• Advancing cybersecurity education through learning analytics = Küberkaitsealase hariduse parendamine õpianalüütika abilMaennel, Kaie2021 https://doi.org/10.23658/taltech.29/2021 https://www.ester.ee/record=b5434228*est https://digikogu.taltech.ee/et/Item/d01c0b17-3b4b-41c5-ae24-e75b6128a183
  • An enhanced lightweight authentication scheme for secure access to cloud dataHammami, Hamza; Obaidat, Mohammad S.; Ben Yahia, SadokProceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 3: ICE-B, Lieusaint, Paris, France, July 8-10, 20202020 / p. 110-117 https://doi.org/10.5220/0009824301100117
  • An expectation-based approach to policy-based security of the Border Gateway ProtocolLi, Jun; Stein, Josh; Zhang, Mingwei; Maennel, Olaf Manuel2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) : GI 2016 : IEEE Global Internet Symposium : April 10-14, 2016, San Francisco, CA, USA2016 / p. 340-345 : ill https://doi.org/10.1109/INFCOMW.2016.7562098 https://www.scopus.com/sourceid/18204 https://www.scopus.com/record/display.uri?eid=2-s2.0-84988851027&origin=inward&txGid=6fad250da0a5c87c69bda2ee5d0cea8b https://www.webofscience.com/wos/woscc/full-record/WOS:000389210700063
  • Are the current system engineering practices sufficient to meet cyber crime?Buldas, Ahto; Saarepera, MärtHuman Aspects of Information Security, Privacy and Trust : 5th International Conference, HAS 2017 : held as part of HCI International 2017, Vancouver, BC, Canada, July 9–14, 2017 : proceedings2017 / p. 451-463 https://doi.org/10.1007/978-3-319-58460-7_31 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85025149036&origin=inward&txGid=07b6c88214d330c6d639ab561f7fb408 https://www.webofscience.com/wos/woscc/full-record/WOS:000431846800031
  • Assessing safety of object pushing using the principle of reversibilityGavšin, Juri; Kruusmaa, MaarjaHybrid Artificial Intelligent Systems : 6th International Conference : HAIS 2011 : Wroclaw, Poland, May 23-25, 2011 : proceedings. Part I2011 / p. 313-320 : ill https://link.springer.com/chapter/10.1007/978-3-642-21219-2_40
  • Attacker profiling in quantitative security assessment based on attack treesLenin, Aleksandr; Willemson, Jan; Sari, Dyan PermataSecure IT Systems : 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15–17, 2014, Proceedings2014 https://doi.org/10.1007/978-3-319-11599-3_12 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-84910045330&origin=inward&txGid=3d1414578a64d0fd80bb52dd53b7eb53
  • Automating defences against cyber operations in computer networks = Arvutivõrkude kaitse automatiseerimine küberoperatsioonide vastuPihelgas, Mauno2021 https://doi.org/10.23658/taltech.36/2021 https://www.ester.ee/record=b5449710*est https://digikogu.taltech.ee/et/Item/beb3e841-9c6e-4496-a73a-17148bc941ef
  • Bandwidth Reduction DoS attacks in Multi-Tenant NoC-based MPSoCs : detection and avoidance strategies = Ribalaiuse vähendamise DoS-rünnakud mitme rentnikuga NoC-põhiste MPSoC-de puhul : tuvastamise ja vältimise strateegiadChaves Arroyave, Cesar Giovanni2023 https://doi.org/10.23658/taltech.8/2023 https://digikogu.taltech.ee/et/Item/60b3f5ee-3a53-43c6-b79e-d6a8cbbc3489 https://www.ester.ee/record=b5548907*est
  • Black-box separations and their adaptability to the non-uniform modelBuldas, Ahto; Niitsoo, MargusInformation security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings2013 / p. 152-167 https://doi.org/10.1007/978-3-642-39059-3_11 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-84884494636&origin=resultslist&sort=plf-f&src=s&sot=b&sdt=b&s=DOI%2810.1007%2F978-3-642-39059-3_11%29&sessionSearchId=08e7c58f88aea92900d731f06ee215ed
  • Bounded pre-image awareness and the security of hash-tree keyless signaturesBuldas, Ahto; Laanoja, Risto; Laud, Peeter; Truu, AhtoProvable security : 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014 : proceedings2014 / p. 130-145 : ill https://doi.org/10.1007/978-3-319-12475-9_10 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-84909996429&origin=inward&txGid=169ee69b6719d63921e27252844094cf https://jcr.clarivate.com/jcr-jp/journal-profile?journal=LECT%20NOTES%20ARTIF%20INT&year=2005 https://www.webofscience.com/wos/woscc/full-record/WOS:000345592800010
  • Comparative analysis of pattern mining algorithms for event logsGasimov, Orkhan; Vaarandi, Risto; Pihelgas, Mauno2023 IEEE International Conference on Cyber Security and Resilience (CSR) : Venice, Italy, 20232023 / 7 p https://doi.org//10.1109/CSR57506.2023.10224996
  • Detecting and mitigating Low-and-Slow DoS attacks in NoC-based MPSoCsChaves Arroyave, Cesar Giovanni; Azad, Siavoosh Payandeh; Sepulveda, Johanna; Hollstein, Thomas2019 14th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC) : July 1-3 2019, York - United Kingdom : proceedings2019 / p. 82-89 : ill https://doi.org/10.1109/ReCoSoC48741.2019.9034934
  • Does secure time-staming imply collision-free hash functionsBuldas, Ahto; Jürgenson, AivoInfo- ja kommunikatsioonitehnoloogia doktorikooli IKTDK kolmanda aastakonverentsi artiklite kogumik : 25.-26. aprill 2008, Voore külalistemaja2008 / p. 59-63 : ill
  • Does secure time-stamping imply collision-free hash functions?Buldas, Ahto; Jürgenson, AivoLecture notes in computer science2007 / p. 138-150
  • Efficient semantics of parallel and serial models of attack trees = Ründepuude paralleel- ja jadamudelite efektiivsed semantikadJürgenson, Aivo2010 https://www.ester.ee/record=b2604924*est
  • 802.11 Denial of Service ründed ja nende leevendamine : referaatRebane, AndriA & A2009 / 2, lk. 43-50 : ill https://artiklid.elnet.ee/record=b1451681*est
  • E-learning environment identification system : error injection and patterns dynamicsKumlander, DenissInnovations and advances in computer, information, systems sciences, and engineering2013 / p. 917-924 https://doi.org/10.1007/978-1-4614-3535-8_76 https://www.scopus.com/sourceid/19700186822 https://www.scopus.com/record/display.uri?eid=2-s2.0-84866635198&origin=resultslist&sort=plf-f&src=s&sot=b&sdt=b&s=DOI%2810.1007%2F978-1-4614-3535-8_76%29
  • An experimental study of building blocks of lattice-based NIST post-quantum cryptographic algorithmsImran, Malik; Abideen, Zain Ul; Pagliarini, Samuel NascimentoElectronics2020 / art. 1953, 26 p. : ill https://doi.org/10.3390/electronics9111953 https://www.scopus.com/sourceid/21100829272 https://www.scopus.com/record/display.uri?eid=2-s2.0-85096516874&origin=inward&txGid=8ae2f54b5d9b18229c39260c95bb0b68 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=ELECTRONICS-SWITZ&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000593628700001
  • Frankenstack : real-time cyberattack detection and feedback system for technical cyber exercisesPihelgas, Mauno; Kont, MarkusProceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings2021 / p. 396-402 https://doi.org/10.1109/CSR51186.2021.9527923
  • Gone phishin' (but not to jail) [Online resource]Mäses, Sten; Kikerpill, KristjanProceedings of the 3rd Interdisciplinary Cyber Research Workshop 2017 : 8th of July 20172017 / p. 29-30 https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/crw2017_final.pdf
  • Hardware realization of lattice-based post-quantum cryptography = Võrel põhinev post-kvant-krüptograafia riistvaraline realisatsioonImran, Malik2023 https://www.ester.ee/record=b5571216*est https://doi.org/10.23658/taltech.33/2023 https://digikogu.taltech.ee/et/Item/75aeb070-cb8b-4511-beaf-cbea3fca147d https://www.ester.ee/record=b5571216*est
  • Hardware trojan insertion in finalized layouts : from methodology to a silicon demonstrationPerez, Tiago Diadami; Pagliarini, Samuel NascimentoIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems2023 / p. 2094-2107 https://doi.org/10.1109/TCAD.2022.3223846 https://www.scopus.com/sourceid/27724 https://www.scopus.com/record/display.uri?eid=2-s2.0-85144011739&origin=resultslist&sort=plf-f&src=s&sid=f6bea21f940b112407e8b3b930cd5a56&sot=b&sdt=b&s=DOI%2810.1109%2FTCAD.2022.3223846%29&sl=141&sessionSearchId=f6bea21f940b112407e8b3b930cd5a56 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=IEEE%20T%20COMPUT%20AID%20D&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:001017411600002
  • Hardware Trojans for confidence reduction and misclassifications on neural networksGrailoo, Mahdieh; Leier, Mairo; Pagliarini, Samuel NascimentoProceedings Of The Twenty Third International Symposium On Quality Electronic Design (ISQED 2022)2022 / art. 180541, p. 230-235 https://doi.org/10.1109/ISQED54688.2022.9806246
  • Infosüsteemide turveHanson, Vello; Buldas, Ahto1997 https://www.ester.ee/record=b1059903*est
  • Infotehnoloogia. Sõnastik. Osa 8, TurvalisusHanson, Vello; Tavast, Arvi; Kalja, Ahto; Võhandu, Leo1999 https://www.ester.ee/record=b1323628*est
  • Keyless signature infrastructure and PKI : hash-tree signatures in pre- and post-quantum worldBuldas, Ahto; Laanoja, Risto; Truu, AhtoInternational journal of services technology and management2017 / p. 117-130 : ill https://doi.org/10.1504/IJSTM.2017.10002708 https://www.scopus.com/sourceid/19699 https://www.scopus.com/record/display.uri?eid=2-s2.0-85011279377&origin=inward&txGid=004ffeb20d7c072b548860fef26b1102
  • Kübermaailmas on oluline probleeme ennetadaSõmer, TiiaMente et Manu2017 / lk. 30-33 : fot http://www.ttu.ee/public/m/mente-et-manu/MM_01_2017/index.html https://artiklid.elnet.ee/record=b2811469*est
  • Küberohud meie nina all: 4 igapäevast turvariski, mida tõsiselt ei võeta [Võrguväljaanne]digipro.geenius.ee2022 https://digipro.geenius.ee/blogi/dokobiti-blogi/kuberohud-meie-nina-all-4-igapaevast-turvariski-mida-tosiselt-ei-voeta/
  • Leveraging layout-based effects for locking analog ICsAljafar, Muayad J.; Azais, Florence; Flottes, Marie-Lise; Pagliarini, Samuel NascimentoASHES'22: Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security2022 / p. 5-13 https://doi.org/10.1145/3560834.3563826
  • Long-term secure time-stamping using preimage-aware hash functions : (short version)Buldas, Ahto; Geihs, Matthias; Buchmann, JohannesProvable Security : 11th International Conference, ProvSec 2017, Xi'an, China, October 23–25, 2017 : proceedings2017 / p. 251-260 : ill http://doi.org/10.1007/978-3-319-68637-0_15 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85032685678&origin=inward&txGid=c0c4e1227619d7ab264eb75b545f9b65 https://www.webofscience.com/wos/woscc/full-record/WOS:000529303600015
  • Mapping requirements specifications into a formalized blockchain-enabled authentication protocol for secured personal identity assuranceLeiding, Benjamin; Norta, AlexanderFuture Data and Security Engineering : 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 - December 1, 2017 : proceedings2017 / p. 181-196 : ill https://doi.org/10.1007/978-3-319-70004-5_13 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85036461982&origin=inward&txGid=606bbd41a3252c20d93fe400e9106a39 https://www.webofscience.com/wos/woscc/full-record/WOS:000440851600013
  • MedBIoT : generation of an IoT Botnet Dataset in a medium-sized IoT networkGuerra Manzanares, Alejandro; Medina-Galindo, Jorge; Bahsi, Hayretdin; Nõmm, SvenProceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP : February 25-27, 2020, La Valletta, Malta. Vol. 12020 / p. 207-218 : ill https://doi.org/10.5220/0009187802070218
  • Mikrokontrollerite riistvara turbestToomsalu, ArvoArvutustehnika ja Andmetöötlus1997 / 7/8, lk. 7-12
  • Mikrokontrollerite turveToomsalu, ArvoArvutustehnika ja Andmetöötlus1997 / 5, lk. 12-13; 6, lk. 10-15
  • Mobiilse pahavara plahvatusele võib pakkuda leevendust masinõpe [Võrguväljaanne]Oidermaa, Jaan-Juhannovaator.err.ee2022 https://novaator.err.ee/1608708055/mobiilse-pahavara-plahvatusele-voib-pakkuda-leevendust-masinope
  • New efficient utility upper bounds for the fully adaptive model of attack treesBuldas, Ahto; Lenin, AleksandrDecision and game theory for security : 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013 : proceedings2013 / p. 192-205 : ill https://doi.org/10.1007/978-3-319-02786-9_12 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-84893415855&origin=resultslist&sort=plf-f&src=s&sot=b&sdt=b&s=DOI%2810.1007%2F978-3-319-02786-9_12%29&sessionSearchId=4e9f1108c3ce1a3973bd48ac5e4a956b
  • A novel anonymous authentication and key agreement scheme for smart gridHammami, Hamza; Obaidat, Mohammad S.; Ben Yahia, SadokProceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 3: ICE-B, Lieusaint, Paris, France, July 8-10, 20202020 / p. 357-362 https://doi.org/10.5220/0009824203570362
  • Password attacks and generation strategiesTasevski, PredragTTÜ üliõpilaste teadustööde konkursi kokkuvõtted : Tipika teaduskonverents, 24. november 2011, Tallinn2011 / p. 14
  • Proceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology [Online resource]2015 http://cybercentre.cs.ttu.ee/en/icr2015/
  • Proceedings of the 2nd Interdisciplinary Cyber Research Workshop 2016 [Online resource]2016 http://cybercentre.cs.ttu.ee/wp/wp-content/uploads/2016/03/CRW_2016_lingitud.pdf http://www.ester.ee/record=b4579694*est
  • Proceedings of the 3rd Interdisciplinary Cyber Research Workshop 2017 : 8th of July 2017 [Online resource]2017 http://www.ester.ee/record=b4684355*est https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/crw2017_final.pdf
  • Proceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 2018 [Online resource]2018 https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/CRW_2018_lingitud.pdf https://www.ester.ee/record=b5139478*est
  • Rational choice of security measures via multi-parameter attack treesBuldas, Ahto; Laud, Peeter; Priisalu, Jaan; Saarepera, Märt; Willemson, Jan1st International Workshop on Critical Information Infrastructures Security : Samos Island, Greece, August 30 - September 2, 20062006 / p. 232-243 https://link.springer.com/chapter/10.1007/11962977_19
  • Regulatory patterns of the Internet development : expanding the role of private stakeholders through mediatized "self-regulation"Solarte Vasquez, Maria ClaudiaBaltic journal of European studies2013 / p. 84-120 https://artiklid.elnet.ee/record=b2646912*est
  • Roy, Partha Sarathi ; Dutta, Sabyasachi ; Susilo, Willy ; Safavi-Naini, Reihaneh. Password protected secret sharing from lattices : [review]Henno, JaakzbMATH Open2022 / 1 p. https://zbmath.org/pdf/1492.94193.pdf
  • Safeguarding a formalized blockchain-enabled identity-authentication protocol by applying security risk-oriented patternsNorta, Alexander; Matulevičius, Raimundas; Leiding, BenjaminComputers & Security2019 / p. 253−269 https://doi.org/10.1016/j.cose.2019.05.017 https://www.scopus.com/sourceid/28898 https://www.scopus.com/record/display.uri?eid=2-s2.0-85068181119&origin=inward&txGid=c4272b532e8bdb269f1498304362354d https://jcr.clarivate.com/jcr-jp/journal-profile?journal=COMPUT%20SECUR&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000483406200015
  • Security and privacy issues in cloud computing : [brief descriptions]Abbas, Haider; Maennel, Olaf Manuel; Assar, SaidAnnals of telecommunications2017 / p. 233-235 https://doi.org/10.1007/s12243-017-0578-3 https://www.scopus.com/sourceid/17722 https://www.scopus.com/record/display.uri?eid=2-s2.0-85018831463&origin=inward&txGid=c83a055d4a0e3af3e290936c869908b8 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=ANN%20TELECOMMUN&year=2017 https://www.webofscience.com/wos/woscc/full-record/WOS:000401762500001
  • Security proofs for hash tree time-stamping using hash functions with small output sizeBuldas, Ahto; Laanoja, RistoInformation security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings2013 / p. 235-250 : ill https://doi.org/10.1007/978-3-642-39059-3_16 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-84884481046&origin=resultslist&sort=plf-f&src=s&sot=b&sdt=b&s=DOI%2810.1007%2F978-3-642-39059-3_16%29&sessionSearchId=2806594f1e8987ebcedf3818d2d566a2
  • Security protocols analysis in the computational model - dependency flow graphs-based approach = Turvaprotokollide analüüs arvutuslikul mudelil - sõltuvusgraafidel põhinev lähenemisviisTšahhirov, Ilja2008 https://www.ester.ee/record=b2449152*est
  • Simple infeasibility certificates for attack treesBuldas, Ahto; Lenin, Aleksandr; Villemson, Jan; Charnamord, AntonAdvances in Information and Computer Security : 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 – September 1, 2017 : proceedings2017 / p. 39-55 : ill https://doi.org/10.1007/978-3-319-64200-0_3 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85028456863&origin=inward&txGid=26ff8d3cf1c1d7b434005f2530c84db0 https://www.webofscience.com/wos/woscc/full-record/WOS:000455355700003
  • Specialized cyber red team responsive computer network operations = Vastutegevusele orienteeritud punase meeskonna küberoperatsioonidBlumbergs, Bernhards2019 https://digi.lib.ttu.ee/i/?12015
  • TalTechi arvutisüsteemide professori uudne tehnoloogia raskendab spionaaži [Võrguväljaanne]Kald, Indrekituudised.ee2021 https://www.ituudised.ee/uudised/2021/03/15/taltechi-arvutisusteemide-professori-uudne-tehnoloogia-muudab-spionaazi-voimatuks
  • Towards a healthcare cybersecurity certification schemeHovhannisyan, Kristine; Bogacki, Piotr; Colabuono, Consuelo Assunta; Lofu, Domenico; Marabello, Maria Vittoria; Maxwell, Brady Eugen2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)2021 / p. 1-9 https://doi.org/10.1109/CyberSA52016.2021.9478255
  • Vastupidavus võrgusüsteemidesViigipuu, RainA & A2009 / 1, lk. 22-30 https://artiklid.elnet.ee/record=b1226510*est
  • Студента TalTech ждал неприятный сюрприз в начале учебного года: как такое могло произойти?postimees.ee2023 https://limon.postimees.ee/7848940/studenta-taltech-zhdal-nepriyatnyy-syurpriz-v-nachale-uchebnogo-goda-kak-takoe-moglo-proizoyti