Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
arvutiturve (subject term)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
53
Look more..
(1/1)
Export
export all inquiry results
(53)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
dissertation
Advancing cybersecurity education through learning analytics = Küberkaitsealase hariduse parendamine õpianalüütika abil
Maennel, Kaie
2021
https://doi.org/10.23658/taltech.29/2021
https://www.ester.ee/record=b5434228*est
https://digikogu.taltech.ee/et/Item/d01c0b17-3b4b-41c5-ae24-e75b6128a183
dissertation
2
book article
An enhanced lightweight authentication scheme for secure access to cloud data
Hammami, Hamza
;
Obaidat, Mohammad S.
;
Ben Yahia, Sadok
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 3: ICE-B, Lieusaint, Paris, France, July 8-10, 2020
2020
/
p. 110-117
https://doi.org/10.5220/0009824301100117
book article
3
book article EST
/
book article ENG
An expectation-based approach to policy-based security of the Border Gateway Protocol
Li, Jun
;
Stein, Josh
;
Zhang, Mingwei
;
Maennel, Olaf Manuel
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) : GI 2016 : IEEE Global Internet Symposium : April 10-14, 2016, San Francisco, CA, USA
2016
/
p. 340-345 : ill
https://doi.org/10.1109/INFCOMW.2016.7562098
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
4
book article EST
/
book article ENG
Are the current system engineering practices sufficient to meet cyber crime?
Buldas, Ahto
;
Saarepera, Märt
Human Aspects of Information Security, Privacy and Trust : 5th International Conference, HAS 2017 : held as part of HCI International 2017, Vancouver, BC, Canada, July 9–14, 2017 : proceedings
2017
/
p. 451-463
https://doi.org/10.1007/978-3-319-58460-7_31
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
5
book article
Assessing safety of object pushing using the principle of reversibility
Gavšin, Juri
;
Kruusmaa, Maarja
Hybrid Artificial Intelligent Systems : 6th International Conference : HAIS 2011 : Wroclaw, Poland, May 23-25, 2011 : proceedings. Part I
2011
/
p. 313-320 : ill
https://link.springer.com/chapter/10.1007/978-3-642-21219-2_40
book article
6
dissertation
Automating defences against cyber operations in computer networks = Arvutivõrkude kaitse automatiseerimine küberoperatsioonide vastu
Pihelgas, Mauno
2021
https://doi.org/10.23658/taltech.36/2021
https://www.ester.ee/record=b5449710*est
https://digikogu.taltech.ee/et/Item/beb3e841-9c6e-4496-a73a-17148bc941ef
dissertation
7
dissertation
Bandwidth Reduction DoS attacks in Multi-Tenant NoC-based MPSoCs : detection and avoidance strategies = Ribalaiuse vähendamise DoS-rünnakud mitme rentnikuga NoC-põhiste MPSoC-de puhul : tuvastamise ja vältimise strateegiad
Chaves Arroyave, Cesar Giovanni
2023
https://doi.org/10.23658/taltech.8/2023
https://digikogu.taltech.ee/et/Item/60b3f5ee-3a53-43c6-b79e-d6a8cbbc3489
https://www.ester.ee/record=b5548907*est
dissertation
Seotud publikatsioonid
5
A Distributed DoS detection scheme for NoC-based MPSoCs
Diagnosing DoS attacks in NoC-based MPSoCs
DoS attack detection and path collision localization in NoC-based MPSoC architectures
Lightweight monitoring scheme for flooding DoS Attack detection in multi-tenant MPSoCs
Detecting and mitigating Low-and-Slow DoS attacks in NoC-based MPSoCs
8
book article
Black-box separations and their adaptability to the non-uniform model
Buldas, Ahto
;
Niitsoo, Margus
Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings
2013
/
p. 152-167
book article
9
book article
Bounded pre-image awareness and the security of hash-tree keyless signatures
Buldas, Ahto
;
Laanoja, Risto
;
Laud, Peeter
;
Truu, Ahto
Provable security : 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014 : proceedings
2014
/
p. 130-145 : ill
book article
10
book article
Detecting and mitigating Low-and-Slow DoS attacks in NoC-based MPSoCs
Chaves Arroyave, Cesar Giovanni
;
Azad, Siavoosh Payandeh
;
Sepulveda, Johanna
;
Hollstein, Thomas
2019 14th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC) : July 1-3 2019, York - United Kingdom : proceedings
2019
/
p. 82-89 : ill
https://doi.org/10.1109/ReCoSoC48741.2019.9034934
book article
Seotud publikatsioonid
1
Bandwidth Reduction DoS attacks in Multi-Tenant NoC-based MPSoCs : detection and avoidance strategies = Ribalaiuse vähendamise DoS-rünnakud mitme rentnikuga NoC-põhiste MPSoC-de puhul : tuvastamise ja vältimise strateegiad
11
book article
Does secure time-staming imply collision-free hash functions
Buldas, Ahto
;
Jürgenson, Aivo
Info- ja kommunikatsioonitehnoloogia doktorikooli IKTDK kolmanda aastakonverentsi artiklite kogumik : 25.-26. aprill 2008, Voore külalistemaja
2008
/
p. 59-63 : ill
book article
12
journal article
Does secure time-stamping imply collision-free hash functions?
Buldas, Ahto
;
Jürgenson, Aivo
Lecture notes in computer science
2007
/
p. 138-150
journal article
13
dissertation
Efficient semantics of parallel and serial models of attack trees = Ründepuude paralleel- ja jadamudelite efektiivsed semantikad
Jürgenson, Aivo
2010
https://www.ester.ee/record=b2604924*est
dissertation
14
journal article
802.11 Denial of Service ründed ja nende leevendamine : referaat
Rebane, Andri
A & A
2009
/
2, lk. 43-50 : ill
https://artiklid.elnet.ee/record=b1451681*est
journal article
15
book article
E-learning environment identification system : error injection and patterns dynamics
Kumlander, Deniss
Innovations and advances in computer, information, systems sciences, and engineering
2013
/
p. 917-924
book article
16
journal article EST
/
journal article ENG
An experimental study of building blocks of lattice-based NIST post-quantum cryptographic algorithms
Imran, Malik
;
Abideen, Zain Ul
;
Pagliarini, Samuel Nascimento
Electronics
2020
/
art. 1953, 26 p. : ill
https://doi.org/10.3390/electronics9111953
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Seotud publikatsioonid
1
Hardware realization of lattice-based post-quantum cryptography = Võrel põhinev post-kvant-krüptograafia riistvaraline realisatsioon
17
book article
Frankenstack: real-time cyberattack detection and feedback system for technical cyber exercises
Pihelgas, Mauno
;
Kont, Markus
Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings
2021
/
p. 396–402
https://doi.org/10.1109/CSR51186.2021.9527923
book article
18
book article
Gone phishin' (but not to jail) [Online resource]
Mäses, Sten
;
Kikerpill, Kristjan
Proceedings of the 3rd Interdisciplinary Cyber Research Workshop 2017 : 8th of July 2017
2017
/
p. 29-30
https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/crw2017_final.pdf
book article
19
dissertation
Hardware realization of lattice-based post-quantum cryptography = Võrel põhinev post-kvant-krüptograafia riistvaraline realisatsioon
Imran, Malik
2023
https://www.ester.ee/record=b5571216*est
https://doi.org/10.23658/taltech.33/2023
https://digikogu.taltech.ee/et/Item/75aeb070-cb8b-4511-beaf-cbea3fca147d
https://www.ester.ee/record=b5571216*est
dissertation
Seotud publikatsioonid
6
An experimental study of building blocks of lattice-based NIST post-quantum cryptographic algorithms
An open-source library of large integer polynomial multipliers
Design space exploration of SABER in 65nm ASIC
High-speed SABER key encapsulation mechanism in 65nm CMOS
A versatile and flexible multiplier generator for Large integer polynomials
High-speed design of postquantum cryptography with optimized hashing and multiplication
20
journal article EST
/
journal article ENG
Hardware trojan insertion in finalized layouts : from methodology to a silicon demonstration
Perez, Tiago Diadami
;
Pagliarini, Samuel Nascimento
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
2023
/
p. 2094-2107
https://doi.org/10.1109/TCAD.2022.3223846
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Seotud publikatsioonid
1
Security-aware physical synthesis of integrated circuits = Integraallülituste turvateadlik füüsiline süntees
21
book article
Hardware Trojans for confidence reduction and misclassifications on neural networks
Grailoo, Mahdieh
;
Leier, Mairo
;
Pagliarini, Samuel Nascimento
Proceedings Of The Twenty Third International Symposium On Quality Electronic Design (ISQED 2022)
2022
/
art. 180541, p. 230-235
https://doi.org/10.1109/ISQED54688.2022.9806246
book article
22
book
Infosüsteemide turve
Hanson, Vello
;
Buldas, Ahto
1997
https://www.ester.ee/record=b1059903*est
book
23
book
Infotehnoloogia. Sõnastik. Osa 8, Turvalisus
Hanson, Vello
;
Tavast, Arvi
;
Kalja, Ahto
;
Võhandu, Leo
1999
https://www.ester.ee/record=b1323628*est
book
24
journal article
Keyless signature infrastructure and PKI : hash-tree signatures in pre- and post-quantum world
Buldas, Ahto
;
Laanoja, Risto
;
Truu, Ahto
International journal of services technology and management
2017
/
p. 117-130 : ill
http://dx.doi.org/10.1504/IJSTM.2017.10002708
journal article
25
journal article
Kübermaailmas on oluline probleeme ennetada
Sõmer, Tiia
Mente et Manu
2017
/
lk. 30-33 : fot
http://www.ttu.ee/public/m/mente-et-manu/MM_01_2017/index.html
https://artiklid.elnet.ee/record=b2811469*est
journal article
Number of records 53, displaying
1 - 25
previous
1
2
3
next
subject term
1
1.
arvutiturve
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT