Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
cyber security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
30
Look more..
(2/221)
Export
export all inquiry results
(30)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Anomaly detection and classification in power system state estimation: Combining model-based and data-driven methods
Asefi, Sajjad
;
Mitrovic, Mile
;
Cetenovic, Dragan
;
Levi, Victor
;
Gryazina, Elena
;
Terzija, Vladimir
Sustainable energy, grids and networks
2023
/
art. 101116, 14 p. : ill
https://doi.org/10.1016/j.segan.2023.101116
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
2
book article
ASAT weapons : enhancing NATO’s operational capabilities in the emerging space dependent era
Carlo, Antonio
;
Veazoglou, Nikolaos
Modelling and Simulation for Autonomous Systems : 6th International Conference, MESAS 2019, Palermo, Italy, October 29–31, 2019, Revised Selected Papers
2020
/
p. 417-426
https://doi.org/10.1007/978-3-030-43890-6_34
book article
3
book article
Building cyber resilience : the defensive shield for the EU
Osula, Anna-Maria
Cybersecurity policy in the EU and South Korea from consultation to action : theoretical and comparative perspectives
2022
/
p. 179-196
https://doi.org/10.1007/978-3-031-08384-6_9
book article
4
book article
Capability detection and evaluation metrics for cyber security lab exercises
Caliskan, Emin
;
Tatar, Unal
;
Bahsi, Hayretdin
;
Ottis, Rain
;
Vaarandi, Risto
Proceedings of the 12th International Conference on Cyber Warfare and Security, ICCWS 2017
2017
/
p. 407-414 : ill
https://www.scopus.com/record/display.uri?eid=2-s2.0-85018944652&origin=inward&txGid=dad813d957372581ca0932bf6e4fb5d8
book article
5
journal article EST
/
journal article ENG
Cyber attacks on critical infrastructures and satellite communications
Carlo, Antonio
;
Obergfaell, Kim
International Journal of Critical Infrastructure Protection
2024
/
art. 100701, 8 p.
https://doi.org/10.1016/j.ijcip.2024.100701
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
6
book article
Cyber attacks on power system automation and protection and impact analysis
Rajkumar, Vetrivel Subramaniam
;
Tealane, Marko
;
Stefanov, Alexandru
;
Presekal, Alfan
;
Palensky, Peter
Proceedings of 2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), 26-28 October, 2020
2020
/
p. 247–254
https://doi.org/10.1109/ISGT-Europe47291.2020.9248840
book article
7
book article
Cyber attacks on protective relays in digital substations and impact analysis
Rajkumar, Vetrivel Subramaniam
;
Tealane, Marko
;
Stefanov, Alexandru
;
Palensky, Peter
8th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems(MSCPES), Virtual Workshop, online, from April 21, 2020 : proceedings
2020
/
6 p. : ill
https://doi.org/10.1109/MSCPES49613.2020.9133698
book article
8
book article
Cyber commands - universal solution to a universal cyber security problem?
Alatalu, Siim
Proceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 2018
2018
/
p. 21-22
https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/CRW_2018_lingitud.pdf
book article
9
book article EST
/
book article ENG
Cyber range and digital twin technologies for space resiliency and security
Carlo, Antonio
;
Manti, Nebile Pelin
;
Edl, András
;
Bintang Alam Semesta Wisran, A.M.
;
Breda, Paola
57th IAA Symposium on Safety, Quality and Knowledge Management in Space Activities : held at the 75th International Astronautical Congress (IAC 2024) : Milan, Italy, 14-18 October 2024
Proceedings of the International Astronautical Congress, IAC
2024
/
p. 322-332
https://doi.org/10.52202/078376-0032
Conference proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
10
book article
Educational computer game for cyber security : game concept [Online resource]
Sõmer, Tiia
Proceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology
2015
/
p. 17-19
http://cybercentre.cs.ttu.ee/en/icr2015/
book article
11
journal article EST
/
journal article ENG
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Heering, Dan
TransNav : the international journal on marine navigation and safety of sea transportation
2020
/
p. 271−278
https://doi.org/10.12716/1001.14.02.01
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
12
journal article
Envisioning the future renewable and resilient energy grids – a power grid revolution enabled by renewables, energy storage, and energy electronics
Peng, Fang Zheng
;
Liu, Chen-Ching
;
Li, Yuan
;
Jain, Akshay Kumar
;
Vinnikov, Dmitri
IEEE journal of emerging and selected topics in industrial electronics
2024
/
p. 8-26
https://doi.org/10.1109/JESTIE.2023.3343291
Journal metrics at WOS
Article at WOS
journal article
13
journal article EST
/
journal article ENG
EU Common position on international law and cyberspace
Osula, Anna-Maria
;
Kasper, Agnes
;
Kajander, Aleksi Oskar Johannes
Masaryk University journal of law and technology
2022
/
p. 89-123
https://doi.org/10.5817/MUJLT2022-1-4
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
14
book article
Hacking on the high seas: How automated reverse-engineering can assist vulnerability discovery of a proprietary communication protocol
Visky, Gabor
;
Rohl, Alexander
;
Vaarandi, Risto
;
Katsikas, Sokratis
;
Maennel, Olaf Manuel
2024 IEEE 49th Conference on Local Computer Networks (LCN)
2024
/
7 p
https://doi.org/10.1109/LCN60385.2024.10639746
Article at Scopus
Article at WOS
book article
Related publications
1
Cybersecurity for maritime operational technology: challenges, considerations, and solutions = Merendustehnoloogia küberturvalisus: väljakutsed, kaalutlused ja lahendused
15
book article
How to build a SOC on a budget
Vaarandi, Risto
;
Mäses, Sten
2022 IEEE International Conference on Cyber Security and Resilience (CSR)
2022
/
p. 171-177 : ill
https://doi.org/10.1109/CSR54599.2022.9850281
book article
16
journal article EST
/
journal article ENG
Hunting for vulnerabilities : call for European protection of security researchers
Rampašek, Michal
;
Andraško, Jozef
;
Sokol, Pavol
;
Hamulak, Ondrej
Journal of Cybersecurity
2026
/
art. tyag002 ; 18 p
https://doi.org/10.1093/cybsec/tyag002
https://academic.oup.com/cybersecurity/article/12/1/tyag002/8449232
journal article EST
/
journal article ENG
17
book article
Lightweight testbed for IEC61162-450-related cyber security research
Visky, Gabor
;
Katsikas, Sokratis
;
Maennel, Olaf Manuel
2024 IEEE International Conference on Cyber Security and Resilience (CSR) : proceedings
2024
/
p. 638-643
https://doi.org/10.1109/CSR61664.2024.10679439
Article at Scopus
Article at WOS
book article
Related publications
1
Cybersecurity for maritime operational technology: challenges, considerations, and solutions = Merendustehnoloogia küberturvalisus: väljakutsed, kaalutlused ja lahendused
18
book article EST
/
book article ENG
A live virtual simulator for teaching cybersecurity to information technology students
Ernits, Margus
;
Kikkas, Kaido
Learning and Collaboration Technologies : Third International Conference, LCT 2016, held as part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016 : proceedings
2016
/
p. 474-486 : ill
https://doi.org/10.1007/978-3-319-39483-1_43
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
book article EST
/
book article ENG
19
book article EST
/
book article ENG
Modelling the impact of space situational awareness disruption on the European and Arctic security landscape
Carlo, Antonio
;
Boschetti, Nicolo
Modelling and Simulation for Autonomous Systems: 9th International Conference, MESAS 2022, Prague, Czech Republic, October 20–21, 2022 : Revised Selected Papers
2023
/
p. 299-311
https://doi.org/10.1007/978-3-031-31268-7_18
Journal metrics at Scopus
Article at Scopus
book article EST
/
book article ENG
20
book article
Open Source Intrusion Detection Systems' Performance Analysis Under Resource Constraints
Visky, Gabor
;
Adam, Balint
;
Vaarandi, Risto
;
Pihelgas, Mauno
;
Maennel, Olaf Manuel
2024 IEEE 22nd Jubilee International Symposium on Intelligent Systems and Informatics (SISY)
2024
/
p. 000201-000208
https://doi.org//10.1109/SISY62279.2024.10737571
Article at Scopus
book article
Related publications
1
Cybersecurity for maritime operational technology: challenges, considerations, and solutions = Merendustehnoloogia küberturvalisus: väljakutsed, kaalutlused ja lahendused
21
journal article EST
/
journal article ENG
Process-aware security monitoring in industrial control systems: A systematic review and future directions
Rehman, Muaan Ur
;
Bahsi, Hayretdin
International journal of critical infrastructure protection
2024
/
art. 100719, 19 p. : ill
https://doi.org/10.1016/j.ijcip.2024.100719
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
22
book article EST
/
book article ENG
Russia
Munkoe, Malthe
;
Foster, Noel
;
Mölder, Holger
The Palgrave Handbook on Cyber Diplomacy
2025
/
p. 517-541
https://doi.org/10.1007/978-3-031-93385-1_23
book article EST
/
book article ENG
23
book article
Statistical Analysis-Based Feature Selection for Anomaly Detection in AIS Dataset
Visky, Gabor
;
Vaarandi, Risto
;
Katsikas, Sokratis
;
Maennel, Olaf Manuel
2025 IEEE 23rd World Symposium on Applied Machine Intelligence and Informatics (SAMI)
2025
/
p. 000159-000164
https://doi.org//10.1109/SAMI63904.2025.10883201
book article
Related publications
1
Cybersecurity for maritime operational technology: challenges, considerations, and solutions = Merendustehnoloogia küberturvalisus: väljakutsed, kaalutlused ja lahendused
24
journal article EST
/
journal article ENG
A systematic literature review of cyber security monitoring in maritime
Vaarandi, Risto
;
Tsiopoulos, Leonidas
;
Visky, Gabor
;
Rehman, Muaan Ur
;
Bahsi, Hayretdin
IEEE Access
2025
/
p. 85307-85329
https://doi.org/10.1109/ACCESS.2025.3567385
journal article EST
/
journal article ENG
Related publications
1
Cybersecurity for maritime operational technology: challenges, considerations, and solutions = Merendustehnoloogia küberturvalisus: väljakutsed, kaalutlused ja lahendused
25
book article
Technological sovereignty : missing the point?
Maurer, Tim
;
Skierka-Canton, Isabel
;
Morgus, Robert
;
Hohmann, Mirko
2015 7th International Conference on Cyber Conflict : Architectures in Cyberspace : 26-29 May 2015, Tallinn, Estonia
2015
/
p. 53-67
book article
Related publications
1
Securing digital government : towards governance mechanisms for e-state resilience = Digitaalse valitsuse turvalisus : valitsemismehhanismid e-riigi vastupidavuse tagamiseks
Number of records 30, displaying
1 - 25
previous
1
2
next
keyword
215
1.
cyber security
2.
cyber security education
3.
cyber security exercises
4.
cyber security monitoring
5.
cyber security strategies
6.
cyber-security
7.
maritime cyber security
8.
maritime cyber security operations centers
9.
national cyber security strategy
10.
autonomous vehicle cyber range
11.
cloud-based cyber-physical systems (C2PS)
12.
cognitive cyber warfare
13.
cyber
14.
Cyber “Maastricht”
15.
cyber architecture
16.
cyber attacks
17.
cyber battle damage assessment
18.
Cyber Bio-analytical Physical Systems (CBPSs)
19.
cyber challenge
20.
cyber command
21.
Cyber Command organisational structure
22.
cyber conflict
23.
cyber contingency
24.
cyber crime
25.
cyber crime pathways
26.
cyber crime scripting
27.
Cyber crisis management
28.
cyber defence
29.
cyber defence exercise
30.
cyber defence exercises
31.
cyber defense education
32.
cyber defense exercise
33.
cyber defense exercises
34.
cyber dependence
35.
cyber diplomacy
36.
cyber exercise
37.
cyber hygiene
38.
cyber impact assessment
39.
cyber incidents
40.
cyber insurance
41.
cyber intrusion detection
42.
cyber kill chain
43.
cyber operation
44.
cyber operation officer
45.
cyber operations
46.
cyber operations exercises
47.
cyber physical energy systems
48.
cyber physical power system (CPPS)
49.
Cyber Physical Production System
50.
cyber physical production systems (CPPS)
51.
cyber physical social system
52.
cyber physical social systems (cpss)
53.
cyber physical system
54.
Cyber Planning tool
55.
cyber power Europe
56.
cyber ranges
57.
cyber red teaming
58.
cyber resilience
59.
cyber resilience at sea
60.
cyber risk
61.
cyber risk management in shipping
62.
cyber situational awareness
63.
cyber stability
64.
cyber team communication
65.
cyber threat
66.
cyber threat communication
67.
Cyber Threat Intelligence
68.
cyber threats
69.
cyber war
70.
cyber warfare
71.
cyber warriors
72.
cyber weapons
73.
cyber-attack
74.
cyber-attack pathways
75.
Cyber-attacks
76.
cyber-insurance
77.
cyber-paternalism
78.
cyber-physical energy systems
79.
cyber-physical social system (CPSS)
80.
cyber-physical system
81.
Cyber-Physical System (CPS)
82.
cyber-physical system logistic robot
83.
cyber-physical systems
84.
Cyber-Physical Systems (CPS)
85.
cyber-risks
86.
cyber-space nexus
87.
cyber-vulnerabilities
88.
Defensive Cyber Operations
89.
EU cyber policy
90.
international cyber norms
91.
military cyber
92.
mobile cyber-physical system
93.
NATO cyber operations definitions
94.
NATO Cyber Range
95.
Offensive Cyber Operations
96.
perceived cyber risks and threats
97.
responsive cyber defence
98.
Socio-Cyber-Physical Systems
99.
space cyber range
100.
technical cyber exercise
101.
Visualising Cyber Planning
102.
ad-hoc sensor networks security
103.
Automatic Security Verification
104.
Blockchain security
105.
cache security
106.
cloud security
107.
communication system security
108.
comprehensive system of economic security
109.
computer security
110.
cooperative security dilemma
111.
data and information security
112.
data security
113.
development of security cameras
114.
digital security practices
115.
drinking water security
116.
economic security
117.
economic security of enterprise
118.
emotional security
119.
energy security
120.
energy security indicator
121.
Estonian information security standard
122.
graded security
123.
hardware security
124.
hardware security primitive
125.
high level of security
126.
Homeland security
127.
human security
128.
information security
129.
information security and privacy
130.
initial level of security
131.
internal security
132.
international security
133.
investment and innovation security
134.
IPv6 security
135.
IT security
136.
IT security management
137.
job security
138.
long-term security
139.
Maritime Security Operations Center (M-SOC)
140.
medium level of security
141.
metadata model for security measures
142.
Middle Eastern security
143.
Mobile security
144.
national security
145.
NATO. Science for Peace and Security Program
146.
network security
147.
network security monitoring
148.
OSCE (Organization for Security and Co-operation in Europe)
149.
passenger’s security
150.
policy-based routing security
151.
political and security cultures
152.
post-quantum security
153.
power system security
154.
quantitative security
155.
regional security
156.
RISC-V Security Verification
157.
Safety and Security in Sea Transportation
158.
safety and security testing
159.
security
160.
security adaptation
161.
security alert prioritization
162.
security analysis
163.
security and justice (AFSJ)
164.
Security and political science
165.
security and privacy
166.
security and privacy in smart grids
167.
Security Assertion
168.
Security Assertion Mining
169.
security closure
170.
Security Coverage
171.
security dataset
172.
security dilemma
173.
Security evaluation
174.
security evaluation instruments
175.
Security Level Evaluation
176.
Security limitations
177.
security log analysis
178.
security management
179.
security model
180.
security monitoring
181.
security notion
182.
security objectives
183.
security of data
184.
security of supply
185.
security operation center
186.
security operations center
187.
security patterns
188.
security policy
189.
security problem definition
190.
security proof
191.
security protocols
192.
security requirements
193.
security requirements engineering
194.
security research
195.
security risk assessment
196.
security risk management
197.
security risks
198.
security science and technology
199.
security strategies
200.
security systems for military objects
201.
security testing
202.
security training
203.
security verification
204.
security-by-design
205.
social security planning
206.
societal security
207.
software security
208.
software security level
209.
software security subcharacteristics
210.
sufficient level of security
211.
system of economic security
212.
system security
213.
terrorism security
214.
transmission System Security
215.
voting privacy and security
subject term
6
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
5.
National Computer Security Incident Response Teams (N-CSIRTs)
6.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT