Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
küberturve (subject term)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
471
Look more..
(1/1)
Export
export all inquiry results
(471)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
251
book article
Learning analytics perspective: evidencing learning from digital datasets in cybersecurity exercises
Maennel, Kaie
Proceedings 5th IEEE European Symposium on Security and Privacy Workshops EUROS&PW 2020 : 7-11 September 2020, VIrtual Event, Los Alamitos, California
2020
/
p. 27-36
https://doi.org/10.1109/EuroSPW51379.2020.00013
book article
252
journal article EST
/
journal article ENG
Learning from few cyber-attacks : addressing the class imbalance problem in machine learning-based intrusion detection in software-defined networking
Mirsadeghi, Seyed Mohammad Hadi
;
Bahsi, Hayretdin
;
Vaarandi, Risto
;
Inoubli, Wissem
IEEE Access
2023
/
p. 140428 - 140442
https://doi.org/10.1109/ACCESS.2023.3341755
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
253
book article
Legal aspects of cybersecurity in emerging technologies : smart grids and big data : European answers to security breaches and "common" cyber crime
Kasper, Agnes
Regulating eTechnologies in the European Union : normative realities and trends
2014
/
p. 189-216 : ill
book article
254
journal article
Light weight tabletop exercise for cybersecurity education
Ottis, Rain
Journal of homeland security and emergency management
2014
/
p. 579-592
journal article
255
book article EST
/
book article ENG
Lightweight monitoring scheme for flooding DoS Attack detection in multi-tenant MPSoCs
Chaves Arroyave, Cesar Giovanni
;
Sepulveda, Johanna
;
Hollstein, Thomas
2021 IEEE International Symposium on Circuits and Systems (ISCAS), Daegu, Korea May 22-28, 2021 : proceedings
2021
/
5 p
https://doi.org/10.1109/ISCAS51556.2021.9401153
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
Seotud publikatsioonid
1
Bandwidth Reduction DoS attacks in Multi-Tenant NoC-based MPSoCs : detection and avoidance strategies = Ribalaiuse vähendamise DoS-rünnakud mitme rentnikuga NoC-põhiste MPSoC-de puhul : tuvastamise ja vältimise strateegiad
256
book article
Lightweight testbed for IEC61162-450-related cyber security research
Visky, Gabor
;
Katsikas, Sokratis
;
Maennel, Olaf Manuel
2024 IEEE International Conference on Cyber Security and Resilience (CSR) : proceedings
2024
/
p. 638-643
https://doi.org/10.1109/CSR61664.2024.10679439
book article
257
book article
Lizards in the street! Introducing cybersecurity awareness in a digital literacy context
Frydenberg, Mark
;
Lorenz, Birgy
EDSIGCON Proceedings 2019 : Cleveland Ohio, November 6-9, 2019
2019
/
Art. n4936, 13 p. : ill
http://proc.iscap.info/2019/pdf/4936.pdf
book article
258
book article EST
/
book article ENG
A live virtual simulator for teaching cybersecurity to information technology students
Ernits, Margus
;
Kikkas, Kaido
Learning and Collaboration Technologies : Third International Conference, LCT 2016, held as part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016 : proceedings
2016
/
p. 474-486 : ill
https://doi.org/10.1007/978-3-319-39483-1_43
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
book article EST
/
book article ENG
259
dissertation
Machine learning-based detection and characterization of evolving threats in mobile and IoT Systems = Masinõppepõhine arenevate ohtude tuvastamine ning kirjeldamine mobiilseadmete ja värkvõrkude jaoks
Guerra Manzanares, Alejandro
2022
https://doi.org/10.23658/taltech.54/2022
https://digikogu.taltech.ee/et/Item/f56ae778-e5a5-4147-a8e4-4833e08fa789
https://www.ester.ee/record=b5511898*est
dissertation
Seotud publikatsioonid
14
Hybrid feature selection models for machine learning based botnet detection in IoT networks
In-depth feature selection and ranking for automated detection of mobile malware
Time-frame analysis of system calls behavior in machine learning-based mobile malware detection
Towards the integration of a post-hoc interpretation step into the machine learning workflow for IoT botnet detection
KronoDroid : time-based hybrid-featured dataset for effective android malware detection and characterization
Android malware concept drift using system calls : detection, characterization and challenges
Concept drift and cross-device behavior : challenges and implications for effective android malware detection
Cross-device behavioral consistency : benchmarking and implications for effective android malware detection
Leveraging the first line of defense : a study on the evolution and usage of android security permissions for enhanced android malware detection
On the relativity of time : implications and challenges of data drift on long-term effective android malware detection
MedBIoT : generation of an IoT Botnet Dataset in a medium-sized IoT network
Using MedBIoT dataset to build effective machine learning-based IoT botnet detection systems
On the application of active learning for efficient and effective Iot botnet detection
On the application of active learning to handle data evolution in Android malware detection
260
newspaper article
Majandusjulgeolek Eesti restart 2021 : 14. aprillil veebikonverents
Postimees
2021
/
Lk. 25
https://dea.digar.ee/article/postimees/2021/03/25/21.1
newspaper article
261
book article
Making the Cyber Mercenary - Autonomous Weapons Systems and Common Article 1 of the Geneva Conventions
Kajander, Aleksi Oskar Johannes
;
Tsybulenko, Evhen
;
Kasper, Agnes
2020 12th International Conference on Cyber Conflict : 20/20 vision : the next decade
2020
/
p. 79-95
https://ieeexplore.ieee.org/abstract/document/9131722
https://www.ester.ee/record=b5303919*est
book article
262
book article
Managing security risks in E-voting over the Internet
Tepandi, Jaak
;
Martens, Tarvi
E-challenges-2006
2006
/
p. 100
book article
263
book article EST
/
book article ENG
Mapping requirements specifications into a formalized blockchain-enabled authentication protocol for secured personal identity assurance
Leiding, Benjamin
;
Norta, Alexander
Future Data and Security Engineering : 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 - December 1, 2017 : proceedings
2017
/
p. 181-196 : ill
https://doi.org/10.1007/978-3-319-70004-5_13
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
264
journal article
Maritime cyber-insurance : The Norwegian case : [abstract]
Franke, Ulrik
;
Langfeldt Friberg, Even
;
Bahsi, Hayretdin
International Journal of Critical Infrastructures
2022
/
p. 267–286
https://doi.org/10.1504/IJCIS.2022.10046729
journal article
265
journal article EST
/
journal article ENG
Maritime cyber-insurance: the Norwegian case
Franke, Ulrik
;
Friberg, Even Langfeldt
;
Bahşi, Hayretdin
International Journal of Critical Infrastructures
2022
/
p. 267-286
https://doi.org/10.1504/ijcis.2022.125816
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
266
book article EST
/
book article ENG
Mental model mapping method for cybersecurity
Kullman, Kaur
;
Buchanan, Laurin
;
Komlodi, Anita
;
Engel, Don
HCI for Cybersecurity, Privacy and Trust : Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : Proceedings
2020
/
p. 458-470
https://doi.org/10.1007/978-3-030-50309-3_30
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
Seotud publikatsioonid
1
Interactive stereoscopically perceivable multidimensional data visualizations for cybersecurity = Interaktiivsed, ruumiliselt tajutavad, mitmemõõtelised andmekuvad küberturbele
267
journal article
Merendus sektoris on küberhügieen olulisem kui kunagi varem
Tampere, Uku
Teejuht : maal, vees ja õhus : Transpordiameti digiajakiri
2024
/
lk. 14-17 : fot
https://digiajakiri.transpordiamet.ee/view/434325528/14/
journal article
268
book article
Messung, Prüfung und Nachweis von IT-Sicherheit
Skierka-Canton, Isabel
IT-Sicherheitsrecht : Praxishandbuch
2021
/
S. 154−180
https://www.nomos-shop.de/en/nomos/title/it-sicherheitsrecht-id-86855/
book article
Seotud publikatsioonid
1
Securing digital government : towards governance mechanisms for e-state resilience = Digitaalse valitsuse turvalisus : valitsemismehhanismid e-riigi vastupidavuse tagamiseks
269
book article EST
/
book article ENG
A method for adding cyberethical behaviour measurements to computer science homework assignments
Mäses, Sten
;
Aitsam, Heleri
;
Randmann, Liina
19th Koli Calling Conference on Computing Education Research Koli Calling 2019 : November 21-24, 2019, Koli, Finland : proceedings
2019
/
5 p. : ill
https://doi.org/10.1145/3364510.3364529
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
270
book article EST
/
book article ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
271
book article
A method for teaching Open Source Intelligence (OSINT) using personalised cloud-based exercises
Yari, Saber
;
Mäses, Sten
;
Maennel, Olaf Manuel
Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020
2020
/
p. 480−489
https://doi.org/10.34190/ICCWS.20.091
book article
272
book article
Methodology for modelling financially motivated cyber crime
Sõmer, Tiia
16th International Conference on Cyber Warfare and Security (ICCWS 2021) : Online, 25 - 26 February 2021
2021
/
p. 326-335
http://toc.proceedings.com/58552webtoc.pdf?msclkid=97ad966dbea311ecb39e14df5abebf21
book article
Seotud publikatsioonid
1
Modelling financially motivated cyber crime = Finantsiliselt motiveeritud küberkuritegevuse modelleerimine
273
newspaper article
Miks Facebook ei tööta? Põhjuseks võib olla ebaõnnestunud tarkvarauuendus [Võrguväljaanne]
Veedla, Alice
delfi.ee
2021
"Miks Facebook ei tööta? Põhjuseks võib olla ebaõnnestunud tarkvarauuendus "
newspaper article
274
newspaper article
Millist küberstrateegiat Eesti vajab?
Lorenz, Birgy
Äripäev
2018
/
Lk. 12
https://dea.digar.ee/article/aripaev/2018/06/22/18.3
newspaper article
275
newspaper article
Mis toimub tehisintellekti „kapoti all“ ja miks me seda teadma peame? [Võrguväljaanne]
delfi.ee
2022
Mis toimub tehisintellekti „kapoti all“ ja miks me seda teadma peame?
newspaper article
Number of records 471, displaying
251 - 275
previous
7
8
9
10
11
12
13
14
15
16
next
subject term
1
1.
küberturve
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT