Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysisBlumbergs, Bernhards; Vaarandi, RistoMILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 20172017 / p. 707-712 https://doi.org/10.1109/MILCOM.2017.8170785 Conference proceedings at Scopus Article at Scopus Article at WOS A case study about the use and evaluation of cyber deceptive methods against highly targeted attacksFarar, Alexandria Elaine; Bahsi, Hayretdin; Blumbergs, Bernhards2017 International Conference On Cyber Incident Response, Coordination, Containment and Control, Cyber Incident 2017 : London, United Kingdom, 19 June 2017 through 20 June 20172017 / [7] p. : ill https://doi.org/10.1109/CYBERINCIDENT.2017.8054640 Creating and detecting IPv6 transition mechanism-based information exfiltration covert channelsBlumbergs, Bernhards; Pihelgas, Mauno; Kont, Markus; Maennel, Olaf Manuel; Vaarandi, RistoSecure IT Systems : 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016 : proceedings2016 / p. 85-100 : ill https://doi.org/10.1007/978-3-319-47560-8_6 Conference Proceedings at Scopus Article at Scopus Conference Proceedings at WOS Article at WOS Crossed swords : a cyber red team oriented technical exerciseBlumbergs, Bernhards; Ottis, Rain; Vaarandi, RistoProceedings of the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 20192019 / p. 37-44 https://www.scopus.com/record/display.uri?eid=2-s2.0-85070019446&origin=inward&txGid=b3ce06db78a90b7b9e8a79c0d7b1f9c7 A cyber red team oriented technical exerciseBlumbergs, Bernhards; Ottis, Rain; Vaarandi, RistoAbstracts and conference materials for the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 20192019 / p. 10-11 https://www.academic-conferences.org/conferences/eccws/eccws-future-and-past/ Frankenstack : toward real-time red team feedbackKont, Markus; Pihelgas, Mauno; Maennel, Kaie; Blumbergs, Bernhards; Lepik, ToomasMILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 20172017 / p. 400-405 : ill https://doi.org/10.1109/MILCOM.2017.8170852 Journal metrics at Scopus Article at Scopus Article at WOS Remote exploit development for cyber red team computer network operations targeting industrial control systemsBlumbergs, BernhardsProceedings of the 5th International Conference on Information Systems Security and Privacy : ICISSP 2019 : February 23-25, 2019, Prague, Czech Republic. Vol. 12019 / p. 88-99 : ill https://doi.org/10.5220/0007310300880099 Simple event correlator - best practices for creating scalable configurationsVaarandi, Risto; Blumbergs, Bernhards; Caliskan, Emin2015 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision (CogSIMA 2015) : 9-12 March 2015, Orlando, Florida, USA2015 / p. 96-100 http://dx.doi.org/10.1109/COGSIMA.2015.7108181 Specialized cyber red team responsive computer network operations = Vastutegevusele orienteeritud punase meeskonna küberoperatsioonidBlumbergs, Bernhards2019 https://digi.lib.ttu.ee/i/?12015 TED : a container based tool to perform security risk assessment for ELF binariesMucci, Daniele; Blumbergs, BernhardsProceedings of the 5th International Conference on Information Systems Security and Privacy : ICISSP 2019 : February 23-25, 2019, Prague, Czech Republic. Vol. 12019 / p. 361–369 : tab http://doi.org/10.5220/0007371603610369 An unsupervised framework for detecting anomalous messages from syslog log filesVaarandi, Risto; Blumbergs, Bernhards; Kont, MarkusNetwork operations and management symposium : cognitive mangement in a cyber world, 23-27 april 2018, Taipei, Taiwan2018 / 6 p http://doi.org/10.1109/NOMS.2018.8406283