Accessing extraterritorially located data : options for states [Online resource]Osula, Anna-Maria2015 https://ccdcoe.org/sites/default/files/multimedia/pdf/Accessing%20extraterritorially%20located%20data%20options%20for%20States_Anna-Maria_Osula.pdf Adrian Venables: robotid vallutavad transpordisektorit. Küberturvalisus [Võrguväljaanne]Venables, AdrianEdasi.org : innustav ja hariv ajakiri2021 "Adrian Venables: robotid vallutavad transpordisektorit. Küberturvalisus " Adrian Venables: sõda inforuumis – mis see on ja kuidas seal käituda? Küberturvalisus [Võrguväljaanne]Edasi.org : innustav ja hariv ajakiri2022 "Adrian Venables: sõda inforuumis – mis see on ja kuidas seal käituda? Küberturvalisus" Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings2021 https://doi.org/10.1007/978-3-030-87657-9 Advancing cybersecurity education through learning analytics = Küberkaitsealase hariduse parendamine õpianalüütika abilMaennel, Kaie2021 https://doi.org/10.23658/taltech.29/2021 https://www.ester.ee/record=b5434228*est https://digikogu.taltech.ee/et/Item/d01c0b17-3b4b-41c5-ae24-e75b6128a183 Ago Luberg: leian motivatsiooni õpetamisest endast!Luberg, AgoMente et Manu2021 / lk. 14-19 : fot https://www.ester.ee/record=b1242496*est AI systems to ensure cyber security in spacePelin Manti, Nebile; Carlo, Antonio; Markova, Rada; Jha, Devanshu; Breda, Paola; Abdin, Adam; Boschetti, NicoloIAC 2022 congress proceedings2022 / art. 70423 https://dl.iafastro.directory/event/IAC-2022/paper/70423/ Conference proceedings at Scopus Article at Scopus Algas ründetegevusele suunatud küberoperatsioonide õppus [Võrguväljaanne]postimees.ee2021 "Algas ründetegevusele suunatud küberoperatsioonide õppus " Aligning Estonian and Japanese efforts in building norms in cyberspaceOsula, Anna-MariaSo Far, Yet So Close : Japanese and Estonian cybersecurity : policy perspectives and cooperations : report2021 / p. 22-29 https://icds.ee/wp-content/uploads/2021/05/ICDS_Report_So_Far_Yet_So_Close_Roigas_Jermalavicius_May_2021.pdf Alliance attribution of global cyber attacks : The European UnionAlatalu, SiimNational cyber emergencies: the return to civil defence2020 / p. 171−185 https://doi.org/10.4324/9780429343438 Ambitsioon saada merenduse küberjulgeoleku eestkõnelejaksHõimoja, JaneMeremees : Eesti merendusajakiri = Estonian maritime magazine2022 / lk. 8-10 : fot https://www.ester.ee/record=b4646644*est https://issuu.com/ajakirimeremees/docs/meremees_2022_1-4 An extended review on cyber vulnerabilities of AI technologies in space applications: Technological challenges and international governance of AIBreda, P.; Markova, R.; Abdin, A. F.; Mantı, N. P.; Carlo, Antonio; Jha, D.Journal of space safety engineering2023 / p. 447-458 : ill https://doi.org/10.1016/j.jsse.2023.08.003 An international technical standard for commercial space system cybersecurity - a call to actionFalco, Gregory; Henry, Waybe; Aliberti, Marco; Bailey, Brandon; Bailly, Mathieu; Bonnart, Sebastien; Boschetti, Nicolo; Bottarelli, Mirko; Byerly, Adam; Carlo, AntonioASCEND 20222022 https://doi.org/10.2514/6.2022-4302 Analysis of national cyber situational awareness practicesBahsi, HayretdinStrategic cyber defense : a multidisciplinary perspective2017 / p. 31-41 http://doi.org/10.3233/978-1-61499-771-9-31 Anomaly detection and classification in power system state estimation: Combining model-based and data-driven methodsAsefi, Sajjad; Mitrovic, Mile; Cetenovic, Dragan; Levi, Victor; Gryazina, Elena; Terzija, VladimirSustainable energy, grids and networks2023 / art. 101116 https://doi.org/10.1016/j.segan.2023.101116 Areeba : an area efficient binary huff-curve architectureSajid, Asher; Rashid, Muhammad; Jamal, Sajjad Shaukat; Imran, Malik; Alotaibi, Saud S.; Sinky, Mohammed H.Electronics (Switzerland)2021 / art. 1490 https://doi.org/10.3390/electronics10121490 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS Art and automation of teaching malware reverse engineeringLepik, Toomas; Maennel, Kaie; Ernits, Margus; Maennel, Olaf ManuelLearning and Collaboration Technologies : Learning and Teaching : 5th International Conference : LCT 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018 : Proceedings, Part II2018 / p. 461-472 https://doi.org/10.1007/978-3-319-91152-6_35 Conference Proceedings at Scopus Article at Scopus Conference Proceedings at WOS Article at WOS Artificial intelligence in cyber defenceTõugu, Enn2011 : 3rd International Conference on Cyber Conflict : 7-10 June 2011, Tallinn, Estonia : proceedings2011 / p. 95-105 Arvuti riistvarasse peidetud troojalane pakub häkkeritele hõlbuelu [Võrguväljaanne]Oidermaa, Jaan-Juhannovaator.err.ee2022 "Arvuti riistvarasse peidetud troojalane pakub häkkeritele hõlbuelu" Arvutiklassis peaks vältima olukordi, kus ainult poisid saavad särada. Intervjuu Birgy LorenzigaLorenz, Birgymuurileht.ee2023 Arvutiklassis peaks vältima olukordi, kus ainult poisid saavad särada. Intervjuu Birgy Lorenziga Arvutiteadlane: RIA andmebaasi fotode allalaadija võis tahta neid müüaEinmann, AndresPostimees2021 / Lk. 2 https://dea.digar.ee/article/postimees/2021/07/29/3.3 ASAT weapons : enhancing NATO’s operational capabilities in the emerging space dependent eraCarlo, Antonio; Veazoglou, NikolaosModelling and Simulation for Autonomous Systems : 6th International Conference, MESAS 2019, Palermo, Italy, October 29–31, 2019, Revised Selected Papers2020 / p. 417-426 https://doi.org/10.1007/978-3-030-43890-6_34 Assessing the role of international relations in cybersecurity : a preliminary analysisRincon Mendez, Angelica MarinaCeDEM 15 : Proceedings of the International Conference for E-Democracy and Open Government 2015 : 20-22 May 2015, Danube University Krems, Austria2015 / p. 401-404 http://www.donau-uni.ac.at/imperia/md/content/department/gpa/zeg/bilder/cedem/cedem15/cedem15_oa_proceedings.pdf Attribute evaluation on attack trees with incomplete informationBuldas, Ahto; Gadyatskaya, Olga; Lenin, Aleksandr; Mauw, Sjouke; Trujillo-Rasua, RolandComputers & Security2020 / art. 101630, 17 p. : ill https://doi.org/10.1016/j.cose.2019.101630 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS Attribute evaluation on attack trees with incomplete information : a preprintBuldas, Ahto; Gadyatskaya, Olga; Lenin, Aleksandr; Mauw, Sjouke; Trujillo-Rasua, RolandarXiv.org2019 / 21 p. : ill http://arxiv.org/abs/1812.10754 Automating defences against cyber operations in computer networks = Arvutivõrkude kaitse automatiseerimine küberoperatsioonide vastuPihelgas, Mauno2021 https://doi.org/10.23658/taltech.36/2021 https://www.ester.ee/record=b5449710*est https://digikogu.taltech.ee/et/Item/beb3e841-9c6e-4496-a73a-17148bc941ef Autonomous cyber defence capabilitiesTammet, TanelAutonomous cyber capabilities under international law2021 / p. 36-50 https://www.ester.ee/record=b5395402*est Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysisBlumbergs, Bernhards; Vaarandi, RistoMILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 20172017 / p. 707-712 https://doi.org/10.1109/MILCOM.2017.8170785 Big data ja tehnoloogiahiiud: kes lõpuks andmeid haldab? [Võrguväljaanne]digi.geenius.ee2021 "Big data ja tehnoloogiahiiud: kes lõpuks andmeid haldab" Birgy Lorenz: kübertalentide väsimatu avastajaLorenz, BirgyMente et Manu2022 / lk. 12-17 : fot https://www.ester.ee/record=b1242496*est Building an ontology for cyber defence exercisesBabayeva, Gulkhara; Maennel, Kaie; Maennel, Olaf ManuelIEEE European Symposium on Security and Privacy Workshops (EuroS&PW)2022 / p. 423-432 https://doi.org/10.1109/EuroSPW55150.2022.00050 Building cyber resilience : the defensive shield for the EUOsula, Anna-MariaCybersecurity policy in the EU and South Korea from consultation to action : theoretical and comparative perspectives2022 / p. 179-196 https://doi.org/10.1007/978-3-031-08384-6_9 Capability detection and evaluation metrics for cyber security lab exercisesCaliskan, Emin; Tatar, Unal; Bahsi, Hayretdin; Ottis, Rain; Vaarandi, RistoProceedings of the 12th International Conference on Cyber Warfare and Security, ICCWS 20172017 / p. 407-414 : ill https://www.scopus.com/record/display.uri?eid=2-s2.0-85018944652&origin=inward&txGid=dad813d957372581ca0932bf6e4fb5d8 Career development in cyber security: Bootcamp training programsCaliskan, Emin; Vaarandi, RistoProceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 20202020 / p. 503-511 https://doi.org/10.34190/ICCWS.20.080 A case study about the use and evaluation of cyber deceptive methods against highly targeted attacksFarar, Alexandria Elaine; Bahsi, Hayretdin; Blumbergs, Bernhards2017 International Conference On Cyber Incident Response, Coordination, Containment and Control, Cyber Incident 2017 : London, United Kingdom, 19 June 2017 through 20 June 20172017 / [7] p. : ill https://doi.org/10.1109/CYBERINCIDENT.2017.8054640 CGI Eesti kosmose ärisuuna juhi Sille Kraami soovitus noortele : tehke suure kirega seda, millesse usuteKraam, Silleforte.delfi.ee2024 GI Eesti kosmose ärisuuna juhi Sille Kraami soovitus noortele: tehke suure kirega seda, millesse usute The challenge of protecting space-based assets against cyber threatsCarlo, Antonio; Lacroix, Lisa; Zarkan Cesari, LaetitiaIAC 2020 congress proceedings2020 / art. 59386 https://dl.iafastro.directory/event/IAC-2020/paper/59386/ Challenges in collecting digital evidence : a legal perspectiveKasper, Agnes; Laurits, EneliThe future of law and eTechnologies2016 / p. 195-233 : ill http://dx.doi.org/10.1007/978-3-319-26896-5_10 Chia, N-H.; Chung, K-M.; Yamakawa, T. A black-box approach to post-quantum zero-knowledge in constant rounds : [review]Henno, JaakzbMATH Open2022 / 1 p. https://zbmath.org/1486.94089 Civil defence and cyber security: A contemporary European perspectiveTikk, EnekenNational cyber emergencies: the return to civil defence2020 / p. 76-92 https://doi.org/10.4324/9780429343438 Combined safety and cybersecurity testing methodology for autonomous driving algorithmsRoberts, Andrew; Malayjerdi, Mohsen; Malayjerdi, Ehsan; Maennel, Olaf ManuelCSCS '22 : Proceedings of the 6th ACM Computer Science in Cars Symposium2022 / art. 12, 10 p https://doi.org/10.1145/3568160.3570235 A comparative framework for cyber threat modelling : case of healthcare and industrial control systemsBalogun, Mobolarinwa; Bahsi, Hayretdin; Keskin, Omer F.; Tatar, UnalInternational Journal of Critical Infrastructures2021 / 1 p https://doi.org/10.1504/IJCIS.2024.10046187 A comparison-based methodology for the security assurance of novel systemsLaud, Peeter; Vakarjuk, JelizavetaESORICS 2022: Computer Security. ESORICS 2022 International Workshops : conference proceedings2023 / p. 625-644 https://doi.org/10.1007/978-3-031-25460-4_36 A comprehensive instrument for identifying critical information infrastructure servicesHerrera, Luis-Carlos; Maennel, Olaf ManuelInternational Journal of Critical Infrastructure Protection2019 / p. 50-61 : ill https://doi.org/10.1016/j.ijcip.2019.02.001 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS A conceptual nationwide cyber situational awareness framework for critical infrastructuresBahsi, Hayretdin; Maennel, Olaf ManuelSecure IT systems : 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015 : proceedings2015 / p. 3-10 : ill https://doi.org/10.1007/978-3-319-26502-5_1 CR14 ja Tallinna Tehnikaülikool sõlmisid leppe Eesti noorte küberkaitsevõistluse edendamiseksElektriala2023 / lk. 11-12 : foto https://www.ester.ee/record=b1240496*est Creating randomness with gamesHenno, Jaak; Jaakkola, Hannu; Mäkelä, JukkaActa Polytechnica Hungarica : journal of applied sciences at Budapest Polytechnic Hungary2019 / p. 193-212 : ill http://acta.uni-obuda.hu/Henno_Jaakkola_Makela_96.pdf https://doi.org/10.12700/APH.16.9.2019.9.11 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS Crossed swords : a cyber red team oriented technical exerciseBlumbergs, Bernhards; Ottis, Rain; Vaarandi, RistoProceedings of the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 20192019 / p. 37-44 https://www.scopus.com/record/display.uri?eid=2-s2.0-85070019446&origin=inward&txGid=b3ce06db78a90b7b9e8a79c0d7b1f9c7 Culturally-sensitive cybersecurity awareness program design for Iranian high-school studentsKarimnia, Rooya; Maennel, Kaie; Shahin, MahtabProceedings of the 8th International Conference on Information Systems Security and Privacy (ICISSP), 9-11 February, 20222022 / p. 121-132 https://doi.org/10.5220/0010824800003120 Cyber attacks on power system automation and protection and impact analysisRajkumar, Vetrivel Subramaniam; Tealane, Marko; Stefanov, Alexandru; Presekal, Alfan; Palensky, PeterProceedings of 2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), 26-28 October, 20202020 / p. 247–254 https://doi.org/10.1109/ISGT-Europe47291.2020.9248840 Cyber attacks on protective relays in digital substations and impact analysisRajkumar, Vetrivel Subramaniam; Tealane, Marko; Stefanov, Alexandru; Palensky, Peter8th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems(MSCPES), Virtual Workshop, online, from April 21, 2020 : proceedings2020 / 6 p. : ill https://doi.org/10.1109/MSCPES49613.2020.9133698 Cyber commands - a universal solution to a universal cyber security challenge?Alatalu, SiimRedesigning organizations2020 / p. 27−43 https://doi.org/10.1007/978-3-030-27957-8_2 Cyber commands - universal solution to a universal cyber security problem?Alatalu, SiimProceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 20182018 / p. 21-22 https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/CRW_2018_lingitud.pdf Cyber game to cyber exercise : a new methodology for cybersecurity simulationsLovell, Kieren NicolasProceedings of the 5th Interdisciplinary Cyber Research Conference 2019 : 29th of June 2019, Tallinn University of Technology2019 / p. 13-16 https://www.ester.ee/record=b5238490*est Cyber hygiene : the big pictureMaennel, Kaie; Mäses, Sten; Maennel, Olaf ManuelSecure IT Systems : 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28–30, 2018 : proceedings2018 / p. 291-305 : ill https://doi.org/10.1007/978-3-030-03638-6_18 Conference Proceedings at Scopus Article at Scopus Conference Proceedings at WOS Article at WOS Cyber incident management in low-income countriesHountomey, Jean-Robert; Bahsi, Hayretdin; Tatar, Unal; Hashem, Sherif; Dubois, Elisabeth2022 https://cybilportal.org/wp-content/uploads/2022/01/CSIRTs-In-Low-Income-Countries-Final-Report-part-1-v16.pdf https://thegfce.org/working-groups/working-group-b/ Cyber incident management in low-income countriesHountomey, Jean-Robert; Bahsi, Hayretdin; Tatar, Unal; Hashem, Sherif; Dubois, Elisabeth2022 https://cybilportal.org/wp-content/uploads/2022/01/CSIRTs-In-Low-Income-Countries-Final-Report-part-2-v16.pdf https://thegfce.org/working-groups/working-group-b/ A cyber red team oriented technical exerciseBlumbergs, Bernhards; Ottis, Rain; Vaarandi, RistoAbstracts and conference materials for the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 20192019 / p. 10-11 https://www.academic-conferences.org/conferences/eccws/eccws-future-and-past/ Cyber security and intellectual copyrightWarren, AdrienneStudioosus2010 / lk. 20 Cyber security exercises : a comparison of participant evaluation metrics and scoring systemsCaliskan, Emin; Topgul, Oguzhan M.; Ottis, RainStrategic cyber defense : a multidisciplinary perspective2017 / p. 180-190 http://doi.org/10.3233/978-1-61499-771-9-180 Cyber Security Risk Analysis for a Virtual Assistant G2C Digital Service Using FAIR ModelDreyling, Richard; Jackson, Eric B.; Pappel, Ingrid2021 Eighth International Conference on eDemocracy & eGovernment (ICEDEG) : Quito, Ecuador, 28-30 July 20212021 / p. 33-40 https://doi.org/10.1109/ICEDEG52154.2021.9530938 Cyber vulnerabilities and risks of AI technologies in space applicationsBreda, Paola; Abdin, Adam; Markova, Rada; Jha, Devanshu; Carlo, Antonio; Pelin Manti, NebileIAC 2022 congress proceedings2022 / art. 70380 https://dl.iafastro.directory/event/IAC-2022/paper/70380/ Conference proceedings at Scopus Article at Scopus CyberGenomics : application of behavioral genetics in cybersecurityDomarkiene, Ingrida; Ambrozaityte, Laima; Bukauskas, Linas; Rančelis, Tautvydas; Sütterlin, Stefan; Knox, Benjamin James; Maennel, Kaie; Maennel, Olaf Manuel; Parish, Karen; Lugo, Ricardo Gregorio; Brilingaite, AgneBehavioral Sciences2021 / art. 152 https://doi.org/10.3390/bs11110152 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS The cyber-insurance market in NorwayBahsi, Hayretdin; Franke, Ulrik; Langfeldt Friberg, EvenInformation and computer security2020 / p. 54−67 https://doi.org/10.1108/ICS-01-2019-0012 Journal metrics at Scopud Article at Scopus Journal metrics at WOS Article at WOS Cybersecurity considerations in autonomous shipsCho, Sungbaek; Orye, Erwin; Visky, Gabor; Prates, Vasco2022 https://ccdcoe.org/library/publications/cybersecurity-considerations-in-autonomous-ships/ Cybersecurity in GermanySchallbruch, Martin; Skierka-Canton, Isabel2018 http://doi.org/10.1007/978-3-319-90014-8 Cybersecurity in the era of hypercompetitiveness : can the EU meet the new challenges?Munkoe, Malthe; Mölder, HolgerRevista CIDOB d'afers internacionals2022 / p. 69-94 https://doi.org/10.24241/rcai.2022.131.2.69/en Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS Cybersecurity in the making – policy and law: a case study of GeorgiaNapetvaridze, Vladimeri; Chochia, ArchilInternational and comparative law review2019 / p. 155–180 https://doi.org/10.2478/iclr-2019-0019 Cybersecurity knowledge requirements for strategic level decision makersGarcia-Granados, F.; Bahsi, HayretdinProceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 20202020 / p. 559-568 https://doi.org/ Cybersecurity test range for autonomous vehicle shuttlesRoberts, Andrew; Snetkov, Nikita; Maennel, Olaf Manuel2021 IEEE European Symposium on Security and Privacy Workshops EuroS&PW 2021 : Virtual Conference, 6-10 September 2021 : proceedings2021 / p. 239-249 : ill https://doi.org/10.1109/EuroSPW54576.2021.00031 Cybersecurity threats to space: From conception to the aftermathsBonnart, S.; Capurso, A.; Carlo, Antonio; Dethlefsen, T. F.; Kerolle, M.; Lim, J.; Pickard, A.; Russo, A.; Zarkan, L. C.Space law in a networked world2023 / p. 39–101 https://doi.org/10.1163/9789004527270_004 Cybersecurity within the curricula of informatics : the Estonian perspectiveLorenz, Birgy; Kikkas, Kaido; Sõmer, Tiia; Laugasson, EdmundInformatics in Schools. New Ideas in School Informatics :12th International Conference on Informatics in Schools : Situation, Evolution, and Perspectives, ISSEP 2019, Larnaca, Cyprus, November 18–20, 2019 : proceedings2019 / p. 159-171 https://doi.org/10.1007/978-3-030-33759-9_13 Conference Proceedings at Scopus Article at Scopus Conference Proceedings at WOS Article at WOS Cyberspace from the hybrid threat perspectiveGunneriusson, Hakan; Ottis, RainProceedings of the 12th European Conference on Information Warfare and Security : University of Jyväskylä, Finland, 11-12 July 20132013 / p. 98-105 : ill DACA : automated attack scenarios and dataset generationKorving, Frank; Vaarandi, RistoProceedings of the 18th International Conference on Cyber Warfare and Security, ICCWS 2023, a conference hosted by Towson University, Baltimore County, Maryland, USA, 9-10 March 20232023 / p. 550-559 : ill https://papers.academic-conferences.org/index.php/iccws/article/download/962/938 https://doi.org/10.34190/iccws.18.1.962 DADS : decentralized attestation for device swarmsWedaj, Samuel; Paul, Kolin; Ribeiro, Vinay J.ACM Transactions on Privacy and Security2019 / Art. 19 https://doi.org/10.1145/3325822 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS Dances with the Illuminati: Hands on social engineering in a classroom settingMäses, Sten; Lorenz, Birgy; Kikkas, Kaido; Karmo, KristjanNew Perspectives in Behavioral Cybersecurity: Human Behavior and Decision-Making Models2024 / 7 p https://doi.org/10.1201/9781003415060-7 Demüstifitseerime küberturvalisuseSõmer, TiiaKüberturvalisus : Äripäeva lisa2022 / Lk. 14 "Demüstifitseerime küberturvalisuse" https://www.ester.ee/record=b1071975*est Design and implementation of an availability scoring system for cyber defence exercisesPihelgas, Mauno14th International Conference on Cyber Warfare and Security (ICCWS 2019) : Stellenbosch University, South Africa, 28 February - 1 March 2019 : Proceedings2019 / p. 329-337 http://toc.proceedings.com/48113webtoc.pdf "ICCWS 2019" Design and verification of secure cache wrapper against access-driven side-channel attacksNiazmand, Behrad; Azad, Siavoosh Payandeh; Jervan, Gert; Sepulveda, JohannaEuromicro Conference on Digital System Design : DSD 2019 : 28 - 30 August 2019 Kallithea, Chalkidiki, Greece : proceedings2019 / p. 672-676 : ill https://doi.org/10.1109/DSD.2019.00108 Detecting and mitigating Low-and-Slow DoS attacks in NoC-based MPSoCsChaves Arroyave, Cesar Giovanni; Azad, Siavoosh Payandeh; Sepulveda, Johanna; Hollstein, Thomas2019 14th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC) : July 1-3 2019, York - United Kingdom : proceedings2019 / p. 82-89 : ill https://doi.org/10.1109/ReCoSoC48741.2019.9034934 Developing autonomous robotic transport systems for hospitals and medical facilities : legal challengesKerikmäe, Tanel; Kajander, Aleksi Oskar Johannes; Hamulak, Ondrej; Mesarčik, Matuš; Andraško, Jozef; Liiv, InnarIcon2023 / p. 88-104 https://www.icohtec.org/icon/volume-28-issue-2-2023/ Developing military cyber workforce in a conscript armed forces : recruitment, challenges and optionsSõmer, Tiia; Lorenz, Birgy; Ottis, Rain14th International Conference on Cyber Warfare and Security (ICCWS 2019) : Stellenbosch University, South Africa, 28 February - 1 March 2019 : proceedings2019 / p. 413−421 http://toc.proceedings.com/48113webtoc.pdf "ICCWS 2019" Diagnosing DoS attacks in NoC-based MPSoCsChaves Arroyave, Cesar Giovanni; Azad, Siavoosh Payandeh; Hollstein, Thomas; Sepulveda, JohannaTestmethoden und Zuverlässigkeit von Schaltungen und Systemen, TUZ 20192019 / p. [39–41] https://www.researchgate.net/publication/333756736 Digitaalne heaolu ja vaimne tervisLeikop, MadliÕpetajate Leht2024 / Lk. 6 https://dea.digar.ee/article/opetajateleht/2024/01/30/8.1 Digitaalne heaolu ja vaimne tervis Digital development of the European Union : an interdisciplinary perspective2023 https://doi.org/10.1007/978-3-031-27312-4 https://www.ester.ee/record=b5557935*est Digiturvalise kooli hindamine ja statuutLorenz, Birgy; Baum, Anu2022 https://drive.google.com/file/d/1quconUMvKztEwhwEBt2E8ohxqDLQwKbf/view Doktoritöö: digiriigi turvalisuse pant on sektorite koostööHarrik, Airikaerr.ee2023 Doktoritöö: digiriigi turvalisuse pant on sektorite koostöö https://digikogu.taltech.ee/et/Item/e555dd12-dcfd-482f-9a46-908a9bf2cdb0 https://www.ester.ee/record=b5568988*est Domain engineering for cyber defense: a case study and implicationsTepandi, Jaak; Piho, Gunnar; Liiv, InnarConference on Cyber Conflict : proceedings 20102010 / p. 59-77 Dual-use cyber tools and the EU’s narrative construction on cybersecurity capacity buildingKasper, AgnesIDEAS : Interdisciplinary conference on European Advanced Studies : (Dis)integration from an (in)equality perspective2022 / p. 12 https://www.iee-ulb.eu/content/uploads/2022/05/FINAL-Conference-Programme-IDEAS-with-abstracts.pdf Dynamic and distributed security management for NoC Based MPSoCsAzad, Siavoosh Payandeh; Jervan, Gert; Sepulveda, JohannaComputational Science - ICCS 2019 : 19th International Conference, Faro, Portugal, June 12-14, 2019 : Proceedings, Part II2019 / p. 649–662 : ill https://doi.org/10.1007/978-3-030-22741-8_4 Conference Proceedings at Scopus Article at Scopud Conference Proceedings at WOS Article at WOS Early detection of network attacks using deep learningAhmad, Tanwir; Truscan, Dragos; Vain, Jüri; Porres, Ivan2022 IEEE 15th International Conference on Software Testing, Verification andValidation Workshops : ICSTW 2022, 4–13 April 2022, Virtual Event : proceedings2022 / p. 30-39 https://doi.org/10.1109/ICSTW55395.2022.00020 https://arxiv.org/pdf/2201.11628.pdf Educational computer game for cyber security : game concept [Online resource]Sõmer, TiiaProceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology2015 / p. 17-19 http://cybercentre.cs.ttu.ee/en/icr2015/ Eesti arendusettevõte Cybernetica annab võimaluse areneda oma ala professionaaliksituudised.ee2023 Eesti arendusettevõte Cybernetica annab võimaluse areneda oma ala professionaaliks Eesti IT-firma töötaja sai riigilt pea miljoni e-hääletamise turvalisuse uurimiseksKald, Indrekituudised.ee2024 Eesti IT-firma töötaja sai riigilt pea miljoni e-hääletamise turvalisuse uurimiseks Eesti kaitsetööstus on kümne aastaga kujunenud tugevaks majandusharuksRänisoo, TarmoPostimees2021 / Lk. 18-19 : fot https://dea.digar.ee/article/postimees/2021/02/25/15.2 Eesti laevandusettevõtted ei ole küberturvalisusele piisavalt tähelepanu pööranudHeering, DanMeremees. Veeteede Ameti teataja2017 / lk. 10-13 : fot http://www.ester.ee/record=b4646644*est https://issuu.com/ajakirimeremees/docs/meremees_2017_4-4._va_teataja_2017_ Eesti loodab hakata kosmoses liiklust reguleerima ja satelliite turvamaParksepp, AnetteEesti Päevaleht2020 / Lk. 6-7 : ill https://dea.digar.ee/article/eestipaevaleht/2020/09/09/8.1 Eesti suurima küberkaitse talentide võistluse võitis TalTechi tudengLorenz, BirgyElektriala2023 / lk. 23 https://www.ester.ee/record=b1240496*est Eesti teadlane tegi küberkuritegevuse uurimise mudeli, mis toob küberpätid valguse kätte [Võrguväljaanne]postimees.ee2022 Eesti teadlane tegi küberkuritegevuse uurimise mudeli, mis toob küberpätid valguse kätte Eesti teadlased tegid tarkvara, mis ennetab küberrünnakuidPihel, Hele-Riinpostimees.ee2023 Eesti teadlased tegid tarkvara, mis ennetab küberrünnakuid Eestis luuakse merenduse küberturbe keskusTransport ja Logistika : infoleht2020 / lk. 12 https://www.ester.ee/record=b1975868*est Eestist pärit Rangeforce teeb küberkaitse õpetamises revolutsiooni, klientideks USA suur militaarmaja ja juhtiv meediafirmaVogelberg, Jaanusdigipro.geenius.ee2023 Eestist pärit Rangeforce teeb küberkaitse õpetamises revolutsiooni, klientideks USA suur militaarmaja ja juhtiv meediafirma An efficient authentication and key agreement scheme for secure smart grid communication servicesHammami, Hamza; Obaidat, Mohammad S.; Ben Yahia, SadokInternational journal of communication systems2020 / art. e4558, p. 1−13 https://doi.org/10.1002/dac.4558 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS Ekspert: eestlastel on olemas teadmised küberturvalisusest, kuid millegipärast neid ei kasutata [Võrguväljaanne]Baum, Anugeenius.ee2022 Ekspert: eestlastel on olemas teadmised küberturvalisusest, kuid millegipärast neid ei kasutata Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings2020 https://doi.org/10.1007/978-3-030-60347-2 Enhancing cyber defense situational awareness using 3D visualizationsKullman, Kaur; Cowley, Jennifer; Ben-Ashe, Noam13th International Conference on Cyber Warfare and Security (ICCWS 2018), Washington, DC, USA, 8 – 9 March 20182018 / p. 369-378 http://toc.proceedings.com/38822webtoc.pdf Enhancing response selection in impact estimation approachesOjamaa, AndresInfo- ja kommunikatsioonitehnoloogia doktorikooli IKTDK neljanda aastakonverentsi artiklite kogumik : 26.-27. novembril 2010, Essu mõis2010 / lk. 137-140 : ill Enneta küberkurjategijat tema järgmist sammu ette nähesZirnask, VilluFinantsjuhtimine : infoleht2022 / lk. 8 http://www.ester.ee/record=b2082311*est https://digikogu.taltech.ee/et/Item/5c41eec5-0c88-43c8-9294-c9f47e7c438b Enneta küberkurjategijat tema järgmist sammu ette nähes [Võrguväljaanne]Zirnask, Villufinantsuudised.ee2020 Enneta küberkurjategijat tema järgmist sammu ette nähes Ensuring Cybersecurity in Shipping: Reference to Estonian ShipownersHeering, DanTransNav : the international journal on marine navigation and safety of sea transportation2020 / p. 271−278 https://doi.org/10.12716/1001.14.02.01 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS Enterprise security analysis and training experienceOjamaa, Andres; Tõugu, EnnCritical Information Infrastructures Security : 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014 : revised selected papers2016 / p. 200-208 : ill https://doi.org/10.1007/978-3-319-31664-2_21 Envisioning the future renewable and resilient energy grids – a power grid revolution enabled by renewables, energy storage, and energy electronicsPeng, Fang Zheng; Liu, Chen-Ching; Li, Yuan; Jain, Akshay Kumar; Vinnikov, DmitriIEEE journal of emerging and selected topics in industrial electronics2023 https://doi.org/10.1109/JESTIE.2023.3343291 E-­residency as the Estonian e-government Éclat : how more security can result in less privacy [Online resource]Särav, SandraProceedings of the 2nd Interdisciplinary Cyber Research Workshop 20162016 / p. 39-41 http://cybercentre.cs.ttu.ee/wp/wp-content/uploads/2016/03/CRW_2016_lingitud.pdf http://www.ester.ee/record=b4579694*est Establishing cyber sovereignty - Russia follows China's example [Online resource]Venables, AdrianRahvusvaheline Kaitseuuringute Keskus (RKK) = International Centre for Defence and Security (ICDS)2019 "ICDS Blog" Estonia’s cyber defence league : a model for the United States?Cardash, Sharon L.; Cilluffo, Frank J.; Ottis, RainStudies in conflict & terrorism2013 / p. 777-787 Estonian president stresses support for Ukraine at meeting with Cypriot colleague [Online resource]baltictimes.com2022 "Estonian president stresses support for Ukraine at meeting with Cypriot colleague " Estonian scientists create a drone solution to help victims of terrorist attacks [Online resource]Hankewitz, Stenestonianworld.com2021 "Estonian scientists create a drone solution to help victims of terrorist attacks" EU Common position on international law and cyberspaceOsula, Anna-Maria; Kasper, Agnes; Kajander, Aleksi Oskar JohannesMasaryk University journal of law and technology2022 / p. 89-123 https://doi.org/10.5817/MUJLT2022-1-4 Journal metrics at Scopus Article at Scopus EU cybersecurity and cyber diplomacyKasper, Agnes; Osula, Anna-Maria; Molnar, AnnaIDP Revista de Internet Derecho y Política2021 / p. 1-15 https://doi.org/10.7238/idp.v0i34.387469 Journal metrics at Scopus Article at Scopus EU cybersecurity governance – stakeholders and normative intentions towards integrationKasper, AgnesThe future of the European Union : demisting the debate2020 / p. 166−185 https://www.um.edu.mt/library/oar/handle/123456789/52308 https://www.um.edu.mt/library/oar/bitstream/123456789/52308/1/EU_cybersecurity_governance%e2%80%93stakeholders_and_normative_intentions_towards_integration_2020.pdf Euler, sudoku ja küberrünnakudVõhandu, LeoA & A2007 / 6, lk. 45-53 Evaluating cybersecurity-related competences through serious gamesMäses, Sten19th Koli Calling Conference on Computing Education Research Koli Calling 2019 : November 21-24, 2019, Koli, Finland : proceedings2019 / 2 p https://doi.org/10.1145/3364510.3366163 Conference proceedings at Scopus Article at Scopus Article at WOS Evaluating cybersecurity-related competences through simulation exercises = Küberturbe-alaste kompetentside hindamine simulatsiooniharjutuste abilMäses, Sten2020 https://www.ester.ee/record=b5384385*est https://digikogu.taltech.ee/et/Item/b4c33d3b-e7ce-48ad-98ad-a0add5e571a3 Event management and incident response framework for small companies [Online resource]Kont, MarkusProceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology2015 / p. 52-53 http://cybercentre.cs.ttu.ee/en/icr2015/ Exercise Neptune : maritime cybersecurity training using the navigational simulatorsLovell, Kieren NicolasProceedings of the 5th Interdisciplinary Cyber Research Conference 2019 : 29th of June 2019, Tallinn University of Technology2019 / p. 34-37 https://www.ester.ee/record=b5238490*est Expert knowledge elicitation for skill level categorization of attack pathsMezešova, Terezia; Bahsi, HayretdinCyber science 2018 : conference programme2018 / p. 29 https://www.c-mric.com/wp-content/uploads/2018/04/20180611-Cyber-Science-2018-Event-Brochure-DRAFT-v0.6.pdf Expert knowledge elicitation for skill level categorization of attack pathsMezešova, Terezia; Bahsi, Hayretdin2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)2019 / 8 p. : tab https://doi.org/10.1109/CyberSecPODS.2019.8885192 Facebooki katkestus mõjutas nii ettevõtete kui ka riikide toimepidevust [Võrguväljaanne]Pärli, Merilinerr.ee2021 "Facebooki katkestus mõjutas nii ettevõtete kui ka riikide toimepidevust" Facebooki, Instagrami ja Whatsappi tabas tohutu ülemaailmne rike [Võrguväljaanne]ohtuleht.ee2021 "Facebooki, Instagrami ja Whatsappi tabas tohutu ülemaailmne rike" Finland wins cyber defence exercise Locked Shields 2022 [Online resource]news.err.ee2022 "Finland wins cyber defence exercise Locked Shields 2022 " ForewordJakobson, Gabriel; Ottis, Rain2016 : 8th International Conference on Cyber Conflict : Cyber Power : 31 May-3 June 2016, Tallinn, Estonia2016 / p. [i] ForewordJakobson, Gabriel; Ottis, Rain2015 7th International Conference on Cyber Conflict : Architectures in Cyberspace : 26-29 May 2015, Tallinn, Estonia2015 / p. i http://www.ester.ee/record=b4459022*est https://ccdcoe.org/sites/default/files/multimedia/pdf/CyCon_2015_book.pdf ForewordJakobson, Gabriel; Ottis, Rain5th International Conference on Cyber Conflict : 4-7 June 2013, Tallinn, Estonia : proceedings2013 / p. vi-viii Formal methods based security for cloud-based manufacturing cyber physical systemMuniasamy, Kandasamy; Srinivasan, Seshadhri; Vain, Jüri; Sethumadhavan, M.IFAC-PapersOnLine2019 / p. 1198-1203 https://doi.org/10.1016/j.ifacol.2019.11.361 Conference proceedings at Scopus Article at Scopus Article at WOS 14th International Conference on Cyber Conflict : Keep Moving2022 https://ccdcoe.org/uploads/2022/06/CyCon_2022_book.pdf Framework for industrial control systems digital forensics in the energy sectorRoberts, AndrewProceedings of the 5th Interdisciplinary Cyber Research Conference 2019 : 29th of June 2019, Tallinn University of Technology2019 / p. 24-26 https://www.ester.ee/record=b5238490*est Frankenstack : toward real-time red team feedbackKont, Markus; Pihelgas, Mauno; Maennel, Kaie; Blumbergs, Bernhards; Lepik, ToomasMILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 20172017 / p. 400-405 : ill http://doi.org/10.1109/MILCOM.2017.8170852 Frankenstack: real-time cyberattack detection and feedback system for technical cyber exercisesPihelgas, Mauno; Kont, MarkusProceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings2021 / p. 396–402 https://doi.org/10.1109/CSR51186.2021.9527923 From simple scoring towards a meaningful interpretation of learning in cybersecurity exercisesErnits, Margus; Mäses, Sten; Lepik, Toomas; Maennel, Olaf ManuelProceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 20202020 / p. 135-143 https://doi.org/10.34190/ICCWS.20.046 From text mining to evidence team learning in cybersecurity exercisesMaennel, Kaie; Joonsoo, Kim; Sütterlin, StefanCompanion Proceedings of the 10th International Conference on Learning Analytics & Knowledge (LAK20) : Cyberspace, March 23-27, 20202020 / p. 107-109 https://lak20.solaresearch.org Gaps in European Cyber Education and Professional Training WG5 I Education : training, awareness, cyber ranges [Online resource]Maennel, Olaf Manuel; Csaba, Virag2018 https://www.ecs-org.eu/documents/publications/5bf7e01bf3ed0.pdf Gert Jervan: Tehisintellektiga on praegu nii nagu kunagi tuumarelvadega – tõestada, et me suudame seda tehaTammepuu, Kadri; Jervan, Gerttv.postimees.ee2023 Gert Jervan: Tehisintellektiga on praegu nii nagu kunagi tuumarelvadega – tõestada, et me suudame seda teha Ghost injection attack on automatic dependent surveillance–broadcast equipped drones impact on human behaviourHaddad, Yazeed; Orye, Erwin; Maennel, Olaf Manuel2021 IEEE International Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA) : Virtual Conference, 14-22 May 2021 : proceedings2021 / p. 161-166 https://doi.org/10.1109/CogSIMA51574.2021.9475928 A global survey of standardization and industry practices of automotive cybersecurity validation and verification testing processes and toolsRoberts, Andrew; Marksteiner, Stefan; Soyturk, Mujdat; Yaman, Berkay; Yang, YiSAE international journal of connected and automated vehicles2024 / art. 12-07-02-0013 https://doi.org/10.4271/12-07-02-0013 Going digital, staying secure : cyber ERM activities in a post-pandemic setupCarlo, Antonio; Casamassima, FrancescaIAC 2022 congress proceedings2022 / art. 70417 https://iafastro.directory/iac/paper/id/70417/summary/ Conference proceedings at Scopus Article at Scopus Governance of cyber-security in Internet-based elections [Online resource]Krimmer, Robert Johannes; Rincon Mendez, Angelica Marina; Meyerhoff Nielsen, MortenProceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology2015 / p. 7-9 http://cybercentre.cs.ttu.ee/en/icr2015/ Ground Station as a Service : a space cybersecurity analysisMeyrick, Evan; Pickard, Aaron; Rahloff, Tobias; Bonnart, Sebastien; Carlo, Antonio; Thangavel, KathiravanIAC 2021 congress proceedings2021 / art. 66555 https://dl.iafastro.directory/event/IAC-2021/paper/66555/ How could Snowden attack an election?Wikström, Douglas; Barrat, Jordi; Heiberg, Sven; Krimmer, Robert Johannes; Schürmann, CarstenElectronic Voting : Second International Joint Conference, E-Vote-ID 2017 : Bregenz, Austria, October 24-27, 2017 : proceedings2017 / p. 280-291 http://dx.doi.org/10.1007/978-3-319-68687-5_17 How to build a SOC on a budgetVaarandi, Risto; Mäses, Sten2022 IEEE International Conference on Cyber Security and Resilience (CSR)2022 / p. 171-177 : ill https://doi.org/10.1109/CSR54599.2022.9850281 Human-human communication in cyber threat situations: a systematic reviewAsk, Torvald F.; Lugo, Ricardo G.; Knox, Benjamin J.; Sütterlin, StefanHCI International 2021 - late breaking papers : cognition, inclusion, learning, and culture : 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021 : proceedings2021 / p. 21-43 : ill https://doi.org/10.1007/978-3-030-90328-2_2 Conference proceeding at Scopus Article at Scopus Article at WOS IaaS platforms : how secure are they?Astrova, Irina; Koschel, Arne; Henke, Mats LennartIEEE 30th International Conference on Advanced Information Networking and Applications Workshops : WAINA 2016 : 23-25 March 2016, Crans-Montana, Switzerland : proceedings2016 / p. 843-848 : ill https://doi.org/10.1109/WAINA.2016.22 Identifying building blocks of Internet voting : preliminary findingsKrimmer, Robert Johannes44. Jahrestagung der Gesellschaft für Informatik : INFORMATIK 2014 : Big Data - Komplexität meistern : 22.-26. September 2014 in Stuttgart, Deutschland2014 / p. 1381-1389 : ill Impact assessment of cyber actions on missions or business processes : a systematic literature reviewBahsi, Hayretdin; Udokwu, Chibuzor; Tatar, Unal; Norta, AlexanderProceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018 : National Defence University, Washington DC, USA, 6-9 March 20182018 / p. 11-20 : ill http://toc.proceedings.com/38822webtoc.pdf The impact of perceived security on intention to use E-learning among studentsFarooq, Ali; Ahmad, Farhan; Khadam, Nyla; Lorenz, Birgy; Isoaho, JouniProceedings IEEE 20th International Conference on Advanced Learning Technologies, ICALT 2020 : 6–9 July 2020, Online2020 / p. 360-364 https://doi.org/10.1109/ICALT49669.2020.00115 Improving and measuring learning effectiveness at cyber defense exercisesMaennel, Kaie; Ottis, Rain; Maennel, Olaf ManuelSecure IT Systems : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017 : proceedings2017 / p. 123-138 : ill https://doi.org/10.1007/978-3-319-70290-2_8 Improving learning efficiency and evaluation fairness for cyber security courses : a case studyCaliskan, Emin; Vaarandi, Risto; Lorenz, BirgyIntelligent Computing : Proceedings of the 2019 Computing Conference. Volume 22019 / p. 622-638 https://doi.org/10.1007/978-3-030-22868-2_45 Conference proceedings at Scopus Article at Scopus In search of a coherent international approach to governing technologies [online resource]Osula, Anna-MariaDigital frontiers2021 In search of a coherent international approach to governing technologies Information aggression - a battlefield of smartphonesNyman-Metcalf, Katrin MerikeThe Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood2021 / p. 195-211 https://doi.org/10.1007/978-3-030-73955-3_10 https://www.ester.ee/record=b5434182*est Information security interoperability framework, version 2Tepandi, JaakEstonian information society yearbook 2011/20122012 / p. 46-47 Infoturbe koosvõime raamistiku ver 2Tepandi, JaakEesti infoühiskonna aastaraamat 2011/20122012 / lk. 46-47 Insider threat detection study [Online resource]Kont, Markus; Pihelgas, Mauno; Wojtkowiak, Jesse; Trinberg, Lorena; Osula, Anna-Maria2015 https://ccdcoe.org/sites/default/files/multimedia/pdf/Insider_Threat_Study_CCDCOE.pdf Inteligencia Artificial : Desafíos reglamentarios en el contexto de la protección de datos personales y la seguridad cibernética en la Unión EuropeaAndraško, J.; Mesarcik, M.; Hamulak, OndrejInteligencia artificial : de la discrepancia regional a las reglas universales2020 Iteligencia artificial Interactive stereoscopically perceivable multidimensional data visualizations for cybersecurityKullman, Kaur; Engel, DonJournal of Defence & Security Technologies2022 / p. 37-52 https://doi.org/10.46713/jdst.004.03 Interactive stereoscopically perceivable multidimensional data visualizations for cybersecurity = Interaktiivsed, ruumiliselt tajutavad, mitmemõõtelised andmekuvad küberturbeleKullman, Kaur2023 https://doi.org/10.23658/taltech.10/2023 https://digikogu.taltech.ee/et/Item/00f8f848-c610-4843-b829-8f544d7ba775 https://www.ester.ee/record=b5552863*est International cyber norms : legal, policy & industry perspectives2016 http://www.ester.ee/record=b4543144*est https://ccdcoe.org/sites/default/files/multimedia/pdf/InternationalCyberNorms_full_book.pdf IntroductionKerttunen, Mika; Tikk, EnekenRoutledge handbook of international cybersecurity2020 / p. 1-8 https://doi.org/10.4324/9781351038904-1 https://www.ester.ee/record=b5308475*est Introductory remarksOsula, Anna-Maria; Maennel, Olaf ManuelProceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 20182018 / lk. 5 https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/CRW_2018_lingitud.pdf Introductory remarks [Online resource]Osula, Anna-Maria; Maennel, Olaf ManuelProceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology2015 / p. 5 http://cybercentre.cs.ttu.ee/en/icr2015/ Isevärki advendikalender aitab taltsutada nutiseadet [Võrguväljaanne]parnu.postimees.ee2021 "Isevärki advendikalender aitab taltsutada nutiseadet" i-tee : a fully automated cyber defense competition for studentsErnits, Margus; Tammekänd, Johannes; Maennel, Olaf ManuelSIGCOMM '15 : proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication : August 17-21, 2015, London, United Kingdom2015 / p. 113-114 : ill http://dx.doi.org/10.1145/2785956.2790033 IT-teadlaste manitsus : enne kui sisestate veebiavarusse oma krediitkaardiandmed, pange tähele...Lorenz, Birgy; Kikkas, Kaidodelfi.ee2022 https://forte.delfi.ee/artikkel/120110952/it-teadlaste-manitsus-enne-kui-sisestate-veebiavarusse-oma-krediitkaardiandmed-pange-tahele Jälitatud ja kastistatud : kas sellist maailma tahamegi?Tammet, TanelDigi2018 / lk. 28-29 : fot http://www.ester.ee/record=b2040633*est Kaasav küberturvalisuse mängLorenz, Birgy; Toom, Hanna; Muulmann, Triin; Kirna, Catlyn2024 https://drive.google.com/file/d/1667DUZwhgcstopp3tMQ7r0nQVxwKzPW2/view Karjäär IT- ja küberturbe valdkonnas – ka tüdrukutele! [Võrguväljaanne]Lorenz, Birgyopleht.ee2021 / Lk. 6 "Karjäär IT- ja küberturbe valdkonnas – ka tüdrukutele!" https://dea.digar.ee/article/opetajateleht/2021/12/03/7.1 Karm suurrünnak Microsofti serveritele seadis ohtu ka eestlaste andmed [Võrguväljaanne]Laikoja, Liisgeenius.ee2021 "Karm suurrünnak Microsofti serveritele seadis ohtu ka eestlaste andmed" Kas sa oled kodus üksi?Härmat, KarinMente et Manu2019 / lk. 22-25 : fot https://www.ester.ee/record=b1242496*est https://www.ttu.ee/public/m/mente-et-manu/MM_01_2019/mobile/index.html Key factors in coping with large-scale security vulnerabilities in the eID fieldLips, Silvia; Pappel, Ingrid; Tsap, Valentyna; Draheim, DirkElectronic Government and the Information Systems Perspective :7th International Conference, EGOVIS 2018, Regensburg, Germany, September 3–5, 2018 : proceedings2018 / p. 60-70 https://doi.org/10.1007/978-3-319-98349-3_5 Conference Proceedings at Scopus Article at Scopus Conference Proceedings at WOS Article at WOS Kitsaskohti andmekaitse rakendamisel koolides [Võrguväljaanne]Lorenz, Birgy; Kikkas, Kaido; Baum, Anu; Metsäär, Tõnuopleht.ee2021 "Kitsaskohti andmekaitse rakendamisel koolides" Konverents võtab fookusesse naiste rolli IT-sektoris [Võrguväljaanne]Liiviste, Priitpealinn.ee2021 "Konverents võtab fookusesse naiste rolli IT-sektoris" Kriisiõppusel testiti Tallinna Vesi AS-i valmisolekut reageerida küberrünnakutele [Võrguväljaanne]Raag, Toomaspealinn.ee2022 Kriisiõppusel testiti Tallinna Vesi AS-i valmisolekut reageerida küberrünnakutele Kristi Joamets: Tehnoloogia on jõudnud pea igasse eluvaldkonda ja see tähendab, et vajab ka õiguslikku hinnangutJoamets, Kristipostimees.ee2023 Kristi Joamets: Tehnoloogia on jõudnud pea igasse eluvaldkonda ja see tähendab, et vajab ka õiguslikku hinnangut Kui internet saab täisJervan, GertPostimees2020 / Lk. 13 https://dea.digar.ee/article/postimees/2020/07/30/11.3 https://leht.postimees.ee/7028359/gert-jervan-kui-eesti-internet-saab-tais Kuidas ma olen teadust teinud ja seda rakendanud : 2017. aasta riikliku elutööpreemia laureaat akadeemik Enn TõuguTõugu, EnnEesti Teaduste Akadeemia aastaraamat = Annales academiae scientarum Estonicae 20172018 / lk. 109-116 Kuidas mõõta küberturbealaseid kompetentse?Härmat, KarinMente et Manu2021 / lk. 33 Mente et Manu 2/2021 Kus on andmed elu ja surma küsimus?digipro.geenius.ee2022 Kus on andmed elu ja surma küsimus? Kus on meie noored kübertalendid?Lorenz, BirgyÄripäev2019 / lk. 12 Küberajateenistus kogub populaarsustHurt, Martin; Sõmer, TiiaPostimees2021 / Lk. 14-15 : ill https://dea.digar.ee/article/postimees/2021/03/18/12.2 Küberajateenistus kogub populaarsust [võrguväljaanne]Sõmer, Tiia; Hurt, Martinpostimees.ee2021 https://leht.postimees.ee/7204011/kuberajateenistus-kogub-populaarsust Küberhügieen - tõhus kaitsevahendMaennel, KaieRaamatupidamisuudised2019 / lk. 43-47 : portr https://www.ester.ee/record=b1072822*est Küberkaitse komisjonMõtus, LeoEesti Teaduste Akadeemia aastaraamat = Annales academiae scientarum Estonicae 20142015 / lk. 37-38 Küberkaitse komisjonMõtus, LeoEesti Teaduste Akadeemia aastaraamat = Annales academiae scientarum Estonicae 20132014 / lk. 39-40 Küberkaitse suvekool Eesti MereakadeemiasHeering, DanMeremees. Veeteede Ameti teataja2018 / lk. 10 : fot http://www.ester.ee/record=b4646644*est https://xn--tt-yka.ee/public/m/mereakadeemia/ajakiri-meremees/Meremees_2018_3-4._VA_Teataja_2018_3-4.pdf Küberkaitse tipptegijad õpivad Eestis digitaalset ühiskonda turvama : [intervjuu TTÜ professori Olaf Maenelliga]Lõugas, Hans; Maennel, Olaf ManuelEesti Päevaleht2015 / lk. 17 Küberkaitse [Võrguteavik]Sõmer, Tiia; Lorenz, Birgy; Mäses, Sten; Muulmann, Triin2019 https://web.htk.tlu.ee/digitaru/kyberkaitse/ Küberkaitse õpetamine jõuab maailmatasemele : [vastava õppekava arendamisest TTÜs]Ojakivi, MirkoEesti Päevaleht2008 / 10. okt., lk. 4 Küberkaitseliitlased valisid uude juhatusse kindrali ja professori [Võrguväljaanne]postimees.ee2021 "Küberkaitseliitlased valisid uude juhatusse kindrali ja professori" Küberkaitsjad korraga kahes ülikoolis : [TTÜ ja Tartu Ülikooli koostööst]Tammet, TanelArvutimaailm2011 / 6, lk. 8-9 Küberkriminalistid peavad valmistuma ka inimese mällu häkkimiseksLõugas, HansEesti Päevaleht2014 / lk. 17 Küberluurest kainestavalt : intervjuu siseministeeriumi infotehnoloogia- ja arenduskeskuse küberturbeosakonna juhi Agu KivimäegaStrandberg, Marek; Kivimägi, AguSirp2013 / lk. 21 : fot https://www.sirp.ee/s1-artiklid/c9-sotsiaalia/2013-10-20-14-20-24/ Kübermaailmas on oluline probleeme ennetadaSõmer, TiiaMente et Manu2017 / lk. 30-33 : fot http://www.ttu.ee/public/m/mente-et-manu/MM_01_2017/index.html KüberNööpnõel 2021 : Uuringu analüüsLorenz, Birgy; Eomäe, Taavi; Talisainen, Aleksei; Kasvandik, Keit2022 https://drive.google.com/file/d/1-fgLvGoTUNSI6KYAfLuF3iZeS4rxxARK/view KüberNööpnõel 2022 : tulemusedLorenz, Birgy; Toom, Hanna; Talisainen, Aleksei; Baum, Anu; Eomäe, Taavi2023 https://docs.google.com/document/d/1hExiVLGR88jwb82mBDKx3IJ2Fexx7uyQjXtUbJxuJts/edit KüberNööpnõel 2023 tulemusedLorenz, Birgy; Eomäe, Taavi; Talisainen, Aleksei; Toom, Hanna2024 https://docs.google.com/document/d/1SY5siAUVzI3o-smwP023ZmhBnpTD8R-9Si7TcHN1_Lo/edit Küberohud meie nina all: 4 igapäevast turvariski, mida tõsiselt ei võeta [Võrguväljaanne]digipro.geenius.ee2022 Küberohud meie nina all: 4 igapäevast turvariski, mida tõsiselt ei võeta Küberolümpial selgus parim arvutisüsteemide kaitsja EestisDirector. Inseneeria2017 / lk. 135 : fot http://www.ester.ee/record=b1519314*est KüberPuuring 2021 analüüs : võistlus 7.-12. klassileLorenz, Birgy; Eomäe, Taavi; Talisainen, Aleksei; Kikas, Oliver; Rannaste, Katrin; Muulman; Muulmann, Triin; Baum, Anu2022 https://drive.google.com/file/d/1mV48eIbfSbWriYiYdWE8ZEjMs1v8rZQw/view KüberPuuring 2022 analüüs : võistlus 7.-12. klassileLorenz, Birgy; Eomäe, Taavi; Talisainen, Aleksei; Kikas, Oliver; Muulmann, Triin2022 https://docs.google.com/document/d/1PuBEkJrHGiMU6h9vWb_-e7eExrG3kE7aSITGtfr9vsY/edit Küberpuuring 2023 analüüs : võistlus 7.-12. klassile ja kutsekoolileLorenz, Birgy; Toom, Hanna; Eomäe, Taavi; Talisainen, Aleksei; Kikas, Oliver; Muulmann, Triin2024 https://docs.google.com/document/d/1pKbFPLZiN6McSAlmM8U_073i4B76V9JgsU4zDVhlko4/edit KüberPähkel 2022 tulemusedLorenz, Birgy; Eomäe, Taavi; Talisainen, Aleksei; Toom, Hanna2023 https://docs.google.com/document/d/1MOEUsvhLjl8e9-DuYA7YRGLckC9aXx1nnx2eXPF9SUA/edit Küberpähkel 2023 analüüsLorenz, Birgy; Eomäe, Taavi; Talisainen, Aleksei; Toom, Hanna2024 https://docs.google.com/document/d/1knA665JvAkpZMudb77QixTFiIdgJLdP_PtzaNz8mMcY/edit Küberpähkel uuringLorenz, Birgy; Eomäe, Taavi; Kirna, Catlyn; Poudel, Diana; Talisainen, Aleksei; Sõmer, Tiia; Mikli, Aet; Pau, Annika; Baum, Anu2022 https://drive.google.com/file/d/1Aj0jzvdr6EZdt_F8AXUQlbpX8HHvj2dC/view KüberPähkel uuring : jaanuar 2018Lorenz, Birgy; Sõmer, Tiia; Osula, Kairi2018 Küberpähkel KüberPähkel uuring : jaanuar 2019Lorenz, Birgy; Osula, Kairi; Leet, Mati; Eomäe, Taavi; Kirna, Catlyn2019 "Küberpähkel2019" KüberPähkel uuring : veebruar 2020Lorenz, Birgy; Osula, Kairi; Kirna, Catlyn; Leet, Mati; Eomäe, Taavi; Hendriskon, Marily; Poudel, Diana; Saks, Hanno; Soop, Tõnu; Mikkli, Aet; Punak, Maarja2020 "KüberPähkel uuring : veebruar 2020" Küberpättide nõrkuseks võivad osutuda end tõestanud ärimudelid [Võrguväljaanne]Sõmer, Tiianovaator.err.ee2022 "Küberpättide nõrkuseks võivad osutuda end tõestanud ärimudelid" Kübertalendid ja nende harimineLorenz, Birgy; Toom, Hanna; Baum, Anu2022 https://drive.google.com/file/d/1dcq-evoBrvka4XxdeqTAlCF_4-IiTpA1/view Küberturbe ekspert: enim ohustab ettevõtet Taavi müügiosakonnast [Võrguväljaanne]Kald, Indrekituudised.ee2021 "Küberturbe ekspert: enim ohustab ettevõtet Taavi müügiosakonnast" Küberturbe haridus laevaohvitseride väljaõppes ning soovitused selle korraldamiseks : magistritööRoolaid, Lauri2018 https://www.ester.ee/record=b5382048*est Küberturbe magistriõppestLeis, PaulA & A2007 / 6, lk. 3-4 #küberturvalisus. Snapchatis saadetud pildid jäävad tegelikult alles4JALEHT2020 / Lk. 12-13 : fot https://www.ester.ee/record=b5352324*est http://4dimensioon.org/2020/08/30/kuberturvalisus-snapchatis-saadetud-pildid-jaavad-tegelikult-alles/ Küberturvalisus. Martin Hurt ja Tiia Sõmer: küberajateenistus – küberturbesektori inkubaator?Hurt, Martin; Sõmer, TiiaEdasi.org : innustav ja hariv ajakiri2021 "Küberturvalisus. Martin Hurt ja Tiia Sõmer: küberajateenistus – küberturbesektori inkubaator?" Küberturvalisus. Tark ei torma: kui midagi on liiga hea, et olla tõsi, siis see ongi nii. Mida teada investeerimiskelmustest [Võrguväljaanne]Sõmer, TiiaEdasi.org : innustav ja hariv ajakiri2021 Küberturvalisus. Tark ei torma: kui midagi on liiga hea, et olla tõsi, siis see ongi nii. Mida teada investeerimiskelmustest Küberturvalisuse ekspert Urmas Ruuto: «Küberrünnakut saab toime panna ka kaugloetavate veemõõtjatega!»postimees.ee2023 Küberturvalisuse ekspert Urmas Ruuto: «Küberrünnakut saab toime panna ka kaugloetavate veemõõtjatega!» Küberturvalisuse tippekspert Urmas Ruuto: “Küberrünnakut saab toime panna ka kaugloetavate veemõõtjatega”Ruuto, Urmasjarvateataja.postimees.ee2023 Küberturvalisuse tippekspert Urmas Ruuto: “Küberrünnakut saab toime panna ka kaugloetavate veemõõtjatega” La ciberseguridad en la era de hipercompetitividad: ¿puede la Union Europea afrontar los nuevos retos?Munkoe, Malthe; Mölder, HolgerRevista CIDOB d'afers internacionals2022 / p. 69-94 https://doi.org/10.24241/rcai.2022.131.2.69 Learning analytics perspective: evidencing learning from digital datasets in cybersecurity exercisesMaennel, KaieProceedings 5th IEEE European Symposium on Security and Privacy Workshops EUROS&PW 2020 : 7-11 September 2020, VIrtual Event, Los Alamitos, California2020 / p. 27-36 https://doi.org/10.1109/EuroSPW51379.2020.00013 Legal aspects of cybersecurity in emerging technologies : smart grids and big data : European answers to security breaches and "common" cyber crimeKasper, AgnesRegulating eTechnologies in the European Union : normative realities and trends2014 / p. 189-216 : ill Light weight tabletop exercise for cybersecurity educationOttis, RainJournal of homeland security and emergency management2014 / p. 579-592 Lightweight monitoring scheme for flooding DoS Attack detection in multi-tenant MPSoCsChaves Arroyave, Cesar Giovanni; Sepulveda, Johanna; Hollstein, Thomas2021 IEEE International Symposium on Circuits and Systems (ISCAS), Daegu, Korea May 22-28, 2021 : proceedings2021 / 5 p https://doi.org/10.1109/ISCAS51556.2021.9401153 Conference Proceedings at Scopus Article at Scopus Article at WOS Lizards in the street! Introducing cybersecurity awareness in a digital literacy contextFrydenberg, Mark; Lorenz, BirgyEDSIGCON Proceedings 2019 : Cleveland Ohio, November 6-9, 20192019 / Art. n4936, 13 p. : ill http://proc.iscap.info/2019/pdf/4936.pdf A live virtual simulator for teaching cybersecurity to information technology studentsErnits, Margus; Kikkas, KaidoLearning and Collaboration Technologies : Third International Conference, LCT 2016, held as part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016 : proceedings2016 / p. 474-486 : ill http://dx.doi.org/10.1007/978-3-319-39483-1_43 Machine learning-based detection and characterization of evolving threats in mobile and IoT Systems = Masinõppepõhine arenevate ohtude tuvastamine ning kirjeldamine mobiilseadmete ja värkvõrkude jaoksGuerra Manzanares, Alejandro2022 https://doi.org/10.23658/taltech.54/2022 https://digikogu.taltech.ee/et/Item/f56ae778-e5a5-4147-a8e4-4833e08fa789 https://www.ester.ee/record=b5511898*est Majandusjulgeolek Eesti restart 2021 : 14. aprillil veebikonverentsPostimees2021 / Lk. 25 https://dea.digar.ee/article/postimees/2021/03/25/21.1 Making the Cyber Mercenary - Autonomous Weapons Systems and Common Article 1 of the Geneva ConventionsKajander, Aleksi Oskar Johannes; Tsybulenko, Evhen; Kasper, Agnes2020 12th International Conference on Cyber Conflict : 20/20 vision : the next decade2020 / p. 79-95 https://ieeexplore.ieee.org/abstract/document/9131722 https://www.ester.ee/record=b5303919*est Managing security risks in E-voting over the InternetTepandi, Jaak; Martens, TarviE-challenges-20062006 / p. 100 Mapping requirements specifications into a formalized blockchain-enabled authentication protocol for secured personal identity assuranceLeiding, Benjamin; Norta, AlexanderFuture Data and Security Engineering : 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 - December 1, 2017 : proceedings2017 / p. 181-196 : ill https://doi.org/10.1007/978-3-319-70004-5_13 Maritime cyber-insurance : The Norwegian case : [abstract]Franke, Ulrik; Langfeldt Friberg, Even; Bahsi, HayretdinInternational Journal of Critical Infrastructures2022 / 1 p https://doi.org/10.1504/IJCIS.2022.10046729 https://doi.org/10.1504/IJCIS.2022.10046164 Maritime cyber-insurance: the Norwegian caseFranke, Ulrik; Friberg, Even Langfeldt; Bahşi, HayretdinInternational Journal of Critical Infrastructures2022 / p. 267-286 https://doi.org/10.1504/ijcis.2022.125816 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS Mental model mapping method for cybersecurityKullman, Kaur; Buchanan, Laurin; Komlodi, Anita; Engel, DonHCI for Cybersecurity, Privacy and Trust : Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : Proceedings2020 / p. 458-470 https://doi.org/10.1007/978-3-030-50309-3_30 Conference Proceedings at Scopus Article at Scopus Messung, Prüfung und Nachweis von IT-SicherheitSkierka-Canton, IsabelIT-Sicherheitsrecht : Praxishandbuch2021 / S. 154−180 https://www.nomos-shop.de/en/nomos/title/it-sicherheitsrecht-id-86855/ A method for adding cyberethical behaviour measurements to computer science homework assignmentsMäses, Sten; Aitsam, Heleri; Randmann, Liina19th Koli Calling Conference on Computing Education Research Koli Calling 2019 : November 21-24, 2019, Koli, Finland : proceedings2019 / 5 p. : ill https://doi.org/10.1145/3364510.3364529 Conference proceedings at Scopus Article at Scopus Article at WOS Method for evaluating information security level in organisationsSeeba, Mari; Mäses, Sten; Matulevičius, RaimundasResearch Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings2022 / p. 644-652 : ill https://doi.org/10.1007/978-3-031-05760-1_39 Conference Proceedings at Scopus Article at Scopus Article at WOS A method for teaching Open Source Intelligence (OSINT) using personalised cloud-based exercisesYari, Saber; Mäses, Sten; Maennel, Olaf ManuelProceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 20202020 / p. 480−489 https://doi.org/10.34190/ICCWS.20.091 Methodology for modelling financially motivated cyber crimeSõmer, Tiia16th International Conference on Cyber Warfare and Security (ICCWS 2021) : Online, 25 - 26 February 20212021 / p. 326-335 http://toc.proceedings.com/58552webtoc.pdf?msclkid=97ad966dbea311ecb39e14df5abebf21 Miks Facebook ei tööta? Põhjuseks võib olla ebaõnnestunud tarkvarauuendus [Võrguväljaanne]Veedla, Alicedelfi.ee2021 "Miks Facebook ei tööta? Põhjuseks võib olla ebaõnnestunud tarkvarauuendus " Millist küberstrateegiat Eesti vajab?Lorenz, BirgyÄripäev2018 / Lk. 12 https://dea.digar.ee/article/aripaev/2018/06/22/18.3 Mis toimub tehisintellekti „kapoti all“ ja miks me seda teadma peame? [Võrguväljaanne]delfi.ee2022 Mis toimub tehisintellekti „kapoti all“ ja miks me seda teadma peame? Mis toimub tehisintellekti "kapoti all" ja miks me seda teadma peame?Härmat, KarinMente et Manu2022 / lk. 30-33 : fot https://www.ester.ee/record=b1242496*est Mixed methods research approach and experimental procedure for measuring human factors in cybersecurity using phishing simulationsMäses, Sten; Kikerpill, Kristjan; Jüristo, Kaspar; Maennel, Olaf ManuelAbstracts of Papers Presented at the 18th European Conference on Research Methodology for Business and Management Studies : ECRM 2019, Hosted By Wits Business School Johannesburg, South Africa 20-21 June, 20192019 / p. 30-31 "ECRM19" Mixed methods research approach and experimental procedure for measuring human factors in cybersecurity using phishing simulationsMäses, Sten; Kikerpill, Kristjan; Jüristo, Kaspar; Maennel, Olaf ManuelECRM 2019 - Proceedings of the 18th European Conference on Research Methodology for Business and Management Studies ; vol. 12019 / p. 218-226 http://toc.proceedings.com/49537webtoc.pdf A 3D mixed reality visualization of network topology and activity results in better dyadic cyber team communication and cyber situational awarenessAsk, Torvald F.; Kullman, Kaur; Sütterlin, Stefan; Knox, Benjamin J.; Engel, Don; Lugo, Ricardo GregorioFrontiers in Big Data2023 / art. 1042783, 21 p. : ill https://doi.org/10.3389/fdata.2023.1042783 Modeling and optimizing graded sequrity measuresOjamaa, Andres; Tõugu, Enn; Kivimaa, JüriInfo- ja kommunikatsioonitehnoloogia doktorikooli IKTDK kolmanda aastakonverentsi artiklite kogumik : 25.-26. aprill 2008, Voore külalistemaja2008 / p. 123-125 : ill Modelling cyberspace to determine cybersecurity training requirementsVenables, AdrianFrontiers in education2021 / art. 768037, 16 p. : ill https://doi.org/10.3389/feduc.2021.768037 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS Modelling financially motivated cyber crime = Finantsiliselt motiveeritud küberkuritegevuse modelleerimineSõmer, Tiia2022 https://doi.org/10.23658/taltech.10/2022 https://www.ester.ee/record=b5491785*est https://digikogu.taltech.ee/et/Item/5c41eec5-0c88-43c8-9294-c9f47e7c438b Modelling the impact of space situational awareness disruption on the European and Arctic security landscapeCarlo, Antonio; Boschetti, NicoloModelling and Simulation for Autonomous Systems: 9th International Conference, MESAS 2022, Prague, Czech Republic, October 20–21, 2022 : Revised Selected Papers2023 / p. 299-311 https://doi.org/10.1007/978-3-031-31268-7_18 A multidimensional cyber defense exercise: emphasis on emotional, social, and cognitive aspectsMaennel, Kaie; Brilingaitė, Agnė,; Bukauskas, Linas; Juozapavičius, Aušrius; Knox, Benjamin James; Lugo, Ricardo Gregorio; Maennel, Olaf Manuel; Majore, Ginta; Sütterlin, StefanSAGE Open2023 / 12 p. : ill https://doi.org/10.1177/21582440231156367 Multi-level analytical frameworks for supporting cyber security legal decision making : thesis for the degree of doctor of philosophyKasper, Agnes2015 http://www.ester.ee/record=b4511758*est Multi-purpose cyber environment for maritime sectorVisky, Gabor; Lavrenovs, Arturs; Orye, Erwin; Heering, Dan; Tam, KimberlyProceedings of the17th International Conference on Cyber Warfare and SecurityState University of New York at AlbanyAlbany, New York, USA 17-18 March 20222022 / p. 349-257 https://doi.org/10.34190/iccws.17.1.26 Naised küberturbes - eeskujud tüdrukuteleLorenz, Birgy; Valdmets, Maris2021 https://sites.google.com/view/eeskujud Naised teaduses: Olga Vovk uurib tervishoiuandmete anonüümistamist [Võrguväljaanne]Kharchenko, VyacheslavBioneer.ee2022 "Naised teaduses: Olga Vovk uurib tervishoiuandmete anonüümistamist" National cybersecurity legislation : is there a magic formula?Tikk, EnekenCybersecurity Best Practices : Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden2018 / p. 615-633 https://doi.org/10.1007/978-3-658-21655-9_42 NATO küberkaitsekeskuse korraldatud õppuse võitis Rootsi [Võrguväljaanne]Ots, Maiterr.ee2021 "NATO küberkaitsekeskuse korraldatud õppuse võitis Rootsi" NATO õppusel häkiti vaenlase taristutAllik, Henry-LaurPostimees2021 / Lk. 2 https://dea.digar.ee/article/postimees/2021/12/13/3.1 NATO's large-scale cyberdefense exercise Locked Shields underway in Tallinn [Online resource]news.err.ee2022 "NATO's large-scale cyberdefense exercise Locked Shields underway in Tallinn" Navigating a Finnish take on international law : interview with Ambassador Marja Lehto, Senior Expert on Public International Law at the Ministry of Foreign Affairs, FinlandDirections : Cyber Digital Europe2020 Navigating a Finnish take on international law : interview with Ambassador Marja Lehto, Senior Expert on Public International Law at the Ministry of Foreign Affairs, Finland NCSS: A global census of national positions on conflict, neutrality and cooperationSerrano Iova; Serrano-Iova, Radu-Antonio; Watashiba, TomoeProceedings of the 22nd European Conference on Cyber Warfare and Security2023 / p. 420-428 https://papers.academic-conferences.org/index.php/eccws/issue/view/20/23 Netflow based framework for identifying anomalous end user nodesVaarandi, Risto; Pihelgas, MaunoProceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 20202020 / p. 448-456 https://doi.org/10.34190/ICCWS.20.035 Noored häkkerid võtavad mõõtu Eesti suurimal kübervõistlusel [Võrguväljaanne]postimees.ee2022 Noored häkkerid võtavad mõõtu Eesti suurimal kübervõistlusel Nutiseadme abil õpitakse meil liiga väheLorenz, BirgyÕpetajate Leht2020 / Lk. 6 Nutiseadme abil õpitakse meil liiga vähe Obtaining better metrics for complex serious games within virtualised simulation environmentsMäses, Sten; Hallaq, Bil; Maennel, Olaf Manuel11th European Conference on Games Based Learning (ECGBL 2017) : Graz, Austria, 5 - 6 October 20172017 / p. 428-434 : ill http://www.scopus.com/inward/record.uri?eid=2-s2.0-85036459293&partnerID=40&md5=2ba817e29bec893e126f50a3d4ede83c Offensive cyber operations exercise kicks off in Estonia [Online resource]news.err.ee2021 "Offensive cyber operations exercise kicks off in Estonia" On the relationship between health sectors' digitalization and sustainable health goals : a cyber security perspectiveSütterlin, Stefan; Knox, Benjamin J.; Maennel, Kaie; Canham, Matthew; Lugo, Ricardo GregorioTransitioning to good health and well-being2022 / 22 p https://www.mdpi.com/books/pdfdownload/edition/1245 Operator impressions of 3D visualizations for cybersecurity analystsKullman, Kaur; Ben-Asher, Noam; Sample, CharProceedings of the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 20192019 / p. 257–266 https://www.researchgate.net/publication/334226184_Operator_Impressions_of_3D_Visualizations_for_Cybersecurity_Analysts Operator impressions of 3D visualizations for cybersecurity analystsKullman, Kaur; Ben-Asher, Noam; Sample, CharAbstracts and conference materials for the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 20192019 / p. 31-32 https://www.academic-conferences.org/conferences/eccws/eccws-future-and-past/ Opportunities and challenges in the cyber-space nexusCarlo, Antonioispionline2023 Opportunities and challenges in the cyber-space nexus Otse pühapäeval kell 11.30: Targa Tuleviku Tuleproov ja Kübernaaskel 2023err.ee2023 Otse pühapäeval kell 11.30: Targa Tuleviku Tuleproov ja Kübernaaskel 2023 Paljastus sajandi suurim tarkvaraprobleemPiir, Rait; Malmberg, Kristi; Tammet, TanelPostimees2018 / lk. 10 TTÜ professor suurest kiibiveast: paljastus sajandi tõsiseim turvaprobleem Parabasis : Cyber-diplomacy in StalemateTikk, Eneken; Kerttunen, Mika2018 https://www.academia.edu/38195740/Tikk_Kerttunen_Parabasis_Cyber-diplomacy_in_stalemate.pdf PASCAL : timing SCA resistant design and verification flowLai, Xinhui; Jenihhin, Maksim; Raik, Jaan; Paul, Kolin2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS 2019) : 1-3 July 2019, Greece2019 / p. 239-242 : ill https://doi.org/10.1109/IOLTS.2019.8854458 Pedagogical challenges and ethical considerations in developing critical thinking in cybersecurityLorenz, Birgy; Kikkas, KaidoProceedings IEEE 20th International Conference on Advanced Learning Technologies, ICALT 2020 : 6–9 July 2020, Online2020 / p. 262-263 https://doi.org/10.1109/ICALT49669.2020.00085 Piiri ületavaid sõidukeid valgustavad läbi Hiina riigifirma röntgenseadmed = Багаж в аэропорту и транспорт на границе просвечивает потенциально опасная китайская техникаVoltri, Johanneserr.ee2024 Piiri ületavaid sõidukeid valgustavad läbi Hiina riigifirma röntgenseadmed Pitfalls of machine learning methods in smart grids : a legal perspectiveAntonov, Aleksander; Häring, Tobias; Korõtko, Tarmo; Rosin, Argo; Kerikmäe, Tanel; Biechl, Helmuth2021 International Symposium on Computer Science and Intelligent Controls :(ISCSIC 2021), 12-14 November 2021, Rome, Italy : proceedings2021 / p. 248-256 https://doi.org/10.1109/ISCSIC54682.2021.00053 A pragmatic methodology for blind hardware trojan insertion in finalized layoutsHepp, Alexander; Perez, Tiago Diadami; Pagliarini, Samuel Nascimento; Sigl, GeorgICCAD '22: Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design2022 / art. 69, p. 1-9 : ill https://doi.org/10.1145/3508352.3549452 Conference Proceedings at Scopus Article at Scopus Article at WOS PrefaceBellatreche, Ladjel; Chernishev, George; Corral, Antonio; Ouchani, Samir; Vain, JüriAdvances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings2021 / p. v-vii https://link.springer.com/content/pdf/bfm:978-3-030-87657-9/1?pdf=chapter%20toc Article collection metrics at Scopus Article at Scopus Preliminary analysis of cyberterrorism threats to internet of things (IoT) applicationsBalogun, Mobolarinwa; Bahsi, Hayretdin; Karabacak, BilgeTerrorists' use of the Internet2017 / p. 49-58 http://doi.org/10.3233/978-1-61499-765-8-49 Preliminary analysis of cyberterrorism threats to internet of things (IoT) applications [Online resource]Bahsi, HayretdinAdvanced Research Workshop supported by the NATO Science for Peace and Security Programme, Terrorists’ Use of the Internet : assessment and response2016 / p. 8 http://www.cyberterrorism-project.org/wp-content/uploads/2016/11/Terrorists%E2%80%99-Use-of-the-Internet-Assessment-and-Response.pdf President Alar Karis külastas FinEst Targa Linna Tippkeskustgoodnews.ee2023 President Alar Karis külastas FinEst Targa Linna Tippkeskust President Karis kohtumisel Küprose riigipeaga: surve Venemaale sõja lõpetamiseks ja igakülgne toetus Ukrainale on praegu esmatähtsad [Võrguväljaanne]lounaeestlane.ee2022 "President Karis kohtumisel Küprose riigipeaga: surve Venemaale sõja lõpetamiseks ja igakülgne toetus Ukrainale on praegu esmatähtsad" Principles of eVoting system security evaluationTepandi, Jaak; Forsgren, O.Innovation and the knowledge economy : issues, applications, case studies. 22005 / p. 468-473 Proceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology [Online resource]2015 http://cybercentre.cs.ttu.ee/en/icr2015/ Proceedings of the 2nd Interdisciplinary Cyber Research Workshop 2016 [Online resource]2016 http://cybercentre.cs.ttu.ee/wp/wp-content/uploads/2016/03/CRW_2016_lingitud.pdf http://www.ester.ee/record=b4579694*est Proceedings of the 3rd Interdisciplinary Cyber Research Workshop 2017 : 8th of July 2017 [Online resource]2017 http://www.ester.ee/record=b4684355*est https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/crw2017_final.pdf Proceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 2018 [Online resource]2018 https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/CRW_2018_lingitud.pdf https://www.ester.ee/record=b5139478*est Programmi RITA tegevuse 1 projekti „Masinõppe ja AI toega teenused“ lõpparuanneSolvak, Mihkel; Vilo, Jaak; Reisberg, Sulev; Tamm, Sirli; Oja, Marek; Ligi, Kadri; Unt, Taavi; Võrk, Andres; Leets, Peeter; Tammet, Tanel; Vaarandi, Risto; Nõmm, Sven; Lepik, Toomas; Lember, Veiko; Nõmmik, Steven; Noordt, Colin Pascal van; Kerikmäe, Tanel2022 Programmi RITA tegevuse 1 projekti „Masinõppe ja AI toega teenused“ lõpparuanne Pronksiöö tõi küberkaitse õppekava : [magistritaseme õppes TÜ ja TTÜ koostöös]Tisler, EveUniversitas Tartuensis : UT : Tartu Ülikooli ajakiri2010 / märts, lk. 22-23 : fot Pühapäeval käivitatakse küberkuu suure võistlus- ja messipäevagapealinn.ee2023 Pühapäeval käivitatakse küberkuu suure võistlus- ja messipäevaga Raamatukogude roll ohutuma küberruumi loomiselKont, Kate-RiinRaamatukogu2022 / lk. 22-25 https://www.ester.ee/record=b1817020*est https://issuu.com/nlib/docs/2022_6_veeb Rain Ottis : tõsised mängud kübermaailmas [Võrguväljaanne}Ottis, Rainerr.ee2019 / fot Rain Ottis: tõsised mängud kübermaailmas Rain Ottis : "Tähtis on teha asju, millesse ise usud!"Alas, AskurMente et Manu2016 / lk. 12-17 : fot https://www.ester.ee/record=b1242496*est Rain Ottis: "Tähtis on teha asju, millesse ise usud!"Alas, Askur; Ottis, RainEesti Ekspress2015 / Koolitusekspress, lk. 2-3 Recommendations for enhancing the results of cyber effectsOrye, Erwin; Maennel, Olaf Manuel2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings2019 / p. 103-121 https://www.ester.ee/record=b5197210*est https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf https://doi.org/10.23919/CYCON.2019.8756649 Regulatory patterns of the Internet development : expanding the role of private stakeholders through mediatized "self-regulation"Solarte Vasquez, Maria ClaudiaBaltic journal of European studies2013 / p. 84-120 A reinforcement learning routing protocol for UAV aided public safety networksMinhas, Hassan Ishtiaq; Ahmad, Rizwan; Ahmed, Waqas; Waheed, Maham; Alam, Muhammad Mahtab; Gul, Sufi TabassumSensors2021 / Art. nr. 4121 https://doi.org/10.3390/s21124121 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS Remote exploit development for cyber red team computer network operations targeting industrial control systemsBlumbergs, BernhardsProceedings of the 5th International Conference on Information Systems Security and Privacy : ICISSP 2019 : February 23-25, 2019, Prague, Czech Republic. Vol. 12019 / p. 88-99 : ill https://doi.org/10.5220/0007310300880099 Remote technical labs : an innovative and scalable component for university cybersecurity program admissionMaennel, Kaie; Kivimägi, Kristian; Maennel, Olaf Manuel; Sütterlin, Stefan; Ernits, MargusEducating Engineers for Future Industrial Revolutions : Proceedings of the 23rd International Conference on Interactive Collaborative Learning (ICL2020). Volume 22021 / p. 521-533 https://doi.org/10.1007/978-3-030-68201-9_51 Conference Proceedings at Scopus Article at Scopus Article at WOS Restrictions of Russian internet resources in Ukraine : national security, censorship or both?Shumilo, Olga; Kerikmäe, Tanel; Chochia, ArchilBaltic journal of European studies2019 / p. 82–95 https://doi.org/10.1515/bjes-2019-0023 https://www.ester.ee/record=b2675037*est Resynthesis-based attacks against logic lockingAlmeida, Felipe; Aksoy, Levent; Nguyen, Quang-Linh; Dupuis, Sophie; Flottes, Marie-Lise; Pagliarini, Samuel Nascimento24 International Symposium on Quality Electronic Design, San Francisco, 5-7 April 20232023 / 8 p. : ill https://doi.org/10.1109/ISQED57927.2023.10129403 Article at Scopus Article at WOS Riistvara Trooja hobuste rünnak võib ohustada nii koduarvuti kasutajat kui ka riigi digitaalset julgeolekut [Võrguväljaanne]arileht.delfi.ee2022 Riistvara Trooja hobuste rünnak võib ohustada nii koduarvuti kasutajat kui ka riigi digitaalset julgeolekut Routledge handbook of international cybersecurity2020 https://doi.org/10.4324/9781351038904 https://www.ester.ee/record=b5308475*est Safeguarding a formalized blockchain-enabled identity-authentication protocol by applying security risk-oriented patternsNorta, Alexander; Matulevičius, Raimundas; Leiding, BenjaminComputers & Security2019 / p. 253−269 https://doi.org/10.1016/j.cose.2019.05.017 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS Safeguarding the final frontier: Analyzing the legal and technical challenges to mega-constellationsJha, Devanshu; Manti, N. P.; Carlo, Antonio; Zarkan, L. C.; Breda, Paola; Jha, A.Journal of space safety engineering2022 / p. 636-643 https://doi.org/10.1016/j.jsse.2022.08.006 Journal metrics at Scopus Article at Scopus Article at WOS Scalable and efficient authentication scheme for secure smart grid communicationHammami, Hamza; Ben Yahia, Sadok; Obaidat, Mohammad S.IET Networks2020 / p. 165-169 https://doi.org/10.1049/iet-net.2019.0225 Journal metrics at Journal Article at Scopus Journal metrics at WOS Article at WOS A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption methodVedešin, Anton; Dogru, John Mehmet Ulgar; Liiv, Innar; Ben Yahia, Sadok; Draheim, DirkIEEE Access2020 / p. 40039-40056 : ill https://doi.org/10.1109/ACCESS.2019.2946730 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS Securing airline-turnaround processes using security risk-oriented patternsSamarütel, Silver; Matulevičius, Raimundas; Norta, Alexander; Nõukas, ReinThe Practice of Enterprise Modeling : 9th IFIP WG 8.1. Working Conference, PoEM 2016, Skövde, Sweden, November 8-10, 2016 : proceedings2016 / p. 209-224 http://dx.doi.org/10.1007/978-3-319-48393-1_15 Securing free and fair European ElectionsWenda, Gregor; Stein, RobertJusletter IT Internet of Things - Digital Edition of Proceedings of the 22nd International Legal Informatics Symposium 2019 : proceedings2019 https://jusletter-it.weblaw.ch/en/issues/2019/IRIS/volksbegehren-online_d9db4211c5.html__ONCE&login=false Securing outer space through cyber : risks and countermeasuresCarlo, Antonio; Casamassima, FrancescaIAC 2021 congress proceedings2021 / art. 64939 https://dl.iafastro.directory/event/IAC-2021/paper/64939/ Conference Proceedings at Scopus Article at Scopus Security risk management in the aviation turnaround sectorMatulevičius, Raimundas; Norta, Alexander; Udokwu, Chibuzor; Nõukas, ReinFuture Data and Security Engineering : Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016 : proceedings2016 / p. 119-140 : ill http://dx.doi.org/10.1007/978-3-319-48057-2_8 Security-by-design approaches for critical infrastructure: mapping the landscape of cyber and space LawCarlo, Antonio; Salmeri, AntoninoNATO legal gazette2021 / p. 97-113 https://www.act.nato.int/wp-content/uploads/2023/05/legal_gazette_42.pdf Service measurement map for large-scale cyber defense exercisesPihelgas, Mauno; Rubio Melon, Francisco Jesus; Priisalu, JaanCyber Defence Situation Awareness : STO-MP-IST-1482016 / p. 9-1 - 9-10 : ill http://dx.doi.org/10.14339/STO-MP-IST-148 Shortcomings in cybersecurity education for seafarersHeering, Dan; Maennel, Olaf Manuel; Venables, AdrianDevelopments in Maritime Technology and Engineering : Celebrating 40 years of teaching in Naval Architecture and Ocean Engineering in Portugal and the 25th anniversary of CENTEC, Volume 12021 / p. 49−61 https://doi.org/10.1201/9781003216582 Side-channel Trojan insertion - a practical foundry-side attack via ECOPerez, Tiago Diadami; Imran, Malik; Vaz, Pablo; Pagliarini, Samuel Nascimento2021 IEEE International Symposium on Circuits and Systems (ISCAS), Daegu, Korea, May 22-28, 2021 : proceedings2021 / 6 p. : ill https://doi.org/10.1109/ISCAS51556.2021.9401481 Conference Proceedings at Scopus Article at Scopus Article at WOS Situational states influence on team workload demands in cyber defense exerciseAsk, Torvald F.; Sütterlin, Stefan; Knox, Benjamin J.; Lugo, Ricardo G.HCI International 2021 - late breaking papers : cognition, inclusion, learning, and culture : 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021 : proceedings2021 / p. 3-20 : ill https://doi.org/10.1007/978-3-030-90328-2_1 Conference proceeding at Scopus Article at Scopus Article at WOS Software technology for cyber security simulations = Tarkvaratehnika küberturbe simulatsioonide jaoksOjamaa, Andres2016 http://www.ester.ee/record=b4640099*est Space as NATO’s operational domain : the case of the cyberthreats against GNSSZarkan Cesari, Laetitia; Carlo, Antonio; Roux, Lucille; Toukebri, Raina; Pelin Manti, NebileIAC 2021 congress proceedings2021 / art. 66298 https://dl.iafastro.directory/event/IAC-2021/paper/66298/ Specialized cyber red team responsive computer network operations = Vastutegevusele orienteeritud punase meeskonna küberoperatsioonidBlumbergs, Bernhards2019 https://digi.lib.ttu.ee/i/?12015 ‘Spill Over’ and ‘Fail Forward’ in the EU’s Cybersecurity RegulationsKasper, Agnes; Osula, Anna-MariaDigital development of the European Union : an interdisciplinary perspective2023 / p. 21-44 : ill https://doi.org/10.1007/978-3-031-27312-4_3 https://www.ester.ee/record=b5557935*est Standing Committee on Cyber SecurityMõtus, LeoEstonian Academy of Sciences year book = Annales Academiae Scientiarum Estonicae 20132014 / p. 44-45 Status Detector for Fuzzing-Based Vulnerability Mining of IEC 61850 ProtocolVisky, Gabor; Lavrenovs, Arturs; Maennel, Olaf ManuelProceeding of the 20th European Conference on Cyber Warfare and Security2021 / p. 454-461 https://doi.org/10.34190/EWS.21.007 Stenmap : framework for evaluating cybersecurity-related skills based on computer simulationsMäses, Sten; Randmann, Liina; Maennel, Olaf Manuel; Lorenz, BirgyLearning and Collaboration Technologies : Learning and Teaching : 5th International Conference : LCT 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018 : Proceedings, Part II2018 / p. 492-504 https://doi.org/10.1007/978-3-319-91152-6_38 Conference Proceedings at Scopus Article at Scopus Conference Proceedings at WOS Article at WOS Strategic cyber security : evaluating nation-state cyber attack mitigation strategies with DEMATEL = Strateegiline küberjulgeolek : küberrünnaku leevendamise strateegiate hindamine riiklikul tasandil : DEMATEL-i meetodGeers, Kenneth2011 https://digi.lib.ttu.ee/i/?592 Strategically normative. Norms and principles in national cybersecurity strategiesKerttunen, Mika; Tikk, Eneken2019 https://eucyberdirect.eu/wp-content/uploads/2019/04/kerttunen_tikk-strategically-normative-april-2019-eucyberdirect_.pdf A stream clustering algorithm for classifying network IDS alertsVaarandi, RistoProceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings2021 / p. 14-19 https://doi.org/10.1109/CSR51186.2021.9527926 Success factors for designing a cybersecurity exercise on the example of incident responseMäses, Sten; Maennel, Kaie; Toussaint, Mascia; Rosa, Veronica2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)2021 / p. 259-268 https://doi.org/10.1109/EuroSPW54576.2021.00033 Surveying pervasive public safety communication technologies in the context of terrorist attacksMasood, Ali; Scazzoli, Davide; Sharma, Navuday; Le Moullec, Yannick; Ahmad, Rizwan; Reggiani, Luca; Magarini, Maurizio; Alam, Muhammad MahtabPhysical communication2020 / art. 101109, https://doi.org/10.1016/j.phycom.2020.101109 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS Suurõppusel harjutatakse läbi vaenuliku saareriigi küberrünnakud naaberriigilePulk, Meinhardpostimees.ee2023 Suurõppusel harjutatakse läbi vaenuliku saareriigi küberrünnakud naaberriigile System for determination of legal responsibility/penalty for a cybersecurity breachHovorushchenko, Tetiana; Herts, Alla; Boyarchuk, Artem; Pavlova, OlgaITTAP 2022 - Proceedings of the 2nd International Workshop on Information Technologies: Theoretical and Applied Problems2022 / p. 233-240 https://ceur-ws.org/Vol-3309/short9.pdf Conference proceedings at Scopus Article at Scopus A systematic approach to offensive volunteer cyber militiaOttis, Rain2011 http://www.ester.ee/record=b2685353*est Tallinn võõrustab taas suurt rahvusvahelist küberkaitseõppustLiiviste, Priitpealinn.ee2022 "Tallinn võõrustab taas suurt rahvusvahelist küberkaitseõppust" Tallinnas toimub Eesti-Poola ühine küberturbe konverents [Võrguväljaanne]am.ee2022 https://www.am.ee/node/8605 Tallinnas toimuva küberturbe konverentsi korraldajad: Ida-Euroopa hääl peab olema kuulda ka Brüsselis ja väljaspool Euroopa Liitudigi.geenius.ee2023 Tallinnas toimuva küberturbe konverentsi korraldajad: Ida-Euroopa hääl peab olema kuulda ka Brüsselis ja väljaspool Euroopa Liitu Taltech avaldas, mis erialad toovad taskusse kahekordse keskmise palgapostimees.ee2023 Taltech avaldas, mis erialad toovad taskusse kahekordse keskmise palga TalTech hoiatab petukirjade eest [Võrguväljaanne]Laan, Triinuohtuleht.ee2021 "TalTech hoiatab petukirjade eest" TalTech issues spam email warning [Võrguväljaanne]err.ee2021 "TalTech issues spam email warning" TalTech korraldab mahuka infoturbejuhtide koolitusprogrammiam.ee2023 https://www.am.ee/node/8848 TalTech loob tüdrukutele suunatud kogumiku naistest Eesti küberturbes [Võrguväljaanne]Liiviste, Priitpealinn.ee2021 "TalTech loob tüdrukutele suunatud kogumiku naistest Eesti küberturbes" TalTechi arvutisüsteemide professori uudne tehnoloogia raskendab spionaaži [Võrguväljaanne]Kald, Indrekituudised.ee2021 "TalTechi arvutisüsteemide professori uudne tehnoloogia raskendab spionaaži TalTechi kaasatud professor Stefan Sütterlin: küberrünnakus proovitakse esimesena murda inimenedigi.geenius.ee2023 TalTechi kaasatud professor Stefan Sütterlin: küberrünnakus proovitakse esimesena murda inimene TalTechi riistvara turvalisuse keskuse doktorandid saavutasid rahvusvahelisel konkurentsitihedal võistlusel kolmanda koha [Võrguväljaanne]digi.geenius.ee2022 "TalTechi riistvara turvalisuse keskuse doktorandid saavutasid rahvusvahelisel konkurentsitihedal võistlusel kolmanda koha" TalTechi tarkvarateaduse instituut sai uue rakendusliku masinõppe professoriKald, Indrekituudised.ee2023 TalTechi tarkvarateaduse instituut sai uue rakendusliku masinõppe professori Teadlane arutleb : missugused on moodsa kübersõja eetilised aspektid ja kas me suudame ennast kaitsta?Leier, Mairodigi.geenius.ee2024 Teadlane arutleb : missugused on moodsa kübersõja eetilised aspektid ja kas me suudame ennast kaitsta? Teadlased loovad küberrünnakute tõrjumiseks Eesti interneti mudeli. TTÜ-s valmib spetsiaalne Eesti küberkaitse tarkvaraRoonemaa, HolgerEesti Päevaleht2010 / 23. veebr., lk. 1, 4 Teaduse populariseerimise auhinnaga pärjatud Birgy Lorenzi jaoks on oluline noorte turvaline käitumine internetis [Võrguväljaanne]digi.geenius.ee2022 Teaduse populariseerimise auhinnaga pärjatud Birgy Lorenzi jaoks on oluline noorte turvaline käitumine internetis Team learning in cybersecurity exercisesMaennel, Kaie; Kim, Joonsoo; Sütterlin, StefanProceedings of the 5th Interdisciplinary Cyber Research Conference 2019 : 29th of June 2019, Tallinn University of Technology2019 / p. 17−19 https://www.ester.ee/record=b5238490*est Technological sovereignty : missing the point?Maurer, Tim; Skierka-Canton, Isabel; Morgus, Robert; Hohmann, Mirko2015 7th International Conference on Cyber Conflict : Architectures in Cyberspace : 26-29 May 2015, Tallinn, Estonia2015 / p. 53-67 TED : a container based tool to perform security risk assessment for ELF binariesMucci, Daniele; Blumbergs, BernhardsProceedings of the 5th International Conference on Information Systems Security and Privacy : ICISSP 2019 : February 23-25, 2019, Prague, Czech Republic. Vol. 12019 / p. 361–369 : tab http://doi.org/10.5220/0007371603610369 Tehnikaülikool ja NATO küberkaitsekoostöö keskus alustavad partnerlust teadus- ja õppetöösMente et Manu2017 / lk. 11 : fot http://www.ester.ee/record=b1242496*est Tehnoloogia ja küberturvalisuse tasakaal merenduses : esikohale eetika ja heaoluMaripuu, HelenaMeremees : Eesti merendusajakiri = Estonian maritime magazine2023 / lk. 6-7 : fot https://issuu.com/ajakirimeremees/docs/meremees322 https://www.ester.ee/record=b4646644*est The becoming of cyber-military capabilitiesSalminen, Mikko; Kerttunen, MikaRoutledge handbook of international cybersecurity2020 / p. 94-107 https://www.ester.ee/record=b5308475*est The EU’s common security and defence policy in facing new security challenges and its impact on cyber defenceKasper, Agnes; Mölder, HolgerThe EU in the 21st century : challenges and opportunities for the European integration process2020 / p. 271-294 https://doi.org/10.1007/978-3-030-38399-2_15 The EU's cybersecurity : a strategic narrative of a cyber power or a confusing policy for a local common market?Kasper, Agnes; Vernygora, Vlad AlexCuadernos Europeos de Deusto = Deusto Journal of European Studies2021 / p. 29–71 https://doi.org/10.18543/ced-65-2021pp29-71 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS The importance of cybersecurity frameworks to regulate emergent AI technologies for space applicationsCarlo, Antonio; Mantı, N. P.; Bintang, A. S. W. A. M.; Casamassima, F.; Boschetti, N.; Breda, P.; Rahloff, T.Journal of space safety engineering2023 / p. 474-482 https://doi.org/10.1016/j.jsse.2023.08.002 The Main challenges and barriers to the successful "Smart Shipping"Alop, AnatoliTransNav: International Journal on Marine Navigation and Safety of Sea Transportation2019 / p. 521-528 http://dx.doi.org/10.12716/1001.13.03.05 The politics of stability: cement and change in cyber affairsKerttunen, Mika; Tikk, EnekenRoutledge handbook of international cybersecurity2020 / p. 52-64 https://www.ester.ee/record=b5308475*est https://doi.org/10.4324/9781351038904-6 The regulatory intersections between artificial intelligence, data protection and cyber security : challenges and opportunities for the EU legal frameworkAndraško, Jozef; Mesarčik, Matuš; Hamulak, OndrejAI & Society2021 / p. 623–636 https://doi.org/10.1007/s00146-020-01125-5 The rise of the regionals: how regional organisations contribute to international cyber stability negotiations at the United Nations levelOtt, Nikolas; Osula, Anna-Maria2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings2019 / p. 321-345 https://doi.org/10.23919/CYCON.2019.8756863 https://www.ester.ee/record=b5197210*est https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf The role of artificial intelligence in kinetic targeting from the perspective of international humanitarian lawRoberts, Anastasia; Venables, Adrian2021 13th International Conference on Cyber Conflict : Going viral2021 / art. 9468301, p. 43-57 https://doi.org/10.23919/CyCon51939.2021.9468301 https://www.ester.ee/record=b5417211*est The role of defence in national cybersecurity get access arrowKerttunen, MikaThe Oxford handbook of cyber security2021 / p. 447–462 https://doi.org/10.1093/oxfordhb/9780198800682.013.27 The Role of IT Background for Metacognitive Accuracy, Confidence and Overestimation of Deep Fake Recognition SkillsSütterlin, Stefan; Lugo, Ricardo Gregorio; Ask, Torvald F.; Veng, Karl; Eck, Jonathan; Fritschi, Jonas; Özmen, Muhammed-Talha; Bärreiter, Basil; Knox, Benjamin JamesAugmented Cognition : 16th International Conference, AC 2022, Held as Part of the 24th HCI International Conference, HCII 2022. Virtual Event, June 26 - July 1, 2022, proceedings2022 / p. 103-119 https://doi.org/10.1007/978-3-031-05457-0_9 The role of the UN Security Council in cybersecurity : International peace and security in the digital ageTikk, Eneken; Schia, Niels NagelhusRoutledge handbook of international cybersecurity2020 / p. 354-356 https://doi.org/10.4324/9781351038904-35 https://www.ester.ee/record=b5308475*est Tiia Sõmer : kuidas küberkurjategijad tegutsevad ja miks nad on edukad? [võrguväljaanne]Sõmer, Tiiaerr.ee2019 / fot Tiia Sõmer: kuidas küberkurjategijad tegutsevad ja miks nad on edukad? Tiia Sõmer : kuidas küberkurjategijad tegutsevad ja miks nad on edukad? [võrguväljaanne]Sõmer, TiiaEdasi.org : innustav ja hariv ajakiri2019 / fot Tiia Sõmer: kuidas küberkurjategijad tegutsevad ja miks nad on edukad? Tiia Sõmer : kuidas küberkurjategijad tegutsevad ja miks nad on edukad? [võrguväljaanne]Sõmer, Tiiaerr.ee2019 Tiia Sõmer: kuidas küberkurjategijad tegutsevad ja miks nad on edukad? Tiia Sõmer: kuidas küberkurjategijad tegutsevad ja miks nad on edukad? [Võrguväljaanne]Sõmer, TiiaEdasi.org : innustav ja hariv ajakiri2019 Tiia Sõmer: kuidas küberkurjategijad tegutsevad ja miks nad on edukad? Tiia Sõmer: kuidas küberkurjategijad tegutsevad ja miks nad on edukad? Time for cyber Maastricht? [Online resource]Kasper, AgnesDirections2020 https://directionsblog.eu/time-for-cyber-maastricht/ Tippkeskus EXCITE ühendab Eesti IT-teaduse absoluutseid tippe [Võrguväljaanne]digi.geenius.ee2021 "Tippkeskus EXCITE ühendab Eesti IT-teaduse absoluutseid tippe" Toimus Eesti suurim häkkimisvõistlus KüberNaaskel : vaata, kes olid paremate seasgeenius.ee2022 Toimus Eesti suurim häkkimisvõistlus KüberNaaskel: vaata, kes olid paremate seas Towards a Cyber Maastricht : two steps forward, one step backKasper, Agnes; Vernygora, Vlad AlexThe future of the European Union : demisting the debate2020 / p. 186-210 https://www.um.edu.mt/library/oar/handle/123456789/52310 https://www.um.edu.mt/library/oar/bitstream/123456789/52310/1/Towards_a_%e2%80%98Cyber_Maastricht%e2%80%99_two_steps_forward_one_step_back_2020.pdf Towards a healthcare cybersecurity certification schemeHovhannisyan, Kristine; Bogacki, Piotr; Colabuono, Consuelo Assunta; Lofu, Domenico; Marabello, Maria Vittoria; Maxwell, Brady Eugen2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)2021 / p. 1-9 https://doi.org/10.1109/CyberSA52016.2021.9478255 Towards a resilient cyber architecture for space infrastructures : mitigating the new attack vectorsCarlo, Antonio; Pelin Manti, Nebile; Breda, Paola; Rollinde de Beaumont, Maelys; Jha, DevanshuIAC 2022 congress proceedings2023 / art. 78079 https://dl.iafastro.directory/event/IAC-2023/paper/78079/ Towards conceptualizing EU cybersecurity law : Discussion paper ; C 253Kasper, Agnes; Antonov, Aleksander2019 https://www.zei.uni-bonn.de/news/2019/zei-discussion-paper-c-253-2019 Towards formal verification of cache access-based side-channel attacksNiazmand, Behrad; Reinbrecht, Cezar; Raik, Jaan; Jervan, Gert; Sepulveda, JohannaTestmethoden und Zuverlässigkeit von Schaltungen und Systemen, TUZ 20192019 / 2 p. : tab http://www.informatik.uni-bremen.de/tuz/2019 Towards pollution-control in cyberspace : problem structure and institutional design in international cybersecurityKasper, Agnes; Krasznay, CsabaInternational and comparative law review2019 / p. 76–96 https://doi.org/10.2478/iclr-2019-0015. Towards the integration of a post-hoc interpretation step into the machine learning workflow for IoT botnet detectionGuerra Manzanares, Alejandro; Nõmm, Sven; Bahsi, Hayretdin18th IEEE International Conference on Machine Learning and Applications : ICMLA 2019, 16–19 December 2019, Boca Raton, Florida, USA : proceedings2019 / p. 1162-1169 : ill https://doi.org/10.1109/ICMLA.2019.00193 Training young cybersecurity talents – The case of EstoniaKikkas, Kaido; Lorenz, BirgyHCI International 2020 - Posters : 22nd International Conference, HCII 2020, Copenhagen, Denmark, July 19-24, 2020, Proceedings, Part II2020 / p. 256-263 https://doi.org/10.1007/978-3-030-50729-9_36 Conference proceeding at Scopus Journal metrics at Scopus Trends and challenges for balanced scoring in cybersecurity exercises : a case study on the example of Locked ShieldsMäses, Sten; Maennel, Kaie; Brilingaite, AgneFrontiers in education2022 / art. 958405 https://doi.org/10.3389/feduc.2022.958405 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS "Trust me, you will need it" : cybersecurity as extracurricular subject at Estonian schoolsLorenz, Birgy; Kikkas, KaidoHCI for Cybersecurity, Privacy and Trust : Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : proceedings2020 / p. 175-188 https://doi.org/10.1007/978-3-030-50309-3_12 Conference proceedings at Scopus Article at Scopus TTÜ ja TÜ valmistavad koos ette küberkaitse, tarkvaratehnika ning energeetika spetsialisteInseneeria2009 / 6(14), lk. 6 TTÜ kübervastuluure start-up Silicon ValleysKoha, Aleks; Romanello, LeonardoMente et Manu2017 / lk. 34-35 https://www.ttu.ee/public/m/mente-et-manu/MM_02_2017/index.html TTÜ loob küberkriminalistika ja küberjulgeoleku keskusePostimees2014 / lk. 4 TTÜ professor : Hiina äppide keelamise asemel tuleks keskenduda küberhügieenile [Võrguväljaanne]Klementi, Joakimerr.ee2020 / fot TTÜ professor: Hiina äppide keelamise asemel tuleks keskenduda küberhügieenile Tulemas küberkaitse magistriõpe : [2007/2008. a. kevadsemestrist avatakse ülikoolidevaheline küberturbe õppemoodul : lühisõnum]Mente et Manu2008 / 30. jaan., lk. 1 https://www.ester.ee/record=b1242496*est 2015 7th International Conference on Cyber Conflict : Architectures in Cyberspace 26-29 May 2015, Tallinn, Estonia2015 http://www.ester.ee/record=b4459022*est https://ccdcoe.org/sites/default/files/multimedia/pdf/CyCon_2015_book.pdf 2011 : 3rd International Conference on Cyber Conflict : 7-10 June 2011, Tallinn, Estonia : proceedingsCzosseck, Christian; Tõugu, Enn; Wingfield, Thomas2011 https://www.ester.ee/record=b2634614*est 2019 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia2019 https://www.ester.ee/record=b5197210*est https://doi.org/10.23919/CyCon46848.2019 Täna tähistatakse rahvusvahelist turvalise interneti päevagoodnews.ee2024 Täna tähistatakse rahvusvahelist turvalise interneti päeva Understanding space vulnerabilities : developing technical and legal frameworks for AI and cybersecurity in the spatial fieldCarlo, Antonio; Pelin Manti, Nebile; A.S.W.A.M., Bintang; Casamassima, Francesca; Boschetti, Nicolo; Breda, Paola; Rahloff, TobiasIAC 2022 congress proceedings2022 / art. 70406 https://dl.iafastro.directory/event/IAC-2022/paper/70406/ Conference proceedings at Scopus Article at Scopus Urmas Ruuto: veel 25 aastat tagasi tundus 2Mb/s võimatuSarv, Mari Öödelfi.ee2023 Urmas Ruuto: veel 25 aastat tagasi tundus 2Mb/s võimatu Use of force in cyberspaceValuch, Josef; Hamulak, OndrejInternational and comparative law review2020 / p. 174−191 https://doi.org/10.2478/iclr-2020-0023 User interactions in Virtual Data ExplorerKullman, Kaur; Engel, DonAugmented Cognition : 16th International Conference, AC 2022, Held as Part of the 24th HCI International Conference, HCII 2022. Virtual Event, June 26 - July 1, 2022, proceedings2022 / p. 333-347 https://doi.org/10.1007/978-3-031-05457-0_26 Conference Proceedings at Scopus Article at Scopus Conference Proceedings at WOS Article at WOS Using competency mapping for skills assessment in an introductory cybersecurity courseMäses, Sten; Maennel, Olaf Manuel; Sütterlin, StefanEducating Engineers for Future Industrial Revolutions : Proceedings of the 23rd International Conference on Interactive Collaborative Learning (ICL2020). Volume 22021 / p. 572-583 https://doi.org/10.1007/978-3-030-68201-9_56 Article collection metrics at Scopus Article at Scopus Article at WOS Using multiplayer games to create secure communicationHenno, Jaak; Jaakkola, Hannu; Mäkelä, JukkaEighth Workshop on Software Quality Analysis, Monitoring, Improvement, and Applications : SQAMIA 2019 : Ohrid, North Macedonia, 22 - 25. 09. 2019 : proceedings2019 / p. 4-4:13 : ill https://perun.pmf.uns.ac.rs/pracner/down/sqamia2019/sqamia2019-proc.pdf Using technical cybersecurity exercises in university admissions and skill evaluationMaennel, Kaie; Mäses, Sten; Sütterlin, Stefan; Ernits, Margus; Maennel, Olaf ManuelIFAC-PapersOnLine2019 / p. 169-174 https://doi.org/10.1016/j.ifacol.2019.12.169 Conference proceedings at Scopus Article at Scopus Article at WOS Utilising journey mapping and crime scripting to combat cyber crimeSõmer, Tiia; Hallaq, Bil; Watson, TimProceedings of the 15th European Conference on Cyber Warfare and Security : ECCWS 2016 : hosted by Universität der Bundeswehr, Munich, Germany, 7-8 July 20162016 / p. 276-281 : ill Utilising journey mapping and crime scripting to combat cybercrime and cyber warfare attacksSõmer, Tiia; Hallaq, Bil; Watson, TimJournal of information warfare2016 / p. 39-49 https://www.jinfowar.com/journal-issue/volume-15-issue-4 Vabaduse valvurist sai Vihasool jalgrattamuuseumi omanikTohver, AndresVirumaa Teataja / Lk. 4 https://dea.digar.ee/article/virumaateataja/2022/09/15/6.1 Vaenujalal riigid õhutavad konflikte küberrünnakuid tehes [Võrguväljaanne]Sinisalu, Handoituudised.ee2021 "Vaenujalal riigid õhutavad konflikte küberrünnakuid tehes" Variable self-efficacy as a measurement for behaviors in cyber security operationsLugo, Ricardo Gregorio; Knox, Benjamin J.; Josok, Oyvind; Sütterlin, StefanAugmented Cognition. Human Cognition and Behavior : 14th International Conference, AC 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : proceedings, Part II2020 / p. 395-404 https://doi.org/10.1007/978-3-030-50439-7_27 Conference proceedings at Scopus Article at Scopus Verified security of BLT signature schemeFirsov, Denis; Buldas, Ahto; Truu, Ahto; Laanoja, RistoCPP 2020 - Proceedings of the 9th ACM SIGPLAN International Conference on Certified Programs and Proofs, co-located with POPL 2020, New Orleans 20 January 2020 through 21 January 20202020 / p. 244-257 https://doi.org/10.1145/3372885.3373828 What do we talk about when we talk about international cybersecurityTikk, EnekenRoutledge handbook of international cybersecurity2020 / p. 389-396 https://doi.org/10.4324/9781351038904-38 https://www.ester.ee/record=b5308475*est When shutdown is no option : identifying the notion of the digital government continuity paradox in Estonia's eID crisisSkierka-Canton, IsabelGovernment information quarterly2023 / art. 101781, 12 p. : ill https://doi.org/10.1016/j.giq.2022.101781 5G - ohust on asi kaugelTikk, EnekenPostimees2019 / lk. 16 Eneken Tikk: 5G - ohust on asi kaugel 5G and digital sovereignty of the EU : the Slovak wayGabriš, Tomaš; Hamulak, OndrejTalTech Journal of European Studies2021 / p. 25−47 https://doi.org/10.2478/bjes-2021-0013 Visualising cyber crime based on the E-Crime Project : mapping the journeys of cyber criminals [Online resource]Sõmer, TiiaProceedings of the 2nd Interdisciplinary Cyber Research Workshop 20162016 / p. 26 http://cybercentre.cs.ttu.ee/wp/wp-content/uploads/2016/03/CRW_2016_lingitud.pdf http://www.ester.ee/record=b4579694*est Õpilased asuvad küberkaitsevõistluses päästma jõule küberkatastroofist [Võrguväljaanne]postimees.ee2021 "Õpilased asuvad küberkaitsevõistluses päästma jõule küberkatastroofist" Üleilmne teadmistesõda, strateegiline ettekujutus, ebakindlus ja hirmMölder, Holger; Shiraev, EricSõjateadlane = Estonian journal of military studies2021 / lk. 33–61 https://www.ester.ee/record=b4555087*est https://www.kvak.ee/files/2022/02/ST_17_veebifail.pdf Ülisalajane NATO õppus : sõbralike riikide häkkerid harjutasid Tallinnas vaenulike riikide ründamist [Võrguväljaanne]Allik, Henry-Laurpostimees.ee2021 "Ülisalajane NATO õppus: sõbralike riikide häkkerid harjutasid Tallinnas vaenulike riikide ründamist " Ülo Jaaksoo: Huvitav on see, et meie Eestis usaldame oma riikiJaaksoo, ÜloPostimees2022 https://dea.digar.ee/article/ak/2022/07/16/2.1 В Тарту прошел финал соревнований по кибербезопасности Cyber Battle of Estonia [Online resource]Punamäe, Ode Mariarus.err.ee2021 "В Тарту прошел финал соревнований по кибербезопасности Cyber Battle of Estonia" Європейська парадигма кібербезпеки, Эвропейская парадигма кибербезпекиKasper, AgnesKharkiv International Legal Forum, 24-28 september, 2019 = ПРОГРАМА ІІІ ХАРКІВСЬКОГО МІЖНАРОДНОГО ЮРИДИЧНОГО ФОРУМУ III2019 / с. 9 Карис: сейчас важнее всего всесторонне поддерживать Украину [Online resource]Stolitsa.ee2022 "Карис: сейчас важнее всего всесторонне поддерживать Украину" Мошенники рассылают фишинговые письма от имени ректора ТТУ [Online resource]rus.err.ee2021 "Мошенники рассылают фишинговые письма от имени ректора ТТУ" На учениях проверена готовность Tallinna Vesi к кибератакам [Online resource]Stolitsa.ee2022 https://stolitsa.ee/tallinn/na-ucheniyakh-proverena-gotovnost-tallinna-vesi-k-kiberatakam Эстонские и польские эксперты обсудят кибербезопасность [Online resource]Stolitsa.ee2022 Эстонские и польские эксперты обсудят кибербезопасность