• Analysis of autonomous driving software to low-level sensor cyber attacksRoberts, Andrew James; Malayjerdi, Mohsen; Bellone, Mauro; Sell, Raivo; Maennel, Olaf Manuel; Hamad, Mohammad; Steinhorst, Sebastian20th International Conference on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2025, 28-29 April 2025, Ottawa, Ontario, Canada2025 / 11 p https://www.etis.ee/Portal/Publications/Display/c612b9a7-7a51-4621-b2d2-76ec03764667
  • Application of journey mapping and crime scripting to the phenomenon of trollingSõmer, Tiia; Tiido, Anna; Sample, Char; Mitchener-Nissen, TimothyProceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018 : National Defence University, Washington DC, USA, 6-9 March 20182018 / p. 465–473 : ill https://www.scopus.com/inward/record.uri?eid=2-s2.0-85051737104&partnerID=40&md5=7bed8e3a8250f0083f8c7702e27c6839 https://www.proceedings.com/38822.html
  • Artificial intelligence within the military domain and cyber warfareHallaq, Bil; Sõmer, Tiia; Osula, Anna-Maria; Ngo, Kim; Mitchener-Nissen, TimothyProceedings of the 16th European Conference on Cyber Warfare and Security, ECCWS 2017 : hosted by University College Dublin, Ireland, 29-30 June 20172017 / p. 153-156 https://www.scopus.com/record/display.uri?eid=2-s2.0-85028013021&origin=resultslist&zone=contextBox
  • ASAT weapons : enhancing NATO’s operational capabilities in the emerging space dependent eraCarlo, Antonio; Veazoglou, NikolaosModelling and Simulation for Autonomous Systems : 6th International Conference, MESAS 2019, Palermo, Italy, October 29–31, 2019, Revised Selected Papers2020 / p. 417-426 https://doi.org/10.1007/978-3-030-43890-6_34
  • Building an ontology for cyber defence exercisesBabayeva, Gulkhara; Maennel, Kaie; Maennel, Olaf ManuelIEEE European Symposium on Security and Privacy Workshops (EuroS&PW)2022 / p. 423-432 https://doi.org/10.1109/EuroSPW55150.2022.00050
  • A case study about the use and evaluation of cyber deceptive methods against highly targeted attacksFarar, Alexandria Elaine; Bahsi, Hayretdin; Blumbergs, Bernhards2017 International Conference On Cyber Incident Response, Coordination, Containment and Control, Cyber Incident 2017 : London, United Kingdom, 19 June 2017 through 20 June 20172017 / [7] p. : ill https://doi.org/10.1109/CYBERINCIDENT.2017.8054640
  • The challenge of protecting space-based assets against cyber threatsCarlo, Antonio; Lacroix, Lisa; Zarkan Cesari, LaetitiaIAC 2020 congress proceedings2020 / art. 59386 https://dl.iafastro.directory/event/IAC-2020/paper/59386/
  • Command and control of cyber weaponsTõugu, Enn2012 4th International Conference on Cyber Conflict : 5-8 June 2012, Tallinn, Estonia : proceedings2012 / p. 333-343 : ill
  • A conceptual nationwide cyber situational awareness framework for critical infrastructuresBahsi, Hayretdin; Maennel, Olaf ManuelSecure IT systems : 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015 : proceedings2015 / p. 3-10 : ill https://doi.org/10.1007/978-3-319-26502-5_1 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-84951873992&origin=inward&txGid=293ce3b9f2fdd541a2e5919611efb245 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=LECT%20NOTES%20ARTIF%20INT&year=2005 https://www.webofscience.com/wos/woscc/full-record/WOS:000374098500001
  • Conflict in cyberspaceOttis, RainRoutledge Handbook of the Future of Warfare2023 / p. 411-420 https://www.taylorfrancis.com/chapters/edit/10.4324/9781003299011-43/conflict-cyberspace-rain-ottis?context=ubx&refId=85b71956-0de2-449f-b3d8-2625a9d6a971 https://doi.org/10.4324/9781003299011-43
  • Cultural, peace and conflict studies series. Vol. 6, The crisis in Ukraine and information operations of the Russian Federation2016 http://www.ester.ee/record=b4555087*est http://www.ksk.edu.ee/wp-content/uploads/2016/12/sojateadlane_2_www.pdf
  • Cyber operations during the conflict in Ukraine and the role of international lawValuch, Josef; Hamulak, OndrejThe use of force against Ukraine and international law : jus ad bellum, jus in bello, jus post bellum2018 / p. 215-235 https://doi.org/10.1007/978-94-6265-222-4_10
  • Cyber warfareOttis, RainCyber security : analytics, technology and automation2015 / p. 89-96 https://doi.org/10.1007/978-3-319-18302-2_6 https://www.scopus.com/sourceid/21100298204 https://www.scopus.com/record/display.uri?eid=2-s2.0-84934878555&origin=inward&txGid=6c24b619b554a5cb6d1c6baf8f1cd089
  • DACA : automated attack scenarios and dataset generationKorving, Frank; Vaarandi, RistoProceedings of the 18th International Conference on Cyber Warfare and Security, ICCWS 2023, a conference hosted by Towson University, Baltimore County, Maryland, USA, 9-10 March 20232023 / p. 550-559 : ill https://papers.academic-conferences.org/index.php/iccws/article/download/962/938 https://doi.org/10.34190/iccws.18.1.962
  • Deep learning-based detection of cyberattacks in software-defined networksMirsadeghi, Seyed Mohammad Hadi; Bahsi, Hayretdin; Inbouli, WissemDigital forensics and cyber crime : 13th EAI international conference, ICDF2C 2022, Boston, MA, November 16-18, 2022 : proceedings2023 / p. 341-354 https://doi.org/10.1007/978-3-031-36574-4_20
  • Efficient semantics of parallel and serial models of attack trees = Ründepuude paralleel- ja jadamudelite efektiivsed semantikadJürgenson, Aivo2010 https://www.ester.ee/record=b2604924*est
  • Enhancing Cybersecurity in Marine Vessels : Integrating Artificial Neural Networks with Inertial Navigation Systems for Resilience Against GPS Cyber-AttacksGülmez, YigitMaritime Cybersecurity2025 / p. 161-178 https://doi.org/10.1007/978-3-031-87290-7_9
  • Enhancing response selection in impact estimation approachesOjamaa, AndresInfo- ja kommunikatsioonitehnoloogia doktorikooli IKTDK neljanda aastakonverentsi artiklite kogumik : 26.-27. novembril 2010, Essu mõis2010 / lk. 137-140 : ill
  • Enhancing the cyber resilience of sea dronesOrye, Erwin; Visky, Gabor; Rohl, Alexander; Maennel, Olaf ManuelCyCon 2024 : Over the Horizon 16th International Conference on Cyber Conflict2024 / p. 83-102 https://ccdcoe.org/uploads/2024/05/CyCon_2024_Orye_Visky_Rohl_Maennel-1.pdf
  • Event-triggered cooperative control of distributed generators in a distribution network subject to jamming attacksXu, Yan; Wen, Fushuan; Palu, Ivo2020 International Conference on Smart Grids and Energy Systems (SGES): 23-26 Nov. 20202020 / p. 95-99 https://doi.org/10.1109/SGES51519.2020.00024
  • Exploring historical maritime cyber-attacks and introducing maritime security operations center as a solution to mitigate themNasr, Ahmed Nagi Abdelaziz Mohamed; Leiger, Roomet; Zaitseva-Pärnaste, Inga; Kujala, Pentti Jouko SakariTheory and practice of shipbuilding : Proceedings of the 26th Symposium (SORTA 2024), Zadar, Croatia, 2-5 October 20242024 / p. 235-245 https://doi.org/10.3233/PMST240042 https://www.scopus.com/sourceid/21101107127 https://www.scopus.com/pages/publications/85216718852?inward
  • Factors of socially engineering citizens in critical situationsLorenz, Birgy; Kikkas, Kaido; Osula, KairiAdvances in Human Factors in Cybersecurity : proceedings of the AHFE 2018 : International Conference on Human Factors in Cybersecurity, July 21-25, 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida, USA2019 / p. 229-240 https://doi.org/10.1007/978-3-319-94782-2_23 https://www.scopus.com/sourceid/5100152904 https://www.scopus.com/record/display.uri?eid=2-s2.0-85049653000&origin=inward&txGid=9ca9ef4afdba0d279143693dae608316 https://www.webofscience.com/wos/woscc/full-record/WOS:000465515600023
  • ForewordJakobson, Gabriel; Ottis, Rain5th International Conference on Cyber Conflict : 4-7 June 2013, Tallinn, Estonia : proceedings2013 / p. vi-viii
  • ForewordJakobson, Gabriel; Ottis, Rain2015 7th International Conference on Cyber Conflict : Architectures in Cyberspace : 26-29 May 2015, Tallinn, Estonia2015 / p. i http://www.ester.ee/record=b4459022*est https://ccdcoe.org/sites/default/files/multimedia/pdf/CyCon_2015_book.pdf
  • Gamification as a neuroergonomic approach to improving interpersonal situational awareness in cyber defenseAsk, Torvald F.; Knox, Benjamin James; Lugo, Ricardo Gregorio; Hoffmann, Lukas; Sütterlin, StefanFrontiers in education2023 / art. 988043, 16 p. : ill https://doi.org/10.3389/feduc.2023.988043 https://www.scopus.com/sourceid/21100935978 https://www.scopus.com/record/display.uri?eid=2-s2.0-85164508991&origin=inward&txGid=ceffb445dac1c155904690a5ea04dffc https://jcr.clarivate.com/jcr-jp/journal-profile?journal=FRONT%20EDUC&year=2023 https://www.webofscience.com/wos/woscc/full-record/WOS:001019244300001
  • How do NATO members define cyber operations?Arik, MarkoHCI International 2023 – Late Breaking Posters |b 25th International Conference on Human-Computer Interaction, HCII 2023, Copenhagen, Denmark, July 23–28, 2023, Proceedings, Part I2024 / p. 8-14 https://doi.org/10.1007/978-3-031-49212-9_2 https://www.scopus.com/sourceid/17700155007 https://www.scopus.com/pages/publications/85180155875?inward
  • Information aggression - a battlefield of smartphonesNyman-Metcalf, Katrin MerikeThe Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood2021 / p. 195-211 https://doi.org/10.1007/978-3-030-73955-3_10 https://www.ester.ee/record=b5434182*est
  • Katrin Nyman-Metcalf : kosmos – lähituleviku sõjatander? [Võrguväljaanne]Nyman-Metcalf, Katrin Merikeerr.ee2021 / fot https://www.err.ee/1608327659/katrin-nyman-metcalf-kosmos-lahituleviku-sojatander
  • Kübersõja küsimärgid ja eripäradOttis, RainSirp : Diplomaatia2013 / lk. 9 : portr https://diplomaatia.ee/kubersoja-kusimargid-ja-eriparad/
  • Kübersõjas on haavatavad isegi ilma internetiühenduseta sihtmärgidPiir, Raitnovaator.err.ee2024 https://novaator.err.ee/1609283511/kubersojas-on-haavatavad-isegi-ilma-internetiuhenduseta-sihtmargid
  • Külm kübersõda : [innovaatiliste tehnoloogiate arendamise vajadusest infotehnoloogias]Tammet, TanelEesti Päevaleht2005 / 27. sept., lk. 7 https://epl.delfi.ee/artikkel/51024946/tanel-tammet-kulm-kubersoda
  • Military psychological operations in the digital battlespace : a practical application of the legal frameworkRoberts, Anastasia; Venables, Adrian NicholasCyCon 2024 : Over the Horizon 16th International Conference on Cyber Conflict2024 / p. 281-296 https://ccdcoe.org/uploads/2024/05/CyCon_2024_Roberts_Venables-1.pdf
  • On antagonism between side-channel security and soft-error reliability in BNN inference enginesLai, Xinhui; Lange, Thomas; Balakrishnan, Aneesh; Alexandrescu, Dan; Jenihhin, MaksimIFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC)2021 / p. 1-6 https://doi.org/10.1109/VLSI-SoC53125.2021.9606981
  • Reliable and efficient determination of the likelihood of rational attacks = Ratsionaalsete rünnete tõepära efektiivne ja usaldusväärne kindlakstegemineLenin, Aleksandr2015 https://www.ester.ee/record=b4530005*est
  • Securing outer space through cyber : risks and countermeasuresCarlo, Antonio; Casamassima, FrancescaIAC 2021 congress proceedings2021 / art. 64939 https://dl.iafastro.directory/event/IAC-2021/paper/64939/ https://www.scopus.com/sourceid/21100255701 https://www.scopus.com/record/display.uri?eid=2-s2.0-85127453125&origin=inward&txGid=4531c27593a436cb8cfbec6b01cd95ae
  • Simulating a cyber-attack on an autonomous sea surface vessel's rudder controllerAstrov, Igor; Bauk, Sanja2024 13th Mediterranean Conference on Embedded Computing (MECO), 11-14 June 2024, Budva, Montenegro2024 / 7 p. : ill https://doi.org/10.1109/MECO62516.2024.10577872 https://www.scopus.com/record/display.uri?eid=2-s2.0-85199487761&origin=resultslist&sort=plf-f&src=s&sot=b&sdt=b&s=ALL%28%22Simulating+a+cyber-attack+on+an+autonomous+sea+surface+vessel%27s+rudder+controller%22%29&sessionSearchId=f53bb18a788748acab088b0e35200e2d&relpos=1 https://www.webofscience.com/wos/woscc/full-record/WOS:001268606200063
  • Simulating a cyber-attack on an autonomous sea surface vessel's rudder controllerAstrov, Igor; Bauk, Sanja2024 13th Mediterranean Conference on Embedded Computing, MECO 20242024 / 1 p. https://journals.scholarsportal.info/browse/26379511
  • Simulating Cyber-Attacks on the Unmanned Sea-Surface Vessel’s Rudder ControllerAstrov, Igor; Bauk, SanjaMaritime Cybersecurity2025 / p. 83-102 https://doi.org/10.1007/978-3-031-87290-7_5
  • Strategic cyber securityGeers, Kenneth2011 https://www.ester.ee/record=b2692421*est
  • Strategic cyber security : evaluating nation-state cyber attack mitigation strategies with DEMATEL = Strateegiline küberjulgeolek : küberrünnaku leevendamise strateegiate hindamine riiklikul tasandil : DEMATEL-i meetodGeers, Kenneth2011 https://digi.lib.ttu.ee/i/?592
  • Suurõppusel harjutatakse läbi vaenuliku saareriigi küberrünnakud naaberriigilePulk, Meinhardpostimees.ee2023 https://www.postimees.ee/7757513/suuroppusel-harjutatakse-labi-vaenuliku-saareriigi-kuberrunnakud-naaberriigile
  • A systematic approach to offensive volunteer cyber militiaOttis, Rain2011 http://www.ester.ee/record=b2685353*est
  • Teadlased loovad küberrünnakute tõrjumiseks Eesti interneti mudeli. TTÜ-s valmib spetsiaalne Eesti küberkaitse tarkvaraRoonemaa, HolgerEesti Päevaleht2010 / 23. veebr., lk. 1, 4
  • Technological sovereignty : missing the point?Maurer, Tim; Skierka-Canton, Isabel; Morgus, Robert; Hohmann, Mirko2015 7th International Conference on Cyber Conflict : Architectures in Cyberspace : 26-29 May 2015, Tallinn, Estonia2015 / p. 53-67
  • The becoming of cyber-military capabilitiesSalminen, Mikko; Kerttunen, MikaRoutledge handbook of international cybersecurity2020 / p. 94-107 https://www.ester.ee/record=b5308475*est
  • The role of artificial intelligence in kinetic targeting from the perspective of international humanitarian lawRoberts, Anastasia; Venables, Adrian Nicholas2021 13th International Conference on Cyber Conflict : Going viral2021 / art. 9468301, p. 43-57 https://doi.org/10.23919/CyCon51939.2021.9468301 https://www.ester.ee/record=b5417211*est
  • 2015 7th International Conference on Cyber Conflict : Architectures in Cyberspace 26-29 May 2015, Tallinn, Estonia2015 http://www.ester.ee/record=b4459022*est https://ccdcoe.org/sites/default/files/multimedia/pdf/CyCon_2015_book.pdf
  • 2011 : 3rd International Conference on Cyber Conflict : 7-10 June 2011, Tallinn, Estonia : proceedingsCzosseck, Christian; Tõugu, Enn; Wingfield, Thomas2011 https://www.ester.ee/record=b2634614*est
  • 2019 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia2019 https://www.ester.ee/record=b5197210*est https://doi.org/10.23919/CyCon46848.2019
  • Using language translation software to detect and classify cyberattacks from suspected cyberattackers from specific countries and languagesPatterson, Wayne; Azzoni, Carlos; Florea, Diana; Kikkas, Kaido; Lorenz, Birgy; Malachias, Rosangela; Vagulin, Leonid; Yu, WilliamNew perspectives in behavioral : cybersecurity II human behavior for business, profiling, linguistics and voting2025 https://www.routledge.com/New-Perspectives-in-Behavioral-Cybersecurity-II-Human-Behavior-for-Business-Profiling-Linguistics-and-Voting/Patterson/p/book/9781032983523