Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cybersecurity (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
54
Look more..
(1/26)
Export
export all inquiry results
(54)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
26
book article EST
/
book article ENG
Mental model mapping method for cybersecurity
Kullman, Kaur
;
Buchanan, Laurin
;
Komlodi, Anita
;
Engel, Don
HCI for Cybersecurity, Privacy and Trust : Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : Proceedings
2020
/
p. 458-470
https://doi.org/10.1007/978-3-030-50309-3_30
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
Seotud publikatsioonid
1
Interactive stereoscopically perceivable multidimensional data visualizations for cybersecurity = Interaktiivsed, ruumiliselt tajutavad, mitmemõõtelised andmekuvad küberturbele
27
book article EST
/
book article ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
28
book article
Mixed methods research approach and experimental procedure for measuring human factors in cybersecurity using phishing simulations
Mäses, Sten
;
Kikerpill, Kristjan
;
Jüristo, Kaspar
;
Maennel, Olaf Manuel
Abstracts of Papers Presented at the 18th European Conference on Research Methodology for Business and Management Studies : ECRM 2019, Hosted By Wits Business School Johannesburg, South Africa 20-21 June, 2019
2019
/
p. 30-31
"ECRM19"
book article
29
journal article EST
/
journal article ENG
A 3D mixed reality visualization of network topology and activity results in better dyadic cyber team communication and cyber situational awareness
Ask, Torvald F.
;
Kullman, Kaur
;
Sütterlin, Stefan
;
Knox, Benjamin James
;
Engel, Don
;
Lugo, Ricardo Gregorio
Frontiers in Big Data
2023
/
art. 1042783, 21 p. : ill
https://doi.org/10.3389/fdata.2023.1042783
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Seotud publikatsioonid
1
Interactive stereoscopically perceivable multidimensional data visualizations for cybersecurity = Interaktiivsed, ruumiliselt tajutavad, mitmemõõtelised andmekuvad küberturbele
30
journal article EST
/
journal article ENG
Modelling cyberspace to determine cybersecurity training requirements
Venables, Adrian Nicholas
Frontiers in education
2021
/
art. 768037, 16 p. : ill
https://doi.org/10.3389/feduc.2021.768037
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
31
journal article EST
/
journal article ENG
A multidimensional cyber defense exercise: emphasis on emotional, social, and cognitive aspects
Maennel, Kaie
;
Brilingaite, Agne
;
Bukauskas, Linas
;
Juozapavicius, Ausrius
;
Knox, Benjamin James
;
Lugo, Ricardo Gregorio
;
Maennel, Olaf Manuel
;
Majore, Ginta
;
Sütterlin, Stefan
SAGE Open
2023
/
12 p. : ill
https://doi.org/10.1177/21582440231156367
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
32
book article
Multi-purpose cyber environment for maritime sector
Visky, Gabor
;
Lavrenovs, Arturs
;
Orye, Erwin
;
Heering, Dan
;
Tam, Kimberly
Proceedings of the 17th International Conference on Cyber Warfare and SecurityState University of New York at AlbanyAlbany, New York, USA 17-18 March 2022
2022
/
p. 349-257
https://doi.org/10.34190/iccws.17.1.26
book article
33
book article
Obtaining better metrics for complex serious games within virtualised simulation environments
Mäses, Sten
;
Hallaq, Bil
;
Maennel, Olaf Manuel
11th European Conference on Games Based Learning (ECGBL 2017) : Graz, Austria, 5 - 6 October 2017
2017
/
p. 428-434 : ill
http://www.scopus.com/inward/record.uri?eid=2-s2.0-85036459293&partnerID=40&md5=2ba817e29bec893e126f50a3d4ede83c
book article
34
book article
Operator impressions of 3D visualizations for cybersecurity analysts
Kullman, Kaur
;
Ben-Asher, Noam
;
Sample, Char
Abstracts and conference materials for the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 2019
2019
/
p. 31-32
https://www.academic-conferences.org/conferences/eccws/eccws-future-and-past/
book article
Seotud publikatsioonid
1
Interactive stereoscopically perceivable multidimensional data visualizations for cybersecurity = Interaktiivsed, ruumiliselt tajutavad, mitmemõõtelised andmekuvad küberturbele
35
book article
Operator impressions of 3D visualizations for cybersecurity analysts
Kullman, Kaur
;
Ben-Asher, Noam
;
Sample, Char
Proceedings of the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 2019
2019
/
p. 257–266
https://www.researchgate.net/publication/334226184_Operator_Impressions_of_3D_Visualizations_for_Cybersecurity_Analysts
book article
Seotud publikatsioonid
1
Interactive stereoscopically perceivable multidimensional data visualizations for cybersecurity = Interaktiivsed, ruumiliselt tajutavad, mitmemõõtelised andmekuvad küberturbele
36
book article
Pedagogical challenges and ethical considerations in developing critical thinking in cybersecurity
Lorenz, Birgy
;
Kikkas, Kaido
Proceedings IEEE 20th International Conference on Advanced Learning Technologies, ICALT 2020 : 6–9 July 2020, Online
2020
/
p. 262-263
https://doi.org/10.1109/ICALT49669.2020.00085
book article
37
book article
Pitfalls of machine learning methods in smart grids : a legal perspective
Antonov, Alexander
;
Häring, Tobias
;
Korõtko, Tarmo
;
Rosin, Argo
;
Kerikmäe, Tanel
;
Biechl, Helmuth
2021 International Symposium on Computer Science and Intelligent Controls :(ISCSIC 2021), 12-14 November 2021, Rome, Italy : proceedings
2021
/
p. 248-256
https://doi.org/10.1109/ISCSIC54682.2021.00053
book article
Seotud publikatsioonid
2
Research and development of energy storage control strategies for residential area microgrids = Energiasalvestite juhtimisstrateegiate uurimine ja arendamine elamupiirkondade mikrovõrkudele
Human rights-based legal conditions for trustworthy AI = Inimõigustel põhinevad õiguslikud tingimused usaldusväärse tehisintellekti loomisel
38
book article EST
/
book article ENG
Remote technical labs : an innovative and scalable component for university cybersecurity program admission
Maennel, Kaie
;
Kivimägi, Kristian
;
Maennel, Olaf Manuel
;
Sütterlin, Stefan
;
Ernits, Margus
Educating Engineers for Future Industrial Revolutions : Proceedings of the 23rd International Conference on Interactive Collaborative Learning (ICL2020). Volume 2
2021
/
p. 521-533
https://doi.org/10.1007/978-3-030-68201-9_51
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
39
journal article EST
/
journal article ENG
Restrictions of Russian internet resources in Ukraine : national security, censorship or both?
Shumilo, Olga
;
Kerikmäe, Tanel
;
Chochia, Archil
Baltic journal of European studies
2019
/
p. 82–95
https://doi.org/10.1515/bjes-2019-0023
https://www.ester.ee/record=b2675037*est
Journal metrics at Scopus
Article at Scopus
Article at WOS
journal article EST
/
journal article ENG
40
journal article EST
/
journal article ENG
Safeguarding the final frontier : analyzing the legal and technical challenges to mega-constellations
Jha, Devanshu
;
Manti, Nebile Pelin
;
Carlo, Antonio
;
Zarkan, Laetitia Cesari
;
Breda, Paola
;
Jha, Antara
Journal of space safety engineering
2022
/
p. 636-643
https://doi.org/10.1016/j.jsse.2022.08.006
Journal metrics at Scopus
Article at Scopus
Article at WOS
journal article EST
/
journal article ENG
Seotud publikatsioonid
1
The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamine
41
journal article EST
/
journal article ENG
Small unmanned surface vessels — a review and critical analysis of relations to safety and safety assurance of larger autonomous ships
Bolbot, Victor
;
Sandru, Andrei
;
Saarniniemi, Ture
;
Puolakka, Otto
;
Kujala, Pentti
;
Valdez Banda, Osiris A.
Journal of marine science and engineering
2023
/
art. 2387, 38 p. : ill
https://doi.org/10.3390/jmse11122387
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
42
book article EST
/
book article ENG
System for determination of legal responsibility/penalty for a cybersecurity breach
Hovorushchenko, Tetiana
;
Herts, Alla
;
Boyarchuk, Artem
;
Pavlova, Olga
ITTAP 2022 - Proceedings of the 2nd International Workshop on Information Technologies: Theoretical and Applied Problems
2022
/
p. 233-240
https://ceur-ws.org/Vol-3309/short9.pdf
Conference proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
43
book article
Team learning in cybersecurity exercises
Maennel, Kaie
;
Kim, Joonsoo
;
Sütterlin, Stefan
Proceedings of the 5th Interdisciplinary Cyber Research Conference 2019 : 29th of June 2019, Tallinn University of Technology
2019
/
p. 17−19
https://www.ester.ee/record=b5238490*est
book article
44
journal article EST
/
journal article ENG
The EU's cybersecurity : a strategic narrative of a cyber power or a confusing policy for a local common market?
Kasper, Agnes
;
Vernygora, Vlad Alex
Cuadernos Europeos de Deusto = Deusto Journal of European Studies
2021
/
p. 29–71
https://doi.org/10.18543/ced-65-2021pp29-71
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
45
book article
The Role of IT Background for Metacognitive Accuracy, Confidence and Overestimation of Deep Fake Recognition Skills
Sütterlin, Stefan
;
Lugo, Ricardo Gregorio
;
Ask, Torvald F.
;
Veng, Karl
;
Eck, Jonathan
;
Fritschi, Jonas
;
Özmen, Muhammed-Talha
;
Bärreiter, Basil
;
Knox, Benjamin James
Augmented Cognition : 16th International Conference, AC 2022, Held as Part of the 24th HCI International Conference, HCII 2022. Virtual Event, June 26 - July 1, 2022, proceedings
2022
/
p. 103-119
https://doi.org/10.1007/978-3-031-05457-0_9
book article
46
newspaper article
Time for cyber Maastricht? [Online resource]
Kasper, Agnes
Directions
2020
https://directionsblog.eu/time-for-cyber-maastricht/
newspaper article
47
book article
Towards a healthcare cybersecurity certification scheme
Hovhannisyan, Kristine
;
Bogacki, Piotr
;
Colabuono, Consuelo Assunta
;
Lofu, Domenico
;
Marabello, Maria Vittoria
;
Maxwell, Brady Eugen
2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
2021
/
p. 1-9
https://doi.org/10.1109/CyberSA52016.2021.9478255
book article
48
book article EST
/
book article ENG
Training young cybersecurity talents – The case of Estonia
Kikkas, Kaido
;
Lorenz, Birgy
HCI International 2020 - Posters : 22nd International Conference, HCII 2020, Copenhagen, Denmark, July 19-24, 2020, Proceedings, Part II
2020
/
p. 256-263
https://doi.org/10.1007/978-3-030-50729-9_36
Conference proceeding at Scopus
Journal metrics at Scopus
book article EST
/
book article ENG
49
book article EST
/
book article ENG
"Trust me, you will need it" : cybersecurity as extracurricular subject at Estonian schools
Lorenz, Birgy
;
Kikkas, Kaido
HCI for Cybersecurity, Privacy and Trust : Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : proceedings
2020
/
p. 175-188
https://doi.org/10.1007/978-3-030-50309-3_12
Conference proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
50
book article EST
/
book article ENG
User interactions in Virtual Data Explorer
Kullman, Kaur
;
Engel, Don
Augmented Cognition : 16th International Conference, AC 2022, Held as Part of the 24th HCI International Conference, HCII 2022. Virtual Event, June 26 - July 1, 2022, proceedings
2022
/
p. 333-347
https://doi.org/10.1007/978-3-031-05457-0_26
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
book article EST
/
book article ENG
Number of records 54, displaying
26 - 50
previous
1
2
3
next
keyword
26
1.
automotive cybersecurity
2.
cybersecurity
3.
cybersecurity (CS)
4.
cybersecurity awareness
5.
cybersecurity breach
6.
cybersecurity education
7.
cybersecurity exercises
8.
cybersecurity gender balance
9.
cybersecurity governance
10.
cybersecurity in shipping
11.
cybersecurity incident response
12.
cybersecurity knowledge requirements
13.
cybersecurity law
14.
cybersecurity policy
15.
cybersecurity simulations
16.
cybersecurity standards
17.
cybersecurity test bed
18.
cybersecurity testing
19.
cybersecurity training
20.
cybersecurity vulnerability
21.
EU cybersecurity policy
22.
human factor of cybersecurity
23.
maritime cybersecurity
24.
organising cybersecurity exercises
25.
responsibility/penalty for a cybersecurity breach
26.
set of possible cybersecurity breaches
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT