Addressing security issues in Industry 4.0 through quantum key distributionAuriemma, Fabio; Ejrnaes, MikkelProceedings of the Estonian Academy of Sciences2025 / p. 175-180 https://doi.org/10.3176/proc.2025.2.17 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS Article at WOS Algavad koolitused aitavad tõsta ettevõtete digivõimekustparnu.postimees.ee2023 Algavad koolitused aitavad tõsta ettevõtete digivõimekust TalTech korraldab mahuka infoturbejuhtide koolitusprogrammi Analysis of the impact of poisoned data within Twitter classification modelsPrice, Christopher; Piirsalu, Jaan; Nõmm, SvenIFAC-PapersOnLine2019 / p. 175-180 https://doi.org/10.1016/j.ifacol.2019.12.170 Artificial intelligence approach to identifying propaganda techniques and objects, taking into account ethical and legal aspectsMolchanova, Maryna; Dutt, Pawan KumarComputer Systems and Information Technologies2025 / p. 97-103 https://doi.org/10.31891/csit-2025-2-11 https://csitjournal.khmnu.edu.ua/index.php/csit/article/view/423 CACS: A cloud privacy-preserving attribute management systemKalu, Aivo; Kus, Burak Can; Laud, Peeter; Leung, Kin Long; Snetkov, Nikita; Vakarjuk, JelizavetaProceedings of the 18th International Conference on Availability, Reliability and Security (ARES), Benevento Italy, 29 August 2023 - 1 September, 20232023 / art. 122, p. 1-9 https://doi.org/10.1145/3600160.3605022 Condition monitoring of electrical machines and its relation to industrial internetBelahcen, Anouar; Gyftakis, Konstantinos N.; Martinez, Javier; Climente-Alarcon, Vicente; Vaimann, Toomas2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 20152015 / p. 233-241 : ill http://dx.doi.org/10.1109/WEMDCD.2015.7194535 Co-operation in the field of information securityTepandi, JaakInformation technology in public administration of Estonia : yearbook 20072008 / p. 16-18 Create your own MUSE : a method for updating security level evaluation instrumentsSeeba, Mari; Affia, Abasi-amefon Obot; Mäses, Sten; Matulevičius, RaimundasComputer Standards and Interface2024 / art. 103776 https://doi.org/10.1016/j.csi.2023.103776 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS Cybersecurity knowledge requirements for strategic level decision makersGarcia-Granados, F.; Bahsi, HayretdinProceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 20202020 / p. 559-568 https://doi.org/ Developing requirements for the new encryption mechanisms in the Estonian eID infrastructureOruaas, Mart; Willemson, JanDatabases and Information Systems : 14th International Baltic Conference, DB&IS 2020, Tallinn, Estonia, June 16-19, 2020 : Proceedings2020 / p. 13-20 https://doi.org/10.1007/978-3-030-57672-1_2 Eesti infoturbe kontseptsioon menetlusesPraust, ValdoArvutimaailm1998 / 3, lk. 58-59 Eesti riigi infoturbekontseptsioonistPraust, ValdoInfotehnoloogia haldusjuhtimises : aastaraamat 19971997 / lk. 174-176 Efficiency bounds for adversary constructions in black-box reductionsBuldas, Ahto; Jürgenson, Aivo; Niitsoo, MargusInformation Security and Privacy : 14th Australasian Conference : ACISP 2009 : Brisbane, Australia, July 1-3, 2009 : proceedings2009 / p. 264-275 https://link.springer.com/chapter/10.1007/978-3-642-02620-1_19 Efficient semantics of parallel and serial models of attack trees = Ründepuude paralleel- ja jadamudelite efektiivsed semantikadJürgenson, Aivo2010 https://www.ester.ee/record=b2604924*est eGovernment services : How to develop them, how to manage them?Kalja, Ahto; Kindel, Kristiina; Kivi, Riina; Robal, TarmoProceedings of PICMET'07 : Management of Converging Technologies : Portland, OR, USA, 5-9. August 20072007 / p. 2795-2798 https://ieeexplore.ieee.org/document/4349620 Enhancing the aspect robustness score of the HAABSA++ model using adversarial trainingAgha, Milad; Frasincar, Flavius; Zhu, Beilly; Robal, TarmoWeb Engineering : 25th International Conference, ICWE 2025, Delft, The Netherlands, June 30 – July 3, 2025 : Proceedings2026 / p. 89-103 https://doi.org/10.1007/978-3-031-97207-2 https://link.springer.com/chapter/10.1007/978-3-031-97207-2_7 Gaps in European Cyber Education and Professional Training WG5 I Education : training, awareness, cyber ranges [Online resource]Maennel, Olaf Manuel; Csaba, Virag2018 https://www.ecs-org.eu/documents/publications/5bf7e01bf3ed0.pdf Gert Jervan: TalTechi uurimisrühma tulemusel on Eesti kui digiriigi eestvedaja paremini kaitstudKald, Indrekituudised.ee2023 Gert Jervan: TalTechi uurimisrühma tulemusel on Eesti kui digiriigi eestvedaja paremini kaitstud Hash-based server-assisted digital signature solutions = Räsifunktsioonidel põhinevad serveri toega digitaalse signeerimise lahendusedTruu, Ahto2020 https://digikogu.taltech.ee/et/Item/a972cc4b-53ec-4c82-8de0-b3e941cce345 Ideological networks and security in the two-speed world - Venia Legendi [Electronic resource]Erne, JaanikaSSRN working paper series2013 / [26] p http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2285465 Improving cybersecurity education in schools : An assessment of the "Digitally Safer School" proposalLorenz, BirgyLearning and Collaboration Technologies : 12th International Conference, LCT 2025, Held as Part of the 27th HCI International Conference, HCII 2025 : Proceedings, Part I2025 / p. 315-327 https://doi.org/10.1007/978-3-031-93564-0_19 Information security in the Republic of Estonia : whence it started, and whereto it tendsOit, Monika; Praust, ValdoInformation technology in public administration of Estonia : yearbook 19981999 / p. 93-95 Information security interoperability framework, version 2Tepandi, JaakEstonian information society yearbook 2011/20122012 / p. 46-47 Infosüsteemide turveHanson, Vello; Buldas, Ahto1997 https://www.ester.ee/record=b1059903*est Infoturbe juhi elukutsestLeis, PaulA & A2003 / 5, lk. 27-35 : ill https://artiklid.elnet.ee/record=b1014185*est Infoturbe koosvõime raamistiku ver 2Tepandi, JaakEesti infoühiskonna aastaraamat 2011/20122012 / lk. 46-47 Infoturve Eesti Vabariigis : millal ja kuidas alustati ning kuhu minnakse?Oit, Monika; Praust, ValdoInfotehnoloogia haldusjuhtimises : aastaraamat 19981999 / lk. 109-111 Infoturve ja küberturvalisus : kolmeteistkümnes peatükkMetsallik, Janek; Maasik, Mall; Elland, Maarja-LiisE-tervise aabits : inimesest innovatsioonini ja tagasi2026 / 25 lk https://www.lib.ttu.ee/e-tervis/pdf/13_PTK_Infoturve.pdf Peatükk 13 — Kordamisküsimused Infoturve: kes ise ennast aitab, seda aitab ka internetTepandi, JaakSaldo2006 / 1, lk. 58-59 KronoDroid : time-based hybrid-featured dataset for effective android malware detection and characterizationGuerra Manzanares, Alejandro; Bahsi, Hayretdin; Nõmm, SvenComputers & Security2021 / art. 102399, 32 p https://doi.org/10.1016/j.cose.2021.102399 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS Method for evaluating information security level in organisationsSeeba, Mari; Mäses, Sten; Matulevičius, RaimundasResearch Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings2022 / p. 644-652 : ill https://doi.org/10.1007/978-3-031-05760-1_39 Conference Proceedings at Scopus Article at Scopus Article at WOS Nutitelefonid teavad meist rohkem kui me iseKivi, Kristerpostimees.ee2024 https://www.postimees.ee/7952304/nutitelefonid-teavad-meist-rohkem-kui-me-ise Personal control of privacy and data : Estonian experiencePriisalu, Jaan; Ottis, RainHealth and technology2017 / p. 441-451 https://doi.org/10.1007/s12553-017-0195-1 Journal metrics at Scopus Article at Scopus Proceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology [Online resource]2015 http://cybercentre.cs.ttu.ee/en/icr2015/ Proceedings of the 2nd Interdisciplinary Cyber Research Workshop 2016 [Online resource]2016 http://cybercentre.cs.ttu.ee/wp/wp-content/uploads/2016/03/CRW_2016_lingitud.pdf http://www.ester.ee/record=b4579694*est Proceedings of the 3rd Interdisciplinary Cyber Research Workshop 2017 : 8th of July 2017 [Online resource]2017 http://www.ester.ee/record=b4684355*est https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/crw2017_final.pdf Proceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 2018 [Online resource]2018 https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/CRW_2018_lingitud.pdf https://www.ester.ee/record=b5139478*est Rational choice of security measures via multi-parameter attack treesBuldas, Ahto; Laud, Peeter; Priisalu, Jaan; Saarepera, Märt; Willemson, Jan1st International Workshop on Critical Information Infrastructures Security : Samos Island, Greece, August 30 - September 2, 20062006 / p. 232-243 https://link.springer.com/chapter/10.1007/11962977_19 Reliable and efficient determination of the likelihood of rational attacks = Ratsionaalsete rünnete tõepära efektiivne ja usaldusväärne kindlakstegemineLenin, Aleksandr2015 https://www.ester.ee/record=b4530005*est Riistvara Trooja hobuste rünnak võib ohustada nii koduarvuti kasutajat kui ka riigi digitaalset julgeolekut [Võrguväljaanne]arileht.delfi.ee2022 Riistvara Trooja hobuste rünnak võib ohustada nii koduarvuti kasutajat kui ka riigi digitaalset julgeolekut Salastus avatud süsteemidesPraust, ValdoArvutimaailm1997 / 8, lk. 47-48 A server-assisted hash-based signature schemeBuldas, Ahto; Laanoja, Risto; Truu, AhtoSecure IT Systems : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017 : proceedings2017 / p. 3-17 : ill https://doi.org/10.1007/978-3-319-70290-2_1 Conference proceedings at Scopus Article at Scopus Article at WOS Sharing confidential commercial information for ensuring availability of critical infrastructure : technology opportunities and perspectivesPreden, Jürgo-SörenEnergy security forum2013 / p. 23-27 : ill Smart cargo container tracking and IT security management : Experimental resultsBauk, Sanja; Dzankic, RadojeJournal of maritime research2024 / p. 128-134 https://www.jmr.unican.es/index.php/jmr/article/view/851/855 Journal metrics at Scopus Article at Scopus Strategically normative. Norms and principles in national cybersecurity strategiesKerttunen, Mika; Tikk, Eneken2019 https://eucyberdirect.eu/wp-content/uploads/2019/04/kerttunen_tikk-strategically-normative-april-2019-eucyberdirect_.pdf TalTech valmistab ette üle 200 riigi infoturbe juhiMente et Manu2024 / lk. 11 https://www.ester.ee/record=b1242496*est The Estonian national concept of information securityPraust, ValdoInformation technology in public administration of Estonia : yearbook 19971998 / p. 97-99 The first ten years of X-roadKalja, AhtoEstonian information society yearbook 2011/20122012 / p. 78-80 The rise of the regionals: how regional organisations contribute to international cyber stability negotiations at the United Nations levelOtt, Nikolas; Osula, Anna-Maria2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings2019 / p. 321-345 https://doi.org/10.23919/CYCON.2019.8756863 https://www.ester.ee/record=b5197210*est https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf Студента TalTech ждал неприятный сюрприз в начале учебного года: как такое могло произойти?postimees.ee2023 Студента TalTech ждал неприятный сюрприз в начале учебного года: как такое могло произойти?