Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
infoturve (subject term)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
46
Look more..
(1/1)
Export
export all inquiry results
(46)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
26
journal article EST
/
journal article ENG
KronoDroid : time-based hybrid-featured dataset for effective android malware detection and characterization
Guerra Manzanares, Alejandro
;
Bahsi, Hayretdin
;
Nõmm, Sven
Computers & Security
2021
/
art. 102399, 32 p
https://doi.org/10.1016/j.cose.2021.102399
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
Machine learning-based detection and characterization of evolving threats in mobile and IoT Systems = Masinõppepõhine arenevate ohtude tuvastamine ning kirjeldamine mobiilseadmete ja värkvõrkude jaoks
27
book article EST
/
book article ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
28
newspaper article
Nutitelefonid teavad meist rohkem kui me ise
Kivi, Krister
postimees.ee
2024
https://www.postimees.ee/7952304/nutitelefonid-teavad-meist-rohkem-kui-me-ise
newspaper article
29
journal article EST
/
journal article ENG
Personal control of privacy and data : Estonian experience
Priisalu, Jaan
;
Ottis, Rain
Health and technology
2017
/
p. 441-451
https://doi.org/10.1007/s12553-017-0195-1
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
30
book
Proceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology [Online resource]
2015
http://cybercentre.cs.ttu.ee/en/icr2015/
book
31
book
Proceedings of the 2nd Interdisciplinary Cyber Research Workshop 2016 [Online resource]
2016
http://cybercentre.cs.ttu.ee/wp/wp-content/uploads/2016/03/CRW_2016_lingitud.pdf
http://www.ester.ee/record=b4579694*est
book
32
book
Proceedings of the 3rd Interdisciplinary Cyber Research Workshop 2017 : 8th of July 2017 [Online resource]
2017
http://www.ester.ee/record=b4684355*est
https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/crw2017_final.pdf
book
33
book
Proceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 2018 [Online resource]
2018
https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/CRW_2018_lingitud.pdf
https://www.ester.ee/record=b5139478*est
book
34
book article
Rational choice of security measures via multi-parameter attack trees
Buldas, Ahto
;
Laud, Peeter
;
Priisalu, Jaan
;
Saarepera, Märt
;
Willemson, Jan
1st International Workshop on Critical Information Infrastructures Security : Samos Island, Greece, August 30 - September 2, 2006
2006
/
p. 232-243
https://link.springer.com/chapter/10.1007/11962977_19
book article
35
dissertation
Reliable and efficient determination of the likelihood of rational attacks = Ratsionaalsete rünnete tõepära efektiivne ja usaldusväärne kindlakstegemine
Lenin, Aleksandr
2015
https://www.ester.ee/record=b4530005*est
dissertation
36
newspaper article
Riistvara Trooja hobuste rünnak võib ohustada nii koduarvuti kasutajat kui ka riigi digitaalset julgeolekut [Võrguväljaanne]
arileht.delfi.ee
2022
Riistvara Trooja hobuste rünnak võib ohustada nii koduarvuti kasutajat kui ka riigi digitaalset julgeolekut
newspaper article
37
journal article
Salastus avatud süsteemides
Praust, Valdo
Arvutimaailm
1997
/
8, lk. 47-48
journal article
38
book article EST
/
book article ENG
A server-assisted hash-based signature scheme
Buldas, Ahto
;
Laanoja, Risto
;
Truu, Ahto
Secure IT Systems : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017 : proceedings
2017
/
p. 3-17 : ill
https://doi.org/10.1007/978-3-319-70290-2_1
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
39
journal article
Sharing confidential commercial information for ensuring availability of critical infrastructure : technology opportunities and perspectives
Preden, Jürgo-Sören
Energy security forum
2013
/
p. 23-27 : ill
journal article
40
journal article EST
/
journal article ENG
Smart cargo container tracking and IT security management : Experimental results
Bauk, Sanja
;
Dzankic, Radoje
Journal of maritime research
2024
/
p. 128-134
https://www.jmr.unican.es/index.php/jmr/article/view/851/855
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
41
book
Strategically normative. Norms and principles in national cybersecurity strategies
Kerttunen, Mika
;
Tikk, Eneken
2019
https://eucyberdirect.eu/wp-content/uploads/2019/04/kerttunen_tikk-strategically-normative-april-2019-eucyberdirect_.pdf
book
42
journal article
TalTech valmistab ette üle 200 riigi infoturbe juhi
Mente et Manu
2024
/
lk. 11
https://www.ester.ee/record=b1242496*est
journal article
43
book article
The Estonian national concept of information security
Praust, Valdo
Information technology in public administration of Estonia : yearbook 1997
1998
/
p. 97-99
book article
44
book article
The first ten years of X-road
Kalja, Ahto
Estonian information society yearbook 2011/2012
2012
/
p. 78-80
book article
45
book article
The rise of the regionals: how regional organisations contribute to international cyber stability negotiations at the United Nations level
Ott, Nikolas
;
Osula, Anna-Maria
2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings
2019
/
p. 321-345
https://doi.org/10.23919/CYCON.2019.8756863
https://www.ester.ee/record=b5197210*est
https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf
book article
46
newspaper article
Студента TalTech ждал неприятный сюрприз в начале учебного года: как такое могло произойти?
postimees.ee
2023
Студента TalTech ждал неприятный сюрприз в начале учебного года: как такое могло произойти?
newspaper article
Number of records 46, displaying
26 - 46
previous
1
2
next
subject term
1
1.
infoturve
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT