Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
27
Look more..
(2/197)
Export
export all inquiry results
(27)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Anomaly detection and classification in power system state estimation: Combining model-based and data-driven methods
Asefi, Sajjad
;
Mitrovic, Mile
;
Cetenovic, Dragan
;
Levi, Victor
;
Gryazina, Elena
;
Terzija, Vladimir
Sustainable energy, grids and networks
2023
/
art. 101116, 14 p. : ill
https://doi.org/10.1016/j.segan.2023.101116
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
2
book article
ASAT weapons : enhancing NATO’s operational capabilities in the emerging space dependent era
Carlo, Antonio
;
Veazoglou, Nikolaos
Modelling and Simulation for Autonomous Systems : 6th International Conference, MESAS 2019, Palermo, Italy, October 29–31, 2019, Revised Selected Papers
2020
/
p. 417-426
https://doi.org/10.1007/978-3-030-43890-6_34
book article
3
book article
Building cyber resilience : the defensive shield for the EU
Osula, Anna-Maria
Cybersecurity policy in the EU and South Korea from consultation to action : theoretical and comparative perspectives
2022
/
p. 179-196
https://doi.org/10.1007/978-3-031-08384-6_9
book article
4
book article
Capability detection and evaluation metrics for cyber security lab exercises
Caliskan, Emin
;
Tatar, Unal
;
Bahsi, Hayretdin
;
Ottis, Rain
;
Vaarandi, Risto
Proceedings of the 12th International Conference on Cyber Warfare and Security, ICCWS 2017
2017
/
p. 407-414 : ill
https://www.scopus.com/record/display.uri?eid=2-s2.0-85018944652&origin=inward&txGid=dad813d957372581ca0932bf6e4fb5d8
book article
5
journal article EST
/
journal article ENG
Cyber attacks on critical infrastructures and satellite communications
Carlo, Antonio
;
Obergfaell, Kim
International Journal of Critical Infrastructure Protection
2024
/
art. 100701, 8 p.
https://doi.org/10.1016/j.ijcip.2024.100701
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
6
book article
Cyber attacks on power system automation and protection and impact analysis
Rajkumar, Vetrivel Subramaniam
;
Tealane, Marko
;
Stefanov, Alexandru
;
Presekal, Alfan
;
Palensky, Peter
Proceedings of 2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), 26-28 October, 2020
2020
/
p. 247–254
https://doi.org/10.1109/ISGT-Europe47291.2020.9248840
book article
7
book article
Cyber attacks on protective relays in digital substations and impact analysis
Rajkumar, Vetrivel Subramaniam
;
Tealane, Marko
;
Stefanov, Alexandru
;
Palensky, Peter
8th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems(MSCPES), Virtual Workshop, online, from April 21, 2020 : proceedings
2020
/
6 p. : ill
https://doi.org/10.1109/MSCPES49613.2020.9133698
book article
8
book article
Cyber commands - universal solution to a universal cyber security problem?
Alatalu, Siim
Proceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 2018
2018
/
p. 21-22
https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/CRW_2018_lingitud.pdf
book article
9
book article EST
/
book article ENG
Cyber range and digital twin technologies for space resiliency and security
Carlo, Antonio
;
Manti, Nebile Pelin
;
Edl, András
;
Bintang Alam Semesta Wisran, A.M.
;
Breda, Paola
57th IAA Symposium on Safety, Quality and Knowledge Management in Space Activities : held at the 75th International Astronautical Congress (IAC 2024) : Milan, Italy, 14-18 October 2024
Proceedings of the International Astronautical Congress, IAC
2024
/
p. 322-332
https://doi.org/10.52202/078376-0032
Conference proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
10
book article
Educational computer game for cyber security : game concept [Online resource]
Sõmer, Tiia
Proceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology
2015
/
p. 17-19
http://cybercentre.cs.ttu.ee/en/icr2015/
book article
11
journal article EST
/
journal article ENG
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Heering, Dan
TransNav : the international journal on marine navigation and safety of sea transportation
2020
/
p. 271−278
https://doi.org/10.12716/1001.14.02.01
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
12
journal article
Envisioning the future renewable and resilient energy grids – a power grid revolution enabled by renewables, energy storage, and energy electronics
Peng, Fang Zheng
;
Liu, Chen-Ching
;
Li, Yuan
;
Jain, Akshay Kumar
;
Vinnikov, Dmitri
IEEE journal of emerging and selected topics in industrial electronics
2024
/
p. 8-26
https://doi.org/10.1109/JESTIE.2023.3343291
journal article
13
journal article EST
/
journal article ENG
EU Common position on international law and cyberspace
Osula, Anna-Maria
;
Kasper, Agnes
;
Kajander, Aleksi Oskar Johannes
Masaryk University journal of law and technology
2022
/
p. 89-123
https://doi.org/10.5817/MUJLT2022-1-4
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
14
book article
Hacking on the high seas: How automated reverse-engineering can assist vulnerability discovery of a proprietary communication protocol
Visky, Gabor
;
Rohl, Alexander
;
Vaarandi, Risto
;
Katsikas, Sokratis
;
Maennel, Olaf Manuel
2024 IEEE 49th Conference on Local Computer Networks (LCN)
2024
/
7 p
https://doi.org/10.1109/LCN60385.2024.10639746
book article
15
book article
How to build a SOC on a budget
Vaarandi, Risto
;
Mäses, Sten
2022 IEEE International Conference on Cyber Security and Resilience (CSR)
2022
/
p. 171-177 : ill
https://doi.org/10.1109/CSR54599.2022.9850281
book article
16
book article
Lightweight testbed for IEC61162-450-related cyber security research
Visky, Gabor
;
Katsikas, Sokratis
;
Maennel, Olaf Manuel
2024 IEEE International Conference on Cyber Security and Resilience (CSR) : proceedings
2024
/
p. 638-643
https://doi.org/10.1109/CSR61664.2024.10679439
book article
17
book article EST
/
book article ENG
A live virtual simulator for teaching cybersecurity to information technology students
Ernits, Margus
;
Kikkas, Kaido
Learning and Collaboration Technologies : Third International Conference, LCT 2016, held as part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016 : proceedings
2016
/
p. 474-486 : ill
https://doi.org/10.1007/978-3-319-39483-1_43
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
book article EST
/
book article ENG
18
book article EST
/
book article ENG
Modelling the impact of space situational awareness disruption on the European and Arctic security landscape
Carlo, Antonio
;
Boschetti, Nicolo
Modelling and Simulation for Autonomous Systems: 9th International Conference, MESAS 2022, Prague, Czech Republic, October 20–21, 2022 : Revised Selected Papers
2023
/
p. 299-311
https://doi.org/10.1007/978-3-031-31268-7_18
Journal metrics at Scopus
Article at Scopus
book article EST
/
book article ENG
19
journal article EST
/
journal article ENG
Process-aware security monitoring in industrial control systems: A systematic review and future directions
Ur Rehman, Muaan
;
Bahşi, Hayretdin
International journal of critical infrastructure protection
2024
/
art. 100719, 19 p. : ill
https://doi.org/10.1016/j.ijcip.2024.100719
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
20
book article EST
/
book article ENG
Russia
Munkoe, Malthe
;
Foster, Noel
;
Mölder, Holger
The Palgrave Handbook on Cyber Diplomacy
2025
/
p. 517-541
https://doi.org/10.1007/978-3-031-93385-1_23
book article EST
/
book article ENG
21
journal article EST
/
journal article ENG
A systematic literature review of cyber security monitoring in maritime
Vaarandi, Risto
;
Tsiopoulos, Leonidas
;
Visky, Gabor
;
Rehman, Muaan Ur
;
Bahsi, Hayretdin
IEEE Access
2025
/
p. 85307-85329
https://doi.org/10.1109/ACCESS.2025.3567385
journal article EST
/
journal article ENG
22
book article
Technological sovereignty : missing the point?
Maurer, Tim
;
Skierka-Canton, Isabel
;
Morgus, Robert
;
Hohmann, Mirko
2015 7th International Conference on Cyber Conflict : Architectures in Cyberspace : 26-29 May 2015, Tallinn, Estonia
2015
/
p. 53-67
book article
Related publications
1
Securing digital government : towards governance mechanisms for e-state resilience = Digitaalse valitsuse turvalisus : valitsemismehhanismid e-riigi vastupidavuse tagamiseks
23
journal article
The Main challenges and barriers to the successful "Smart Shipping"
Alop, Anatoli
TransNav: International Journal on Marine Navigation and Safety of Sea Transportation
2019
/
p. 521-528
https://doi.org/10.12716/1001.13.03.05
journal article
24
journal article
The regulatory intersections between artificial intelligence, data protection and cyber security : challenges and opportunities for the EU legal framework
Andraško, Jozef
;
Mesarčik, Matuš
;
Hamulak, Ondrej
AI & Society
2021
/
p. 623–636
https://doi.org/10.1007/s00146-020-01125-5
journal article
25
book article
The rise of the regionals: how regional organisations contribute to international cyber stability negotiations at the United Nations level
Ott, Nikolas
;
Osula, Anna-Maria
2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings
2019
/
p. 321-345
https://doi.org/10.23919/CYCON.2019.8756863
https://www.ester.ee/record=b5197210*est
https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf
book article
Number of records 27, displaying
1 - 25
previous
1
2
next
keyword
192
1.
cyber security
2.
cyber security education
3.
cyber security exercises
4.
cyber security monitoring
5.
cyber security strategies
6.
cyber-security
7.
national cyber security strategy
8.
autonomous vehicle cyber range
9.
cloud-based cyber-physical systems (C2PS)
10.
cognitive cyber warfare
11.
cyber
12.
Cyber “Maastricht”
13.
cyber architecture
14.
cyber attacks
15.
cyber battle damage assessment
16.
Cyber Bio-analytical Physical Systems (CBPSs)
17.
cyber challenge
18.
cyber command
19.
cyber conflict
20.
cyber contingency
21.
cyber crime
22.
cyber crime pathways
23.
cyber crime scripting
24.
Cyber crisis management
25.
cyber defence
26.
cyber defence exercise
27.
cyber defence exercises
28.
cyber defense education
29.
cyber defense exercise
30.
cyber defense exercises
31.
cyber dependence
32.
cyber diplomacy
33.
cyber exercise
34.
cyber hygiene
35.
cyber impact assessment
36.
cyber incidents
37.
cyber insurance
38.
cyber intrusion detection
39.
cyber kill chain
40.
cyber operation
41.
cyber operation officer
42.
cyber operations
43.
cyber physical energy systems
44.
cyber physical power system (CPPS)
45.
Cyber Physical Production System
46.
cyber physical production systems (CPPS)
47.
cyber physical social system
48.
cyber physical social systems (cpss)
49.
cyber physical system
50.
cyber power Europe
51.
cyber ranges
52.
cyber red teaming
53.
cyber resilience
54.
cyber risk
55.
cyber situational awareness
56.
cyber stability
57.
cyber team communication
58.
cyber threat
59.
cyber threat communication
60.
Cyber Threat Intelligence
61.
cyber threats
62.
cyber war
63.
cyber warfare
64.
cyber warriors
65.
cyber weapons
66.
cyber-attack
67.
cyber-attack pathways
68.
cyber-insurance
69.
cyber-paternalism
70.
cyber-physical energy systems
71.
cyber-physical social system (CPSS)
72.
cyber-physical system
73.
Cyber-Physical System (CPS)
74.
cyber-physical system logistic robot
75.
cyber-physical systems
76.
Cyber-Physical Systems (CPS)
77.
cyber-risks
78.
cyber-space nexus
79.
cyber-vulnerabilities
80.
Defensive Cyber Operations
81.
EU cyber policy
82.
international cyber norms
83.
military cyber
84.
mobile cyber-physical system
85.
NATO cyber operations definitions
86.
NATO Cyber Range
87.
Offensive Cyber Operations
88.
perceived cyber risks and threats
89.
responsive cyber defence
90.
Socio-Cyber-Physical Systems
91.
space cyber range
92.
technical cyber exercise
93.
ad-hoc sensor networks security
94.
Automatic Security Verification
95.
Blockchain security
96.
cache security
97.
communication system security
98.
comprehensive system of economic security
99.
computer security
100.
cooperative security dilemma
101.
data and information security
102.
data security
103.
development of security cameras
104.
digital security practices
105.
drinking water security
106.
economic security
107.
economic security of enterprise
108.
emotional security
109.
energy security
110.
energy security indicator
111.
Estonian information security standard
112.
graded security
113.
hardware security
114.
hardware security primitive
115.
human security
116.
information security
117.
information security and privacy
118.
internal security
119.
international security
120.
investment and innovation security
121.
IPv6 security
122.
IT security
123.
IT security management
124.
job security
125.
long-term security
126.
metadata model for security measures
127.
Middle Eastern security
128.
Mobile security
129.
national security
130.
NATO. Science for Peace and Security Program
131.
network security
132.
network security monitoring
133.
OSCE (Organization for Security and Co-operation in Europe)
134.
passenger’s security
135.
policy-based routing security
136.
political and security cultures
137.
post-quantum security
138.
power system security
139.
quantitative security
140.
regional security
141.
RISC-V Security Verification
142.
safety and security testing
143.
security
144.
security adaptation
145.
security alert prioritization
146.
security analysis
147.
security and justice (AFSJ)
148.
Security and political science
149.
security and privacy
150.
security and privacy in smart grids
151.
Security Assertion Mining
152.
security closure
153.
Security Coverage
154.
security dataset
155.
security dilemma
156.
Security evaluation
157.
security evaluation instruments
158.
Security limitations
159.
security log analysis
160.
security management
161.
security model
162.
security monitoring
163.
security notion
164.
security objectives
165.
security of data
166.
security of supply
167.
security operation center
168.
security operations center
169.
security patterns
170.
security policy
171.
security problem definition
172.
security proof
173.
security protocols
174.
security requirements
175.
security requirements engineering
176.
security risk assessment
177.
security risk management
178.
security risks
179.
security science and technology
180.
security strategies
181.
security systems for military objects
182.
security testing
183.
security training
184.
security verification
185.
security-by-design
186.
social security planning
187.
societal security
188.
system of economic security
189.
system security
190.
terrorism security
191.
transmission System Security
192.
voting privacy and security
subject term
5
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
National Computer Security Incident Response Teams (N-CSIRTs)
5.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT