybersecurity-related skills based on computer simulations
Mäses, Sten
;
Randmann, Liina
;
Maennel, Olaf Manuel
;
Lorenz, Birgy
Learning and Collaboration Technologies : Learning and Teaching : 5th International Conference : LCT 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018 : Proceedings, Part II
2018
/
p. 492-504
https://doi.org/10.1007/978-3-319-91152-6_38
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
book article EST
/
book article ENG
438
book
Strategic cyber security
Geers, Kenneth
2011
https://www.ester.ee/record=b2692421*est
book
439
dissertation
Strategic cyber security : evaluating nation-state cyber attack mitigation strategies with DEMATEL = Strateegiline küberjulgeolek : küberrünnaku leevendamise strateegiate hindamine riiklikul tasandil : DEMATEL-i meetod
Geers, Kenneth
2011
https://digi.lib.ttu.ee/i/?592
dissertation
440
book
Strategically normative. Norms and principles in national cybersecurity strategies
Kerttunen, Mika
;
Tikk, Eneken
2019
https://eucyberdirect.eu/wp-content/uploads/2019/04/kerttunen_tikk-strategically-normative-april-2019-eucyberdirect_.pdf
book
441
book article
A stream clustering algorithm for classifying network IDS alerts
Vaarandi, Risto
Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings
2021
/
p. 14-19
https://doi.org/10.1109/CSR51186.2021.9527926
book article
442
journal article EST
/
journal article ENG
Stream clustering guided supervised learning for classifying NIDS alerts
Vaarandi, Risto
;
Guerra Manzanares, Alejandro
Future generation computer systems
2024
/
p. 231-244 : ill
https://doi.org/10.1016/j.future.2024.01.032
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
443
book article
Success factors for designing a cybersecurity exercise on the example of incident response
Mäses, Sten
;
Maennel, Kaie
;
Toussaint, Mascia
;
Rosa, Veronica
2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
2021
/
p. 259-268
https://doi.org/10.1109/EuroSPW54576.2021.00033
book article
444
journal article EST
/
journal article ENG
Survey on architectural attacks : a unified classification and attack model
Ghasempouri, Tara
;
Raik, Jaan
;
Reinbrecht, Cezar
;
Hamdioui, Said
;
Hamdioui, Said
ACM Computing Surveys
2023
/
art. 42
https://doi.org/10.1145/3604803
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
445
journal article EST
/
journal article ENG
Surveying pervasive public safety communication technologies in the context of terrorist attacks
Masood, Ali
;
Scazzoli, Davide
;
Sharma, Navuday
;
Le Moullec, Yannick
;
Ahmad, Rizwan
;
Reggiani, Luca
;
Magarini, Maurizio
;
Alam, Muhammad Mahtab
Physical communication
2020
/
art. 101109,
https://doi.org/10.1016/j.phycom.2020.101109
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
Implementation and demonstration of a device-to-device communication system for emergency and critical scenarios = Seadmetevahelise sidesüsteemi rakendamine ja demonstreerimine hädaolukorra ja kriitiliste juhtumite jaoks
446
newspaper article
Suurõppusel harjutatakse läbi vaenuliku saareriigi küberrünnakud naaberriigile
Pulk, Meinhard
postimees.ee
2023
Suurõppusel harjutatakse läbi vaenuliku saareriigi küberrünnakud naaberriigile
newspaper article
447
newspaper article
Suvekool: kas sina pead nendele IT-küsimustele vastamiseks spikerdama?
digi.geenius.ee
2024
Suvekool: kas sina pead nendele IT-küsimustele vastamiseks spikerdama?
newspaper article
448
book article EST
/
book article ENG
System for determination of legal responsibility/penalty for a cybersecurity breach
Hovorushchenko, Tetiana
;
Herts, Alla
;
Boyarchuk, Artem
;
Pavlova, Olga
ITTAP 2022 - Proceedings of the 2nd International Workshop on Information Technologies: Theoretical and Applied Problems
2022
/
p. 233-240
https://ceur-ws.org/Vol-3309/short9.pdf
Conference proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
449
dissertation
A systematic approach to offensive volunteer cyber militia
Ottis, Rain
2011
http://www.ester.ee/record=b2685353*est
dissertation
450
journal article EST
/
journal article ENG
A systematic literature review of cyber security monitoring in maritime
Vaarandi, Risto
;
Tsiopoulos, Leonidas
;
Visky, Gabor
;
Rehman, Muaan Ur
;
Bahsi, Hayretdin
IEEE Access
2025
/
p. 85307-85329
https://doi.org/10.1109/ACCESS.2025.3567385
journal article EST
/
journal article ENG
Number of records 556, displaying
426 - 450
previous
14
15
16
17
18
19
20
21
22
23
next
subject term
1
1.
küberturve
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT