Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
küberturve (subject term)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
497
Look more..
(1/1)
Export
export all inquiry results
(497)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
26
journal article EST
/
journal article ENG
Attribute evaluation on attack trees with incomplete information
Buldas, Ahto
;
Gadyatskaya, Olga
;
Lenin, Aleksandr
;
Mauw, Sjouke
;
Trujillo-Rasua, Roland
Computers & Security
2020
/
art. 101630, 17 p. : ill
https://doi.org/10.1016/j.cose.2019.101630
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
27
journal article
Attribute evaluation on attack trees with incomplete information : a preprint
Buldas, Ahto
;
Gadyatskaya, Olga
;
Lenin, Aleksandr
;
Mauw, Sjouke
;
Trujillo-Rasua, Roland
arXiv.org
2019
/
21 p. : ill
http://arxiv.org/abs/1812.10754
journal article
28
dissertation
Automating defences against cyber operations in computer networks = Arvutivõrkude kaitse automatiseerimine küberoperatsioonide vastu
Pihelgas, Mauno
2021
https://doi.org/10.23658/taltech.36/2021
https://www.ester.ee/record=b5449710*est
https://digikogu.taltech.ee/et/Item/beb3e841-9c6e-4496-a73a-17148bc941ef
dissertation
29
book article
Autonomous cyber defence capabilities
Tammet, Tanel
Autonomous cyber capabilities under international law
2021
/
p. 36-50
https://www.ester.ee/record=b5395402*est
book article
30
book article EST
/
book article ENG
Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
Blumbergs, Bernhards
;
Vaarandi, Risto
MILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 2017
2017
/
p. 707-712
https://doi.org/10.1109/MILCOM.2017.8170785
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
31
newspaper article
Big data ja tehnoloogiahiiud: kes lõpuks andmeid haldab? [Võrguväljaanne]
digi.geenius.ee
2021
"Big data ja tehnoloogiahiiud: kes lõpuks andmeid haldab"
newspaper article
32
journal article
Birgy Lorenz: kübertalentide väsimatu avastaja
Lorenz, Birgy
Mente et Manu
2022
/
lk. 12-17 : fot
https://www.ester.ee/record=b1242496*est
journal article
33
book article
Building an ontology for cyber defence exercises
Babayeva, Gulkhara
;
Maennel, Kaie
;
Maennel, Olaf Manuel
IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
2022
/
p. 423-432
https://doi.org/10.1109/EuroSPW55150.2022.00050
book article
34
book article
Building cyber resilience : the defensive shield for the EU
Osula, Anna-Maria
Cybersecurity policy in the EU and South Korea from consultation to action : theoretical and comparative perspectives
2022
/
p. 179-196
https://doi.org/10.1007/978-3-031-08384-6_9
book article
35
book article
Capability detection and evaluation metrics for cyber security lab exercises
Caliskan, Emin
;
Tatar, Unal
;
Bahsi, Hayretdin
;
Ottis, Rain
;
Vaarandi, Risto
Proceedings of the 12th International Conference on Cyber Warfare and Security, ICCWS 2017
2017
/
p. 407-414 : ill
https://www.scopus.com/record/display.uri?eid=2-s2.0-85018944652&origin=inward&txGid=dad813d957372581ca0932bf6e4fb5d8
book article
36
book article
Career development in cyber security: Bootcamp training programs
Caliskan, Emin
;
Vaarandi, Risto
Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020
2020
/
p. 503-511
https://doi.org/10.34190/ICCWS.20.080
book article
37
book article
A case study about the use and evaluation of cyber deceptive methods against highly targeted attacks
Farar, Alexandria Elaine
;
Bahsi, Hayretdin
;
Blumbergs, Bernhards
2017 International Conference On Cyber Incident Response, Coordination, Containment and Control, Cyber Incident 2017 : London, United Kingdom, 19 June 2017 through 20 June 2017
2017
/
[7] p. : ill
https://doi.org/10.1109/CYBERINCIDENT.2017.8054640
book article
38
newspaper article
CGI Eesti kosmose ärisuuna juhi Sille Kraami soovitus noortele : tehke suure kirega seda, millesse usute
Kraam, Sille
forte.delfi.ee
2024
GI Eesti kosmose ärisuuna juhi Sille Kraami soovitus noortele: tehke suure kirega seda, millesse usute
newspaper article
39
book article
The challenge of protecting space-based assets against cyber threats
Carlo, Antonio
;
Lacroix, Lisa
;
Zarkan Cesari, Laetitia
IAC 2020 congress proceedings
2020
/
art. 59386
https://dl.iafastro.directory/event/IAC-2020/paper/59386/
book article
40
book article
Challenges in collecting digital evidence : a legal perspective
Kasper, Agnes
;
Laurits, Eneli
The future of law and eTechnologies
2016
/
p. 195-233 : ill
http://dx.doi.org/10.1007/978-3-319-26896-5_10
book article
41
journal article
Chia, N-H.; Chung, K-M.; Yamakawa, T. A black-box approach to post-quantum zero-knowledge in constant rounds : [review]
Henno, Jaak
zbMATH Open
2022
/
1 p
https://zbmath.org/1486.94089
journal article
42
journal article EST
/
journal article ENG
Ciberseguridad y ciberdiplomacia de la UE
Kasper, Agnes
;
Osula, Anna-Maria
;
Molnar, Anna
IDP Revista de Internet Derecho y Política
2021
/
p. 1-15
https://doi.org/10.7238/idp.v0i34.387469
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
43
book article
Civil defence and cyber security: A contemporary European perspective
Tikk, Eneken
National cyber emergencies: the return to civil defence
2020
/
p. 76-92
https://doi.org/10.4324/9780429343438
book article
44
book article
Combined safety and cybersecurity testing methodology for autonomous driving algorithms
Roberts, Andrew
;
Malayjerdi, Mohsen
;
Malayjerdi, Ehsan
;
Maennel, Olaf Manuel
CSCS '22 : Proceedings of the 6th ACM Computer Science in Cars Symposium
2022
/
art. 12, 10 p
https://doi.org/10.1145/3568160.3570235
book article
Related publications
1
Scenario-based validation of safety and performance of an autonomous vehicle by a software in loop simulation method = Autonoomse sõiduki ohutuse ja jõudluse stsenaariumipõhine valideerimine tsüklisimulatsiooni meetodi abil
45
book article
Comparative analysis of pattern mining algorithms for event logs
Gasimov, Orkhan
;
Vaarandi, Risto
;
Pihelgas, Mauno
2023 IEEE International Conference on Cyber Security and Resilience (CSR) : Venice, Italy, 2023
2023
/
7 p
https://doi.org//10.1109/CSR57506.2023.10224996
book article
46
journal article
A comparative framework for cyber threat modelling : case of healthcare and industrial control systems
Balogun, Taofeek Mobolarinwa
;
Bahsi, Hayretdin
;
Keskin, Omer F.
;
Tatar, Unal
International Journal of Critical Infrastructures
2021
/
1 p
https://doi.org/10.1504/IJCIS.2024.10046187
journal article
47
journal article EST
/
journal article ENG
A comparative framework for cyber threat modelling: case of healthcare and industrial control systems
Balogun, Taofeek Mobolarinwa
;
Bahsi, Hayretdin
;
Keskin, Omer F.
;
Tatar, Unal
International Journal of Critical Infrastructures
2023
/
p. 405-431
https://doi.org/10.1504/IJCIS.2023.133282
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
48
book article
A comparison-based methodology for the security assurance of novel systems
Laud, Peeter
;
Vakarjuk, Jelizaveta
ESORICS 2022: Computer Security. ESORICS 2022 International Workshops : conference proceedings
2023
/
p. 625-644
https://doi.org/10.1007/978-3-031-25460-4_36
book article
49
journal article EST
/
journal article ENG
A comprehensive instrument for identifying critical information infrastructure services
Herrera, Luis-Carlos
;
Maennel, Olaf Manuel
International Journal of Critical Infrastructure Protection
2019
/
p. 50-61 : ill
https://doi.org/10.1016/j.ijcip.2019.02.001
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
50
journal article
A comprehensive review on DC fast charging stations for electric vehicles: standards, power conversion technologies, architectures, energy management, and cybersecurity
Arena, Gabriele
;
Chub, Andrii
;
Lukianov, Mykola
;
Strzelecki, Ryszard
;
Vinnikov, Dmitri
;
de Carne, Giovanni
IEEE open journal of power electronics
2024
/
p. 1573-1611
https://doi.org/10.1109/OJPEL.2024.3466936
journal article
Number of records 497, displaying
26 - 50
previous
1
2
3
4
5
6
7
8
9
10
next
subject term
1
1.
küberturve
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT