Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
23
Look more..
(2/184)
Export
export all inquiry results
(23)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Anomaly detection and classification in power system state estimation: Combining model-based and data-driven methods
Asefi, Sajjad
;
Mitrovic, Mile
;
Cetenovic, Dragan
;
Levi, Victor
;
Gryazina, Elena
;
Terzija, Vladimir
Sustainable energy, grids and networks
2023
/
art. 101116, 14 p. : ill
https://doi.org/10.1016/j.segan.2023.101116
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
2
book article
ASAT weapons : enhancing NATO’s operational capabilities in the emerging space dependent era
Carlo, Antonio
;
Veazoglou, Nikolaos
Modelling and Simulation for Autonomous Systems : 6th International Conference, MESAS 2019, Palermo, Italy, October 29–31, 2019, Revised Selected Papers
2020
/
p. 417-426
https://doi.org/10.1007/978-3-030-43890-6_34
book article
3
book article
Building cyber resilience : the defensive shield for the EU
Osula, Anna-Maria
Cybersecurity policy in the EU and South Korea from consultation to action : theoretical and comparative perspectives
2022
/
p. 179-196
https://doi.org/10.1007/978-3-031-08384-6_9
book article
4
book article
Capability detection and evaluation metrics for cyber security lab exercises
Caliskan, Emin
;
Tatar, Unal
;
Bahsi, Hayretdin
;
Ottis, Rain
;
Vaarandi, Risto
Proceedings of the 12th International Conference on Cyber Warfare and Security, ICCWS 2017
2017
/
p. 407-414 : ill
https://www.scopus.com/record/display.uri?eid=2-s2.0-85018944652&origin=inward&txGid=dad813d957372581ca0932bf6e4fb5d8
book article
5
book article
Cyber attacks on power system automation and protection and impact analysis
Rajkumar, Vetrivel Subramaniam
;
Tealane, Marko
;
Stefanov, Alexandru
;
Presekal, Alfan
;
Palensky, Peter
Proceedings of 2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), 26-28 October, 2020
2020
/
p. 247–254
https://doi.org/10.1109/ISGT-Europe47291.2020.9248840
book article
6
book article
Cyber attacks on protective relays in digital substations and impact analysis
Rajkumar, Vetrivel Subramaniam
;
Tealane, Marko
;
Stefanov, Alexandru
;
Palensky, Peter
8th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems(MSCPES), Virtual Workshop, online, from April 21, 2020 : proceedings
2020
/
6 p. : ill
https://doi.org/10.1109/MSCPES49613.2020.9133698
book article
7
book article
Cyber commands - universal solution to a universal cyber security problem?
Alatalu, Siim
Proceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 2018
2018
/
p. 21-22
https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/CRW_2018_lingitud.pdf
book article
8
book article
Educational computer game for cyber security : game concept [Online resource]
Sõmer, Tiia
Proceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology
2015
/
p. 17-19
http://cybercentre.cs.ttu.ee/en/icr2015/
book article
9
journal article EST
/
journal article ENG
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Heering, Dan
TransNav : the international journal on marine navigation and safety of sea transportation
2020
/
p. 271−278
https://doi.org/10.12716/1001.14.02.01
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
10
journal article
Envisioning the future renewable and resilient energy grids – a power grid revolution enabled by renewables, energy storage, and energy electronics
Peng, Fang Zheng
;
Liu, Chen-Ching
;
Li, Yuan
;
Jain, Akshay Kumar
;
Vinnikov, Dmitri
IEEE journal of emerging and selected topics in industrial electronics
2024
/
p. 8-26
https://doi.org/10.1109/JESTIE.2023.3343291
journal article
11
journal article EST
/
journal article ENG
EU Common position on international law and cyberspace
Osula, Anna-Maria
;
Kasper, Agnes
;
Kajander, Aleksi Oskar Johannes
Masaryk University journal of law and technology
2022
/
p. 89-123
https://doi.org/10.5817/MUJLT2022-1-4
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
12
book article
Hacking on the high seas: How automated reverse-engineering can assist vulnerability discovery of a proprietary communication protocol
Visky, Gabor
;
Rohl, Alexander
;
Vaarandi, Risto
;
Katsikas, Sokratis
;
Maennel, Olaf Manuel
2024 IEEE 49th Conference on Local Computer Networks (LCN)
2024
/
7 p
https://doi.org/10.1109/LCN60385.2024.10639746
book article
13
book article
How to build a SOC on a budget
Vaarandi, Risto
;
Mäses, Sten
2022 IEEE International Conference on Cyber Security and Resilience (CSR)
2022
/
p. 171-177 : ill
https://doi.org/10.1109/CSR54599.2022.9850281
book article
14
book article
Lightweight testbed for IEC61162-450-related cyber security research
Visky, Gabor
;
Katsikas, Sokratis
;
Maennel, Olaf Manuel
2024 IEEE International Conference on Cyber Security and Resilience (CSR) : proceedings
2024
/
p. 638-643
https://doi.org/10.1109/CSR61664.2024.10679439
book article
15
book article EST
/
book article ENG
A live virtual simulator for teaching cybersecurity to information technology students
Ernits, Margus
;
Kikkas, Kaido
Learning and Collaboration Technologies : Third International Conference, LCT 2016, held as part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016 : proceedings
2016
/
p. 474-486 : ill
https://doi.org/10.1007/978-3-319-39483-1_43
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
book article EST
/
book article ENG
16
book article EST
/
book article ENG
Modelling the impact of space situational awareness disruption on the European and Arctic security landscape
Carlo, Antonio
;
Boschetti, Nicolo
Modelling and Simulation for Autonomous Systems: 9th International Conference, MESAS 2022, Prague, Czech Republic, October 20–21, 2022 : Revised Selected Papers
2023
/
p. 299-311
https://doi.org/10.1007/978-3-031-31268-7_18
Journal metrics at Scopus
Article at Scopus
book article EST
/
book article ENG
17
journal article EST
/
journal article ENG
Process-aware security monitoring in industrial control systems: A systematic review and future directions
Ur Rehman, Muaan
;
Bahşi, Hayretdin
International journal of critical infrastructure protection
2024
/
art. 100719, 19 p. : ill
https://doi.org/10.1016/j.ijcip.2024.100719
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
18
book article
Technological sovereignty : missing the point?
Maurer, Tim
;
Skierka-Canton, Isabel
;
Morgus, Robert
;
Hohmann, Mirko
2015 7th International Conference on Cyber Conflict : Architectures in Cyberspace : 26-29 May 2015, Tallinn, Estonia
2015
/
p. 53-67
book article
Seotud publikatsioonid
1
Securing digital government : towards governance mechanisms for e-state resilience = Digitaalse valitsuse turvalisus : valitsemismehhanismid e-riigi vastupidavuse tagamiseks
19
journal article
The Main challenges and barriers to the successful "Smart Shipping"
Alop, Anatoli
TransNav: International Journal on Marine Navigation and Safety of Sea Transportation
2019
/
p. 521-528
https://doi.org/10.12716/1001.13.03.05
journal article
20
journal article
The regulatory intersections between artificial intelligence, data protection and cyber security : challenges and opportunities for the EU legal framework
Andraško, Jozef
;
Mesarčik, Matuš
;
Hamulak, Ondrej
AI & Society
2021
/
p. 623–636
https://doi.org/10.1007/s00146-020-01125-5
journal article
21
book article
The rise of the regionals: how regional organisations contribute to international cyber stability negotiations at the United Nations level
Ott, Nikolas
;
Osula, Anna-Maria
2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings
2019
/
p. 321-345
https://doi.org/10.23919/CYCON.2019.8756863
https://www.ester.ee/record=b5197210*est
https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf
book article
22
book article
Towards an Open-source Intrusion Detection System Integration Into Marine Vehicles
Visky, Gabor
;
Khisteva, Dariana
;
Vaarandi, Risto
;
Maennel, Olaf Manuel
2024 International Symposium ELMAR
Proceedings of ELMAR-2024 : 66th International Symposium ELMAR. 16-18 September 2024, Zadar, Croatia
2024
/
p. 263-268
https://doi.org/10.1109/ELMAR62909.2024.10694518
Conference proceedings at Scopus
Article at Scopus
book article
23
book article EST
/
book article ENG
Variable self-efficacy as a measurement for behaviors in cyber security operations
Lugo, Ricardo Gregorio
;
Knox, Benjamin James
;
Josok, Oyvind
;
Sütterlin, Stefan
Augmented Cognition. Human Cognition and Behavior : 14th International Conference, AC 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : proceedings, Part II
2020
/
p. 395-404
https://doi.org/10.1007/978-3-030-50439-7_27
Conference proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
Number of records 23, displaying
1 - 23
keyword
179
1.
cyber security
2.
cyber security education
3.
cyber security exercises
4.
cyber security strategies
5.
cyber-security
6.
national cyber security strategy
7.
autonomous vehicle cyber range
8.
cloud-based cyber-physical systems (C2PS)
9.
cognitive cyber warfare
10.
cyber
11.
Cyber “Maastricht”
12.
cyber architecture
13.
cyber attacks
14.
cyber battle damage assessment
15.
Cyber Bio-analytical Physical Systems (CBPSs)
16.
cyber challenge
17.
cyber command
18.
cyber conflict
19.
cyber contingency
20.
cyber crime
21.
cyber crime pathways
22.
cyber crime scripting
23.
Cyber crisis management
24.
cyber defence
25.
cyber defence exercise
26.
cyber defence exercises
27.
cyber defense education
28.
cyber defense exercise
29.
cyber defense exercises
30.
cyber dependence
31.
cyber diplomacy
32.
cyber exercise
33.
cyber hygiene
34.
cyber impact assessment
35.
cyber incidents
36.
cyber insurance
37.
cyber intrusion detection
38.
cyber kill chain
39.
cyber operation
40.
cyber operations
41.
cyber physical energy systems
42.
cyber physical power system (CPPS)
43.
Cyber Physical Production System
44.
cyber physical production systems (CPPS)
45.
cyber physical social system
46.
cyber physical social systems (cpss)
47.
cyber physical system
48.
cyber power Europe
49.
cyber ranges
50.
cyber red teaming
51.
cyber resilience
52.
cyber risk
53.
cyber situational awareness
54.
cyber stability
55.
cyber team communication
56.
cyber threat
57.
cyber threat communication
58.
cyber threats
59.
cyber war
60.
cyber warfare
61.
cyber warriors
62.
cyber weapons
63.
cyber-attack
64.
cyber-attack pathways
65.
cyber-insurance
66.
cyber-paternalism
67.
cyber-physical energy systems
68.
cyber-physical social system (CPSS)
69.
cyber-physical system
70.
Cyber-Physical System (CPS)
71.
cyber-physical system logistic robot
72.
cyber-physical systems
73.
Cyber-Physical Systems (CPS)
74.
cyber-risks
75.
cyber-vulnerabilities
76.
Defensive Cyber Operations
77.
EU cyber policy
78.
international cyber norms
79.
military cyber
80.
mobile cyber-physical system
81.
NATO Cyber Range
82.
Offensive Cyber Operations
83.
perceived cyber risks and threats
84.
responsive cyber defence
85.
Socio-Cyber-Physical Systems
86.
technical cyber exercise
87.
ad-hoc sensor networks security
88.
Automatic Security Verification
89.
Blockchain security
90.
cache security
91.
communication system security
92.
comprehensive system of economic security
93.
computer security
94.
cooperative security dilemma
95.
data security
96.
development of security cameras
97.
drinking water security
98.
economic security
99.
economic security of enterprise
100.
emotional security
101.
energy security
102.
energy security indicator
103.
Estonian information security standard
104.
graded security
105.
hardware security
106.
hardware security primitive
107.
human security
108.
information security
109.
internal security
110.
international security
111.
investment and innovation security
112.
IPv6 security
113.
IT security
114.
IT security management
115.
job security
116.
long-term security
117.
metadata model for security measures
118.
Middle Eastern security
119.
Mobile security
120.
national security
121.
NATO. Science for Peace and Security Program
122.
network security
123.
network security monitoring
124.
OSCE (Organization for Security and Co-operation in Europe)
125.
passenger’s security
126.
policy-based routing security
127.
political and security cultures
128.
post-quantum security
129.
power system security
130.
quantitative security
131.
regional security
132.
RISC-V Security Verification
133.
safety and security testing
134.
security
135.
security adaptation
136.
security alert prioritization
137.
security analysis
138.
security and justice (AFSJ)
139.
security and privacy
140.
security and privacy in smart grids
141.
Security Assertion Mining
142.
security closure
143.
Security Coverage
144.
security dataset
145.
security dilemma
146.
Security evaluation
147.
security evaluation instruments
148.
security log analysis
149.
security management
150.
security model
151.
security monitoring
152.
security notion
153.
security objectives
154.
security of data
155.
security of supply
156.
security operation center
157.
security operations center
158.
security patterns
159.
security policy
160.
security problem definition
161.
security proof
162.
security protocols
163.
security requirements
164.
security requirements engineering
165.
security risk assessment
166.
security risk management
167.
security strategies
168.
security systems for military objects
169.
security testing
170.
security training
171.
security verification
172.
security-by-design
173.
social security planning
174.
societal security
175.
system of economic security
176.
system security
177.
terrorism security
178.
transmission System Security
179.
voting privacy and security
subject term
5
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
4.
National Computer Security Incident Response Teams (N-CSIRTs)
5.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT