Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
küberturve (subject term)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
500
Look more..
(1/1)
Export
export all inquiry results
(500)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
276
book article
Mapping cyber attacks on the internet of medical things : a taxonomic review
Kondeti, Venkatesh
;
Bahsi, Hayretdin
2024 19th Annual System of Systems Engineering Conference (SoSE)
2024
/
p. 84 - 91
https://doi.org/10.1109/SOSE62659.2024.10620925
Article at Scopus
Article at WOS
book article
277
book article EST
/
book article ENG
Mapping requirements specifications into a formalized blockchain-enabled authentication protocol for secured personal identity assurance
Leiding, Benjamin
;
Norta, Alexander
Future Data and Security Engineering : 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 - December 1, 2017 : proceedings
2017
/
p. 181-196 : ill
https://doi.org/10.1007/978-3-319-70004-5_13
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
278
journal article
Maritime cyber-insurance : The Norwegian case : [abstract]
Franke, Ulrik
;
Langfeldt Friberg, Even
;
Bahsi, Hayretdin
International Journal of Critical Infrastructures
2022
/
p. 267–286
https://doi.org/10.1504/IJCIS.2022.10046729
journal article
279
journal article EST
/
journal article ENG
Maritime cyber-insurance: the Norwegian case
Franke, Ulrik
;
Friberg, Even Langfeldt
;
Bahşi, Hayretdin
International Journal of Critical Infrastructures
2022
/
p. 267-286
https://doi.org/10.1504/ijcis.2022.125816
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
280
book article EST
/
book article ENG
Mental model mapping method for cybersecurity
Kullman, Kaur
;
Buchanan, Laurin
;
Komlodi, Anita
;
Engel, Don
HCI for Cybersecurity, Privacy and Trust : Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : Proceedings
2020
/
p. 458-470
https://doi.org/10.1007/978-3-030-50309-3_30
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
Related publications
1
Interactive stereoscopically perceivable multidimensional data visualizations for cybersecurity = Interaktiivsed, ruumiliselt tajutavad, mitmemõõtelised andmekuvad küberturbele
281
journal article
Merendus sektoris on küberhügieen olulisem kui kunagi varem
Tampere, Uku
Teejuht : maal, vees ja õhus : Transpordiameti digiajakiri
2024
/
lk. 14-17 : fot
https://digiajakiri.transpordiamet.ee/view/434325528/14/
journal article
282
book article
Messung, Prüfung und Nachweis von IT-Sicherheit
Skierka-Canton, Isabel
IT-Sicherheitsrecht : Praxishandbuch
2021
/
S. 154−180
https://www.nomos-shop.de/en/nomos/title/it-sicherheitsrecht-id-86855/
book article
Related publications
1
Securing digital government : towards governance mechanisms for e-state resilience = Digitaalse valitsuse turvalisus : valitsemismehhanismid e-riigi vastupidavuse tagamiseks
283
book article
Metamorphic testing for verification and fault localization in industrial control systems
Sudheerbabu, Gaadha
;
Ahmad, Tanwir
;
Truscan, Dragos
;
Vain, Jüri
CyberSecurity in a DevOps Environment: From Requirements to Monitoring
2023
/
p. 127 - 159
https://doi.org/10.1007/978-3-031-42212-6_5
Article at Scopus
book article
284
book article EST
/
book article ENG
A method for adding cyberethical behaviour measurements to computer science homework assignments
Mäses, Sten
;
Aitsam, Heleri
;
Randmann, Liina
19th Koli Calling Conference on Computing Education Research Koli Calling 2019 : November 21-24, 2019, Koli, Finland : proceedings
2019
/
5 p. : ill
https://doi.org/10.1145/3364510.3364529
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
285
book article EST
/
book article ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
286
book article
A method for teaching Open Source Intelligence (OSINT) using personalised cloud-based exercises
Yari, Saber
;
Mäses, Sten
;
Maennel, Olaf Manuel
Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020
2020
/
p. 480−489
https://doi.org/10.34190/ICCWS.20.091
book article
287
book article
Methodology for modelling financially motivated cyber crime
Sõmer, Tiia
16th International Conference on Cyber Warfare and Security (ICCWS 2021) : Online, 25 - 26 February 2021
2021
/
p. 326-335
http://toc.proceedings.com/58552webtoc.pdf?msclkid=97ad966dbea311ecb39e14df5abebf21
book article
Related publications
1
Modelling financially motivated cyber crime = Finantsiliselt motiveeritud küberkuritegevuse modelleerimine
288
newspaper article
Miks Facebook ei tööta? Põhjuseks võib olla ebaõnnestunud tarkvarauuendus [Võrguväljaanne]
Veedla, Alice
delfi.ee
2021
"Miks Facebook ei tööta? Põhjuseks võib olla ebaõnnestunud tarkvarauuendus "
newspaper article
289
newspaper article
Millist küberstrateegiat Eesti vajab?
Lorenz, Birgy
Äripäev
2018
/
Lk. 12
https://dea.digar.ee/article/aripaev/2018/06/22/18.3
newspaper article
290
newspaper article
Mis toimub tehisintellekti „kapoti all“ ja miks me seda teadma peame? [Võrguväljaanne]
delfi.ee
2022
Mis toimub tehisintellekti „kapoti all“ ja miks me seda teadma peame?
newspaper article
291
journal article
Mis toimub tehisintellekti "kapoti all" ja miks me seda teadma peame?
Härmat, Karin
Mente et Manu
2022
/
lk. 30-33 : fot
https://www.ester.ee/record=b1242496*est
journal article
292
book article
Mixed methods research approach and experimental procedure for measuring human factors in cybersecurity using phishing simulations
Mäses, Sten
;
Kikerpill, Kristjan
;
Jüristo, Kaspar
;
Maennel, Olaf Manuel
Abstracts of Papers Presented at the 18th European Conference on Research Methodology for Business and Management Studies : ECRM 2019, Hosted By Wits Business School Johannesburg, South Africa 20-21 June, 2019
2019
/
p. 30-31
"ECRM19"
book article
293
book article
Mixed methods research approach and experimental procedure for measuring human factors in cybersecurity using phishing simulations
Mäses, Sten
;
Kikerpill, Kristjan
;
Jüristo, Kaspar
;
Maennel, Olaf Manuel
ECRM 2019 - Proceedings of the 18th European Conference on Research Methodology for Business and Management Studies ; vol. 1
2019
/
p. 218-226
http://toc.proceedings.com/49537webtoc.pdf
book article
294
journal article EST
/
journal article ENG
A 3D mixed reality visualization of network topology and activity results in better dyadic cyber team communication and cyber situational awareness
Ask, Torvald F.
;
Kullman, Kaur
;
Sütterlin, Stefan
;
Knox, Benjamin James
;
Engel, Don
;
Lugo, Ricardo Gregorio
Frontiers in Big Data
2023
/
art. 1042783, 21 p. : ill
https://doi.org/10.3389/fdata.2023.1042783
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
Interactive stereoscopically perceivable multidimensional data visualizations for cybersecurity = Interaktiivsed, ruumiliselt tajutavad, mitmemõõtelised andmekuvad küberturbele
295
book article
Modeling and optimizing graded sequrity measures
Ojamaa, Andres
;
Tõugu, Enn
;
Kivimaa, Jüri
Info- ja kommunikatsioonitehnoloogia doktorikooli IKTDK kolmanda aastakonverentsi artiklite kogumik : 25.-26. aprill 2008, Voore külalistemaja
2008
/
p. 123-125 : ill
book article
296
book article
Modeling the trajectory tracking accuracy of an autonomous catamaran patrol vessel under different positional data disturbance conditions
Udal, Andres
;
Kaugerand, Jaanus
;
Mõlder, Heigo
;
Astrov, Igor
;
Bauk, Sanja
MT '24 : 10th International Conference on Maritime Transport : Barcelona, Spain, 5-7 June, 2024
2024
/
p. 1-15 : ill
https://doi.org/10.5821/mt.13165
http://hdl.handle.net/2117/409463
book article
297
journal article EST
/
journal article ENG
Modelling cyberspace to determine cybersecurity training requirements
Venables, Adrian Nicholas
Frontiers in education
2021
/
art. 768037, 16 p. : ill
https://doi.org/10.3389/feduc.2021.768037
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
298
dissertation
Modelling financially motivated cyber crime = Finantsiliselt motiveeritud küberkuritegevuse modelleerimine
Sõmer, Tiia
2022
https://doi.org/10.23658/taltech.10/2022
https://www.ester.ee/record=b5491785*est
https://digikogu.taltech.ee/et/Item/5c41eec5-0c88-43c8-9294-c9f47e7c438b
dissertation
Related publications
5
Utilising journey mapping and crime scripting to combat cyber crime
Utilising journey mapping and crime scripting to combat cybercrime and cyber warfare attacks
Application of journey mapping and crime scripting to the phenomenon of trolling
Taxonomies of cybercrime : an overview and proposal to be used in mapping cyber criminal journeys
Methodology for modelling financially motivated cyber crime
299
book article EST
/
book article ENG
Modelling the impact of space situational awareness disruption on the European and Arctic security landscape
Carlo, Antonio
;
Boschetti, Nicolo
Modelling and Simulation for Autonomous Systems: 9th International Conference, MESAS 2022, Prague, Czech Republic, October 20–21, 2022 : Revised Selected Papers
2023
/
p. 299-311
https://doi.org/10.1007/978-3-031-31268-7_18
Journal metrics at Scopus
Article at Scopus
book article EST
/
book article ENG
300
journal article EST
/
journal article ENG
A multidimensional cyber defense exercise: emphasis on emotional, social, and cognitive aspects
Maennel, Kaie
;
Brilingaite, Agne
;
Bukauskas, Linas
;
Juozapavicius, Ausrius
;
Knox, Benjamin James
;
Lugo, Ricardo Gregorio
;
Maennel, Olaf Manuel
;
Majore, Ginta
;
Sütterlin, Stefan
SAGE Open
2023
/
12 p. : ill
https://doi.org/10.1177/21582440231156367
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 500, displaying
276 - 300
previous
8
9
10
11
12
13
14
15
16
17
next
subject term
1
1.
küberturve
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT