- Accessing extraterritorially located data : options for states [Online resource]Osula, Anna-Maria2015 https://ccdcoe.org/sites/default/files/multimedia/pdf/Accessing%20extraterritorially%20located%20data%20options%20for%20States_Anna-Maria_Osula.pdf
- Adrian Venables: robotid vallutavad transpordisektorit. Küberturvalisus [Võrguväljaanne]Venables, AdrianEdasi.org : innustav ja hariv ajakiri2021 "Adrian Venables: robotid vallutavad transpordisektorit. Küberturvalisus "
- Adrian Venables: sõda inforuumis – mis see on ja kuidas seal käituda? Küberturvalisus [Võrguväljaanne]Edasi.org : innustav ja hariv ajakiri2022 "Adrian Venables: sõda inforuumis – mis see on ja kuidas seal käituda? Küberturvalisus"
- Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings2021 https://doi.org/10.1007/978-3-030-87657-9
- Advancing cybersecurity education through learning analytics = Küberkaitsealase hariduse parendamine õpianalüütika abilMaennel, Kaie2021 https://doi.org/10.23658/taltech.29/2021 https://www.ester.ee/record=b5434228*est https://digikogu.taltech.ee/et/Item/d01c0b17-3b4b-41c5-ae24-e75b6128a183
- Ago Luberg: leian motivatsiooni õpetamisest endast!Luberg, AgoMente et Manu2021 / lk. 14-19 : fot https://www.ester.ee/record=b1242496*est
- AI systems to ensure cyber security in spacePelin Manti, Nebile; Carlo, Antonio; Markova, Rada; Jha, Devanshu; Breda, Paola; Abdin, Adam; Boschetti, NicoloIAC 2022 congress proceedings2022 / art. 70423 https://dl.iafastro.directory/event/IAC-2022/paper/70423/ Conference proceedings at Scopus Article at Scopus
- Algas ründetegevusele suunatud küberoperatsioonide õppus [Võrguväljaanne]postimees.ee2021 "Algas ründetegevusele suunatud küberoperatsioonide õppus "
- Aligning Estonian and Japanese efforts in building norms in cyberspaceOsula, Anna-MariaSo Far, Yet So Close : Japanese and Estonian cybersecurity : policy perspectives and cooperations : report2021 / p. 22-29 https://icds.ee/wp-content/uploads/2021/05/ICDS_Report_So_Far_Yet_So_Close_Roigas_Jermalavicius_May_2021.pdf
- Alliance attribution of global cyber attacks : The European UnionAlatalu, SiimNational cyber emergencies: the return to civil defence2020 / p. 171−185 https://doi.org/10.4324/9780429343438
- Ambitsioon saada merenduse küberjulgeoleku eestkõnelejaksHõimoja, JaneMeremees : Eesti merendusajakiri = Estonian maritime magazine2022 / lk. 8-10 : fot https://www.ester.ee/record=b4646644*est https://issuu.com/ajakirimeremees/docs/meremees_2022_1-4
- An extended review on cyber vulnerabilities of AI technologies in space applications: Technological challenges and international governance of AIBreda, P.; Markova, R.; Abdin, A. F.; Mantı, N. P.; Carlo, Antonio; Jha, D.Journal of space safety engineering2023 / p. 447-458 : ill https://doi.org/10.1016/j.jsse.2023.08.003
- An international technical standard for commercial space system cybersecurity - a call to actionFalco, Gregory; Henry, Waybe; Aliberti, Marco; Bailey, Brandon; Bailly, Mathieu; Bonnart, Sebastien; Boschetti, Nicolo; Bottarelli, Mirko; Byerly, Adam; Carlo, AntonioASCEND 20222022 https://doi.org/10.2514/6.2022-4302
- Analysis of national cyber situational awareness practicesBahsi, HayretdinStrategic cyber defense : a multidisciplinary perspective2017 / p. 31-41 https://doi.org/10.3233/978-1-61499-771-9-31
- Andmed tulevikuühiskonnas : andmevabaduse tuleviku uurimissuund : uuring 2022Õunapuu, Tauno; Olesk, Maarja; Raun, Merle; Kaldur, Kristjan; Tiits, Marek; Tatar, Merit2022 https://www.ester.ee/record=b5643049*est https://www.ibs.ee/wp-content/uploads/Andmed-tulevikuuhiskonnas-2022.pdf
- Anomaly detection and classification in power system state estimation: Combining model-based and data-driven methodsAsefi, Sajjad; Mitrovic, Mile; Cetenovic, Dragan; Levi, Victor; Gryazina, Elena; Terzija, VladimirSustainable energy, grids and networks2023 / art. 101116 https://doi.org/10.1016/j.segan.2023.101116
- Areeba : an area efficient binary huff-curve architectureSajid, Asher; Rashid, Muhammad; Jamal, Sajjad Shaukat; Imran, Malik; Alotaibi, Saud S.; Sinky, Mohammed H.Electronics (Switzerland)2021 / art. 1490 https://doi.org/10.3390/electronics10121490 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS
- Art and automation of teaching malware reverse engineeringLepik, Toomas; Maennel, Kaie; Ernits, Margus; Maennel, Olaf ManuelLearning and Collaboration Technologies : Learning and Teaching : 5th International Conference : LCT 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018 : Proceedings, Part II2018 / p. 461-472 https://doi.org/10.1007/978-3-319-91152-6_35 Conference Proceedings at Scopus Article at Scopus Conference Proceedings at WOS Article at WOS
- Artificial intelligence in cyber defenceTõugu, Enn2011 : 3rd International Conference on Cyber Conflict : 7-10 June 2011, Tallinn, Estonia : proceedings2011 / p. 95-105
- Arvuti riistvarasse peidetud troojalane pakub häkkeritele hõlbuelu [Võrguväljaanne]Oidermaa, Jaan-Juhannovaator.err.ee2022 "Arvuti riistvarasse peidetud troojalane pakub häkkeritele hõlbuelu"
- Arvutiklassis peaks vältima olukordi, kus ainult poisid saavad särada. Intervjuu Birgy LorenzigaLorenz, Birgymuurileht.ee2023 Arvutiklassis peaks vältima olukordi, kus ainult poisid saavad särada. Intervjuu Birgy Lorenziga
- Arvutiteadlane: RIA andmebaasi fotode allalaadija võis tahta neid müüaEinmann, AndresPostimees2021 / Lk. 2 https://dea.digar.ee/article/postimees/2021/07/29/3.3
- ASAT weapons : enhancing NATO’s operational capabilities in the emerging space dependent eraCarlo, Antonio; Veazoglou, NikolaosModelling and Simulation for Autonomous Systems : 6th International Conference, MESAS 2019, Palermo, Italy, October 29–31, 2019, Revised Selected Papers2020 / p. 417-426 https://doi.org/10.1007/978-3-030-43890-6_34
- Assessing the role of international relations in cybersecurity : a preliminary analysisRincon Mendez, Angelica MarinaCeDEM 15 : Proceedings of the International Conference for E-Democracy and Open Government 2015 : 20-22 May 2015, Danube University Krems, Austria2015 / p. 401-404 http://www.donau-uni.ac.at/imperia/md/content/department/gpa/zeg/bilder/cedem/cedem15/cedem15_oa_proceedings.pdf
- Attribute evaluation on attack trees with incomplete informationBuldas, Ahto; Gadyatskaya, Olga; Lenin, Aleksandr; Mauw, Sjouke; Trujillo-Rasua, RolandComputers & Security2020 / art. 101630, 17 p. : ill https://doi.org/10.1016/j.cose.2019.101630 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS
- Attribute evaluation on attack trees with incomplete information : a preprintBuldas, Ahto; Gadyatskaya, Olga; Lenin, Aleksandr; Mauw, Sjouke; Trujillo-Rasua, RolandarXiv.org2019 / 21 p. : ill http://arxiv.org/abs/1812.10754
- Automating defences against cyber operations in computer networks = Arvutivõrkude kaitse automatiseerimine küberoperatsioonide vastuPihelgas, Mauno2021 https://doi.org/10.23658/taltech.36/2021 https://www.ester.ee/record=b5449710*est https://digikogu.taltech.ee/et/Item/beb3e841-9c6e-4496-a73a-17148bc941ef
- Autonomous cyber defence capabilitiesTammet, TanelAutonomous cyber capabilities under international law2021 / p. 36-50 https://www.ester.ee/record=b5395402*est
- Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysisBlumbergs, Bernhards; Vaarandi, RistoMILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 20172017 / p. 707-712 https://doi.org/10.1109/MILCOM.2017.8170785
- Big data ja tehnoloogiahiiud: kes lõpuks andmeid haldab? [Võrguväljaanne]digi.geenius.ee2021 "Big data ja tehnoloogiahiiud: kes lõpuks andmeid haldab"
- Birgy Lorenz: kübertalentide väsimatu avastajaLorenz, BirgyMente et Manu2022 / lk. 12-17 : fot https://www.ester.ee/record=b1242496*est
- Building an ontology for cyber defence exercisesBabayeva, Gulkhara; Maennel, Kaie; Maennel, Olaf ManuelIEEE European Symposium on Security and Privacy Workshops (EuroS&PW)2022 / p. 423-432 https://doi.org/10.1109/EuroSPW55150.2022.00050
- Building cyber resilience : the defensive shield for the EUOsula, Anna-MariaCybersecurity policy in the EU and South Korea from consultation to action : theoretical and comparative perspectives2022 / p. 179-196 https://doi.org/10.1007/978-3-031-08384-6_9
- Capability detection and evaluation metrics for cyber security lab exercisesCaliskan, Emin; Tatar, Unal; Bahsi, Hayretdin; Ottis, Rain; Vaarandi, RistoProceedings of the 12th International Conference on Cyber Warfare and Security, ICCWS 20172017 / p. 407-414 : ill https://www.scopus.com/record/display.uri?eid=2-s2.0-85018944652&origin=inward&txGid=dad813d957372581ca0932bf6e4fb5d8
- Career development in cyber security: Bootcamp training programsCaliskan, Emin; Vaarandi, RistoProceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 20202020 / p. 503-511 https://doi.org/10.34190/ICCWS.20.080
- A case study about the use and evaluation of cyber deceptive methods against highly targeted attacksFarar, Alexandria Elaine; Bahsi, Hayretdin; Blumbergs, Bernhards2017 International Conference On Cyber Incident Response, Coordination, Containment and Control, Cyber Incident 2017 : London, United Kingdom, 19 June 2017 through 20 June 20172017 / [7] p. : ill https://doi.org/10.1109/CYBERINCIDENT.2017.8054640
- CGI Eesti kosmose ärisuuna juhi Sille Kraami soovitus noortele : tehke suure kirega seda, millesse usuteKraam, Silleforte.delfi.ee2024 GI Eesti kosmose ärisuuna juhi Sille Kraami soovitus noortele: tehke suure kirega seda, millesse usute
- The challenge of protecting space-based assets against cyber threatsCarlo, Antonio; Lacroix, Lisa; Zarkan Cesari, LaetitiaIAC 2020 congress proceedings2020 / art. 59386 https://dl.iafastro.directory/event/IAC-2020/paper/59386/
- Challenges in collecting digital evidence : a legal perspectiveKasper, Agnes; Laurits, EneliThe future of law and eTechnologies2016 / p. 195-233 : ill http://dx.doi.org/10.1007/978-3-319-26896-5_10
- Chia, N-H.; Chung, K-M.; Yamakawa, T. A black-box approach to post-quantum zero-knowledge in constant rounds : [review]Henno, JaakzbMATH Open2022 / 1 p. https://zbmath.org/1486.94089
- Ciberseguridad y ciberdiplomacia de la UEKasper, Agnes; Osula, Anna-Maria; Molnar, AnnaIDP Revista de Internet Derecho y Política2021 / p. 1-15 https://doi.org/10.7238/idp.v0i34.387469 Journal metrics at Scopus Article at Scopus
- Civil defence and cyber security: A contemporary European perspectiveTikk, EnekenNational cyber emergencies: the return to civil defence2020 / p. 76-92 https://doi.org/10.4324/9780429343438
- Combined safety and cybersecurity testing methodology for autonomous driving algorithmsRoberts, Andrew; Malayjerdi, Mohsen; Malayjerdi, Ehsan; Maennel, Olaf ManuelCSCS '22 : Proceedings of the 6th ACM Computer Science in Cars Symposium2022 / art. 12, 10 p https://doi.org/10.1145/3568160.3570235
- A comparative framework for cyber threat modelling : case of healthcare and industrial control systemsBalogun, Mobolarinwa; Bahsi, Hayretdin; Keskin, Omer F.; Tatar, UnalInternational Journal of Critical Infrastructures2021 / 1 p https://doi.org/10.1504/IJCIS.2024.10046187
- A comparison-based methodology for the security assurance of novel systemsLaud, Peeter; Vakarjuk, JelizavetaESORICS 2022: Computer Security. ESORICS 2022 International Workshops : conference proceedings2023 / p. 625-644 https://doi.org/10.1007/978-3-031-25460-4_36
- A comprehensive instrument for identifying critical information infrastructure servicesHerrera, Luis-Carlos; Maennel, Olaf ManuelInternational Journal of Critical Infrastructure Protection2019 / p. 50-61 : ill https://doi.org/10.1016/j.ijcip.2019.02.001 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS
- A conceptual nationwide cyber situational awareness framework for critical infrastructuresBahsi, Hayretdin; Maennel, Olaf ManuelSecure IT systems : 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015 : proceedings2015 / p. 3-10 : ill https://doi.org/10.1007/978-3-319-26502-5_1
- CR14 ja Tallinna Tehnikaülikool sõlmisid leppe Eesti noorte küberkaitsevõistluse edendamiseksElektriala2023 / lk. 11-12 : foto https://www.ester.ee/record=b1240496*est
- Creating randomness with gamesHenno, Jaak; Jaakkola, Hannu; Mäkelä, JukkaActa Polytechnica Hungarica : journal of applied sciences at Budapest Polytechnic Hungary2019 / p. 193-212 : ill http://acta.uni-obuda.hu/Henno_Jaakkola_Makela_96.pdf https://doi.org/10.12700/APH.16.9.2019.9.11 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS
- Crossed swords : a cyber red team oriented technical exerciseBlumbergs, Bernhards; Ottis, Rain; Vaarandi, RistoProceedings of the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 20192019 / p. 37-44 https://www.scopus.com/record/display.uri?eid=2-s2.0-85070019446&origin=inward&txGid=b3ce06db78a90b7b9e8a79c0d7b1f9c7
- Culturally-sensitive cybersecurity awareness program design for Iranian high-school studentsKarimnia, Rooya; Maennel, Kaie; Shahin, MahtabProceedings of the 8th International Conference on Information Systems Security and Privacy (ICISSP), 9-11 February, 20222022 / p. 121-132 https://doi.org/10.5220/0010824800003120
- Cyber attacks on power system automation and protection and impact analysisRajkumar, Vetrivel Subramaniam; Tealane, Marko; Stefanov, Alexandru; Presekal, Alfan; Palensky, PeterProceedings of 2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), 26-28 October, 20202020 / p. 247–254 https://doi.org/10.1109/ISGT-Europe47291.2020.9248840
- Cyber attacks on protective relays in digital substations and impact analysisRajkumar, Vetrivel Subramaniam; Tealane, Marko; Stefanov, Alexandru; Palensky, Peter8th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems(MSCPES), Virtual Workshop, online, from April 21, 2020 : proceedings2020 / 6 p. : ill https://doi.org/10.1109/MSCPES49613.2020.9133698
- Cyber commands - a universal solution to a universal cyber security challenge?Alatalu, SiimRedesigning organizations2020 / p. 27−43 https://doi.org/10.1007/978-3-030-27957-8_2
- Cyber commands - universal solution to a universal cyber security problem?Alatalu, SiimProceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 20182018 / p. 21-22 https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/CRW_2018_lingitud.pdf
- Cyber game to cyber exercise : a new methodology for cybersecurity simulationsLovell, Kieren NicolasProceedings of the 5th Interdisciplinary Cyber Research Conference 2019 : 29th of June 2019, Tallinn University of Technology2019 / p. 13-16 https://www.ester.ee/record=b5238490*est
- Cyber hygiene : the big pictureMaennel, Kaie; Mäses, Sten; Maennel, Olaf ManuelSecure IT Systems : 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28–30, 2018 : proceedings2018 / p. 291-305 : ill https://doi.org/10.1007/978-3-030-03638-6_18 Conference Proceedings at Scopus Article at Scopus Conference Proceedings at WOS Article at WOS
- Cyber incident management in low-income countriesHountomey, Jean-Robert; Bahsi, Hayretdin; Tatar, Unal; Hashem, Sherif; Dubois, Elisabeth2022 https://cybilportal.org/wp-content/uploads/2022/01/CSIRTs-In-Low-Income-Countries-Final-Report-part-1-v16.pdf https://thegfce.org/working-groups/working-group-b/
- Cyber incident management in low-income countriesHountomey, Jean-Robert; Bahsi, Hayretdin; Tatar, Unal; Hashem, Sherif; Dubois, Elisabeth2022 https://cybilportal.org/wp-content/uploads/2022/01/CSIRTs-In-Low-Income-Countries-Final-Report-part-2-v16.pdf https://thegfce.org/working-groups/working-group-b/
- A cyber red team oriented technical exerciseBlumbergs, Bernhards; Ottis, Rain; Vaarandi, RistoAbstracts and conference materials for the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 20192019 / p. 10-11 https://www.academic-conferences.org/conferences/eccws/eccws-future-and-past/
- Cyber security and intellectual copyrightWarren, AdrienneStudioosus2010 / lk. 20 https://www.ester.ee/record=b1558644*est
- Cyber security exercises : a comparison of participant evaluation metrics and scoring systemsCaliskan, Emin; Topgul, Oguzhan M.; Ottis, RainStrategic cyber defense : a multidisciplinary perspective2017 / p. 180-190 http://doi.org/10.3233/978-1-61499-771-9-180
- Cyber Security Risk Analysis for a Virtual Assistant G2C Digital Service Using FAIR ModelDreyling, Richard; Jackson, Eric B.; Pappel, Ingrid2021 Eighth International Conference on eDemocracy & eGovernment (ICEDEG) : Quito, Ecuador, 28-30 July 20212021 / p. 33-40 https://doi.org/10.1109/ICEDEG52154.2021.9530938
- Cyber vulnerabilities and risks of AI technologies in space applicationsBreda, Paola; Abdin, Adam; Markova, Rada; Jha, Devanshu; Carlo, Antonio; Pelin Manti, NebileIAC 2022 congress proceedings2022 / art. 70380 https://dl.iafastro.directory/event/IAC-2022/paper/70380/ Conference proceedings at Scopus Article at Scopus
- CyberGenomics : application of behavioral genetics in cybersecurityDomarkiene, Ingrida; Ambrozaityte, Laima; Bukauskas, Linas; Rančelis, Tautvydas; Sütterlin, Stefan; Knox, Benjamin James; Maennel, Kaie; Maennel, Olaf Manuel; Parish, Karen; Lugo, Ricardo Gregorio; Brilingaite, AgneBehavioral Sciences2021 / art. 152 https://doi.org/10.3390/bs11110152 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS
- The cyber-insurance market in NorwayBahsi, Hayretdin; Franke, Ulrik; Langfeldt Friberg, EvenInformation and computer security2020 / p. 54−67 https://doi.org/10.1108/ICS-01-2019-0012 Journal metrics at Scopud Article at Scopus Journal metrics at WOS Article at WOS
- Cybersecurity considerations in autonomous shipsCho, Sungbaek; Orye, Erwin; Visky, Gabor; Prates, Vasco2022 https://ccdcoe.org/library/publications/cybersecurity-considerations-in-autonomous-ships/
- Cybersecurity in GermanySchallbruch, Martin; Skierka-Canton, Isabel2018 http://doi.org/10.1007/978-3-319-90014-8
- Cybersecurity in the era of hypercompetitiveness : can the EU meet the new challenges?Munkoe, Malthe; Mölder, HolgerRevista CIDOB d'afers internacionals2022 / p. 69-94 https://doi.org/10.24241/rcai.2022.131.2.69/en Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS
- Cybersecurity in the making – policy and law: a case study of GeorgiaNapetvaridze, Vladimeri; Chochia, ArchilInternational and comparative law review2019 / p. 155–180 https://doi.org/10.2478/iclr-2019-0019
- Cybersecurity knowledge requirements for strategic level decision makersGarcia-Granados, F.; Bahsi, HayretdinProceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 20202020 / p. 559-568 https://doi.org/
- Cybersecurity test range for autonomous vehicle shuttlesRoberts, Andrew; Snetkov, Nikita; Maennel, Olaf Manuel2021 IEEE European Symposium on Security and Privacy Workshops EuroS&PW 2021 : Virtual Conference, 6-10 September 2021 : proceedings2021 / p. 239-249 : ill https://doi.org/10.1109/EuroSPW54576.2021.00031
- Cybersecurity threats to space: From conception to the aftermathsBonnart, S.; Capurso, A.; Carlo, Antonio; Dethlefsen, T. F.; Kerolle, M.; Lim, J.; Pickard, A.; Russo, A.; Zarkan, L. C.Space law in a networked world2023 / p. 39–101 https://doi.org/10.1163/9789004527270_004
- Cybersecurity within the curricula of informatics : the Estonian perspectiveLorenz, Birgy; Kikkas, Kaido; Sõmer, Tiia; Laugasson, EdmundInformatics in Schools. New Ideas in School Informatics :12th International Conference on Informatics in Schools : Situation, Evolution, and Perspectives, ISSEP 2019, Larnaca, Cyprus, November 18–20, 2019 : proceedings2019 / p. 159-171 https://doi.org/10.1007/978-3-030-33759-9_13 Conference proceeding at Scopus Article at Scopus Conference proceeding at WOS Article at WOS
- Cyberspace from the hybrid threat perspectiveGunneriusson, Hakan; Ottis, RainProceedings of the 12th European Conference on Information Warfare and Security : University of Jyväskylä, Finland, 11-12 July 20132013 / p. 98-105 : ill
- DACA : automated attack scenarios and dataset generationKorving, Frank; Vaarandi, RistoProceedings of the 18th International Conference on Cyber Warfare and Security, ICCWS 2023, a conference hosted by Towson University, Baltimore County, Maryland, USA, 9-10 March 20232023 / p. 550-559 : ill https://papers.academic-conferences.org/index.php/iccws/article/download/962/938 https://doi.org/10.34190/iccws.18.1.962
- DADS : decentralized attestation for device swarmsWedaj, Samuel; Paul, Kolin; Ribeiro, Vinay J.ACM Transactions on Privacy and Security2019 / Art. 19 https://doi.org/10.1145/3325822 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS
- Dances with the Illuminati: Hands on social engineering in a classroom settingMäses, Sten; Lorenz, Birgy; Kikkas, Kaido; Karmo, KristjanNew Perspectives in Behavioral Cybersecurity: Human Behavior and Decision-Making Models2024 / 7 p https://doi.org/10.1201/9781003415060-7
- Demüstifitseerime küberturvalisuseSõmer, TiiaKüberturvalisus : Äripäeva lisa2022 / Lk. 14 "Demüstifitseerime küberturvalisuse" https://www.ester.ee/record=b1071975*est
- Design and implementation of an availability scoring system for cyber defence exercisesPihelgas, Mauno14th International Conference on Cyber Warfare and Security (ICCWS 2019) : Stellenbosch University, South Africa, 28 February - 1 March 2019 : Proceedings2019 / p. 329-337 http://toc.proceedings.com/48113webtoc.pdf "ICCWS 2019"
- Design and verification of secure cache wrapper against access-driven side-channel attacksNiazmand, Behrad; Azad, Siavoosh Payandeh; Jervan, Gert; Sepulveda, JohannaEuromicro Conference on Digital System Design : DSD 2019 : 28 - 30 August 2019 Kallithea, Chalkidiki, Greece : proceedings2019 / p. 672-676 : ill https://doi.org/10.1109/DSD.2019.00108
- Detecting and mitigating Low-and-Slow DoS attacks in NoC-based MPSoCsChaves Arroyave, Cesar Giovanni; Azad, Siavoosh Payandeh; Sepulveda, Johanna; Hollstein, Thomas2019 14th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC) : July 1-3 2019, York - United Kingdom : proceedings2019 / p. 82-89 : ill https://doi.org/10.1109/ReCoSoC48741.2019.9034934
- Developing autonomous robotic transport systems for hospitals and medical facilities : legal challengesKerikmäe, Tanel; Kajander, Aleksi Oskar Johannes; Hamulak, Ondrej; Mesarčik, Matuš; Andraško, Jozef; Liiv, InnarIcon2023 / p. 88-104 https://www.icohtec.org/icon/volume-28-issue-2-2023/
- Developing military cyber workforce in a conscript armed forces : recruitment, challenges and optionsSõmer, Tiia; Lorenz, Birgy; Ottis, Rain14th International Conference on Cyber Warfare and Security (ICCWS 2019) : Stellenbosch University, South Africa, 28 February - 1 March 2019 : proceedings2019 / p. 413−421 http://toc.proceedings.com/48113webtoc.pdf "ICCWS 2019"
- Diagnosing DoS attacks in NoC-based MPSoCsChaves Arroyave, Cesar Giovanni; Azad, Siavoosh Payandeh; Hollstein, Thomas; Sepulveda, JohannaTestmethoden und Zuverlässigkeit von Schaltungen und Systemen, TUZ 20192019 / p. [39–41] https://www.researchgate.net/publication/333756736
- Digitaalne heaolu ja vaimne tervisLeikop, MadliÕpetajate Leht2024 / Lk. 6 https://dea.digar.ee/article/opetajateleht/2024/01/30/8.1 Digitaalne heaolu ja vaimne tervis
- Digital development of the European Union : an interdisciplinary perspective2023 https://doi.org/10.1007/978-3-031-27312-4 https://www.ester.ee/record=b5557935*est
- Digiturvalise kooli hindamine ja statuutLorenz, Birgy; Baum, Anu2022 https://drive.google.com/file/d/1quconUMvKztEwhwEBt2E8ohxqDLQwKbf/view
- Doktoritöö: digiriigi turvalisuse pant on sektorite koostööHarrik, Airikaerr.ee2023 Doktoritöö: digiriigi turvalisuse pant on sektorite koostöö https://digikogu.taltech.ee/et/Item/e555dd12-dcfd-482f-9a46-908a9bf2cdb0 https://www.ester.ee/record=b5568988*est
- Domain engineering for cyber defense: a case study and implicationsTepandi, Jaak; Piho, Gunnar; Liiv, InnarConference on Cyber Conflict : proceedings 20102010 / p. 59-77
- Dual-use cyber tools and the EU’s narrative construction on cybersecurity capacity buildingKasper, AgnesIDEAS : Interdisciplinary conference on European Advanced Studies : (Dis)integration from an (in)equality perspective2022 / p. 12 https://www.iee-ulb.eu/content/uploads/2022/05/FINAL-Conference-Programme-IDEAS-with-abstracts.pdf
- Dynamic and distributed security management for NoC Based MPSoCsAzad, Siavoosh Payandeh; Jervan, Gert; Sepulveda, JohannaComputational Science - ICCS 2019 : 19th International Conference, Faro, Portugal, June 12-14, 2019 : Proceedings, Part II2019 / p. 649–662 : ill https://doi.org/10.1007/978-3-030-22741-8_4 Conference proceeding at Scopus Article at Scopus Conference proceeding at WOS Article at WOS
- Early detection of network attacks using deep learningAhmad, Tanwir; Truscan, Dragos; Vain, Jüri; Porres, Ivan2022 IEEE 15th International Conference on Software Testing, Verification andValidation Workshops : ICSTW 2022, 4–13 April 2022, Virtual Event : proceedings2022 / p. 30-39 https://doi.org/10.1109/ICSTW55395.2022.00020 https://arxiv.org/pdf/2201.11628.pdf
- Educational computer game for cyber security : game concept [Online resource]Sõmer, TiiaProceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology2015 / p. 17-19 http://cybercentre.cs.ttu.ee/en/icr2015/
- Eesti arendusettevõte Cybernetica annab võimaluse areneda oma ala professionaaliksituudised.ee2023 Eesti arendusettevõte Cybernetica annab võimaluse areneda oma ala professionaaliks
- Eesti IT-firma töötaja sai riigilt pea miljoni e-hääletamise turvalisuse uurimiseksKald, Indrekituudised.ee2024 Eesti IT-firma töötaja sai riigilt pea miljoni e-hääletamise turvalisuse uurimiseks
- Eesti kaitsetööstus on kümne aastaga kujunenud tugevaks majandusharuksRänisoo, TarmoPostimees2021 / Lk. 18-19 : fot https://dea.digar.ee/article/postimees/2021/02/25/15.2
- Eesti laevandusettevõtted ei ole küberturvalisusele piisavalt tähelepanu pööranudHeering, DanMeremees. Veeteede Ameti teataja2017 / lk. 10-13 : fot http://www.ester.ee/record=b4646644*est https://issuu.com/ajakirimeremees/docs/meremees_2017_4-4._va_teataja_2017_
- Eesti loodab hakata kosmoses liiklust reguleerima ja satelliite turvamaParksepp, AnetteEesti Päevaleht2020 / Lk. 6-7 : ill https://dea.digar.ee/article/eestipaevaleht/2020/09/09/8.1
- Eesti suurima küberkaitse talentide võistluse võitis TalTechi tudengLorenz, BirgyElektriala2023 / lk. 23 https://www.ester.ee/record=b1240496*est
- Eesti teadlane tegi küberkuritegevuse uurimise mudeli, mis toob küberpätid valguse kätte [Võrguväljaanne]postimees.ee2022 Eesti teadlane tegi küberkuritegevuse uurimise mudeli, mis toob küberpätid valguse kätte
- Eesti teadlased tegid tarkvara, mis ennetab küberrünnakuidPihel, Hele-Riinpostimees.ee2023 Eesti teadlased tegid tarkvara, mis ennetab küberrünnakuid
- Eestis luuakse merenduse küberturbe keskusTransport ja Logistika : infoleht2020 / lk. 12 https://www.ester.ee/record=b1975868*est
- Eestist pärit Rangeforce teeb küberkaitse õpetamises revolutsiooni, klientideks USA suur militaarmaja ja juhtiv meediafirmaVogelberg, Jaanusdigipro.geenius.ee2023 Eestist pärit Rangeforce teeb küberkaitse õpetamises revolutsiooni, klientideks USA suur militaarmaja ja juhtiv meediafirma
- An efficient authentication and key agreement scheme for secure smart grid communication servicesHammami, Hamza; Obaidat, Mohammad S.; Ben Yahia, SadokInternational journal of communication systems2020 / art. e4558, p. 1−13 https://doi.org/10.1002/dac.4558 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS
- Ekspert: eestlastel on olemas teadmised küberturvalisusest, kuid millegipärast neid ei kasutata [Võrguväljaanne]Baum, Anugeenius.ee2022 Ekspert: eestlastel on olemas teadmised küberturvalisusest, kuid millegipärast neid ei kasutata
- Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings2020 https://doi.org/10.1007/978-3-030-60347-2
- Enhancing cyber defense situational awareness using 3D visualizationsKullman, Kaur; Cowley, Jennifer; Ben-Ashe, Noam13th International Conference on Cyber Warfare and Security (ICCWS 2018), Washington, DC, USA, 8 – 9 March 20182018 / p. 369-378 http://toc.proceedings.com/38822webtoc.pdf
- Enhancing response selection in impact estimation approachesOjamaa, AndresInfo- ja kommunikatsioonitehnoloogia doktorikooli IKTDK neljanda aastakonverentsi artiklite kogumik : 26.-27. novembril 2010, Essu mõis2010 / lk. 137-140 : ill
- Enneta küberkurjategijat tema järgmist sammu ette nähesZirnask, VilluFinantsjuhtimine : infoleht2022 / lk. 8 http://www.ester.ee/record=b2082311*est https://digikogu.taltech.ee/et/Item/5c41eec5-0c88-43c8-9294-c9f47e7c438b
- Enneta küberkurjategijat tema järgmist sammu ette nähes [Võrguväljaanne]Zirnask, Villufinantsuudised.ee2020 Enneta küberkurjategijat tema järgmist sammu ette nähes
- Ensuring Cybersecurity in Shipping: Reference to Estonian ShipownersHeering, DanTransNav : the international journal on marine navigation and safety of sea transportation2020 / p. 271−278 https://doi.org/10.12716/1001.14.02.01 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS
- Enterprise security analysis and training experienceOjamaa, Andres; Tõugu, EnnCritical Information Infrastructures Security : 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014 : revised selected papers2016 / p. 200-208 : ill https://doi.org/10.1007/978-3-319-31664-2_21
- Envisioning the future renewable and resilient energy grids – a power grid revolution enabled by renewables, energy storage, and energy electronicsPeng, Fang Zheng; Liu, Chen-Ching; Li, Yuan; Jain, Akshay Kumar; Vinnikov, DmitriIEEE journal of emerging and selected topics in industrial electronics2024 / p. 8-26 https://doi.org/10.1109/JESTIE.2023.3343291
- E-residency as the Estonian e-government Éclat : how more security can result in less privacy [Online resource]Särav, SandraProceedings of the 2nd Interdisciplinary Cyber Research Workshop 20162016 / p. 39-41 http://cybercentre.cs.ttu.ee/wp/wp-content/uploads/2016/03/CRW_2016_lingitud.pdf http://www.ester.ee/record=b4579694*est
- Establishing cyber sovereignty - Russia follows China's example [Online resource]Venables, AdrianRahvusvaheline Kaitseuuringute Keskus (RKK) = International Centre for Defence and Security (ICDS)2019 "ICDS Blog"
- Estonia’s cyber defence league : a model for the United States?Cardash, Sharon L.; Cilluffo, Frank J.; Ottis, RainStudies in conflict & terrorism2013 / p. 777-787
- Estonian president stresses support for Ukraine at meeting with Cypriot colleague [Online resource]baltictimes.com2022 "Estonian president stresses support for Ukraine at meeting with Cypriot colleague "
- Estonian scientists create a drone solution to help victims of terrorist attacks [Online resource]Hankewitz, Stenestonianworld.com2021 "Estonian scientists create a drone solution to help victims of terrorist attacks"
- EU Common position on international law and cyberspaceOsula, Anna-Maria; Kasper, Agnes; Kajander, Aleksi Oskar JohannesMasaryk University journal of law and technology2022 / p. 89-123 https://doi.org/10.5817/MUJLT2022-1-4 Journal metrics at Scopus Article at Scopus
- EU cybersecurity governance – stakeholders and normative intentions towards integrationKasper, AgnesThe future of the European Union : demisting the debate2020 / p. 166−185 https://www.um.edu.mt/library/oar/handle/123456789/52308 https://www.um.edu.mt/library/oar/bitstream/123456789/52308/1/EU_cybersecurity_governance%e2%80%93stakeholders_and_normative_intentions_towards_integration_2020.pdf
- Evaluating cybersecurity-related competences through serious gamesMäses, Sten19th Koli Calling Conference on Computing Education Research Koli Calling 2019 : November 21-24, 2019, Koli, Finland : proceedings2019 / 2 p https://doi.org/10.1145/3364510.3366163 Conference proceedings at Scopus Article at Scopus Article at WOS
- Evaluating cybersecurity-related competences through simulation exercises = Küberturbe-alaste kompetentside hindamine simulatsiooniharjutuste abilMäses, Sten2020 https://www.ester.ee/record=b5384385*est https://digikogu.taltech.ee/et/Item/b4c33d3b-e7ce-48ad-98ad-a0add5e571a3
- Event management and incident response framework for small companies [Online resource]Kont, MarkusProceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology2015 / p. 52-53 http://cybercentre.cs.ttu.ee/en/icr2015/
- Exercise Neptune : maritime cybersecurity training using the navigational simulatorsLovell, Kieren NicolasProceedings of the 5th Interdisciplinary Cyber Research Conference 2019 : 29th of June 2019, Tallinn University of Technology2019 / p. 34-37 https://www.ester.ee/record=b5238490*est
- Expert knowledge elicitation for skill level categorization of attack pathsMezešova, Terezia; Bahsi, HayretdinCyber science 2018 : conference programme2018 / p. 29 https://www.c-mric.com/wp-content/uploads/2018/04/20180611-Cyber-Science-2018-Event-Brochure-DRAFT-v0.6.pdf
- Expert knowledge elicitation for skill level categorization of attack pathsMezešova, Terezia; Bahsi, Hayretdin2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)2019 / 8 p. : tab https://doi.org/10.1109/CyberSecPODS.2019.8885192
- Facebooki katkestus mõjutas nii ettevõtete kui ka riikide toimepidevust [Võrguväljaanne]Pärli, Merilinerr.ee2021 "Facebooki katkestus mõjutas nii ettevõtete kui ka riikide toimepidevust"
- Facebooki, Instagrami ja Whatsappi tabas tohutu ülemaailmne rike [Võrguväljaanne]ohtuleht.ee2021 "Facebooki, Instagrami ja Whatsappi tabas tohutu ülemaailmne rike"
- Finland wins cyber defence exercise Locked Shields 2022 [Online resource]news.err.ee2022 "Finland wins cyber defence exercise Locked Shields 2022 "
- ForewordJakobson, Gabriel; Ottis, Rain2016 : 8th International Conference on Cyber Conflict : Cyber Power : 31 May-3 June 2016, Tallinn, Estonia2016 / p. [i]
- ForewordJakobson, Gabriel; Ottis, Rain2015 7th International Conference on Cyber Conflict : Architectures in Cyberspace : 26-29 May 2015, Tallinn, Estonia2015 / p. i http://www.ester.ee/record=b4459022*est https://ccdcoe.org/sites/default/files/multimedia/pdf/CyCon_2015_book.pdf
- ForewordJakobson, Gabriel; Ottis, Rain5th International Conference on Cyber Conflict : 4-7 June 2013, Tallinn, Estonia : proceedings2013 / p. vi-viii
- Formal methods based security for cloud-based manufacturing cyber physical systemMuniasamy, Kandasamy; Srinivasan, Seshadhri; Vain, Jüri; Sethumadhavan, M.IFAC-PapersOnLine2019 / p. 1198-1203 https://doi.org/10.1016/j.ifacol.2019.11.361 Conference proceedings at Scopus Article at Scopus Article at WOS
- 14th International Conference on Cyber Conflict : Keep Moving2022 https://ccdcoe.org/uploads/2022/06/CyCon_2022_book.pdf
- Framework for industrial control systems digital forensics in the energy sectorRoberts, AndrewProceedings of the 5th Interdisciplinary Cyber Research Conference 2019 : 29th of June 2019, Tallinn University of Technology2019 / p. 24-26 https://www.ester.ee/record=b5238490*est
- Frankenstack : toward real-time red team feedbackKont, Markus; Pihelgas, Mauno; Maennel, Kaie; Blumbergs, Bernhards; Lepik, ToomasMILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 20172017 / p. 400-405 : ill http://doi.org/10.1109/MILCOM.2017.8170852
- Frankenstack: real-time cyberattack detection and feedback system for technical cyber exercisesPihelgas, Mauno; Kont, MarkusProceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings2021 / p. 396–402 https://doi.org/10.1109/CSR51186.2021.9527923
- From simple scoring towards a meaningful interpretation of learning in cybersecurity exercisesErnits, Margus; Mäses, Sten; Lepik, Toomas; Maennel, Olaf ManuelProceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 20202020 / p. 135-143 https://doi.org/10.34190/ICCWS.20.046
- From text mining to evidence team learning in cybersecurity exercisesMaennel, Kaie; Joonsoo, Kim; Sütterlin, StefanCompanion Proceedings of the 10th International Conference on Learning Analytics & Knowledge (LAK20) : Cyberspace, March 23-27, 20202020 / p. 107-109 https://lak20.solaresearch.org
- Gaps in European Cyber Education and Professional Training WG5 I Education : training, awareness, cyber ranges [Online resource]Maennel, Olaf Manuel; Csaba, Virag2018 https://www.ecs-org.eu/documents/publications/5bf7e01bf3ed0.pdf
- Gert Jervan: Tehisintellektiga on praegu nii nagu kunagi tuumarelvadega – tõestada, et me suudame seda tehaTammepuu, Kadri; Jervan, Gerttv.postimees.ee2023 Gert Jervan: Tehisintellektiga on praegu nii nagu kunagi tuumarelvadega – tõestada, et me suudame seda teha
- Ghost injection attack on automatic dependent surveillance–broadcast equipped drones impact on human behaviourHaddad, Yazeed; Orye, Erwin; Maennel, Olaf Manuel2021 IEEE International Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA) : Virtual Conference, 14-22 May 2021 : proceedings2021 / p. 161-166 https://doi.org/10.1109/CogSIMA51574.2021.9475928
- A global survey of standardization and industry practices of automotive cybersecurity validation and verification testing processes and toolsRoberts, Andrew; Marksteiner, Stefan; Soyturk, Mujdat; Yaman, Berkay; Yang, YiSAE international journal of connected and automated vehicles2024 / art. 12-07-02-0013 https://doi.org/10.4271/12-07-02-0013
- Going digital, staying secure : cyber ERM activities in a post-pandemic setupCarlo, Antonio; Casamassima, FrancescaIAC 2022 congress proceedings2022 / art. 70417 https://iafastro.directory/iac/paper/id/70417/summary/ Conference proceedings at Scopus Article at Scopus
- Governance of cyber-security in Internet-based elections [Online resource]Krimmer, Robert Johannes; Rincon Mendez, Angelica Marina; Meyerhoff Nielsen, MortenProceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology2015 / p. 7-9 http://cybercentre.cs.ttu.ee/en/icr2015/
- Ground Station as a Service : a space cybersecurity analysisMeyrick, Evan; Pickard, Aaron; Rahloff, Tobias; Bonnart, Sebastien; Carlo, Antonio; Thangavel, KathiravanIAC 2021 congress proceedings2021 / art. 66555 https://dl.iafastro.directory/event/IAC-2021/paper/66555/
- How could Snowden attack an election?Wikström, Douglas; Barrat, Jordi; Heiberg, Sven; Krimmer, Robert Johannes; Schürmann, CarstenElectronic Voting : Second International Joint Conference, E-Vote-ID 2017 : Bregenz, Austria, October 24-27, 2017 : proceedings2017 / p. 280-291 http://dx.doi.org/10.1007/978-3-319-68687-5_17
- How to build a SOC on a budgetVaarandi, Risto; Mäses, Sten2022 IEEE International Conference on Cyber Security and Resilience (CSR)2022 / p. 171-177 : ill https://doi.org/10.1109/CSR54599.2022.9850281
- Human-human communication in cyber threat situations: a systematic reviewAsk, Torvald F.; Lugo, Ricardo G.; Knox, Benjamin J.; Sütterlin, StefanHCI International 2021 - late breaking papers : cognition, inclusion, learning, and culture : 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021 : proceedings2021 / p. 21-43 : ill https://doi.org/10.1007/978-3-030-90328-2_2 Conference proceedings at Scopus Article at Scopus Conference proceedings at WOS Article at WOS
- IaaS platforms : how secure are they?Astrova, Irina; Koschel, Arne; Henke, Mats LennartIEEE 30th International Conference on Advanced Information Networking and Applications Workshops : WAINA 2016 : 23-25 March 2016, Crans-Montana, Switzerland : proceedings2016 / p. 843-848 : ill https://doi.org/10.1109/WAINA.2016.22
- Identifying building blocks of Internet voting : preliminary findingsKrimmer, Robert Johannes44. Jahrestagung der Gesellschaft für Informatik : INFORMATIK 2014 : Big Data - Komplexität meistern : 22.-26. September 2014 in Stuttgart, Deutschland2014 / p. 1381-1389 : ill
- Impact assessment of cyber actions on missions or business processes : a systematic literature reviewBahsi, Hayretdin; Udokwu, Chibuzor; Tatar, Unal; Norta, AlexanderProceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018 : National Defence University, Washington DC, USA, 6-9 March 20182018 / p. 11-20 : ill http://toc.proceedings.com/38822webtoc.pdf
- The impact of perceived security on intention to use E-learning among studentsFarooq, Ali; Ahmad, Farhan; Khadam, Nyla; Lorenz, Birgy; Isoaho, JouniProceedings IEEE 20th International Conference on Advanced Learning Technologies, ICALT 2020 : 6–9 July 2020, Online2020 / p. 360-364 https://doi.org/10.1109/ICALT49669.2020.00115
- Improving and measuring learning effectiveness at cyber defense exercisesMaennel, Kaie; Ottis, Rain; Maennel, Olaf ManuelSecure IT Systems : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017 : proceedings2017 / p. 123-138 : ill https://doi.org/10.1007/978-3-319-70290-2_8
- Improving learning efficiency and evaluation fairness for cyber security courses : a case studyCaliskan, Emin; Vaarandi, Risto; Lorenz, BirgyIntelligent Computing : Proceedings of the 2019 Computing Conference. Volume 22019 / p. 622-638 https://doi.org/10.1007/978-3-030-22868-2_45 Conference proceedings at Scopus Article at Scopus
- In search of a coherent international approach to governing technologies [online resource]Osula, Anna-MariaDigital frontiers2021 In search of a coherent international approach to governing technologies
- Information aggression - a battlefield of smartphonesNyman-Metcalf, Katrin MerikeThe Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood2021 / p. 195-211 https://doi.org/10.1007/978-3-030-73955-3_10 https://www.ester.ee/record=b5434182*est
- Information security interoperability framework, version 2Tepandi, JaakEstonian information society yearbook 2011/20122012 / p. 46-47
- Infoturbe koosvõime raamistiku ver 2Tepandi, JaakEesti infoühiskonna aastaraamat 2011/20122012 / lk. 46-47
- Insider threat detection study [Online resource]Kont, Markus; Pihelgas, Mauno; Wojtkowiak, Jesse; Trinberg, Lorena; Osula, Anna-Maria2015 https://ccdcoe.org/sites/default/files/multimedia/pdf/Insider_Threat_Study_CCDCOE.pdf
- Inteligencia Artificial : Desafíos reglamentarios en el contexto de la protección de datos personales y la seguridad cibernética en la Unión EuropeaAndraško, J.; Mesarcik, M.; Hamulak, OndrejInteligencia artificial : de la discrepancia regional a las reglas universales2020 Iteligencia artificial
- Interactive stereoscopically perceivable multidimensional data visualizations for cybersecurityKullman, Kaur; Engel, DonJournal of Defence & Security Technologies2022 / p. 37-52 https://doi.org/10.46713/jdst.004.03
- Interactive stereoscopically perceivable multidimensional data visualizations for cybersecurity = Interaktiivsed, ruumiliselt tajutavad, mitmemõõtelised andmekuvad küberturbeleKullman, Kaur2023 https://doi.org/10.23658/taltech.10/2023 https://digikogu.taltech.ee/et/Item/00f8f848-c610-4843-b829-8f544d7ba775 https://www.ester.ee/record=b5552863*est
- International cyber norms : legal, policy & industry perspectives2016 http://www.ester.ee/record=b4543144*est https://ccdcoe.org/sites/default/files/multimedia/pdf/InternationalCyberNorms_full_book.pdf
- IntroductionKerttunen, Mika; Tikk, EnekenRoutledge handbook of international cybersecurity2020 / p. 1-8 https://doi.org/10.4324/9781351038904-1 https://www.ester.ee/record=b5308475*est
- Introductory remarksOsula, Anna-Maria; Maennel, Olaf ManuelProceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 20182018 / lk. 5 https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/CRW_2018_lingitud.pdf
- Introductory remarks [Online resource]Osula, Anna-Maria; Maennel, Olaf ManuelProceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology2015 / p. 5 http://cybercentre.cs.ttu.ee/en/icr2015/
- Isevärki advendikalender aitab taltsutada nutiseadet [Võrguväljaanne]parnu.postimees.ee2021 "Isevärki advendikalender aitab taltsutada nutiseadet"
- i-tee : a fully automated cyber defense competition for studentsErnits, Margus; Tammekänd, Johannes; Maennel, Olaf ManuelSIGCOMM '15 : proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication : August 17-21, 2015, London, United Kingdom2015 / p. 113-114 : ill http://dx.doi.org/10.1145/2785956.2790033
- IT-teadlaste manitsus : enne kui sisestate veebiavarusse oma krediitkaardiandmed, pange tähele...Lorenz, Birgy; Kikkas, Kaidodelfi.ee2022 https://forte.delfi.ee/artikkel/120110952/it-teadlaste-manitsus-enne-kui-sisestate-veebiavarusse-oma-krediitkaardiandmed-pange-tahele
- Jälitatud ja kastistatud : kas sellist maailma tahamegi?Tammet, TanelDigi2018 / lk. 28-29 : fot http://www.ester.ee/record=b2040633*est
- Kaasav küberturvalisuse mängLorenz, Birgy; Toom, Hanna; Muulmann, Triin; Kirna, Catlyn2024 https://drive.google.com/file/d/1667DUZwhgcstopp3tMQ7r0nQVxwKzPW2/view
- Karjäär IT- ja küberturbe valdkonnas – ka tüdrukutele! [Võrguväljaanne]Lorenz, Birgyopleht.ee2021 / Lk. 6 "Karjäär IT- ja küberturbe valdkonnas – ka tüdrukutele!" https://dea.digar.ee/article/opetajateleht/2021/12/03/7.1
- Karm suurrünnak Microsofti serveritele seadis ohtu ka eestlaste andmed [Võrguväljaanne]Laikoja, Liisgeenius.ee2021 "Karm suurrünnak Microsofti serveritele seadis ohtu ka eestlaste andmed"
- Kas sa oled kodus üksi?Härmat, KarinMente et Manu2019 / lk. 22-25 : fot https://www.ester.ee/record=b1242496*est https://www.ttu.ee/public/m/mente-et-manu/MM_01_2019/mobile/index.html
- Key factors in coping with large-scale security vulnerabilities in the eID fieldLips, Silvia; Pappel, Ingrid; Tsap, Valentyna; Draheim, DirkElectronic Government and the Information Systems Perspective :7th International Conference, EGOVIS 2018, Regensburg, Germany, September 3–5, 2018 : proceedings2018 / p. 60-70 https://doi.org/10.1007/978-3-319-98349-3_5 Conference Proceedings at Scopus Article at Scopus Conference Proceedings at WOS Article at WOS
- Kitsaskohti andmekaitse rakendamisel koolides [Võrguväljaanne]Lorenz, Birgy; Kikkas, Kaido; Baum, Anu; Metsäär, Tõnuopleht.ee2021 "Kitsaskohti andmekaitse rakendamisel koolides"
- Konverents võtab fookusesse naiste rolli IT-sektoris [Võrguväljaanne]Liiviste, Priitpealinn.ee2021 "Konverents võtab fookusesse naiste rolli IT-sektoris"
- Kriisiõppusel testiti Tallinna Vesi AS-i valmisolekut reageerida küberrünnakutele [Võrguväljaanne]Raag, Toomaspealinn.ee2022 Kriisiõppusel testiti Tallinna Vesi AS-i valmisolekut reageerida küberrünnakutele
- Kristi Joamets: Tehnoloogia on jõudnud pea igasse eluvaldkonda ja see tähendab, et vajab ka õiguslikku hinnangutJoamets, Kristipostimees.ee2023 Kristi Joamets: Tehnoloogia on jõudnud pea igasse eluvaldkonda ja see tähendab, et vajab ka õiguslikku hinnangut
- Kui internet saab täisJervan, GertPostimees2020 / Lk. 13 https://dea.digar.ee/article/postimees/2020/07/30/11.3 https://leht.postimees.ee/7028359/gert-jervan-kui-eesti-internet-saab-tais
- Kuidas ma olen teadust teinud ja seda rakendanud : 2017. aasta riikliku elutööpreemia laureaat akadeemik Enn TõuguTõugu, EnnEesti Teaduste Akadeemia aastaraamat = Annales academiae scientarum Estonicae 20172018 / lk. 109-116
- Kuidas mõõta küberturbealaseid kompetentse?Härmat, KarinMente et Manu2021 / lk. 33 Mente et Manu 2/2021
- Kus on andmed elu ja surma küsimus?digipro.geenius.ee2022 Kus on andmed elu ja surma küsimus?
- Kus on meie noored kübertalendid?Lorenz, BirgyÄripäev2019 / lk. 12
- Küberajateenistus kogub populaarsustHurt, Martin; Sõmer, TiiaPostimees2021 / Lk. 14-15 : ill https://dea.digar.ee/article/postimees/2021/03/18/12.2
- Küberajateenistus kogub populaarsust [võrguväljaanne]Sõmer, Tiia; Hurt, Martinpostimees.ee2021 https://leht.postimees.ee/7204011/kuberajateenistus-kogub-populaarsust
- Küberhügieen - tõhus kaitsevahendMaennel, KaieRaamatupidamisuudised2019 / lk. 43-47 : portr https://www.ester.ee/record=b1072822*est
- Küberkaitse komisjonMõtus, LeoEesti Teaduste Akadeemia aastaraamat = Annales academiae scientarum Estonicae 20132014 / lk. 39-40
- Küberkaitse komisjonMõtus, LeoEesti Teaduste Akadeemia aastaraamat = Annales academiae scientarum Estonicae 20142015 / lk. 37-38
- Küberkaitse suvekool Eesti MereakadeemiasHeering, DanMeremees. Veeteede Ameti teataja2018 / lk. 10 : fot http://www.ester.ee/record=b4646644*est https://xn--tt-yka.ee/public/m/mereakadeemia/ajakiri-meremees/Meremees_2018_3-4._VA_Teataja_2018_3-4.pdf
- Küberkaitse tipptegijad õpivad Eestis digitaalset ühiskonda turvama : [intervjuu TTÜ professori Olaf Maenelliga]Lõugas, Hans; Maennel, Olaf ManuelEesti Päevaleht2015 / lk. 17
- Küberkaitse [Võrguteavik]Sõmer, Tiia; Lorenz, Birgy; Mäses, Sten; Muulmann, Triin2019 https://web.htk.tlu.ee/digitaru/kyberkaitse/
- Küberkaitse õpetamine jõuab maailmatasemele : [vastava õppekava arendamisest TTÜs]Ojakivi, MirkoEesti Päevaleht2008 / 10. okt., lk. 4
- Küberkaitseliitlased valisid uude juhatusse kindrali ja professori [Võrguväljaanne]postimees.ee2021 "Küberkaitseliitlased valisid uude juhatusse kindrali ja professori"
- Küberkaitsetudengid teel MEKTORY-st RäniorguKarro, RainisStudioosus2014 / lk. 8-9 https://www.ester.ee/record=b1558644*est
- Küberkaitsjad korraga kahes ülikoolis : [TTÜ ja Tartu Ülikooli koostööst]Tammet, TanelArvutimaailm2011 / 6, lk. 8-9
- Küberkriminalistid peavad valmistuma ka inimese mällu häkkimiseksLõugas, HansEesti Päevaleht2014 / lk. 17 https://epl.delfi.ee/artikkel/70217417/kuberkriminalistid-peavad-valmistuma-ka-inimese-mallu-hakkimiseks
- Küberluurest kainestavalt : intervjuu siseministeeriumi infotehnoloogia- ja arenduskeskuse küberturbeosakonna juhi Agu KivimäegaStrandberg, Marek; Kivimägi, AguSirp2013 / lk. 21 : fot https://www.sirp.ee/s1-artiklid/c9-sotsiaalia/2013-10-20-14-20-24/
- Kübermaailmas on oluline probleeme ennetadaSõmer, TiiaMente et Manu2017 / lk. 30-33 : fot http://www.ttu.ee/public/m/mente-et-manu/MM_01_2017/index.html
- Kübermere piraadidVassiljev, AleksanderStudioosus2012 / lk. 4 https://www.ester.ee/record=b1558644*est
- KüberNööpnõel 2021 : Uuringu analüüsLorenz, Birgy; Eomäe, Taavi; Talisainen, Aleksei; Kasvandik, Keit2022 https://drive.google.com/file/d/1-fgLvGoTUNSI6KYAfLuF3iZeS4rxxARK/view
- KüberNööpnõel 2022 : tulemusedLorenz, Birgy; Toom, Hanna; Talisainen, Aleksei; Baum, Anu; Eomäe, Taavi2023 https://docs.google.com/document/d/1hExiVLGR88jwb82mBDKx3IJ2Fexx7uyQjXtUbJxuJts/edit
- KüberNööpnõel 2023 tulemusedLorenz, Birgy; Eomäe, Taavi; Talisainen, Aleksei; Toom, Hanna2024 https://docs.google.com/document/d/1SY5siAUVzI3o-smwP023ZmhBnpTD8R-9Si7TcHN1_Lo/edit
- Küberohud meie nina all: 4 igapäevast turvariski, mida tõsiselt ei võeta [Võrguväljaanne]digipro.geenius.ee2022 Küberohud meie nina all: 4 igapäevast turvariski, mida tõsiselt ei võeta
- Küberolümpial selgus parim arvutisüsteemide kaitsja EestisDirector. Inseneeria2017 / lk. 135 : fot http://www.ester.ee/record=b1519314*est
- KüberPuuring 2021 analüüs : võistlus 7.-12. klassileLorenz, Birgy; Eomäe, Taavi; Talisainen, Aleksei; Kikas, Oliver; Rannaste, Katrin; Muulman; Muulmann, Triin; Baum, Anu2022 https://drive.google.com/file/d/1mV48eIbfSbWriYiYdWE8ZEjMs1v8rZQw/view
- KüberPuuring 2022 analüüs : võistlus 7.-12. klassileLorenz, Birgy; Eomäe, Taavi; Talisainen, Aleksei; Kikas, Oliver; Muulmann, Triin2022 https://docs.google.com/document/d/1PuBEkJrHGiMU6h9vWb_-e7eExrG3kE7aSITGtfr9vsY/edit
- Küberpuuring 2023 analüüs : võistlus 7.-12. klassile ja kutsekoolileLorenz, Birgy; Toom, Hanna; Eomäe, Taavi; Talisainen, Aleksei; Kikas, Oliver; Muulmann, Triin2024 https://docs.google.com/document/d/1pKbFPLZiN6McSAlmM8U_073i4B76V9JgsU4zDVhlko4/edit
- KüberPähkel 2022 tulemusedLorenz, Birgy; Eomäe, Taavi; Talisainen, Aleksei; Toom, Hanna2023 https://docs.google.com/document/d/1MOEUsvhLjl8e9-DuYA7YRGLckC9aXx1nnx2eXPF9SUA/edit
- Küberpähkel 2023 analüüsLorenz, Birgy; Eomäe, Taavi; Talisainen, Aleksei; Toom, Hanna2024 https://docs.google.com/document/d/1knA665JvAkpZMudb77QixTFiIdgJLdP_PtzaNz8mMcY/edit
- Küberpähkel uuringLorenz, Birgy; Eomäe, Taavi; Kirna, Catlyn; Poudel, Diana; Talisainen, Aleksei; Sõmer, Tiia; Mikli, Aet; Pau, Annika; Baum, Anu2022 https://drive.google.com/file/d/1Aj0jzvdr6EZdt_F8AXUQlbpX8HHvj2dC/view
- KüberPähkel uuring : jaanuar 2018Lorenz, Birgy; Sõmer, Tiia; Osula, Kairi2018 Küberpähkel
- KüberPähkel uuring : jaanuar 2019Lorenz, Birgy; Osula, Kairi; Leet, Mati; Eomäe, Taavi; Kirna, Catlyn2019 "Küberpähkel2019"
- KüberPähkel uuring : veebruar 2020Lorenz, Birgy; Osula, Kairi; Kirna, Catlyn; Leet, Mati; Eomäe, Taavi; Hendriskon, Marily; Poudel, Diana; Saks, Hanno; Soop, Tõnu; Mikkli, Aet; Punak, Maarja2020 "KüberPähkel uuring : veebruar 2020"
- Küberpättide nõrkuseks võivad osutuda end tõestanud ärimudelid [Võrguväljaanne]Sõmer, Tiianovaator.err.ee2022 "Küberpättide nõrkuseks võivad osutuda end tõestanud ärimudelid"
- Kübersõjas on haavatavad isegi ilma internetiühenduseta sihtmärgidPiir, Raitnovaator.err.ee2024 Kübersõjas on haavatavad isegi ilma internetiühenduseta sihtmärgid
- Kübertalendid ja nende harimineLorenz, Birgy; Toom, Hanna; Baum, Anu2022 https://drive.google.com/file/d/1dcq-evoBrvka4XxdeqTAlCF_4-IiTpA1/view
- Küberturbe ekspert: enim ohustab ettevõtet Taavi müügiosakonnast [Võrguväljaanne]Kald, Indrekituudised.ee2021 "Küberturbe ekspert: enim ohustab ettevõtet Taavi müügiosakonnast"
- Küberturbe haridus laevaohvitseride väljaõppes ning soovitused selle korraldamiseks : magistritööRoolaid, Lauri2018 https://www.ester.ee/record=b5382048*est
- Küberturbe magistriõppestLeis, PaulA & A2007 / 6, lk. 3-4
- #küberturvalisus. Snapchatis saadetud pildid jäävad tegelikult alles4JALEHT2020 / Lk. 12-13 : fot https://www.ester.ee/record=b5352324*est http://4dimensioon.org/2020/08/30/kuberturvalisus-snapchatis-saadetud-pildid-jaavad-tegelikult-alles/
- Küberturvalisus. Martin Hurt ja Tiia Sõmer: küberajateenistus – küberturbesektori inkubaator?Hurt, Martin; Sõmer, TiiaEdasi.org : innustav ja hariv ajakiri2021 "Küberturvalisus. Martin Hurt ja Tiia Sõmer: küberajateenistus – küberturbesektori inkubaator?"
- Küberturvalisus. Tark ei torma: kui midagi on liiga hea, et olla tõsi, siis see ongi nii. Mida teada investeerimiskelmustest [Võrguväljaanne]Sõmer, TiiaEdasi.org : innustav ja hariv ajakiri2021 Küberturvalisus. Tark ei torma: kui midagi on liiga hea, et olla tõsi, siis see ongi nii. Mida teada investeerimiskelmustest
- Küberturvalisuse ekspert Urmas Ruuto: «Küberrünnakut saab toime panna ka kaugloetavate veemõõtjatega!»postimees.ee2023 Küberturvalisuse ekspert Urmas Ruuto: «Küberrünnakut saab toime panna ka kaugloetavate veemõõtjatega!»
- Küberturvalisuse tippekspert Urmas Ruuto: “Küberrünnakut saab toime panna ka kaugloetavate veemõõtjatega”Ruuto, Urmasjarvateataja.postimees.ee2023 Küberturvalisuse tippekspert Urmas Ruuto: “Küberrünnakut saab toime panna ka kaugloetavate veemõõtjatega”
- La ciberseguridad en la era de hipercompetitividad: ¿puede la Union Europea afrontar los nuevos retos?Munkoe, Malthe; Mölder, HolgerRevista CIDOB d'afers internacionals2022 / p. 69-94 https://doi.org/10.24241/rcai.2022.131.2.69
- Learning analytics perspective: evidencing learning from digital datasets in cybersecurity exercisesMaennel, KaieProceedings 5th IEEE European Symposium on Security and Privacy Workshops EUROS&PW 2020 : 7-11 September 2020, VIrtual Event, Los Alamitos, California2020 / p. 27-36 https://doi.org/10.1109/EuroSPW51379.2020.00013
- Legal aspects of cybersecurity in emerging technologies : smart grids and big data : European answers to security breaches and "common" cyber crimeKasper, AgnesRegulating eTechnologies in the European Union : normative realities and trends2014 / p. 189-216 : ill
- Light weight tabletop exercise for cybersecurity educationOttis, RainJournal of homeland security and emergency management2014 / p. 579-592
- Lightweight monitoring scheme for flooding DoS Attack detection in multi-tenant MPSoCsChaves Arroyave, Cesar Giovanni; Sepulveda, Johanna; Hollstein, Thomas2021 IEEE International Symposium on Circuits and Systems (ISCAS), Daegu, Korea May 22-28, 2021 : proceedings2021 / 5 p https://doi.org/10.1109/ISCAS51556.2021.9401153 Conference Proceedings at Scopus Article at Scopus Article at WOS
- Lizards in the street! Introducing cybersecurity awareness in a digital literacy contextFrydenberg, Mark; Lorenz, BirgyEDSIGCON Proceedings 2019 : Cleveland Ohio, November 6-9, 20192019 / Art. n4936, 13 p. : ill http://proc.iscap.info/2019/pdf/4936.pdf
- A live virtual simulator for teaching cybersecurity to information technology studentsErnits, Margus; Kikkas, KaidoLearning and Collaboration Technologies : Third International Conference, LCT 2016, held as part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016 : proceedings2016 / p. 474-486 : ill http://dx.doi.org/10.1007/978-3-319-39483-1_43
- Machine learning-based detection and characterization of evolving threats in mobile and IoT Systems = Masinõppepõhine arenevate ohtude tuvastamine ning kirjeldamine mobiilseadmete ja värkvõrkude jaoksGuerra Manzanares, Alejandro2022 https://doi.org/10.23658/taltech.54/2022 https://digikogu.taltech.ee/et/Item/f56ae778-e5a5-4147-a8e4-4833e08fa789 https://www.ester.ee/record=b5511898*est
- Majandusjulgeolek Eesti restart 2021 : 14. aprillil veebikonverentsPostimees2021 / Lk. 25 https://dea.digar.ee/article/postimees/2021/03/25/21.1
- Making the Cyber Mercenary - Autonomous Weapons Systems and Common Article 1 of the Geneva ConventionsKajander, Aleksi Oskar Johannes; Tsybulenko, Evhen; Kasper, Agnes2020 12th International Conference on Cyber Conflict : 20/20 vision : the next decade2020 / p. 79-95 https://ieeexplore.ieee.org/abstract/document/9131722 https://www.ester.ee/record=b5303919*est
- Managing security risks in E-voting over the InternetTepandi, Jaak; Martens, TarviE-challenges-20062006 / p. 100
- Mapping requirements specifications into a formalized blockchain-enabled authentication protocol for secured personal identity assuranceLeiding, Benjamin; Norta, AlexanderFuture Data and Security Engineering : 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 - December 1, 2017 : proceedings2017 / p. 181-196 : ill https://doi.org/10.1007/978-3-319-70004-5_13
- Maritime cyber-insurance : The Norwegian case : [abstract]Franke, Ulrik; Langfeldt Friberg, Even; Bahsi, HayretdinInternational Journal of Critical Infrastructures2022 / 1 p https://doi.org/10.1504/IJCIS.2022.10046729 https://doi.org/10.1504/IJCIS.2022.10046164
- Maritime cyber-insurance: the Norwegian caseFranke, Ulrik; Friberg, Even Langfeldt; Bahşi, HayretdinInternational Journal of Critical Infrastructures2022 / p. 267-286 https://doi.org/10.1504/ijcis.2022.125816 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS
- Mental model mapping method for cybersecurityKullman, Kaur; Buchanan, Laurin; Komlodi, Anita; Engel, DonHCI for Cybersecurity, Privacy and Trust : Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : Proceedings2020 / p. 458-470 https://doi.org/10.1007/978-3-030-50309-3_30 Conference Proceedings at Scopus Article at Scopus
- Messung, Prüfung und Nachweis von IT-SicherheitSkierka-Canton, IsabelIT-Sicherheitsrecht : Praxishandbuch2021 / S. 154−180 https://www.nomos-shop.de/en/nomos/title/it-sicherheitsrecht-id-86855/
- A method for adding cyberethical behaviour measurements to computer science homework assignmentsMäses, Sten; Aitsam, Heleri; Randmann, Liina19th Koli Calling Conference on Computing Education Research Koli Calling 2019 : November 21-24, 2019, Koli, Finland : proceedings2019 / 5 p. : ill https://doi.org/10.1145/3364510.3364529 Conference proceedings at Scopus Article at Scopus Article at WOS
- Method for evaluating information security level in organisationsSeeba, Mari; Mäses, Sten; Matulevičius, RaimundasResearch Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings2022 / p. 644-652 : ill https://doi.org/10.1007/978-3-031-05760-1_39 Conference Proceedings at Scopus Article at Scopus Article at WOS
- A method for teaching Open Source Intelligence (OSINT) using personalised cloud-based exercisesYari, Saber; Mäses, Sten; Maennel, Olaf ManuelProceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 20202020 / p. 480−489 https://doi.org/10.34190/ICCWS.20.091
- Methodology for modelling financially motivated cyber crimeSõmer, Tiia16th International Conference on Cyber Warfare and Security (ICCWS 2021) : Online, 25 - 26 February 20212021 / p. 326-335 http://toc.proceedings.com/58552webtoc.pdf?msclkid=97ad966dbea311ecb39e14df5abebf21
- Miks Facebook ei tööta? Põhjuseks võib olla ebaõnnestunud tarkvarauuendus [Võrguväljaanne]Veedla, Alicedelfi.ee2021 "Miks Facebook ei tööta? Põhjuseks võib olla ebaõnnestunud tarkvarauuendus "
- Millist küberstrateegiat Eesti vajab?Lorenz, BirgyÄripäev2018 / Lk. 12 https://dea.digar.ee/article/aripaev/2018/06/22/18.3
- Mis toimub tehisintellekti „kapoti all“ ja miks me seda teadma peame? [Võrguväljaanne]delfi.ee2022 Mis toimub tehisintellekti „kapoti all“ ja miks me seda teadma peame?
- Mis toimub tehisintellekti "kapoti all" ja miks me seda teadma peame?Härmat, KarinMente et Manu2022 / lk. 30-33 : fot https://www.ester.ee/record=b1242496*est
- Mixed methods research approach and experimental procedure for measuring human factors in cybersecurity using phishing simulationsMäses, Sten; Kikerpill, Kristjan; Jüristo, Kaspar; Maennel, Olaf ManuelAbstracts of Papers Presented at the 18th European Conference on Research Methodology for Business and Management Studies : ECRM 2019, Hosted By Wits Business School Johannesburg, South Africa 20-21 June, 20192019 / p. 30-31 "ECRM19"
- Mixed methods research approach and experimental procedure for measuring human factors in cybersecurity using phishing simulationsMäses, Sten; Kikerpill, Kristjan; Jüristo, Kaspar; Maennel, Olaf ManuelECRM 2019 - Proceedings of the 18th European Conference on Research Methodology for Business and Management Studies ; vol. 12019 / p. 218-226 http://toc.proceedings.com/49537webtoc.pdf
- A 3D mixed reality visualization of network topology and activity results in better dyadic cyber team communication and cyber situational awarenessAsk, Torvald F.; Kullman, Kaur; Sütterlin, Stefan; Knox, Benjamin J.; Engel, Don; Lugo, Ricardo GregorioFrontiers in Big Data2023 / art. 1042783, 21 p. : ill https://doi.org/10.3389/fdata.2023.1042783
- Modeling and optimizing graded sequrity measuresOjamaa, Andres; Tõugu, Enn; Kivimaa, JüriInfo- ja kommunikatsioonitehnoloogia doktorikooli IKTDK kolmanda aastakonverentsi artiklite kogumik : 25.-26. aprill 2008, Voore külalistemaja2008 / p. 123-125 : ill
- Modelling cyberspace to determine cybersecurity training requirementsVenables, AdrianFrontiers in education2021 / art. 768037, 16 p. : ill https://doi.org/10.3389/feduc.2021.768037 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS
- Modelling financially motivated cyber crime = Finantsiliselt motiveeritud küberkuritegevuse modelleerimineSõmer, Tiia2022 https://doi.org/10.23658/taltech.10/2022 https://www.ester.ee/record=b5491785*est https://digikogu.taltech.ee/et/Item/5c41eec5-0c88-43c8-9294-c9f47e7c438b
- Modelling the impact of space situational awareness disruption on the European and Arctic security landscapeCarlo, Antonio; Boschetti, NicoloModelling and Simulation for Autonomous Systems: 9th International Conference, MESAS 2022, Prague, Czech Republic, October 20–21, 2022 : Revised Selected Papers2023 / p. 299-311 https://doi.org/10.1007/978-3-031-31268-7_18
- A multidimensional cyber defense exercise: emphasis on emotional, social, and cognitive aspectsMaennel, Kaie; Brilingaitė, Agnė,; Bukauskas, Linas; Juozapavičius, Aušrius; Knox, Benjamin James; Lugo, Ricardo Gregorio; Maennel, Olaf Manuel; Majore, Ginta; Sütterlin, StefanSAGE Open2023 / 12 p. : ill https://doi.org/10.1177/21582440231156367
- Multi-level analytical frameworks for supporting cyber security legal decision making : thesis for the degree of doctor of philosophyKasper, Agnes2015 http://www.ester.ee/record=b4511758*est
- Multi-purpose cyber environment for maritime sectorVisky, Gabor; Lavrenovs, Arturs; Orye, Erwin; Heering, Dan; Tam, KimberlyProceedings of the17th International Conference on Cyber Warfare and SecurityState University of New York at AlbanyAlbany, New York, USA 17-18 March 20222022 / p. 349-257 https://doi.org/10.34190/iccws.17.1.26
- Naised küberturbes - eeskujud tüdrukuteleLorenz, Birgy; Valdmets, Maris2021 https://sites.google.com/view/eeskujud
- Naised teaduses: Olga Vovk uurib tervishoiuandmete anonüümistamist [Võrguväljaanne]Kharchenko, VyacheslavBioneer.ee2022 "Naised teaduses: Olga Vovk uurib tervishoiuandmete anonüümistamist"
- National cybersecurity legislation : is there a magic formula?Tikk, EnekenCybersecurity Best Practices : Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden2018 / p. 615-633 https://doi.org/10.1007/978-3-658-21655-9_42
- NATO küberkaitsekeskuse korraldatud õppuse võitis Rootsi [Võrguväljaanne]Ots, Maiterr.ee2021 "NATO küberkaitsekeskuse korraldatud õppuse võitis Rootsi"
- NATO õppusel häkiti vaenlase taristutAllik, Henry-LaurPostimees2021 / Lk. 2 https://dea.digar.ee/article/postimees/2021/12/13/3.1
- NATO's large-scale cyberdefense exercise Locked Shields underway in Tallinn [Online resource]news.err.ee2022 "NATO's large-scale cyberdefense exercise Locked Shields underway in Tallinn"
- Navigating a Finnish take on international law : interview with Ambassador Marja Lehto, Senior Expert on Public International Law at the Ministry of Foreign Affairs, FinlandDirections : Cyber Digital Europe2020 Navigating a Finnish take on international law : interview with Ambassador Marja Lehto, Senior Expert on Public International Law at the Ministry of Foreign Affairs, Finland
- NCSS: A global census of national positions on conflict, neutrality and cooperationSerrano Iova; Serrano-Iova, Radu-Antonio; Watashiba, TomoeProceedings of the 22nd European Conference on Cyber Warfare and Security2023 / p. 420-428 https://papers.academic-conferences.org/index.php/eccws/issue/view/20/23
- Netflow based framework for identifying anomalous end user nodesVaarandi, Risto; Pihelgas, MaunoProceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 20202020 / p. 448-456 https://doi.org/10.34190/ICCWS.20.035
- Noored häkkerid võtavad mõõtu Eesti suurimal kübervõistlusel [Võrguväljaanne]postimees.ee2022 Noored häkkerid võtavad mõõtu Eesti suurimal kübervõistlusel
- Nutiseadme abil õpitakse meil liiga väheLorenz, BirgyÕpetajate Leht2020 / Lk. 6 Nutiseadme abil õpitakse meil liiga vähe
- Obtaining better metrics for complex serious games within virtualised simulation environmentsMäses, Sten; Hallaq, Bil; Maennel, Olaf Manuel11th European Conference on Games Based Learning (ECGBL 2017) : Graz, Austria, 5 - 6 October 20172017 / p. 428-434 : ill http://www.scopus.com/inward/record.uri?eid=2-s2.0-85036459293&partnerID=40&md5=2ba817e29bec893e126f50a3d4ede83c
- Offensive cyber operations exercise kicks off in Estonia [Online resource]news.err.ee2021 "Offensive cyber operations exercise kicks off in Estonia"
- On the relationship between health sectors' digitalization and sustainable health goals : a cyber security perspectiveSütterlin, Stefan; Knox, Benjamin J.; Maennel, Kaie; Canham, Matthew; Lugo, Ricardo GregorioTransitioning to good health and well-being2022 / 22 p https://www.mdpi.com/books/pdfdownload/edition/1245
- Operator impressions of 3D visualizations for cybersecurity analystsKullman, Kaur; Ben-Asher, Noam; Sample, CharAbstracts and conference materials for the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 20192019 / p. 31-32 https://www.academic-conferences.org/conferences/eccws/eccws-future-and-past/
- Operator impressions of 3D visualizations for cybersecurity analystsKullman, Kaur; Ben-Asher, Noam; Sample, CharProceedings of the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 20192019 / p. 257–266 https://www.researchgate.net/publication/334226184_Operator_Impressions_of_3D_Visualizations_for_Cybersecurity_Analysts
- Opportunities and challenges in the cyber-space nexusCarlo, Antonioispionline2023 Opportunities and challenges in the cyber-space nexus
- Otse pühapäeval kell 11.30: Targa Tuleviku Tuleproov ja Kübernaaskel 2023err.ee2023 Otse pühapäeval kell 11.30: Targa Tuleviku Tuleproov ja Kübernaaskel 2023
- Oxfordi ülikool toob teadmised kaasaegsest infoühiskonnast TTÜ-sseKello, LucasStudioosus2015 / lk. 18-19 https://www.ester.ee/record=b1558644*est
- Paljastus sajandi suurim tarkvaraprobleemPiir, Rait; Malmberg, Kristi; Tammet, TanelPostimees2018 / lk. 10 TTÜ professor suurest kiibiveast: paljastus sajandi tõsiseim turvaprobleem
- Parabasis : Cyber-diplomacy in StalemateTikk, Eneken; Kerttunen, Mika2018 https://www.academia.edu/38195740/Tikk_Kerttunen_Parabasis_Cyber-diplomacy_in_stalemate.pdf
- PASCAL : timing SCA resistant design and verification flowLai, Xinhui; Jenihhin, Maksim; Raik, Jaan; Paul, Kolin2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS 2019) : 1-3 July 2019, Greece2019 / p. 239-242 : ill https://doi.org/10.1109/IOLTS.2019.8854458
- Pedagogical challenges and ethical considerations in developing critical thinking in cybersecurityLorenz, Birgy; Kikkas, KaidoProceedings IEEE 20th International Conference on Advanced Learning Technologies, ICALT 2020 : 6–9 July 2020, Online2020 / p. 262-263 https://doi.org/10.1109/ICALT49669.2020.00085
- Piiri ületavaid sõidukeid valgustavad läbi Hiina riigifirma röntgenseadmed = Багаж в аэропорту и транспорт на границе просвечивает потенциально опасная китайская техникаVoltri, Johanneserr.ee2024 Piiri ületavaid sõidukeid valgustavad läbi Hiina riigifirma röntgenseadmed
- Pitfalls of machine learning methods in smart grids : a legal perspectiveAntonov, Aleksander; Häring, Tobias; Korõtko, Tarmo; Rosin, Argo; Kerikmäe, Tanel; Biechl, Helmuth2021 International Symposium on Computer Science and Intelligent Controls :(ISCSIC 2021), 12-14 November 2021, Rome, Italy : proceedings2021 / p. 248-256 https://doi.org/10.1109/ISCSIC54682.2021.00053
- A pragmatic methodology for blind hardware trojan insertion in finalized layoutsHepp, Alexander; Perez, Tiago Diadami; Pagliarini, Samuel Nascimento; Sigl, GeorgICCAD '22: Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design2022 / art. 69, p. 1-9 : ill https://doi.org/10.1145/3508352.3549452 Conference Proceedings at Scopus Article at Scopus Article at WOS
- PrefaceBellatreche, Ladjel; Chernishev, George; Corral, Antonio; Ouchani, Samir; Vain, JüriAdvances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings2021 / p. v-vii https://link.springer.com/content/pdf/bfm:978-3-030-87657-9/1?pdf=chapter%20toc Article collection metrics at Scopus Article at Scopus
- Preliminary analysis of cyberterrorism threats to internet of things (IoT) applicationsBalogun, Mobolarinwa; Bahsi, Hayretdin; Karabacak, BilgeTerrorists' use of the Internet2017 / p. 49-58 http://doi.org/10.3233/978-1-61499-765-8-49
- Preliminary analysis of cyberterrorism threats to internet of things (IoT) applications [Online resource]Bahsi, HayretdinAdvanced Research Workshop supported by the NATO Science for Peace and Security Programme, Terrorists’ Use of the Internet : assessment and response2016 / p. 8 http://www.cyberterrorism-project.org/wp-content/uploads/2016/11/Terrorists%E2%80%99-Use-of-the-Internet-Assessment-and-Response.pdf
- President Alar Karis külastas FinEst Targa Linna Tippkeskustgoodnews.ee2023 President Alar Karis külastas FinEst Targa Linna Tippkeskust
- President Karis kohtumisel Küprose riigipeaga: surve Venemaale sõja lõpetamiseks ja igakülgne toetus Ukrainale on praegu esmatähtsad [Võrguväljaanne]lounaeestlane.ee2022 "President Karis kohtumisel Küprose riigipeaga: surve Venemaale sõja lõpetamiseks ja igakülgne toetus Ukrainale on praegu esmatähtsad"
- Principles of eVoting system security evaluationTepandi, Jaak; Forsgren, O.Innovation and the knowledge economy : issues, applications, case studies. 22005 / p. 468-473
- Proceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology [Online resource]2015 http://cybercentre.cs.ttu.ee/en/icr2015/
- Proceedings of the 2nd Interdisciplinary Cyber Research Workshop 2016 [Online resource]2016 http://cybercentre.cs.ttu.ee/wp/wp-content/uploads/2016/03/CRW_2016_lingitud.pdf http://www.ester.ee/record=b4579694*est
- Proceedings of the 3rd Interdisciplinary Cyber Research Workshop 2017 : 8th of July 2017 [Online resource]2017 http://www.ester.ee/record=b4684355*est https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/crw2017_final.pdf
- Proceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 2018 [Online resource]2018 https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/CRW_2018_lingitud.pdf https://www.ester.ee/record=b5139478*est
- Programmi RITA tegevuse 1 projekti „Masinõppe ja AI toega teenused“ lõpparuanneSolvak, Mihkel; Vilo, Jaak; Reisberg, Sulev; Tamm, Sirli; Oja, Marek; Ligi, Kadri; Unt, Taavi; Võrk, Andres; Leets, Peeter; Tammet, Tanel; Vaarandi, Risto; Nõmm, Sven; Lepik, Toomas; Lember, Veiko; Nõmmik, Steven; Noordt, Colin Pascal van; Kerikmäe, Tanel2022 Programmi RITA tegevuse 1 projekti „Masinõppe ja AI toega teenused“ lõpparuanne
- Pronksiöö tõi küberkaitse õppekava : [magistritaseme õppes TÜ ja TTÜ koostöös]Tisler, EveUniversitas Tartuensis : UT : Tartu Ülikooli ajakiri2010 / märts, lk. 22-23 : fot
- Pühapäeval käivitatakse küberkuu suure võistlus- ja messipäevagapealinn.ee2023 Pühapäeval käivitatakse küberkuu suure võistlus- ja messipäevaga
- Raamatukogude roll ohutuma küberruumi loomiselKont, Kate-RiinRaamatukogu2022 / lk. 22-25 https://www.ester.ee/record=b1817020*est https://issuu.com/nlib/docs/2022_6_veeb
- Rain Ottis : tõsised mängud kübermaailmas [Võrguväljaanne}Ottis, Rainerr.ee2019 / fot Rain Ottis: tõsised mängud kübermaailmas
- Rain Ottis : "Tähtis on teha asju, millesse ise usud!"Alas, AskurMente et Manu2016 / lk. 12-17 : fot https://www.ester.ee/record=b1242496*est
- Rain Ottis: "Tähtis on teha asju, millesse ise usud!"Alas, Askur; Ottis, RainEesti Ekspress2015 / Koolitusekspress, lk. 2-3
- Recommendations for enhancing the results of cyber effectsOrye, Erwin; Maennel, Olaf Manuel2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings2019 / p. 103-121 https://www.ester.ee/record=b5197210*est https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf https://doi.org/10.23919/CYCON.2019.8756649
- Regulatory patterns of the Internet development : expanding the role of private stakeholders through mediatized "self-regulation"Solarte Vasquez, Maria ClaudiaBaltic journal of European studies2013 / p. 84-120
- A reinforcement learning routing protocol for UAV aided public safety networksMinhas, Hassan Ishtiaq; Ahmad, Rizwan; Ahmed, Waqas; Waheed, Maham; Alam, Muhammad Mahtab; Gul, Sufi TabassumSensors2021 / Art. nr. 4121 https://doi.org/10.3390/s21124121 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS
- Remote exploit development for cyber red team computer network operations targeting industrial control systemsBlumbergs, BernhardsProceedings of the 5th International Conference on Information Systems Security and Privacy : ICISSP 2019 : February 23-25, 2019, Prague, Czech Republic. Vol. 12019 / p. 88-99 : ill https://doi.org/10.5220/0007310300880099
- Remote technical labs : an innovative and scalable component for university cybersecurity program admissionMaennel, Kaie; Kivimägi, Kristian; Maennel, Olaf Manuel; Sütterlin, Stefan; Ernits, MargusEducating Engineers for Future Industrial Revolutions : Proceedings of the 23rd International Conference on Interactive Collaborative Learning (ICL2020). Volume 22021 / p. 521-533 https://doi.org/10.1007/978-3-030-68201-9_51 Conference Proceedings at Scopus Article at Scopus Article at WOS
- Restrictions of Russian internet resources in Ukraine : national security, censorship or both?Shumilo, Olga; Kerikmäe, Tanel; Chochia, ArchilBaltic journal of European studies2019 / p. 82–95 https://doi.org/10.1515/bjes-2019-0023 https://www.ester.ee/record=b2675037*est Journal metrics at Scopus Article at Scopus Article at WOS
- Resynthesis-based attacks against logic lockingAlmeida, Felipe; Aksoy, Levent; Nguyen, Quang-Linh; Dupuis, Sophie; Flottes, Marie-Lise; Pagliarini, Samuel Nascimento2023 24th International Symposium on Quality Electronic Design (ISQED) : San Francisco, 5-7 April 20232023 / 8 p. : ill https://doi.org/10.1109/ISQED57927.2023.10129403 Article at Scopus Article at WOS
- Riistvara Trooja hobuste rünnak võib ohustada nii koduarvuti kasutajat kui ka riigi digitaalset julgeolekut [Võrguväljaanne]arileht.delfi.ee2022 Riistvara Trooja hobuste rünnak võib ohustada nii koduarvuti kasutajat kui ka riigi digitaalset julgeolekut
- Routledge handbook of international cybersecurity2020 https://doi.org/10.4324/9781351038904 https://www.ester.ee/record=b5308475*est
- Safeguarding a formalized blockchain-enabled identity-authentication protocol by applying security risk-oriented patternsNorta, Alexander; Matulevičius, Raimundas; Leiding, BenjaminComputers & Security2019 / p. 253−269 https://doi.org/10.1016/j.cose.2019.05.017 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS
- Safeguarding the final frontier: Analyzing the legal and technical challenges to mega-constellationsJha, Devanshu; Manti, N. P.; Carlo, Antonio; Zarkan, L. C.; Breda, Paola; Jha, A.Journal of space safety engineering2022 / p. 636-643 https://doi.org/10.1016/j.jsse.2022.08.006 Journal metrics at Scopus Article at Scopus Article at WOS
- Scalable and efficient authentication scheme for secure smart grid communicationHammami, Hamza; Ben Yahia, Sadok; Obaidat, Mohammad S.IET Networks2020 / p. 165-169 https://doi.org/10.1049/iet-net.2019.0225 Journal metrics at Journal Article at Scopus Journal metrics at WOS Article at WOS
- A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption methodVedešin, Anton; Dogru, John Mehmet Ulgar; Liiv, Innar; Ben Yahia, Sadok; Draheim, DirkIEEE Access2020 / p. 40039-40056 : ill https://doi.org/10.1109/ACCESS.2019.2946730 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS
- Securing airline-turnaround processes using security risk-oriented patternsSamarütel, Silver; Matulevičius, Raimundas; Norta, Alexander; Nõukas, ReinThe Practice of Enterprise Modeling : 9th IFIP WG 8.1. Working Conference, PoEM 2016, Skövde, Sweden, November 8-10, 2016 : proceedings2016 / p. 209-224 http://dx.doi.org/10.1007/978-3-319-48393-1_15
- Securing free and fair European ElectionsWenda, Gregor; Stein, RobertJusletter IT Internet of Things - Digital Edition of Proceedings of the 22nd International Legal Informatics Symposium 2019 : proceedings2019 https://jusletter-it.weblaw.ch/en/issues/2019/IRIS/volksbegehren-online_d9db4211c5.html__ONCE&login=false
- Securing outer space through cyber : risks and countermeasuresCarlo, Antonio; Casamassima, FrancescaIAC 2021 congress proceedings2021 / art. 64939 https://dl.iafastro.directory/event/IAC-2021/paper/64939/ Conference Proceedings at Scopus Article at Scopus
- Security risk management in the aviation turnaround sectorMatulevičius, Raimundas; Norta, Alexander; Udokwu, Chibuzor; Nõukas, ReinFuture Data and Security Engineering : Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016 : proceedings2016 / p. 119-140 : ill http://dx.doi.org/10.1007/978-3-319-48057-2_8
- Security-by-design approaches for critical infrastructure: mapping the landscape of cyber and space LawCarlo, Antonio; Salmeri, AntoninoNATO legal gazette2021 / p. 97-113 https://www.act.nato.int/wp-content/uploads/2023/05/legal_gazette_42.pdf
- Service measurement map for large-scale cyber defense exercisesPihelgas, Mauno; Rubio Melon, Francisco Jesus; Priisalu, JaanCyber Defence Situation Awareness : STO-MP-IST-1482016 / p. 9-1 - 9-10 : ill http://dx.doi.org/10.14339/STO-MP-IST-148
- Shortcomings in cybersecurity education for seafarersHeering, Dan; Maennel, Olaf Manuel; Venables, AdrianDevelopments in Maritime Technology and Engineering : Celebrating 40 years of teaching in Naval Architecture and Ocean Engineering in Portugal and the 25th anniversary of CENTEC, Volume 12021 / p. 49−61 https://doi.org/10.1201/9781003216582
- Side-channel Trojan insertion - a practical foundry-side attack via ECOPerez, Tiago Diadami; Imran, Malik; Vaz, Pablo; Pagliarini, Samuel Nascimento2021 IEEE International Symposium on Circuits and Systems (ISCAS), Daegu, Korea, May 22-28, 2021 : proceedings2021 / 5 p. : ill https://doi.org/10.1109/ISCAS51556.2021.9401481 Conference Proceedings at Scopus Article at Scopus Article at WOS
- Situational states influence on team workload demands in cyber defense exerciseAsk, Torvald F.; Sütterlin, Stefan; Knox, Benjamin J.; Lugo, Ricardo G.HCI International 2021 - late breaking papers : cognition, inclusion, learning, and culture : 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021 : proceedings2021 / p. 3-20 : ill https://doi.org/10.1007/978-3-030-90328-2_1 Conference proceeding at Scopus Article at Scopus Conference proceeding at WOS Article at WOS
- Software technology for cyber security simulations = Tarkvaratehnika küberturbe simulatsioonide jaoksOjamaa, Andres2016 http://www.ester.ee/record=b4640099*est
- Space as NATO’s operational domain : the case of the cyberthreats against GNSSZarkan Cesari, Laetitia; Carlo, Antonio; Roux, Lucille; Toukebri, Raina; Pelin Manti, NebileIAC 2021 congress proceedings2021 / art. 66298 https://dl.iafastro.directory/event/IAC-2021/paper/66298/
- Specialized cyber red team responsive computer network operations = Vastutegevusele orienteeritud punase meeskonna küberoperatsioonidBlumbergs, Bernhards2019 https://digi.lib.ttu.ee/i/?12015
- ‘Spill Over’ and ‘Fail Forward’ in the EU’s Cybersecurity RegulationsKasper, Agnes; Osula, Anna-MariaDigital development of the European Union : an interdisciplinary perspective2023 / p. 21-44 : ill https://doi.org/10.1007/978-3-031-27312-4_3 https://www.ester.ee/record=b5557935*est
- Standing Committee on Cyber SecurityMõtus, LeoEstonian Academy of Sciences year book = Annales Academiae Scientiarum Estonicae 20132014 / p. 44-45
- Status Detector for Fuzzing-Based Vulnerability Mining of IEC 61850 ProtocolVisky, Gabor; Lavrenovs, Arturs; Maennel, Olaf ManuelProceeding of the 20th European Conference on Cyber Warfare and Security2021 / p. 454-461 https://doi.org/10.34190/EWS.21.007
- Stenmap : framework for evaluating cybersecurity-related skills based on computer simulationsMäses, Sten; Randmann, Liina; Maennel, Olaf Manuel; Lorenz, BirgyLearning and Collaboration Technologies : Learning and Teaching : 5th International Conference : LCT 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018 : Proceedings, Part II2018 / p. 492-504 https://doi.org/10.1007/978-3-319-91152-6_38 Conference Proceedings at Scopus Article at Scopus Conference Proceedings at WOS Article at WOS
- Strategic cyber security : evaluating nation-state cyber attack mitigation strategies with DEMATEL = Strateegiline küberjulgeolek : küberrünnaku leevendamise strateegiate hindamine riiklikul tasandil : DEMATEL-i meetodGeers, Kenneth2011 https://digi.lib.ttu.ee/i/?592
- Strategically normative. Norms and principles in national cybersecurity strategiesKerttunen, Mika; Tikk, Eneken2019 https://eucyberdirect.eu/wp-content/uploads/2019/04/kerttunen_tikk-strategically-normative-april-2019-eucyberdirect_.pdf
- A stream clustering algorithm for classifying network IDS alertsVaarandi, RistoProceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings2021 / p. 14-19 https://doi.org/10.1109/CSR51186.2021.9527926
- Success factors for designing a cybersecurity exercise on the example of incident responseMäses, Sten; Maennel, Kaie; Toussaint, Mascia; Rosa, Veronica2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)2021 / p. 259-268 https://doi.org/10.1109/EuroSPW54576.2021.00033
- Surveying pervasive public safety communication technologies in the context of terrorist attacksMasood, Ali; Scazzoli, Davide; Sharma, Navuday; Le Moullec, Yannick; Ahmad, Rizwan; Reggiani, Luca; Magarini, Maurizio; Alam, Muhammad MahtabPhysical communication2020 / art. 101109, https://doi.org/10.1016/j.phycom.2020.101109 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS
- Suurõppusel harjutatakse läbi vaenuliku saareriigi küberrünnakud naaberriigilePulk, Meinhardpostimees.ee2023 Suurõppusel harjutatakse läbi vaenuliku saareriigi küberrünnakud naaberriigile
- System for determination of legal responsibility/penalty for a cybersecurity breachHovorushchenko, Tetiana; Herts, Alla; Boyarchuk, Artem; Pavlova, OlgaITTAP 2022 - Proceedings of the 2nd International Workshop on Information Technologies: Theoretical and Applied Problems2022 / p. 233-240 https://ceur-ws.org/Vol-3309/short9.pdf Conference proceedings at Scopus Article at Scopus
- A systematic approach to offensive volunteer cyber militiaOttis, Rain2011 http://www.ester.ee/record=b2685353*est
- Tallinn võõrustab taas suurt rahvusvahelist küberkaitseõppustLiiviste, Priitpealinn.ee2022 "Tallinn võõrustab taas suurt rahvusvahelist küberkaitseõppust"
- Tallinnas toimub Eesti-Poola ühine küberturbe konverents [Võrguväljaanne]am.ee2022 https://www.am.ee/node/8605
- Tallinnas toimuva küberturbe konverentsi korraldajad: Ida-Euroopa hääl peab olema kuulda ka Brüsselis ja väljaspool Euroopa Liitudigi.geenius.ee2023 Tallinnas toimuva küberturbe konverentsi korraldajad: Ida-Euroopa hääl peab olema kuulda ka Brüsselis ja väljaspool Euroopa Liitu
- Taltech avaldas, mis erialad toovad taskusse kahekordse keskmise palgapostimees.ee2023 Taltech avaldas, mis erialad toovad taskusse kahekordse keskmise palga
- TalTech hoiatab petukirjade eest [Võrguväljaanne]Laan, Triinuohtuleht.ee2021 "TalTech hoiatab petukirjade eest"
- TalTech issues spam email warning [Võrguväljaanne]err.ee2021 "TalTech issues spam email warning"
- TalTech korraldab mahuka infoturbejuhtide koolitusprogrammiam.ee2023 https://www.am.ee/node/8848
- TalTech loob tüdrukutele suunatud kogumiku naistest Eesti küberturbes [Võrguväljaanne]Liiviste, Priitpealinn.ee2021 "TalTech loob tüdrukutele suunatud kogumiku naistest Eesti küberturbes"
- TalTechi arvutisüsteemide professori uudne tehnoloogia raskendab spionaaži [Võrguväljaanne]Kald, Indrekituudised.ee2021 "TalTechi arvutisüsteemide professori uudne tehnoloogia raskendab spionaaži
- TalTechi kaasatud professor Stefan Sütterlin: küberrünnakus proovitakse esimesena murda inimenedigi.geenius.ee2023 TalTechi kaasatud professor Stefan Sütterlin: küberrünnakus proovitakse esimesena murda inimene
- TalTechi kõige noorem tudeng Vira naudib küberturbe tehnoloogiate maailma = Самая юная студентка TalTech Вира осваивает технологии кибербезопасностиMustamäe2024 / lk. 3 : fot https://www.ester.ee/record=b1072635*est
- TalTechi riistvara turvalisuse keskuse doktorandid saavutasid rahvusvahelisel konkurentsitihedal võistlusel kolmanda koha [Võrguväljaanne]digi.geenius.ee2022 "TalTechi riistvara turvalisuse keskuse doktorandid saavutasid rahvusvahelisel konkurentsitihedal võistlusel kolmanda koha"
- TalTechi tarkvarateaduse instituut sai uue rakendusliku masinõppe professoriKald, Indrekituudised.ee2023 TalTechi tarkvarateaduse instituut sai uue rakendusliku masinõppe professori
- Teadlane arutleb : missugused on moodsa kübersõja eetilised aspektid ja kas me suudame ennast kaitsta?Leier, Mairodigi.geenius.ee2024 Teadlane arutleb : missugused on moodsa kübersõja eetilised aspektid ja kas me suudame ennast kaitsta?
- Teadlased loovad küberrünnakute tõrjumiseks Eesti interneti mudeli. TTÜ-s valmib spetsiaalne Eesti küberkaitse tarkvaraRoonemaa, HolgerEesti Päevaleht2010 / 23. veebr., lk. 1, 4
- Teaduse populariseerimise auhinnaga pärjatud Birgy Lorenzi jaoks on oluline noorte turvaline käitumine internetis [Võrguväljaanne]digi.geenius.ee2022 Teaduse populariseerimise auhinnaga pärjatud Birgy Lorenzi jaoks on oluline noorte turvaline käitumine internetis
- Team learning in cybersecurity exercisesMaennel, Kaie; Kim, Joonsoo; Sütterlin, StefanProceedings of the 5th Interdisciplinary Cyber Research Conference 2019 : 29th of June 2019, Tallinn University of Technology2019 / p. 17−19 https://www.ester.ee/record=b5238490*est
- Technological sovereignty : missing the point?Maurer, Tim; Skierka-Canton, Isabel; Morgus, Robert; Hohmann, Mirko2015 7th International Conference on Cyber Conflict : Architectures in Cyberspace : 26-29 May 2015, Tallinn, Estonia2015 / p. 53-67
- TED : a container based tool to perform security risk assessment for ELF binariesMucci, Daniele; Blumbergs, BernhardsProceedings of the 5th International Conference on Information Systems Security and Privacy : ICISSP 2019 : February 23-25, 2019, Prague, Czech Republic. Vol. 12019 / p. 361–369 : tab http://doi.org/10.5220/0007371603610369
- Tehnikaülikool ja NATO küberkaitsekoostöö keskus alustavad partnerlust teadus- ja õppetöösMente et Manu2017 / lk. 11 : fot http://www.ester.ee/record=b1242496*est
- Tehnoloogia ja küberturvalisuse tasakaal merenduses : esikohale eetika ja heaoluMaripuu, HelenaMeremees : Eesti merendusajakiri = Estonian maritime magazine2023 / lk. 6-7 : fot https://issuu.com/ajakirimeremees/docs/meremees322 https://www.ester.ee/record=b4646644*est
- The becoming of cyber-military capabilitiesSalminen, Mikko; Kerttunen, MikaRoutledge handbook of international cybersecurity2020 / p. 94-107 https://www.ester.ee/record=b5308475*est
- The EU’s common security and defence policy in facing new security challenges and its impact on cyber defenceKasper, Agnes; Mölder, HolgerThe EU in the 21st century : challenges and opportunities for the European integration process2020 / p. 271-294 https://doi.org/10.1007/978-3-030-38399-2_15
- The EU's cybersecurity : a strategic narrative of a cyber power or a confusing policy for a local common market?Kasper, Agnes; Vernygora, Vlad AlexCuadernos Europeos de Deusto = Deusto Journal of European Studies2021 / p. 29–71 https://doi.org/10.18543/ced-65-2021pp29-71 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS
- The importance of cybersecurity frameworks to regulate emergent AI technologies for space applicationsCarlo, Antonio; Mantı, N. P.; Bintang, A. S. W. A. M.; Casamassima, F.; Boschetti, N.; Breda, P.; Rahloff, T.Journal of space safety engineering2023 / p. 474-482 https://doi.org/10.1016/j.jsse.2023.08.002
- The Main challenges and barriers to the successful "Smart Shipping"Alop, AnatoliTransNav: International Journal on Marine Navigation and Safety of Sea Transportation2019 / p. 521-528 https://doi.org/10.12716/1001.13.03.05
- The politics of stability: cement and change in cyber affairsKerttunen, Mika; Tikk, EnekenRoutledge handbook of international cybersecurity2020 / p. 52-64 https://www.ester.ee/record=b5308475*est https://doi.org/10.4324/9781351038904-6
- The regulatory intersections between artificial intelligence, data protection and cyber security : challenges and opportunities for the EU legal frameworkAndraško, Jozef; Mesarčik, Matuš; Hamulak, OndrejAI & Society2021 / p. 623–636 https://doi.org/10.1007/s00146-020-01125-5
- The rise of the regionals: how regional organisations contribute to international cyber stability negotiations at the United Nations levelOtt, Nikolas; Osula, Anna-Maria2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings2019 / p. 321-345 https://doi.org/10.23919/CYCON.2019.8756863 https://www.ester.ee/record=b5197210*est https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf
- The role of artificial intelligence in kinetic targeting from the perspective of international humanitarian lawRoberts, Anastasia; Venables, Adrian2021 13th International Conference on Cyber Conflict : Going viral2021 / art. 9468301, p. 43-57 https://doi.org/10.23919/CyCon51939.2021.9468301 https://www.ester.ee/record=b5417211*est
- The role of defence in national cybersecurity get access arrowKerttunen, MikaThe Oxford handbook of cyber security2021 / p. 447–462 https://doi.org/10.1093/oxfordhb/9780198800682.013.27
- The Role of IT Background for Metacognitive Accuracy, Confidence and Overestimation of Deep Fake Recognition SkillsSütterlin, Stefan; Lugo, Ricardo Gregorio; Ask, Torvald F.; Veng, Karl; Eck, Jonathan; Fritschi, Jonas; Özmen, Muhammed-Talha; Bärreiter, Basil; Knox, Benjamin JamesAugmented Cognition : 16th International Conference, AC 2022, Held as Part of the 24th HCI International Conference, HCII 2022. Virtual Event, June 26 - July 1, 2022, proceedings2022 / p. 103-119 https://doi.org/10.1007/978-3-031-05457-0_9
- The role of the UN Security Council in cybersecurity : International peace and security in the digital ageTikk, Eneken; Schia, Niels NagelhusRoutledge handbook of international cybersecurity2020 / p. 354-356 https://doi.org/10.4324/9781351038904-35 https://www.ester.ee/record=b5308475*est
- Tiia Sõmer : kuidas küberkurjategijad tegutsevad ja miks nad on edukad? [võrguväljaanne]Sõmer, Tiiaerr.ee2019 / fot Tiia Sõmer: kuidas küberkurjategijad tegutsevad ja miks nad on edukad?
- Tiia Sõmer : kuidas küberkurjategijad tegutsevad ja miks nad on edukad? [võrguväljaanne]Sõmer, TiiaEdasi.org : innustav ja hariv ajakiri2019 / fot Tiia Sõmer: kuidas küberkurjategijad tegutsevad ja miks nad on edukad?
- Tiia Sõmer : kuidas küberkurjategijad tegutsevad ja miks nad on edukad? [võrguväljaanne]Sõmer, Tiiaerr.ee2019 Tiia Sõmer: kuidas küberkurjategijad tegutsevad ja miks nad on edukad?
- Tiia Sõmer: kuidas küberkurjategijad tegutsevad ja miks nad on edukad? [Võrguväljaanne]Sõmer, TiiaEdasi.org : innustav ja hariv ajakiri2019 Tiia Sõmer: kuidas küberkurjategijad tegutsevad ja miks nad on edukad? Tiia Sõmer: kuidas küberkurjategijad tegutsevad ja miks nad on edukad?
- Time for cyber Maastricht? [Online resource]Kasper, AgnesDirections2020 https://directionsblog.eu/time-for-cyber-maastricht/
- Tippkeskus EXCITE ühendab Eesti IT-teaduse absoluutseid tippe [Võrguväljaanne]digi.geenius.ee2021 "Tippkeskus EXCITE ühendab Eesti IT-teaduse absoluutseid tippe"
- Toimus Eesti suurim häkkimisvõistlus KüberNaaskel : vaata, kes olid paremate seasgeenius.ee2022 Toimus Eesti suurim häkkimisvõistlus KüberNaaskel: vaata, kes olid paremate seas
- Towards a Cyber Maastricht : two steps forward, one step backKasper, Agnes; Vernygora, Vlad AlexThe future of the European Union : demisting the debate2020 / p. 186-210 https://www.um.edu.mt/library/oar/handle/123456789/52310 https://www.um.edu.mt/library/oar/bitstream/123456789/52310/1/Towards_a_%e2%80%98Cyber_Maastricht%e2%80%99_two_steps_forward_one_step_back_2020.pdf
- Towards a healthcare cybersecurity certification schemeHovhannisyan, Kristine; Bogacki, Piotr; Colabuono, Consuelo Assunta; Lofu, Domenico; Marabello, Maria Vittoria; Maxwell, Brady Eugen2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)2021 / p. 1-9 https://doi.org/10.1109/CyberSA52016.2021.9478255
- Towards a resilient cyber architecture for space infrastructures : mitigating the new attack vectorsCarlo, Antonio; Pelin Manti, Nebile; Breda, Paola; Rollinde de Beaumont, Maelys; Jha, DevanshuIAC 2022 congress proceedings2023 / art. 78079 https://dl.iafastro.directory/event/IAC-2023/paper/78079/
- Towards conceptualizing EU cybersecurity law : Discussion paper ; C 253Kasper, Agnes; Antonov, Aleksander2019 https://www.zei.uni-bonn.de/news/2019/zei-discussion-paper-c-253-2019
- Towards formal verification of cache access-based side-channel attacksNiazmand, Behrad; Reinbrecht, Cezar; Raik, Jaan; Jervan, Gert; Sepulveda, JohannaTestmethoden und Zuverlässigkeit von Schaltungen und Systemen, TUZ 20192019 / 2 p. : tab http://www.informatik.uni-bremen.de/tuz/2019
- Towards pollution-control in cyberspace : problem structure and institutional design in international cybersecurityKasper, Agnes; Krasznay, CsabaInternational and comparative law review2019 / p. 76–96 https://doi.org/10.2478/iclr-2019-0015.
- Towards the integration of a post-hoc interpretation step into the machine learning workflow for IoT botnet detectionGuerra Manzanares, Alejandro; Nõmm, Sven; Bahsi, Hayretdin18th IEEE International Conference on Machine Learning and Applications : ICMLA 2019, 16–19 December 2019, Boca Raton, Florida, USA : proceedings2019 / p. 1162-1169 : ill https://doi.org/10.1109/ICMLA.2019.00193
- Training young cybersecurity talents – The case of EstoniaKikkas, Kaido; Lorenz, BirgyHCI International 2020 - Posters : 22nd International Conference, HCII 2020, Copenhagen, Denmark, July 19-24, 2020, Proceedings, Part II2020 / p. 256-263 https://doi.org/10.1007/978-3-030-50729-9_36 Conference proceeding at Scopus Journal metrics at Scopus
- Trends and challenges for balanced scoring in cybersecurity exercises : a case study on the example of Locked ShieldsMäses, Sten; Maennel, Kaie; Brilingaite, AgneFrontiers in education2022 / art. 958405 https://doi.org/10.3389/feduc.2022.958405 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS
- "Trust me, you will need it" : cybersecurity as extracurricular subject at Estonian schoolsLorenz, Birgy; Kikkas, KaidoHCI for Cybersecurity, Privacy and Trust : Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : proceedings2020 / p. 175-188 https://doi.org/10.1007/978-3-030-50309-3_12 Conference proceedings at Scopus Article at Scopus
- TTÜ ja TÜ valmistavad koos ette küberkaitse, tarkvaratehnika ning energeetika spetsialisteInseneeria2009 / 6(14), lk. 6
- TTÜ kübervastuluure start-up Silicon ValleysKoha, Aleks; Romanello, LeonardoMente et Manu2017 / lk. 34-35 https://www.ttu.ee/public/m/mente-et-manu/MM_02_2017/index.html
- TTÜ loob küberkriminalistika ja küberjulgeoleku keskusePostimees2014 / lk. 4 https://www.postimees.ee/2984857/ttu-loob-kuberkriminalistika-ja-kuberjulgeoleku-keskuse
- TTÜ professor: Hiina äppide keelamise asemel tuleks keskenduda küberhügieenile [Võrguväljaanne]Klementi, Joakimerr.ee2020 / fot TTÜ professor: Hiina äppide keelamise asemel tuleks keskenduda küberhügieenile
- Tulemas küberkaitse magistriõpe : [2007/2008. a. kevadsemestrist avatakse ülikoolidevaheline küberturbe õppemoodul : lühisõnum]Mente et Manu2008 / 30. jaan., lk. 1 https://www.ester.ee/record=b1242496*est
- 2015 7th International Conference on Cyber Conflict : Architectures in Cyberspace 26-29 May 2015, Tallinn, Estonia2015 http://www.ester.ee/record=b4459022*est https://ccdcoe.org/sites/default/files/multimedia/pdf/CyCon_2015_book.pdf
- 2011 : 3rd International Conference on Cyber Conflict : 7-10 June 2011, Tallinn, Estonia : proceedingsCzosseck, Christian; Tõugu, Enn; Wingfield, Thomas2011 https://www.ester.ee/record=b2634614*est
- 2019 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia2019 https://www.ester.ee/record=b5197210*est https://doi.org/10.23919/CyCon46848.2019
- Täna tähistatakse rahvusvahelist turvalise interneti päevagoodnews.ee2024 Täna tähistatakse rahvusvahelist turvalise interneti päeva
- Understanding space vulnerabilities : developing technical and legal frameworks for AI and cybersecurity in the spatial fieldCarlo, Antonio; Pelin Manti, Nebile; A.S.W.A.M., Bintang; Casamassima, Francesca; Boschetti, Nicolo; Breda, Paola; Rahloff, TobiasIAC 2022 congress proceedings2022 / art. 70406 https://dl.iafastro.directory/event/IAC-2022/paper/70406/ Conference proceedings at Scopus Article at Scopus
- Urmas Ruuto: veel 25 aastat tagasi tundus 2Mb/s võimatuSarv, Mari Öödelfi.ee2023 Urmas Ruuto: veel 25 aastat tagasi tundus 2Mb/s võimatu
- Use of force in cyberspaceValuch, Josef; Hamulak, OndrejInternational and comparative law review2020 / p. 174−191 https://doi.org/10.2478/iclr-2020-0023
- User interactions in Virtual Data ExplorerKullman, Kaur; Engel, DonAugmented Cognition : 16th International Conference, AC 2022, Held as Part of the 24th HCI International Conference, HCII 2022. Virtual Event, June 26 - July 1, 2022, proceedings2022 / p. 333-347 https://doi.org/10.1007/978-3-031-05457-0_26 Conference Proceedings at Scopus Article at Scopus Conference Proceedings at WOS Article at WOS
- Using competency mapping for skills assessment in an introductory cybersecurity courseMäses, Sten; Maennel, Olaf Manuel; Sütterlin, StefanEducating Engineers for Future Industrial Revolutions : Proceedings of the 23rd International Conference on Interactive Collaborative Learning (ICL2020). Volume 22021 / p. 572-583 https://doi.org/10.1007/978-3-030-68201-9_56 Article collection metrics at Scopus Article at Scopus Article at WOS
- Using multiplayer games to create secure communicationHenno, Jaak; Jaakkola, Hannu; Mäkelä, JukkaEighth Workshop on Software Quality Analysis, Monitoring, Improvement, and Applications : SQAMIA 2019 : Ohrid, North Macedonia, 22 - 25. 09. 2019 : proceedings2019 / p. 4-4:13 : ill https://perun.pmf.uns.ac.rs/pracner/down/sqamia2019/sqamia2019-proc.pdf
- Using technical cybersecurity exercises in university admissions and skill evaluationMaennel, Kaie; Mäses, Sten; Sütterlin, Stefan; Ernits, Margus; Maennel, Olaf ManuelIFAC-PapersOnLine2019 / p. 169-174 https://doi.org/10.1016/j.ifacol.2019.12.169 Conference proceedings at Scopus Article at Scopus Article at WOS
- Utilising journey mapping and crime scripting to combat cyber crimeSõmer, Tiia; Hallaq, Bil; Watson, TimProceedings of the 15th European Conference on Cyber Warfare and Security : ECCWS 2016 : hosted by Universität der Bundeswehr, Munich, Germany, 7-8 July 20162016 / p. 276-281 : ill
- Utilising journey mapping and crime scripting to combat cybercrime and cyber warfare attacksSõmer, Tiia; Hallaq, Bil; Watson, TimJournal of information warfare2016 / p. 39-49 https://www.jinfowar.com/journal-issue/volume-15-issue-4
- Vabaduse valvurist sai Vihasool jalgrattamuuseumi omanikTohver, AndresVirumaa Teataja / Lk. 4 https://dea.digar.ee/article/virumaateataja/2022/09/15/6.1
- Vaenujalal riigid õhutavad konflikte küberrünnakuid tehes [Võrguväljaanne]Sinisalu, Handoituudised.ee2021 "Vaenujalal riigid õhutavad konflikte küberrünnakuid tehes"
- Variable self-efficacy as a measurement for behaviors in cyber security operationsLugo, Ricardo Gregorio; Knox, Benjamin J.; Josok, Oyvind; Sütterlin, StefanAugmented Cognition. Human Cognition and Behavior : 14th International Conference, AC 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : proceedings, Part II2020 / p. 395-404 https://doi.org/10.1007/978-3-030-50439-7_27 Conference proceedings at Scopus Article at Scopus
- Verified security of BLT signature schemeFirsov, Denis; Buldas, Ahto; Truu, Ahto; Laanoja, RistoCPP 2020 - Proceedings of the 9th ACM SIGPLAN International Conference on Certified Programs and Proofs, co-located with POPL 2020, New Orleans 20 January 2020 through 21 January 20202020 / p. 244-257 https://doi.org/10.1145/3372885.3373828
- What do we talk about when we talk about international cybersecurityTikk, EnekenRoutledge handbook of international cybersecurity2020 / p. 389-396 https://doi.org/10.4324/9781351038904-38 https://www.ester.ee/record=b5308475*est
- When shutdown is no option : identifying the notion of the digital government continuity paradox in Estonia's eID crisisSkierka-Canton, IsabelGovernment information quarterly2023 / art. 101781, 12 p. : ill https://doi.org/10.1016/j.giq.2022.101781
- 5G - ohust on asi kaugelTikk, EnekenPostimees2019 / lk. 16 Eneken Tikk: 5G - ohust on asi kaugel
- 5G and digital sovereignty of the EU : the Slovak wayGabriš, Tomaš; Hamulak, OndrejTalTech Journal of European Studies2021 / p. 25−47 https://doi.org/10.2478/bjes-2021-0013
- Visualising cyber crime based on the E-Crime Project : mapping the journeys of cyber criminals [Online resource]Sõmer, TiiaProceedings of the 2nd Interdisciplinary Cyber Research Workshop 20162016 / p. 26 http://cybercentre.cs.ttu.ee/wp/wp-content/uploads/2016/03/CRW_2016_lingitud.pdf http://www.ester.ee/record=b4579694*est
- Õpilased asuvad küberkaitsevõistluses päästma jõule küberkatastroofist [Võrguväljaanne]postimees.ee2021 "Õpilased asuvad küberkaitsevõistluses päästma jõule küberkatastroofist"
- Üleilmne teadmistesõda, strateegiline ettekujutus, ebakindlus ja hirmMölder, Holger; Shiraev, EricSõjateadlane = Estonian journal of military studies2021 / lk. 33–61 https://www.ester.ee/record=b4555087*est https://www.kvak.ee/files/2022/02/ST_17_veebifail.pdf
- Ülisalajane NATO õppus : sõbralike riikide häkkerid harjutasid Tallinnas vaenulike riikide ründamist [Võrguväljaanne]Allik, Henry-Laurpostimees.ee2021 "Ülisalajane NATO õppus: sõbralike riikide häkkerid harjutasid Tallinnas vaenulike riikide ründamist "
- Ülo Jaaksoo: Huvitav on see, et meie Eestis usaldame oma riikiJaaksoo, ÜloPostimees2022 https://dea.digar.ee/article/ak/2022/07/16/2.1
- В Тарту прошел финал соревнований по кибербезопасности Cyber Battle of Estonia [Online resource]Punamäe, Ode Mariarus.err.ee2021 "В Тарту прошел финал соревнований по кибербезопасности Cyber Battle of Estonia"
- Європейська парадигма кібербезпеки, Эвропейская парадигма кибербезпекиKasper, AgnesKharkiv International Legal Forum, 24-28 september, 2019 = ПРОГРАМА ІІІ ХАРКІВСЬКОГО МІЖНАРОДНОГО ЮРИДИЧНОГО ФОРУМУ III2019 / с. 9
- Карис: сейчас важнее всего всесторонне поддерживать Украину [Online resource]Stolitsa.ee2022 "Карис: сейчас важнее всего всесторонне поддерживать Украину"
- Мошенники рассылают фишинговые письма от имени ректора ТТУ [Online resource]rus.err.ee2021 "Мошенники рассылают фишинговые письма от имени ректора ТТУ"
- На учениях проверена готовность Tallinna Vesi к кибератакам [Online resource]Stolitsa.ee2022 https://stolitsa.ee/tallinn/na-ucheniyakh-proverena-gotovnost-tallinna-vesi-k-kiberatakam
- Эстонские и польские эксперты обсудят кибербезопасность [Online resource]Stolitsa.ee2022 Эстонские и польские эксперты обсудят кибербезопасность