- Accessing extraterritorially located data : options for states [Online resource]Osula, Anna-Maria2015 https://ccdcoe.org/sites/default/files/multimedia/pdf/Accessing%20extraterritorially%20located%20data%20options%20for%20States_Anna-Maria_Osula.pdf
- Active learning-based mobile malware detection utilizing auto-labeling and data drift detectionDeng, Zhe; Hubert, Arthur; Ben Yahia, Sadok; Bahsi, HayretdinProceedings of the 2024 IEEE International Conference on Cyber Security and Resilience, CSR 20242024 / p. 146 - 151 https://doi.org/10.1109/CSR61664.2024.10679343 https://www.scopus.com/record/display.uri?eid=2-s2.0-85206173340&origin=resultslist&sort=plf-f&src=s&sot=b&sdt=b&s=DOI%2810.1109%2FCSR61664.2024.10679343%29&sessionSearchId=e1befdb1cf15a568da5cda41fe0f6fd4&relpos=0 https://www.webofscience.com/wos/woscc/full-record/WOS:001327167900023
- Adrian Venables: robotid vallutavad transpordisektorit. Küberturvalisus [Võrguväljaanne]Venables, Adrian NicholasEdasi.org : innustav ja hariv ajakiri2021 https://edasi.org/83811/adrian-venables-robotid-vallutavad-transpordisektorit/
- Adrian Venables: sõda inforuumis – mis see on ja kuidas seal käituda? Küberturvalisus [Võrguväljaanne]Edasi.org : innustav ja hariv ajakiri2022 https://edasi.org/121621/adrian-venables-soda-inforuumis-mis-see-on-ja-kuidas-seal-kaituda-kuberturvalisus/
- Advances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings2021 https://doi.org/10.1007/978-3-030-87657-9
- Advancing cybersecurity education through learning analytics = Küberkaitsealase hariduse parendamine õpianalüütika abilMaennel, Kaie2021 https://doi.org/10.23658/taltech.29/2021 https://www.ester.ee/record=b5434228*est https://digikogu.taltech.ee/et/Item/d01c0b17-3b4b-41c5-ae24-e75b6128a183
- Ago Luberg: leian motivatsiooni õpetamisest endast!Luberg, AgoMente et Manu2021 / lk. 14-19 : fot https://www.ester.ee/record=b1242496*est
- AI systems to ensure cyber security in spacePelin Manti, Nebile; Carlo, Antonio; Markova, Rada; Jha, Devanshu; Breda, Paola; Abdin, Adam; Boschetti, NicoloIAC 2022 congress proceedings2022 / art. 70423 https://dl.iafastro.directory/event/IAC-2022/paper/70423/ https://www.scopus.com/sourceid/21100255701 https://www.scopus.com/record/display.uri?eid=2-s2.0-85167595711&origin=inward&txGid=b79165727de58700c1884c3ad1cf3874
- AIS data analysis: reality in the Sea of EchosVisky, Gabor; Rohl, Alexander; Katsikas, Sokratis; Maennel, Olaf Manuel2024 IEEE 49th Conference on Local Computer Networks (LCN)2024 / 7 p https://doi.org/10.1109/LCN60385.2024.10639765
- Algas ründetegevusele suunatud küberoperatsioonide õppus [Võrguväljaanne]postimees.ee2021 https://www.postimees.ee/7401745/algas-rundetegevusele-suunatud-kuberoperatsioonide-oppus
- Aligning Estonian and Japanese efforts in building norms in cyberspaceOsula, Anna-MariaSo Far, Yet So Close : Japanese and Estonian cybersecurity : policy perspectives and cooperations : report2021 / p. 22-29 https://icds.ee/wp-content/uploads/2021/05/ICDS_Report_So_Far_Yet_So_Close_Roigas_Jermalavicius_May_2021.pdf
- Alliance attribution of global cyber attacks : the European UnionAlatalu, SiimNational cyber emergencies: the return to civil defence2020 / p. 171-185 https://doi.org/10.4324/9780429343438
- Ambitsioon saada merenduse küberjulgeoleku eestkõnelejaksHõimoja, JaneMeremees : Eesti merendusajakiri = Estonian maritime magazine2022 / lk. 8-10 : fot https://www.ester.ee/record=b4646644*est https://issuu.com/ajakirimeremees/docs/meremees_2022_1-4
- Analysis of national cyber situational awareness practicesBahsi, HayretdinStrategic cyber defense : a multidisciplinary perspective2017 / p. 31-41 https://doi.org/10.3233/978-1-61499-771-9-31
- Andmed tulevikuühiskonnas : andmevabaduse tuleviku uurimissuund : uuring 2022Õunapuu, Tauno; Olesk, Maarja; Raun, Merle; Kaldur, Kristjan; Tiits, Marek; Tatar, Merit2022 https://www.ester.ee/record=b5643049*est https://www.ibs.ee/wp-content/uploads/Andmed-tulevikuuhiskonnas-2022.pdf
- Anomaly detection and classification in power system state estimation: Combining model-based and data-driven methodsAsefi, Sajjad; Mitrovic, Mile; Cetenovic, Dragan; Levi, Victor; Gryazina, Elena; Terzija, VladimirSustainable energy, grids and networks2023 / art. 101116, 14 p. : ill https://doi.org/10.1016/j.segan.2023.101116 https://www.scopus.com/sourceid/21100371258 https://www.scopus.com/record/display.uri?eid=2-s2.0-85166961930&origin=inward&txGid=51b9545904c2de4b58e748ea0c07bcce https://jcr.clarivate.com/jcr-jp/journal-profile?journal=SUSTAIN%20ENERGY%20GRIDS&year=2023 https://www.webofscience.com/wos/woscc/full-record/WOS:001068747600001
- Areeba : an area efficient binary huff-curve architectureSajid, Asher; Rashid, Muhammad; Jamal, Sajjad Shaukat; Imran, Malik; Alotaibi, Saud S.; Sinky, Mohammed H.Electronics (Switzerland)2021 / art. 1490 https://doi.org/10.3390/electronics10121490 https://www.scopus.com/sourceid/21100829272 https://www.scopus.com/record/display.uri?eid=2-s2.0-85108164597&origin=resultslist&sort=plf-f&src=s&sid=0572f7efec97a2ba4690f692a7486e18&sot=b&sdt=b&s=DOI%2810.3390%2Felectronics10121490%29&sl=26&sessionSearchId=0572f7efec97a2ba4690f692a7486e18&relpos=0 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=ELECTRONICS-SWITZ&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000666223100001
- Art and automation of teaching malware reverse engineeringLepik, Toomas; Maennel, Kaie; Ernits, Margus; Maennel, Olaf ManuelLearning and Collaboration Technologies : Learning and Teaching : 5th International Conference : LCT 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018 : Proceedings, Part II2018 / p. 461-472 https://doi.org/10.1007/978-3-319-91152-6_35 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85050480031&origin=inward&txGid=180a4e0d3d2e2565eae1bfe93814447d https://jcr.clarivate.com/jcr-jp/journal-profile?journal=LECT%20NOTES%20ARTIF%20INT&year=2005 https://www.webofscience.com/wos/woscc/full-record/WOS:000554414000035
- Artificial intelligence in cyber defenceTõugu, Enn2011 : 3rd International Conference on Cyber Conflict : 7-10 June 2011, Tallinn, Estonia : proceedings2011 / p. 95-105
- Arvuti riistvarasse peidetud troojalane pakub häkkeritele hõlbuelu [Võrguväljaanne]Oidermaa, Jaan-Juhannovaator.err.ee2022 https://novaator.err.ee/1608477221/arvuti-riistvarasse-peidetud-troojalane-pakub-hakkeritele-holbuelu
- Arvutiklassis peaks vältima olukordi, kus ainult poisid saavad särada. Intervjuu Birgy LorenzigaLorenz, Birgymuurileht.ee2023 https://www.muurileht.ee/arvutiklassis-peaks-valtima-olukordi-kus-ainult-poisid-saavad-sarada-intervjuu-birgy-lorenziga/
- Arvutiteadlane: RIA andmebaasi fotode allalaadija võis tahta neid müüaEinmann, AndresPostimees2021 / Lk. 2 https://dea.digar.ee/article/postimees/2021/07/29/3.3
- ASAT weapons : enhancing NATO’s operational capabilities in the emerging space dependent eraCarlo, Antonio; Veazoglou, NikolaosModelling and Simulation for Autonomous Systems : 6th International Conference, MESAS 2019, Palermo, Italy, October 29–31, 2019, Revised Selected Papers2020 / p. 417-426 https://doi.org/10.1007/978-3-030-43890-6_34
- Assessing the role of international relations in cybersecurity : a preliminary analysisRincon Mendez, Angelica MarinaCeDEM 15 : Proceedings of the International Conference for E-Democracy and Open Government 2015 : 20-22 May 2015, Danube University Krems, Austria2015 / p. 401-404 http://www.donau-uni.ac.at/imperia/md/content/department/gpa/zeg/bilder/cedem/cedem15/cedem15_oa_proceedings.pdf
- Assessment of the eID ecosystem as a part of the state’s critical infrastructure : the case of EstoniaBejussova, Karolina; Lips, Silvia; Ahmed, Rozha Kamal; Draheim, DirkElectronic Government and the Information Systems Perspective : 13th International Conference, EGOVIS 2024, Naples, Italy, August 26–28, 2024, Proceedings2024 / p. 88 - 102 https://doi.org/10.1007/978-3-031-68211-7_8 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85202145689&origin=resultslist&sort=plf-f&src=s&sot=b&sdt=b&s=DOI%2810.1007%2F978-3-031-68211-7_8%29&sessionSearchId=9d2463a4c393c098eafee8de7d14eac0&relpos=0 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=LECT%20NOTES%20ARTIF%20INT&year=2005 https://www.webofscience.com/wos/woscc/full-record/WOS:001308540600008
- Attribute evaluation on attack trees with incomplete informationBuldas, Ahto; Gadyatskaya, Olga; Lenin, Aleksandr; Mauw, Sjouke; Trujillo-Rasua, RolandComputers & Security2020 / art. 101630, 17 p. : ill https://doi.org/10.1016/j.cose.2019.101630 https://www.scopus.com/sourceid/28898 https://www.scopus.com/record/display.uri?eid=2-s2.0-85072949979&origin=inward&txGid=4ba37c0bee550175158bb5d1761532c1 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=COMPUT%20SECUR&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000501392500016
- Attribute evaluation on attack trees with incomplete information : a preprintBuldas, Ahto; Gadyatskaya, Olga; Lenin, Aleksandr; Mauw, Sjouke; Trujillo-Rasua, RolandarXiv.org2019 / 21 p. : ill http://arxiv.org/abs/1812.10754
- Automating defences against cyber operations in computer networks = Arvutivõrkude kaitse automatiseerimine küberoperatsioonide vastuPihelgas, Mauno2021 https://doi.org/10.23658/taltech.36/2021 https://www.ester.ee/record=b5449710*est https://digikogu.taltech.ee/et/Item/beb3e841-9c6e-4496-a73a-17148bc941ef
- Autonomous cyber defence capabilitiesTammet, TanelAutonomous cyber capabilities under international law2021 / p. 36-50 https://www.ester.ee/record=b5395402*est
- Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysisBlumbergs, Bernhards; Vaarandi, RistoMILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 20172017 / p. 707-712 https://doi.org/10.1109/MILCOM.2017.8170785 https://www.scopus.com/sourceid/87683 https://www.scopus.com/record/display.uri?eid=2-s2.0-85042351192&origin=inward&txGid=946f32681f64f02c9dfa9af856671f32 https://www.webofscience.com/wos/woscc/full-record/WOS:000426935700120
- Big data ja tehnoloogiahiiud: kes lõpuks andmeid haldab? [Võrguväljaanne]digi.geenius.ee2021 https://digi.geenius.ee/rubriik/teadus-ja-tulevik/big-data-ja-tehnoloogiahiiud-kes-lopuks-andmeid-haldab/
- Birgy Lorenz: kübertalentide väsimatu avastajaLorenz, BirgyMente et Manu2022 / lk. 12-17 : fot https://www.ester.ee/record=b1242496*est
- Building an ontology for cyber defence exercisesBabayeva, Gulkhara; Maennel, Kaie; Maennel, Olaf ManuelIEEE European Symposium on Security and Privacy Workshops (EuroS&PW)2022 / p. 423-432 https://doi.org/10.1109/EuroSPW55150.2022.00050
- Building cyber resilience : the defensive shield for the EUOsula, Anna-MariaCybersecurity policy in the EU and South Korea from consultation to action : theoretical and comparative perspectives2022 / p. 179-196 https://doi.org/10.1007/978-3-031-08384-6_9
- Capability detection and evaluation metrics for cyber security lab exercisesCaliskan, Emin; Tatar, Unal; Bahsi, Hayretdin; Ottis, Rain; Vaarandi, RistoProceedings of the 12th International Conference on Cyber Warfare and Security, ICCWS 20172017 / p. 407-414 : ill https://www.scopus.com/record/display.uri?eid=2-s2.0-85018944652&origin=inward&txGid=dad813d957372581ca0932bf6e4fb5d8
- Career development in cyber security: Bootcamp training programsCaliskan, Emin; Vaarandi, RistoProceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 20202020 / p. 503-511 https://doi.org/10.34190/ICCWS.20.080
- A case study about the use and evaluation of cyber deceptive methods against highly targeted attacksFarar, Alexandria Elaine; Bahsi, Hayretdin; Blumbergs, Bernhards2017 International Conference On Cyber Incident Response, Coordination, Containment and Control, Cyber Incident 2017 : London, United Kingdom, 19 June 2017 through 20 June 20172017 / [7] p. : ill https://doi.org/10.1109/CYBERINCIDENT.2017.8054640
- CGI Eesti kosmose ärisuuna juhi Sille Kraami soovitus noortele : tehke suure kirega seda, millesse usuteKraam, Silleforte.delfi.ee2024 https://forte.delfi.ee/artikkel/120270358/cgi-eesti-kosmose-arisuuna-juhi-sille-kraami-soovitus-noortele-tehke-suure-kirega-seda-millesse-usute
- The challenge of protecting space-based assets against cyber threatsCarlo, Antonio; Lacroix, Lisa; Zarkan Cesari, LaetitiaIAC 2020 congress proceedings2020 / art. 59386 https://dl.iafastro.directory/event/IAC-2020/paper/59386/
- Challenges in collecting digital evidence : a legal perspectiveKasper, Agnes; Laurits, EneliThe future of law and eTechnologies2016 / p. 195-233 : ill http://dx.doi.org/10.1007/978-3-319-26896-5_10
- Chia, N-H.; Chung, K-M.; Yamakawa, T. A black-box approach to post-quantum zero-knowledge in constant rounds : [review]Henno, JaakzbMATH Open2022 / 1 p https://zbmath.org/1486.94089
- Ciberseguridad y ciberdiplomacia de la UEKasper, Agnes; Osula, Anna-Maria; Molnar, AnnaIDP Revista de Internet Derecho y Política2021 / p. 1-15 https://doi.org/10.7238/idp.v0i34.387469 https://www.scopus.com/sourceid/21100942928 https://www.scopus.com/record/display.uri?eid=2-s2.0-85122567306&origin=inward&txGid=995fa2cb8cc949f462f1faf9779a690f
- Civil defence and cyber security: A contemporary European perspectiveTikk, EnekenNational cyber emergencies: the return to civil defence2020 / p. 76-92 https://doi.org/10.4324/9780429343438
- Combined safety and cybersecurity testing methodology for autonomous driving algorithmsRoberts, Andrew; Malayjerdi, Mohsen; Malayjerdi, Ehsan; Maennel, Olaf ManuelCSCS '22 : Proceedings of the 6th ACM Computer Science in Cars Symposium2022 / art. 12, 10 p https://doi.org/10.1145/3568160.3570235
- Comparative analysis of pattern mining algorithms for event logsGasimov, Orkhan; Vaarandi, Risto; Pihelgas, Mauno2023 IEEE International Conference on Cyber Security and Resilience (CSR) : Venice, Italy, 20232023 / 7 p https://doi.org//10.1109/CSR57506.2023.10224996
- A comparative framework for cyber threat modelling : case of healthcare and industrial control systemsBalogun, Taofeek Mobolarinwa; Bahsi, Hayretdin; Keskin, Omer F.; Tatar, UnalInternational Journal of Critical Infrastructures2021 / 1 p https://doi.org/10.1504/IJCIS.2024.10046187
- A comparative framework for cyber threat modelling: case of healthcare and industrial control systemsBalogun, Taofeek Mobolarinwa; Bahsi, Hayretdin; Keskin, Omer F.; Tatar, UnalInternational Journal of Critical Infrastructures2023 / p. 405-431 https://doi.org/10.1504/IJCIS.2023.133282 https://www.scopus.com/sourceid/26673 https://www.scopus.com/record/display.uri?eid=2-s2.0-85171740470&origin=inward&txGid=693e6cff584b654e7baf077afaea616c https://www.webofscience.com/wos/woscc/full-record/WOS:001069139400001 https://www.webofscience.com/wos/woscc/full-record/WOS:001069139400001
- A comparison-based methodology for the security assurance of novel systemsLaud, Peeter; Vakarjuk, JelizavetaESORICS 2022: Computer Security. ESORICS 2022 International Workshops : conference proceedings2023 / p. 625-644 https://doi.org/10.1007/978-3-031-25460-4_36
- A comprehensive instrument for identifying critical information infrastructure servicesHerrera, Luis-Carlos; Maennel, Olaf ManuelInternational Journal of Critical Infrastructure Protection2019 / p. 50-61 : ill https://doi.org/10.1016/j.ijcip.2019.02.001 https://www.scopus.com/sourceid/17300154971 https://www.scopus.com/record/display.uri?eid=2-s2.0-85061452624&origin=inward&txGid=af102d0accf93f44702c05d7eee1a471 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=INT%20J%20CRIT%20INFR%20PROT&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000469812100005
- A comprehensive review on DC fast charging stations for electric vehicles: standards, power conversion technologies, architectures, energy management, and cybersecurityArena, Gabriele; Chub, Andrii; Lukianov, Mykola; Strzelecki, Ryszard; Vinnikov, Dmitri; de Carne, GiovanniIEEE open journal of power electronics2024 / p. 1573-1611 https://doi.org/10.1109/OJPEL.2024.3466936
- A conceptual nationwide cyber situational awareness framework for critical infrastructuresBahsi, Hayretdin; Maennel, Olaf ManuelSecure IT systems : 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015 : proceedings2015 / p. 3-10 : ill https://doi.org/10.1007/978-3-319-26502-5_1
- Corrigendum to Concept drift and cross-device behavior: Challenges and implications for effective android malware detection Computers & Security, Volume 120, 102757 (Computers & Security (2022) 120, (S0167404822001523), (10.1016/j.cose.2022.102757))Guerra-Manzanares, Alejandro; Luckner, Marcin; Bahsi, HayretdinComputers and Security2023 / art. 102998 https://doi.org/10.1016/j.cose.2022.102998 https://www.scopus.com/sourceid/28898 https://www.scopus.com/record/display.uri?eid=2-s2.0-85141940153&origin=resultslist&sort=plf-f&src=s&sid=443787aa9b1ca10ee6304e8733795725&sot=b&sdt=b&s=TITLE-ABS-KEY%28%22Corrigendum+to+Concept+drift+and+cross-device+behavior%3A+Challenges+and+implications+for+effective+android+malware+detection+Computers+%26+Security%2C+Volume+120%2C+102757+%28Computers+%26+Security+%282022%29+120%2C+%28S0167404822001523%29%2C+%2810.1016%2Fj.cose.2022.102757%29%29%22%29&sl=266&sessionSearchId=443787aa9b1ca10ee6304e8733795725&relpos=0 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=COMPUT%20SECUR&year=2023 https://www.webofscience.com/wos/woscc/full-record/WOS:000901150600011
- CR14 ja Tallinna Tehnikaülikool sõlmisid leppe Eesti noorte küberkaitsevõistluse edendamiseksElektriala2023 / lk. 11-12 : foto https://www.ester.ee/record=b1240496*est
- Create your own MUSE : a method for updating security level evaluation instrumentsSeeba, Mari; Affia, Abasi-amefon Obot; Mäses, Sten; Matulevičius, RaimundasComputer Standards and Interface2024 / art. 103776 https://doi.org/10.1016/j.csi.2023.103776 https://www.scopus.com/sourceid/24303 https://www.scopus.com/record/display.uri?eid=2-s2.0-85166474041&origin=resultslist&sort=plf-f&src=s&sot=b&sdt=b&s=DOI%2810.1016%2Fj.csi.2023.103776%29&sessionSearchId=82ea1e262e947a553c0dfd040e2059dd&relpos=0 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=COMPUT%20STAND%20INTER&year=2023 https://www.webofscience.com/wos/woscc/full-record/WOS:001051540800001
- Creating randomness with gamesHenno, Jaak; Jaakkola, Hannu; Mäkelä, JukkaActa Polytechnica Hungarica : journal of applied sciences at Budapest Polytechnic Hungary2019 / p. 193-212 : ill http://acta.uni-obuda.hu/Henno_Jaakkola_Makela_96.pdf https://doi.org/10.12700/APH.16.9.2019.9.11 https://www.scopus.com/sourceid/19700173166 https://www.scopus.com/record/display.uri?eid=2-s2.0-85076453763&origin=inward&txGid=fcde457423ddb10453fdd1f1a76db96b https://jcr.clarivate.com/jcr-jp/journal-profile?journal=ACTA%20POLYTECH%20HUNG&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000492691500011
- Crossed swords : a cyber red team oriented technical exerciseBlumbergs, Bernhards; Ottis, Rain; Vaarandi, RistoProceedings of the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 20192019 / p. 37-44 https://www.scopus.com/record/display.uri?eid=2-s2.0-85070019446&origin=inward&txGid=b3ce06db78a90b7b9e8a79c0d7b1f9c7
- Culturally-sensitive cybersecurity awareness program design for Iranian high-school studentsKarimnia, Rooya; Maennel, Kaie; Shahin, MahtabProceedings of the 8th International Conference on Information Systems Security and Privacy (ICISSP), 9-11 February, 20222022 / p. 121-132 https://doi.org/10.5220/0010824800003120
- Cyber attacks on power system automation and protection and impact analysisRajkumar, Vetrivel Subramaniam; Tealane, Marko; Stefanov, Alexandru; Presekal, Alfan; Palensky, PeterProceedings of 2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), 26-28 October, 20202020 / p. 247–254 https://doi.org/10.1109/ISGT-Europe47291.2020.9248840
- Cyber attacks on protective relays in digital substations and impact analysisRajkumar, Vetrivel Subramaniam; Tealane, Marko; Stefanov, Alexandru; Palensky, Peter8th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems(MSCPES), Virtual Workshop, online, from April 21, 2020 : proceedings2020 / 6 p. : ill https://doi.org/10.1109/MSCPES49613.2020.9133698
- Cyber commands - a universal solution to a universal cyber security challenge?Alatalu, SiimRedesigning organizations2020 / p. 27−43 https://doi.org/10.1007/978-3-030-27957-8_2
- Cyber commands - universal solution to a universal cyber security problem?Alatalu, SiimProceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 20182018 / p. 21-22 https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/CRW_2018_lingitud.pdf
- Cyber game to cyber exercise : a new methodology for cybersecurity simulationsLovell, Kieren NicolasProceedings of the 5th Interdisciplinary Cyber Research Conference 2019 : 29th of June 2019, Tallinn University of Technology2019 / p. 13-16 https://www.ester.ee/record=b5238490*est
- Cyber hygiene : the big pictureMaennel, Kaie; Mäses, Sten; Maennel, Olaf ManuelSecure IT Systems : 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28–30, 2018 : proceedings2018 / p. 291-305 : ill https://doi.org/10.1007/978-3-030-03638-6_18 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85057361477&origin=inward&txGid=d5b5bcb259ba4874d5ffaec97b6198be https://jcr.clarivate.com/jcr-jp/journal-profile?journal=LECT%20NOTES%20ARTIF%20INT&year=2005 https://www.webofscience.com/wos/woscc/full-record/WOS:000509939800018
- Cyber incident management in low-income countriesHountomey, Jean-Robert; Bahsi, Hayretdin; Tatar, Unal; Hashem, Sherif; Dubois, Elisabeth2022 https://cybilportal.org/wp-content/uploads/2022/01/CSIRTs-In-Low-Income-Countries-Final-Report-part-1-v16.pdf https://thegfce.org/working-groups/working-group-b/
- Cyber incident management in low-income countriesHountomey, Jean-Robert; Bahsi, Hayretdin; Tatar, Unal; Hashem, Sherif; Dubois, Elisabeth2022 https://cybilportal.org/wp-content/uploads/2022/01/CSIRTs-In-Low-Income-Countries-Final-Report-part-2-v16.pdf https://thegfce.org/working-groups/working-group-b/
- A cyber red team oriented technical exerciseBlumbergs, Bernhards; Ottis, Rain; Vaarandi, RistoAbstracts and conference materials for the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 20192019 / p. 10-11 https://www.academic-conferences.org/conferences/eccws/eccws-future-and-past/
- Cyber security and intellectual copyrightWarren, AdrienneStudioosus2010 / lk. 20 https://www.ester.ee/record=b1558644*est
- Cyber security exercises : a comparison of participant evaluation metrics and scoring systemsCaliskan, Emin; Topgul, Oguzhan M.; Ottis, RainStrategic cyber defense : a multidisciplinary perspective2017 / p. 180-190 http://doi.org/10.3233/978-1-61499-771-9-180
- Cyber security risk analysis for a virtual assistant G2C digital service using FAIR modelDreyling III, Richard Michael; Jackson, Eric Blake; Pappel, Ingrid2021 Eighth International Conference on eDemocracy & eGovernment (ICEDEG) : Quito, Ecuador, 28-30 July 20212021 / p. 33-40 https://doi.org/10.1109/ICEDEG52154.2021.9530938
- Cyber vulnerabilities and risks of AI technologies in space applicationsBreda, Paola; Abdin, Adam; Markova, Rada; Jha, Devanshu; Carlo, Antonio; Pelin Manti, NebileIAC 2022 congress proceedings2022 / art. 70380 https://dl.iafastro.directory/event/IAC-2022/paper/70380/ https://www.scopus.com/sourceid/21100255701 https://www.scopus.com/record/display.uri?eid=2-s2.0-85167590049&origin=inward&txGid=fdc5170fba591efb80020344c1506fb8
- CyberGenomics : application of behavioral genetics in cybersecurityDomarkiene, Ingrida; Ambrozaityte, Laima; Bukauskas, Linas; Rančelis, Tautvydas; Sütterlin, Stefan; Knox, Benjamin James; Maennel, Kaie; Maennel, Olaf Manuel; Parish, Karen; Lugo, Ricardo Gregorio; Brilingaite, AgneBehavioral Sciences2021 / art. 152 https://doi.org/10.3390/bs11110152 https://www.scopus.com/sourceid/21100901748 https://www.scopus.com/record/display.uri?eid=2-s2.0-85119110515&origin=inward&txGid=6b444d33acd2bb2e4da96ce920d12a69 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=BEHAV%20SCI-BASEL&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000724051400001
- The cyber-insurance market in NorwayBahsi, Hayretdin; Franke, Ulrik; Langfeldt Friberg, EvenInformation and computer security2020 / p. 54−67 https://doi.org/10.1108/ICS-01-2019-0012 https://www.scopus.com/sourceid/21100421900 https://www.scopus.com/record/display.uri?eid=2-s2.0-85074435548&origin=inward&txGid=12cee9252a4817ceb87c31d28943e475 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=INF%20COMPUT%20SECUR&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000523034400001
- Cybersecurity considerations in autonomous shipsCho, Sungbaek; Orye, Erwin; Visky, Gabor; Prates, Vasco2022 https://ccdcoe.org/library/publications/cybersecurity-considerations-in-autonomous-ships/
- Cybersecurity in GermanySchallbruch, Martin; Skierka-Canton, Isabel2018 https://doi.org/10.1007/978-3-319-90014-8
- Cybersecurity in the era of hypercompetitiveness : can the EU meet the new challenges?Munkoe, Malthe; Mölder, HolgerRevista CIDOB d'afers internacionals2022 / p. 69-94 https://doi.org/10.24241/rcai.2022.131.2.69/en https://www.scopus.com/sourceid/21100468970 https://www.scopus.com/record/display.uri?eid=2-s2.0-85139356026&origin=inward&txGid=f7c1813debd5fb86b3fba3ca6fcfd787 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=REV%20CIDOB%20AFERS%20INF&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000879157300004
- Cybersecurity in the making – policy and law: a case study of GeorgiaNapetvaridze, Vladimeri; Chochia, ArchilInternational and comparative law review2019 / p. 155–180 https://doi.org/10.2478/iclr-2019-0019
- Cybersecurity knowledge requirements for strategic level decision makersGarcia-Granados, F.; Bahsi, HayretdinProceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 20202020 / p. 559-568 https://doi.org/
- Cybersecurity test range for autonomous vehicle shuttlesRoberts, Andrew; Snetkov, Nikita; Maennel, Olaf Manuel2021 IEEE European Symposium on Security and Privacy Workshops EuroS&PW 2021 : Virtual Conference, 6-10 September 2021 : proceedings2021 / p. 239-249 : ill https://doi.org/10.1109/EuroSPW54576.2021.00031
- Cybersecurity threats to space : from conception to the aftermathsBonnart, Sebastien; Capurso, Andrea; Carlo, Antonio; Dethlefsen, Thea Flem; Kerolle, Mclee; Lim, Jonathan; Pickard, Aaron; Russo, Antonia; Zarkan, Laetitia CesariSpace law in a networked world2023 / p. 39–101 https://doi.org/10.1163/9789004527270_004
- Cybersecurity within the curricula of informatics : the Estonian perspectiveLorenz, Birgy; Kikkas, Kaido; Sõmer, Tiia; Laugasson, EdmundInformatics in Schools. New Ideas in School Informatics :12th International Conference on Informatics in Schools : Situation, Evolution, and Perspectives, ISSEP 2019, Larnaca, Cyprus, November 18–20, 2019 : proceedings2019 / p. 159-171 https://doi.org/10.1007/978-3-030-33759-9_13 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85078566523&origin=inward&txGid=8b5160ded0859b57c6ede3aa92211611 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=LECT%20NOTES%20ARTIF%20INT&year=2005 https://www.webofscience.com/wos/woscc/full-record/WOS:000612998300013
- Cyberspace from the hybrid threat perspectiveGunneriusson, Hakan; Ottis, RainProceedings of the 12th European Conference on Information Warfare and Security : University of Jyväskylä, Finland, 11-12 July 20132013 / p. 98-105 : ill
- DACA : automated attack scenarios and dataset generationKorving, Frank; Vaarandi, RistoProceedings of the 18th International Conference on Cyber Warfare and Security, ICCWS 2023, a conference hosted by Towson University, Baltimore County, Maryland, USA, 9-10 March 20232023 / p. 550-559 : ill https://papers.academic-conferences.org/index.php/iccws/article/download/962/938 https://doi.org/10.34190/iccws.18.1.962
- DADS : decentralized attestation for device swarmsWedaj, Samuel; Paul, Kolin; Ribeiro, Vinay J.ACM Transactions on Privacy and Security2019 / Art. 19 https://doi.org/10.1145/3325822 https://www.scopus.com/sourceid/21100832567 https://www.scopus.com/record/display.uri?eid=2-s2.0-85069542029&origin=inward&txGid=fa88de5f62f2c5949433e431a8d2cb2c https://jcr.clarivate.com/jcr-jp/journal-profile?journal=ACM%20T%20PRIV%20SECUR&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000497128700005
- Dances with the Illuminati: Hands on social engineering in a classroom settingMäses, Sten; Lorenz, Birgy; Kikkas, Kaido; Karmo, KristjanNew Perspectives in Behavioral Cybersecurity: Human Behavior and Decision-Making Models2024 / 7 p https://doi.org/10.1201/9781003415060-7
- Dauri Kivipuur: andmekaitsest riigihaldusesKivipuur, Daurierr.ee2024 https://www.err.ee/1609464682/dauri-kivipuur-andmekaitsest-riigihalduses
- Demüstifitseerime küberturvalisuseSõmer, TiiaKüberturvalisus : Äripäeva lisa2022 / Lk. 14 https://www.aripaev.ee/lisa/2022/04/21/kuberturvalisus-21042022 https://www.ester.ee/record=b1071975*est
- Design and implementation of an availability scoring system for cyber defence exercisesPihelgas, Mauno14th International Conference on Cyber Warfare and Security (ICCWS 2019) : Stellenbosch University, South Africa, 28 February - 1 March 2019 : Proceedings2019 / p. 329-337 http://toc.proceedings.com/48113webtoc.pdf https://www.scopus.com/record/display.uri?eid=2-s2.0-85066032298&origin=inward&txGid=0054d2c417c19713bb59ad61ab1bfe98
- Design and verification of secure cache wrapper against access-driven side-channel attacksNiazmand, Behrad; Azad, Siavoosh Payandeh; Jervan, Gert; Sepulveda, JohannaEuromicro Conference on Digital System Design : DSD 2019 : 28 - 30 August 2019 Kallithea, Chalkidiki, Greece : proceedings2019 / p. 672-676 : ill https://doi.org/10.1109/DSD.2019.00108
- Detecting and mitigating Low-and-Slow DoS attacks in NoC-based MPSoCsChaves Arroyave, Cesar Giovanni; Azad, Siavoosh Payandeh; Sepulveda, Johanna; Hollstein, Thomas2019 14th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC) : July 1-3 2019, York - United Kingdom : proceedings2019 / p. 82-89 : ill https://doi.org/10.1109/ReCoSoC48741.2019.9034934
- Developing autonomous robotic transport systems for hospitals and medical facilities : legal challengesKerikmäe, Tanel; Kajander, Aleksi Oskar Johannes; Hamulak, Ondrej; Mesarčik, Matuš; Andraško, Jozef; Liiv, InnarIcon2023 / p. 88-104 https://www.icohtec.org/icon/volume-28-issue-2-2023/ https://doi.org/10.11590/icon.2023.2.04 https://www.scopus.com/sourceid/19600156834 https://www.scopus.com/record/display.uri?eid=2-s2.0-85187914139&origin=inward&txGid=fb06f425231d5fd351946401eaa5fb26
- Developing military cyber workforce in a conscript armed forces : recruitment, challenges and optionsSõmer, Tiia; Lorenz, Birgy; Ottis, Rain14th International Conference on Cyber Warfare and Security (ICCWS 2019) : Stellenbosch University, South Africa, 28 February - 1 March 2019 : proceedings2019 / p. 413−421 http://toc.proceedings.com/48113webtoc.pdf https://www.scopus.com/record/display.uri?eid=2-s2.0-85066019052&origin=inward&txGid=a9224afef0d40334bef2220d87b6580e
- Diagnosing DoS attacks in NoC-based MPSoCsChaves Arroyave, Cesar Giovanni; Azad, Siavoosh Payandeh; Hollstein, Thomas; Sepulveda, JohannaTestmethoden und Zuverlässigkeit von Schaltungen und Systemen, TUZ 20192019 / p. [39–41] https://www.researchgate.net/publication/333756736
- Digitaalne heaolu ja vaimne tervisLeikop, MadliÕpetajate Leht2024 / Lk. 6 https://dea.digar.ee/article/opetajateleht/2024/01/30/8.1 https://opleht.ee/2024/01/digitaalne-heaolu-ja-vaimne-tervis/
- Digital development of the European Union : an interdisciplinary perspective2023 https://doi.org/10.1007/978-3-031-27312-4 https://www.ester.ee/record=b5557935*est
- Digital routes and borders in the Middle East : the geopolitical underpinnings of internet connectivityDouzet, Frédérick; Pétiniaud, Louis; Salamatian, Mohammad Reza Kave; Samaan, Jean-LoupTerritory, Politics, Governance2023 / p. 1059 - 1080 https://doi.org/10.1080/21622671.2022.2153726 https://www.scopus.com/sourceid/21100463834 https://www.scopus.com/record/display.uri?eid=2-s2.0-85144253562&origin=resultslist&sort=plf-f&src=s&sid=443787aa9b1ca10ee6304e8733795725&sot=b&sdt=b&s=TITLE%28%22Digital+routes+and+borders+in+the+Middle+East%3A+the+geopolitical+underpinnings+of+Internet+connectivity%22%29&sl=266&sessionSearchId=443787aa9b1ca10ee6304e8733795725&relpos=0 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=TERRIT%20POLIT%20GOV&year=2023 https://www.webofscience.com/wos/woscc/full-record/WOS:000898554800001
- Digiturvalise kooli hindamine ja statuutLorenz, Birgy; Baum, Anu2022 https://drive.google.com/file/d/1quconUMvKztEwhwEBt2E8ohxqDLQwKbf/view
- Doktoritöö: digiriigi turvalisuse pant on sektorite koostööHarrik, Airikaerr.ee2023 https://novaator.err.ee/1609126409/doktoritoo-digiriigi-turvalisuse-pant-on-sektorite-koostoo https://digikogu.taltech.ee/et/Item/e555dd12-dcfd-482f-9a46-908a9bf2cdb0 https://www.ester.ee/record=b5568988*est
- Doktoritöö: satelliitide turvalisus on jäänud ohtlikult vaeslapse ossaHarrik, Airika; Carlo, Antonionovaator.err.ee2024 https://novaator.err.ee/1609388498/doktoritoo-satelliitide-turvalisus-on-jaanud-ohtlikult-vaeslapse-ossa https://digikogu.taltech.ee/et/Item/aef0d0fa-b76a-431f-800a-0b6b2ba0da74 https://doi.org/10.23658/taltech.32/2024
- Domain engineering for cyber defense: a case study and implicationsTepandi, Jaak; Piho, Gunnar; Liiv, InnarConference on Cyber Conflict : proceedings 20102010 / p. 59-77
- Dual-use cyber tools and the EU’s narrative construction on cybersecurity capacity buildingKasper, AgnesIDEAS : Interdisciplinary conference on European Advanced Studies : (Dis)integration from an (in)equality perspective2022 / p. 12 https://www.iee-ulb.eu/content/uploads/2022/05/FINAL-Conference-Programme-IDEAS-with-abstracts.pdf
- Dynamic and distributed security management for NoC Based MPSoCsAzad, Siavoosh Payandeh; Jervan, Gert; Sepulveda, JohannaComputational Science - ICCS 2019 : 19th International Conference, Faro, Portugal, June 12-14, 2019 : Proceedings, Part II2019 / p. 649–662 : ill https://doi.org/10.1007/978-3-030-22741-8_4 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85067702894&origin=inward&txGid=a2b61e312da8739de4a11bd2bea7f959 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=LECT%20NOTES%20ARTIF%20INT&year=2005 https://www.webofscience.com/wos/woscc/full-record/WOS:000589290600046
- Early detection of network attacks using deep learningAhmad, Tanwir; Truscan, Dragos; Vain, Jüri; Porres, Ivan2022 IEEE 15th International Conference on Software Testing, Verification andValidation Workshops : ICSTW 2022, 4–13 April 2022, Virtual Event : proceedings2022 / p. 30-39 https://doi.org/10.1109/ICSTW55395.2022.00020 https://arxiv.org/pdf/2201.11628.pdf
- EARLY: a tool for real-time security attack detectionAhmad, Tanwir; Truscan, Dragos; Vain, JüriCyberSecurity in a DevOps Environment: From Requirements to Monitoring2024 / p. 225-251 https://doi.org/10.1007/978-3-031-42212-6_8 https://www.scopus.com/record/display.uri?eid=2-s2.0-85194996402&origin=resultslist&sort=plf-f&src=s&sot=b&sdt=b&s=DOI%2810.1007%2F978-3-031-42212-6_8%29&sessionSearchId=0b9f9fcd32592ba1f53a2482eaa5a072&relpos=0
- Educational computer game for cyber security : game concept [Online resource]Sõmer, TiiaProceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology2015 / p. 17-19 http://cybercentre.cs.ttu.ee/en/icr2015/
- Eesti arendusettevõte Cybernetica annab võimaluse areneda oma ala professionaaliksituudised.ee2023 https://www.ituudised.ee/sisuturundus/2023/03/17/eesti-arendusettevote-cybernetica-annab-voimaluse-areneda-oma-ala-professionaaliks
- Eesti IT-firma töötaja sai riigilt pea miljoni e-hääletamise turvalisuse uurimiseksKald, Indrekituudised.ee2024 https://www.ituudised.ee/uudised/2024/02/16/eesti-it-firma-tootaja-sai-riigilt-pea-miljoni-e-haaletamise-turvalisuse-uurimiseks
- Eesti kaitsetööstus on kümne aastaga kujunenud tugevaks majandusharuksRänisoo, TarmoPostimees2021 / Lk. 18-19 : fot https://dea.digar.ee/article/postimees/2021/02/25/15.2
- Eesti laevandusettevõtted ei ole küberturvalisusele piisavalt tähelepanu pööranudHeering, DanMeremees. Veeteede Ameti teataja2017 / lk. 10-13 : fot http://www.ester.ee/record=b4646644*est https://issuu.com/ajakirimeremees/docs/meremees_2017_4-4._va_teataja_2017_
- Eesti loodab hakata kosmoses liiklust reguleerima ja satelliite turvamaParksepp, AnetteEesti Päevaleht2020 / Lk. 6-7 : ill https://dea.digar.ee/article/eestipaevaleht/2020/09/09/8.1
- Eesti suurima küberkaitse talentide võistluse võitis TalTechi tudengLorenz, BirgyElektriala2023 / lk. 23 https://www.ester.ee/record=b1240496*est
- Eesti teadlane tegi küberkuritegevuse uurimise mudeli, mis toob küberpätid valguse kätte [Võrguväljaanne]postimees.ee2022 https://teadus.postimees.ee/7514987/eesti-teadlane-tegi-kuberkuritegevuse-uurimise-mudeli-mis-toob-kuberpatid-valguse-katte
- Eesti teadlased tegid tarkvara, mis ennetab küberrünnakuidPihel, Hele-Riinpostimees.ee2023 https://tehnika.postimees.ee/7888716/eesti-ja-soome-teadlased-tegid-tarkvara-mis-ennetab-kuberrunnakuid
- Eestis luuakse merenduse küberturbe keskusTransport ja Logistika : infoleht2020 / lk. 12 https://www.ester.ee/record=b1975868*est
- Eestist pärit Rangeforce teeb küberkaitse õpetamises revolutsiooni, klientideks USA suur militaarmaja ja juhtiv meediafirmaVogelberg, Jaanusdigipro.geenius.ee2023 https://digipro.geenius.ee/eksklusiiv/eestist-parit-rangeforce-teeb-kuberkaitse-opetamises-revolutsiooni-klientideks-usa-suur-militaarmaja-ja-juhtiv-meediafirma/
- Eetiline Häkker – Kriitilise tähtsusega ettevõtted ja küberturbe survepostimees.ee2024 https://www.postimees.ee/8120592/eetiline-hakker-kriitilise-tahtsusega-ettevotted-ja-kuberturbe-surve
- An efficient authentication and key agreement scheme for secure smart grid communication servicesHammami, Hamza; Obaidat, Mohammad S.; Ben Yahia, SadokInternational journal of communication systems2020 / art. e4558, p. 1−13 https://doi.org/10.1002/dac.4558 https://www.scopus.com/sourceid/17964 https://www.scopus.com/record/display.uri?eid=2-s2.0-85088841456&origin=inward&txGid=12b954376ee75fd8b48ae070fa13cade https://jcr.clarivate.com/jcr-jp/journal-profile?journal=INT%20J%20COMMUN%20SYST&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000554412600001
- E-Governance in the European Union : strategies, tools, and implementation2024 https://doi.org/10.1007/978-3-031-56045-3 https://www.ester.ee/record=b5703480*est
- Ekspert: eestlastel on olemas teadmised küberturvalisusest, kuid millegipärast neid ei kasutata [Võrguväljaanne]Baum, Anugeenius.ee2022 https://digipro.geenius.ee/blogi/dokobiti-blogi/ekspert-eestlastel-on-olemas-teadmised-kuberturvalisusest-kuid-millegiparast-neid-ei-kasutata/
- Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings2020 https://doi.org/10.1007/978-3-030-60347-2
- Enhancing cyber defense situational awareness using 3D visualizationsKullman, Kaur; Cowley, Jennifer; Ben-Ashe, Noam13th International Conference on Cyber Warfare and Security (ICCWS 2018), Washington, DC, USA, 8 – 9 March 20182018 / p. 369-378 http://toc.proceedings.com/38822webtoc.pdf
- Enhancing IoT botnet attack detection in SOCs with an explainable active learning frameworkKalakoti, Rajesh; Nõmm, Sven; Bahsi, Hayretdin2024 IEEE World AI IoT Congress (AIIoT)2024 / p. 265 - 272 https://doi.org/10.1109/AIIoT61789.2024.10578957 https://www.scopus.com/record/display.uri?eid=2-s2.0-85198830955&origin=resultslist&sort=plf-f&src=s&sot=b&sdt=b&s=DOI%2810.1109%2FAIIoT61789.2024.10578957%29&sessionSearchId=45c919fe8ff54496e2ffa842f2ed2798&relpos=0 https://www.webofscience.com/wos/woscc/full-record/WOS:001289206000039
- Enhancing response selection in impact estimation approachesOjamaa, AndresInfo- ja kommunikatsioonitehnoloogia doktorikooli IKTDK neljanda aastakonverentsi artiklite kogumik : 26.-27. novembril 2010, Essu mõis2010 / lk. 137-140 : ill
- Enhancing the cyber resilience of sea dronesOrye, Erwin; Visky, Gabor; Rohl, Alexander; Maennel, Olaf ManuelCyCon 2024 : Over the Horizon 16th International Conference on Cyber Conflict2024 / p. 83-102 https://ccdcoe.org/uploads/2024/05/CyCon_2024_Orye_Visky_Rohl_Maennel-1.pdf
- Enneta küberkurjategijat tema järgmist sammu ette nähesZirnask, VilluFinantsjuhtimine : infoleht2022 / lk. 8 http://www.ester.ee/record=b2082311*est https://digikogu.taltech.ee/et/Item/5c41eec5-0c88-43c8-9294-c9f47e7c438b
- Enneta küberkurjategijat tema järgmist sammu ette nähes [Võrguväljaanne]Zirnask, Villufinantsuudised.ee2020 https://www.finantsuudised.ee/uudised/2022/05/03/enneta-kuberkurjategijat-tema-jargmist-sammu-ette-nahes
- Ensuring Cybersecurity in Shipping: Reference to Estonian ShipownersHeering, DanTransNav : the international journal on marine navigation and safety of sea transportation2020 / p. 271−278 https://doi.org/10.12716/1001.14.02.01 https://www.scopus.com/sourceid/21100914186 https://www.scopus.com/record/display.uri?eid=2-s2.0-85090748161&origin=inward&txGid=e02fb02aa35d98b193218e651e28f2db https://jcr.clarivate.com/jcr-jp/journal-profile?journal=TRANSNAV&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000581153700001
- Enterprise security analysis and training experienceOjamaa, Andres; Tõugu, EnnCritical Information Infrastructures Security : 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014 : revised selected papers2016 / p. 200-208 : ill https://doi.org/10.1007/978-3-319-31664-2_21 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-84962339704&origin=inward&txGid=93705dc9e805a0d31ab488dfd81dcaec https://jcr.clarivate.com/jcr-jp/journal-profile?journal=LECT%20NOTES%20ARTIF%20INT&year=2005 https://www.webofscience.com/wos/woscc/full-record/WOS:000515658100021
- Envisioning the future renewable and resilient energy grids – a power grid revolution enabled by renewables, energy storage, and energy electronicsPeng, Fang Zheng; Liu, Chen-Ching; Li, Yuan; Jain, Akshay Kumar; Vinnikov, DmitriIEEE journal of emerging and selected topics in industrial electronics2024 / p. 8-26 https://doi.org/10.1109/JESTIE.2023.3343291
- E-residency as the Estonian e-government Éclat : how more security can result in less privacy [Online resource]Särav, SandraProceedings of the 2nd Interdisciplinary Cyber Research Workshop 20162016 / p. 39-41 http://cybercentre.cs.ttu.ee/wp/wp-content/uploads/2016/03/CRW_2016_lingitud.pdf http://www.ester.ee/record=b4579694*est
- Establishing cyber sovereignty - Russia follows China's example [Online resource]Venables, Adrian NicholasRahvusvaheline Kaitseuuringute Keskus (RKK) = International Centre for Defence and Security (ICDS)2019 https://icds.ee/en/establishing-cyber-sovereignty-russia-follows-chinas-example/
- Estonia’s cyber defence league : a model for the United States?Cardash, Sharon L.; Cilluffo, Frank J.; Ottis, RainStudies in conflict & terrorism2013 / p. 777-787 https://doi.org/10.1080/1057610X.2013.813273 https://www.scopus.com/sourceid/200147101 https://www.scopus.com/record/display.uri?eid=2-s2.0-84883341345&origin=resultslist&sort=plf-f&src=s&sot=b&sdt=b&s=DOI%2810.1080%2F1057610X.2013.813273%29&sessionSearchId=09c53dd41ef9fa4501d393829f4e1654 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=STUD%20CONFL%20TERROR&year=2013 https://www.webofscience.com/wos/woscc/full-record/WOS:000323363800005
- Estonian president stresses support for Ukraine at meeting with Cypriot colleague [Online resource]baltictimes.com2022 https://www.baltictimes.com/estonian_president_stresses_support_for_ukraine_at_meeting_with_cypriot_colleague/
- Estonian scientists create a drone solution to help victims of terrorist attacks [Online resource]Hankewitz, Stenestonianworld.com2021 https://estonianworld.com/technology/estonian-scientists-create-a-drone-solution-to-help-victims-of-terrorist-attacks/
- EU Common position on international law and cyberspaceOsula, Anna-Maria; Kasper, Agnes; Kajander, Aleksi Oskar JohannesMasaryk University journal of law and technology2022 / p. 89-123 https://doi.org/10.5817/MUJLT2022-1-4 https://www.scopus.com/sourceid/21100255068 https://www.scopus.com/record/display.uri?eid=2-s2.0-85134742747&origin=inward&txGid=4d2672af333a7babf97a40094552a0db
- EU cybersecurity governance – stakeholders and normative intentions towards integrationKasper, AgnesThe future of the European Union : demisting the debate2020 / p. 166−185 https://www.um.edu.mt/library/oar/handle/123456789/52308 https://www.um.edu.mt/library/oar/bitstream/123456789/52308/1/EU_cybersecurity_governance%e2%80%93stakeholders_and_normative_intentions_towards_integration_2020.pdf
- EU legal framework of digital security vulnerabilitiesKasper, Agnes; Madi-Nator, AnettLegal issues of digitalisation, robotization and cyber security in the light of EU Law2024 / p. 211-231 https://law-store.wolterskluwer.com/s/product/legal-issues-of-digitalisation-robotization-and-cyber-security-in-the/01tPg000004QY29IAG
- Evaluating cybersecurity-related competences through serious gamesMäses, Sten19th Koli Calling Conference on Computing Education Research Koli Calling 2019 : November 21-24, 2019, Koli, Finland : proceedings2019 / 2 p https://doi.org/10.1145/3364510.3366163 https://www.scopus.com/sourceid/11600154611 https://www.scopus.com/record/display.uri?eid=2-s2.0-85076767047&origin=inward&txGid=8c79dad9e11f6186c0d9d2a5d83e12da https://www.webofscience.com/wos/woscc/full-record/WOS:000558063700040
- Evaluating cybersecurity-related competences through simulation exercises = Küberturbe-alaste kompetentside hindamine simulatsiooniharjutuste abilMäses, Sten2020 https://www.ester.ee/record=b5384385*est https://digikogu.taltech.ee/et/Item/b4c33d3b-e7ce-48ad-98ad-a0add5e571a3
- Event management and incident response framework for small companies [Online resource]Kont, MarkusProceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology2015 / p. 52-53 http://cybercentre.cs.ttu.ee/en/icr2015/
- Exercise Neptune : maritime cybersecurity training using the navigational simulatorsLovell, Kieren NicolasProceedings of the 5th Interdisciplinary Cyber Research Conference 2019 : 29th of June 2019, Tallinn University of Technology2019 / p. 34-37 https://www.ester.ee/record=b5238490*est
- Expert knowledge elicitation for skill level categorization of attack pathsMezešova, Terezia; Bahsi, HayretdinCyber science 2018 : conference programme2018 / p. 29 https://www.c-mric.com/wp-content/uploads/2018/04/20180611-Cyber-Science-2018-Event-Brochure-DRAFT-v0.6.pdf
- Expert knowledge elicitation for skill level categorization of attack pathsMezešova, Terezia; Bahsi, Hayretdin2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)2019 / 8 p. : tab https://doi.org/10.1109/CyberSecPODS.2019.8885192
- Experts: GPS jamming not to blame for Vilnius DHL cargo plane crasherr.ee2024 https://news.err.ee/1609532785/experts-gps-jamming-unlikely-to-be-cause-of-vilnius-dhl-cargo-plane-crash
- Exploring historical maritime cyber-attacks and introducing maritime security operations center as a solution to mitigate themNasr, Ahmed Nagi Abdelaziz Mohamed; Leiger, Roomet; Zaitseva-Pärnaste, Inga; Kujala, Pentti Jouko SakariTheory and practice of shipbuilding2024 / p. 235-245 https://doi.org/10.3233/PMST240042
- An extended review on cyber vulnerabilities of AI technologies in space applications: Technological challenges and international governance of AIBreda, Paola; Markova, Rada; Abdin, Adam; Mantı, Nebile Pelin; Carlo, Antonio; Jha, DevanshuJournal of space safety engineering2023 / p. 447-458 : ill https://doi.org/10.1016/j.jsse.2023.08.003 https://www.scopus.com/sourceid/21100871641 https://www.scopus.com/record/display.uri?eid=2-s2.0-85168485820&origin=inward&txGid=06a8215718d747a62e82a586db69bb74 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=J%20SPACE%20SAF%20ENG&year=2023 https://www.webofscience.com/wos/woscc/full-record/WOS:001115868500001
- Facebooki katkestus mõjutas nii ettevõtete kui ka riikide toimepidevust [Võrguväljaanne]Pärli, Merilinerr.ee2021 https://www.err.ee/1608366537/facebooki-katkestus-mojutas-nii-ettevotete-kui-ka-riikide-toimepidevust
- Facebooki, Instagrami ja Whatsappi tabas tohutu ülemaailmne rike [Võrguväljaanne]ohtuleht.ee2021 https://www.ohtuleht.ee/1045099/facebooki-instagrami-ja-whatsappi-tabas-tohutu-ulemaailmne-rike
- Finland wins cyber defence exercise Locked Shields 2022 [Online resource]news.err.ee2022 https://news.err.ee/1608573799/finland-wins-cyber-defense-exercise-locked-shields-2022
- ForewordJakobson, Gabriel; Ottis, Rain2016 : 8th International Conference on Cyber Conflict : Cyber Power : 31 May-3 June 2016, Tallinn, Estonia2016 / p. [i]
- ForewordJakobson, Gabriel; Ottis, Rain5th International Conference on Cyber Conflict : 4-7 June 2013, Tallinn, Estonia : proceedings2013 / p. vi-viii
- ForewordJakobson, Gabriel; Ottis, Rain2015 7th International Conference on Cyber Conflict : Architectures in Cyberspace : 26-29 May 2015, Tallinn, Estonia2015 / p. i http://www.ester.ee/record=b4459022*est https://ccdcoe.org/sites/default/files/multimedia/pdf/CyCon_2015_book.pdf
- Formal methods based security for cloud-based manufacturing cyber physical systemMuniasamy, Kandasamy; Srinivasan, Seshadhri; Vain, Jüri; Sethumadhavan, M.IFAC-PapersOnLine2019 / p. 1198-1203 https://doi.org/10.1016/j.ifacol.2019.11.361 https://www.scopus.com/sourceid/21100456158 https://www.scopus.com/record/display.uri?eid=2-s2.0-85078940356&origin=inward&txGid=ab5536685faa3ef111dc7258df7535d9 https://www.webofscience.com/wos/woscc/full-record/WOS:000504282400204
- 14th International Conference on Cyber Conflict : Keep Moving2022 https://ccdcoe.org/uploads/2022/06/CyCon_2022_book.pdf
- Framework for industrial control systems digital forensics in the energy sectorRoberts, AndrewProceedings of the 5th Interdisciplinary Cyber Research Conference 2019 : 29th of June 2019, Tallinn University of Technology2019 / p. 24-26 https://www.ester.ee/record=b5238490*est
- Frankenstack : real-time cyberattack detection and feedback system for technical cyber exercisesPihelgas, Mauno; Kont, MarkusProceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings2021 / p. 396-402 https://doi.org/10.1109/CSR51186.2021.9527923
- Frankenstack : toward real-time red team feedbackKont, Markus; Pihelgas, Mauno; Maennel, Kaie; Blumbergs, Bernhards; Lepik, ToomasMILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 20172017 / p. 400-405 : ill https://doi.org/10.1109/MILCOM.2017.8170852 https://www.scopus.com/sourceid/87683 https://www.scopus.com/record/display.uri?eid=2-s2.0-85042381606&origin=inward&txGid=74a20251627c1988d3da254ffb684e70 https://www.webofscience.com/wos/woscc/full-record/WOS:000426935700069
- From simple scoring towards a meaningful interpretation of learning in cybersecurity exercisesErnits, Margus; Mäses, Sten; Lepik, Toomas; Maennel, Olaf ManuelProceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 20202020 / p. 135-143 https://doi.org/10.34190/ICCWS.20.046
- From text mining to evidence team learning in cybersecurity exercisesMaennel, Kaie; Joonsoo, Kim; Sütterlin, StefanCompanion Proceedings of the 10th International Conference on Learning Analytics & Knowledge (LAK20) : Cyberspace, March 23-27, 20202020 / p. 107-109 https://lak20.solaresearch.org
- Gamification as a neuroergonomic approach to improving interpersonal situational awareness in cyber defenseAsk, Torvald F.; Knox, Benjamin James; Lugo, Ricardo Gregorio; Hoffmann, Lukas; Sütterlin, StefanFrontiers in education2023 / art. 988043, 16 p. : ill https://doi.org/10.3389/feduc.2023.988043 https://www.scopus.com/sourceid/21100935978 https://www.scopus.com/record/display.uri?eid=2-s2.0-85164508991&origin=inward&txGid=ceffb445dac1c155904690a5ea04dffc https://jcr.clarivate.com/jcr-jp/journal-profile?journal=FRONT%20EDUC&year=2023 https://www.webofscience.com/wos/woscc/full-record/WOS:001019244300001
- Gaps in European Cyber Education and Professional Training WG5 I Education : training, awareness, cyber ranges [Online resource]Maennel, Olaf Manuel; Csaba, Virag2018 https://www.ecs-org.eu/documents/publications/5bf7e01bf3ed0.pdf
- Gert Jervan: Tehisintellektiga on praegu nii nagu kunagi tuumarelvadega – tõestada, et me suudame seda tehaTammepuu, Kadri; Jervan, Gerttv.postimees.ee2023 https://tv.postimees.ee/7744003/otse-postimehest-gert-jervan-tehisintellektiga-on-praegu-nii-nagu-kunagi-tuumarelvadega-toestada-et-me-suudame-seda-teha
- Ghost injection attack on automatic dependent surveillance–broadcast equipped drones impact on human behaviourHaddad, Yazeed; Orye, Erwin; Maennel, Olaf Manuel2021 IEEE International Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA) : Virtual Conference, 14-22 May 2021 : proceedings2021 / p. 161-166 https://doi.org/10.1109/CogSIMA51574.2021.9475928
- A global survey of standardization and industry practices of automotive cybersecurity validation and verification testing processes and toolsRoberts, Andrew; Marksteiner, Stefan; Soyturk, Mujdat; Yaman, Berkay; Yang, YiSAE international journal of connected and automated vehicles2023 / art. 12-07-02-0013 https://doi.org/10.4271/12-07-02-0013 https://www.scopus.com/sourceid/21101041536 https://www.scopus.com/record/display.uri?eid=2-s2.0-85180776391&origin=inward&txGid=357b3a33a3fe0d58bfa4acdf8be71b6d
- Going digital, staying secure : cyber ERM activities in a post-pandemic setupCarlo, Antonio; Casamassima, FrancescaIAC 2022 congress proceedings2022 / art. 70417 https://iafastro.directory/iac/paper/id/70417/summary/ https://www.scopus.com/sourceid/21100255701 https://www.scopus.com/record/display.uri?eid=2-s2.0-85167618367&origin=inward&txGid=c5893d0f39d4486eaad46a61fa052157
- Governance of cyber-security in Internet-based elections [Online resource]Krimmer, Robert Johannes; Rincon Mendez, Angelica Marina; Meyerhoff Nielsen, MortenProceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology2015 / p. 7-9 http://cybercentre.cs.ttu.ee/en/icr2015/
- Ground Station as a Service : a space cybersecurity analysisMeyrick, Evan; Pickard, Aaron; Rahloff, Tobias; Bonnart, Sebastien; Carlo, Antonio; Thangavel, KathiravanIAC 2021 congress proceedings2021 / art. 66555 https://dl.iafastro.directory/event/IAC-2021/paper/66555/
- Hacking on the high seas: How automated reverse-engineering can assist vulnerability discovery of a proprietary communication protocolVisky, Gabor; Rohl, Alexander; Vaarandi, Risto; Katsikas, Sokratis; Maennel, Olaf Manuel2024 IEEE 49th Conference on Local Computer Networks (LCN)2024 / 7 p https://doi.org/10.1109/LCN60385.2024.10639746
- Heightened cyber vulnerability to patients with cardiac implantable electronic devicesTorgersen, Leanne N.S.; Whitaker, Rupert E.D.; Lugo, Ricardo Gregorio; Sütterlin, Stefan; Schulz, Stefan M.HCI International 2023 Posters : 25th International Conference on Human-Computer Interaction, HCII 2023, Copenhagen, Denmark, July 23–28, 2023, Proceedings, Part I2023 / p. 519-528 https://doi.org/10.1007/978-3-031-35989-7_66 https://www.scopus.com/sourceid/17700155007 https://www.scopus.com/record/display.uri?eid=2-s2.0-85171390259&origin=inward&txGid=49ca03626467439d65de3af5f81682f3
- How could Snowden attack an election?Wikström, Douglas; Barrat, Jordi; Heiberg, Sven; Krimmer, Robert Johannes; Schürmann, CarstenElectronic Voting : Second International Joint Conference, E-Vote-ID 2017 : Bregenz, Austria, October 24-27, 2017 : proceedings2017 / p. 280-291 https://doi.org/10.1007/978-3-319-68687-5_17 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85032467272&origin=inward&txGid=9cdfd4b1cb2fa1175b73601532d7f912 https://www.webofscience.com/wos/woscc/full-record/WOS:000612986000017
- How to build a SOC on a budgetVaarandi, Risto; Mäses, Sten2022 IEEE International Conference on Cyber Security and Resilience (CSR)2022 / p. 171-177 : ill https://doi.org/10.1109/CSR54599.2022.9850281
- The human factor in cyber security education : editorialLugo, Ricardo Gregorio; Sütterlin, Stefan; Knox, Benjamin James; Bukauskas, Linas; Brilingaitė, Agnė; Maennel, Olaf ManuelFrontiers in education2023 / art. 1277282, 2 p https://doi.org/10.3389/feduc.2023.1277282 https://www.scopus.com/sourceid/21100935978 https://www.scopus.com/record/display.uri?eid=2-s2.0-85176437961&origin=inward&txGid=ff714bd5e80d685fcd8979eb44d5cbd3 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=FRONT%20EDUC&year=2023 https://www.webofscience.com/wos/woscc/full-record/WOS:001103598800001
- Human-centric approach to cyber threat identification : The role of cognition, experience, and education in decision-makingLugo, Ricardo Gregorio; Juozapavicius, Ausrius; Lapin, Kristina; Ask, Torvald F.; Knox, Benjamin James; Sütterlin, StefanJournal of cases on information technology2025 / 13 p https://doi.org/10.4018/JCIT.368220
- Human-human communication in cyber threat situations: a systematic reviewAsk, Torvald F.; Lugo, Ricardo Gregorio; Knox, Benjamin James; Sütterlin, StefanHCI International 2021 - late breaking papers : cognition, inclusion, learning, and culture : 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021 : proceedings2021 / p. 21-43 : ill https://doi.org/10.1007/978-3-030-90328-2_2 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85119845944&origin=inward&txGid=2fd33497f6ec27d79d84f440c89f5a25 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=LECT%20NOTES%20ARTIF%20INT&year=2005 https://www.webofscience.com/wos/woscc/full-record/WOS:000765928500002
- Hybrid cybersecurity research and education environment for maritime sectorVisky, Gabor; Šiganov, Aleksei; Rehman, Muaan ur; Vaarandi, Risto; Bahsi, Hayretdin; Tsiopoulos, Leonidas2024 IEEE International Conference on Cyber Security and Resilience (CSR) : proceedings2024 / p. 644-651 https://doi.org/10.1109/CSR61664.2024.10679392
- IaaS platforms : how secure are they?Astrova, Irina; Koschel, Arne; Henke, Mats LennartIEEE 30th International Conference on Advanced Information Networking and Applications Workshops : WAINA 2016 : 23-25 March 2016, Crans-Montana, Switzerland : proceedings2016 / p. 843-848 : ill https://doi.org/10.1109/WAINA.2016.22
- Identifying building blocks of Internet voting : preliminary findingsKrimmer, Robert Johannes44. Jahrestagung der Gesellschaft für Informatik : INFORMATIK 2014 : Big Data - Komplexität meistern : 22.-26. September 2014 in Stuttgart, Deutschland2014 / p. 1381-1389 : ill
- Impact assessment of cyber actions on missions or business processes : a systematic literature reviewBahsi, Hayretdin; Udokwu, Chibuzor; Tatar, Unal; Norta, AlexanderProceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018 : National Defence University, Washington DC, USA, 6-9 March 20182018 / p. 11-20 : ill http://toc.proceedings.com/38822webtoc.pdf
- The impact of perceived security on intention to use E-learning among studentsFarooq, Ali; Ahmad, Farhan; Khadam, Nyla; Lorenz, Birgy; Isoaho, JouniProceedings IEEE 20th International Conference on Advanced Learning Technologies, ICALT 2020 : 6–9 July 2020, Online2020 / p. 360-364 https://doi.org/10.1109/ICALT49669.2020.00115
- Impact of space systems capabilities and their role as critical infrastructureCarlo, Antonio; Breda, PaolaInternational journal of critical infrastructure protection2024 / art. 100680, 11 p. : ill https://doi.org/10.1016/j.ijcip.2024.100680
- The importance of cybersecurity frameworks to regulate emergent AI technologies for space applicationsCarlo, Antonio; Manti, Nebile Pelin; Bintang, A. S. W. A. M.; Casamassima, Francesca; Boschetti, Nicolo; Breda, Paola; Rahloff, TobiasJournal of space safety engineering2023 / p. 474-482 : ill https://doi.org/10.1016/j.jsse.2023.08.002 https://www.scopus.com/sourceid/21100871641 https://www.scopus.com/record/display.uri?eid=2-s2.0-85169561634&origin=inward&txGid=d3135e1dcafc0e8a654c588e80fc749d https://jcr.clarivate.com/jcr-jp/journal-profile?journal=J%20SPACE%20SAF%20ENG&year=2023 https://www.webofscience.com/wos/woscc/full-record/WOS:001115892000001
- Improving and measuring learning effectiveness at cyber defense exercisesMaennel, Kaie; Ottis, Rain; Maennel, Olaf ManuelSecure IT Systems : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017 : proceedings2017 / p. 123-138 : ill https://doi.org/10.1007/978-3-319-70290-2_8 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85034211753&origin=inward&txGid=1517116306474ed336532406336864c1 https://www.webofscience.com/wos/woscc/full-record/WOS:000454482600009
- Improving learning efficiency and evaluation fairness for cyber security courses : a case studyCaliskan, Emin; Vaarandi, Risto; Lorenz, BirgyIntelligent Computing : Proceedings of the 2019 Computing Conference. Volume 22019 / p. 622-638 https://doi.org/10.1007/978-3-030-22868-2_45 https://www.scopus.com/sourceid/5100152904 https://www.scopus.com/record/display.uri?eid=2-s2.0-85069542250&origin=inward&txGid=e8ce1dc2fdb492972d2feda16758b37a
- In search of a coherent international approach to governing technologies [online resource]Osula, Anna-MariaDigital frontiers2021 https://www.orfonline.org/expert-speak/international-approach-to-governing-technologies/
- Information aggression - a battlefield of smartphonesNyman-Metcalf, Katrin MerikeThe Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood2021 / p. 195-211 https://doi.org/10.1007/978-3-030-73955-3_10 https://www.ester.ee/record=b5434182*est
- Information security interoperability framework, version 2Tepandi, JaakEstonian information society yearbook 2011/20122012 / p. 46-47
- Infoturbe koosvõime raamistiku ver 2Tepandi, JaakEesti infoühiskonna aastaraamat 2011/20122012 / lk. 46-47
- Insider threat detection study [Online resource]Kont, Markus; Pihelgas, Mauno; Wojtkowiak, Jesse; Trinberg, Lorena; Osula, Anna-Maria2015 https://ccdcoe.org/sites/default/files/multimedia/pdf/Insider_Threat_Study_CCDCOE.pdf
- Inteligencia Artificial : Desafíos reglamentarios en el contexto de la protección de datos personales y la seguridad cibernética en la Unión EuropeaAndraško, J.; Mesarcik, M.; Hamulak, OndrejInteligencia artificial : de la discrepancia regional a las reglas universales2020 https://www.thomsonreuters.es/es/tienda/duo-papel-ebook/inteligencia-artificial--de-la-discrepancia-regional-a-las-reglas-univ-ersalesduo/p/10015799#
- Intelligentse keskkonna turvaprobleemidestLeis, PaulA & A2007 / 3, lk. 3-4
- Interactive stereoscopically perceivable multidimensional data visualizations for cybersecurityKullman, Kaur; Engel, DonJournal of Defence & Security Technologies2022 / p. 37-52 https://doi.org/10.46713/jdst.004.03
- Interactive stereoscopically perceivable multidimensional data visualizations for cybersecurity = Interaktiivsed, ruumiliselt tajutavad, mitmemõõtelised andmekuvad küberturbeleKullman, Kaur2023 https://doi.org/10.23658/taltech.10/2023 https://digikogu.taltech.ee/et/Item/00f8f848-c610-4843-b829-8f544d7ba775 https://www.ester.ee/record=b5552863*est
- International cyber norms : legal, policy & industry perspectives2016 http://www.ester.ee/record=b4543144*est https://ccdcoe.org/sites/default/files/multimedia/pdf/InternationalCyberNorms_full_book.pdf
- An international technical standard for commercial space system cybersecurity - a call to actionFalco, Gregory; Henry, Waybe; Aliberti, Marco; Bailey, Brandon; Bailly, Mathieu; Bonnart, Sebastien; Boschetti, Nicolo; Bottarelli, Mirko; Byerly, Adam; Carlo, AntonioASCEND 20222022 https://doi.org/10.2514/6.2022-4302
- IntroductionKerttunen, Mika; Tikk, EnekenRoutledge handbook of international cybersecurity2020 / p. 1-8 https://doi.org/10.4324/9781351038904-1 https://www.ester.ee/record=b5308475*est
- Introductory remarksOsula, Anna-Maria; Maennel, Olaf ManuelProceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 20182018 / lk. 5 https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/CRW_2018_lingitud.pdf
- Introductory remarks [Online resource]Osula, Anna-Maria; Maennel, Olaf ManuelProceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology2015 / p. 5 http://cybercentre.cs.ttu.ee/en/icr2015/
- Isejuhtivad autod võivad muuta meie liikluskorraldust, eetilisi tõekspidamisi ja arusaamu küberturvalisusestSell, Raivoarileht.delfi.ee2024 https://arileht.delfi.ee/artikkel/120291836/isejuhtivad-autod-voivad-muuta-meie-liikluskorraldust-eetilisi-toekspidamisi-ja-arusaamu-kuberturvalisusest
- Isevärki advendikalender aitab taltsutada nutiseadet [Võrguväljaanne]parnu.postimees.ee2021 https://parnu.postimees.ee/7400097/isevarki-advendikalender-aitab-taltsutada-nutiseadet
- i-tee : a fully automated cyber defense competition for studentsErnits, Margus; Tammekänd, Johannes; Maennel, Olaf ManuelSIGCOMM '15 : proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication : August 17-21, 2015, London, United Kingdom2015 / p. 113-114 : ill http://dx.doi.org/10.1145/2785956.2790033
- IT-teadlaste manitsus : enne kui sisestate veebiavarusse oma krediitkaardiandmed, pange tähele...Lorenz, Birgy; Kikkas, Kaidodelfi.ee2022 https://forte.delfi.ee/artikkel/120110952/it-teadlaste-manitsus-enne-kui-sisestate-veebiavarusse-oma-krediitkaardiandmed-pange-tahele
- Jälitatud ja kastistatud : kas sellist maailma tahamegi?Tammet, TanelDigi2018 / lk. 28-29 : fot http://www.ester.ee/record=b2040633*est https://artiklid.elnet.ee/record=b2841830*est
- Kaasav küberturvalisuse mängLorenz, Birgy; Toom, Hanna; Muulmann, Triin; Kirna, Catlyn2024 https://drive.google.com/file/d/1667DUZwhgcstopp3tMQ7r0nQVxwKzPW2/view
- Karjäär IT- ja küberturbe valdkonnas – ka tüdrukutele! [Võrguväljaanne]Lorenz, Birgyopleht.ee2021 / Lk. 6 https://opleht.ee/2021/12/karjaar-it-ja-kuberturbe-valdkonnas-ka-tudrukutele/ https://dea.digar.ee/article/opetajateleht/2021/12/03/7.1
- Karm suurrünnak Microsofti serveritele seadis ohtu ka eestlaste andmed [Võrguväljaanne]Laikoja, Liisgeenius.ee2021 https://digipro.geenius.ee/rubriik/uudis/karm-hakker-microsoft-exchange-serverite-suurrunnak-mojutab-ka-eesti-ettevotteid/
- Kas sa oled kodus üksi?Härmat, KarinMente et Manu2019 / lk. 22-25 : fot https://www.ester.ee/record=b1242496*est https://www.ttu.ee/public/m/mente-et-manu/MM_01_2019/mobile/index.html
- Key factors in coping with large-scale security vulnerabilities in the eID fieldLips, Silvia; Pappel, Ingrid; Tsap, Valentyna; Draheim, DirkElectronic Government and the Information Systems Perspective :7th International Conference, EGOVIS 2018, Regensburg, Germany, September 3–5, 2018 : proceedings2018 / p. 60-70 https://doi.org/10.1007/978-3-319-98349-3_5 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85052848171&origin=inward&txGid=886585cd5d326d559b195549b96e00f3 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=LECT%20NOTES%20ARTIF%20INT&year=2005 https://www.webofscience.com/wos/woscc/full-record/WOS:000517826300005
- Kibersigurnost u pomorstvu - MariCybERA projekatBauk, SanjaXVI međunaroni naučno-stručni skup Informacione Tehnologije za e-Obrazovanje : ITeO : zbornik radova2024 / p. 8 https://iteo.rs.ba/sites/default/files/ITeO_Zbornik%20radova%202024%20%281%29.pdf
- Kitsaskohti andmekaitse rakendamisel koolides [Võrguväljaanne]Lorenz, Birgy; Kikkas, Kaido; Baum, Anu; Metsäär, Tõnuopleht.ee2021 https://opleht.ee/2021/03/kitsaskohti-andmekaitse-rakendamisel-koolides/
- Knowledge transfer for public administrations : the case of elections and cybersecurity = Haldusasutuste teadmussiire : valimiste ja küberturvalisuse juhtumSerrano-Iova, Radu-Antonio2024 https://www.ester.ee/record=b5693105*est https://digikogu.taltech.ee/et/Item/87c3f3ff-b378-4e6c-9a6e-a5c9e2e4d1e8 https://doi.org/10.23658/taltech.39/2024
- Konverents võtab fookusesse naiste rolli IT-sektoris [Võrguväljaanne]Liiviste, Priitpealinn.ee2021 https://pealinn.ee/2021/12/08/konverents-votab-fookusesse-naiste-rolli-it-sektoris/
- Kriisiõppusel testiti Tallinna Vesi AS-i valmisolekut reageerida küberrünnakutele [Võrguväljaanne]Raag, Toomaspealinn.ee2022 https://pealinn.ee/2022/05/24/kriisioppusel-testiti-tallinna-vesi-as-i-valmisolekut-reageerida-kuberrunnakutele/
- Kristi Joamets: Tehnoloogia on jõudnud pea igasse eluvaldkonda ja see tähendab, et vajab ka õiguslikku hinnangutJoamets, Kristipostimees.ee2023 https://www.postimees.ee/7776605/kristi-joamets-tehnoloogia-on-joudnud-pea-igasse-eluvaldkonda-ja-see-tahendab-et-vajab-ka-oiguslikku-hinnangut
- Kui internet saab täisJervan, GertPostimees2020 / Lk. 13 https://dea.digar.ee/article/postimees/2020/07/30/11.3 https://leht.postimees.ee/7028359/gert-jervan-kui-eesti-internet-saab-tais
- Kuidas ma olen teadust teinud ja seda rakendanud : 2017. aasta riikliku elutööpreemia laureaat akadeemik Enn TõuguTõugu, EnnEesti Teaduste Akadeemia aastaraamat = Annales academiae scientarum Estonicae 20172018 / lk. 109-116
- Kuidas mõõta küberturbealaseid kompetentse?Härmat, KarinMente et Manu2021 / lk. 33 https://dea.digar.ee/cgi-bin/dea?a=d&d=AKmenteetmanu202104&e=-------et-25--1--txt-txIN%7ctxTI%7ctxAU%7ctxTA-------------
- Kus on andmed elu ja surma küsimus?digipro.geenius.ee2022 https://digipro.geenius.ee/blogi/andmegeeniuse-blogi/kus-on-andmed-elu-ja-surma-kusimus/
- Kus on meie noored kübertalendid?Lorenz, BirgyÄripäev2019 / lk. 12
- Küberajateenistus kogub populaarsustHurt, Martin; Sõmer, TiiaPostimees2021 / Lk. 14-15 : ill https://dea.digar.ee/article/postimees/2021/03/18/12.2
- Küberajateenistus kogub populaarsust [võrguväljaanne]Sõmer, Tiia; Hurt, Martinpostimees.ee2021 https://leht.postimees.ee/7204011/kuberajateenistus-kogub-populaarsust
- Küberhariduse tegemised: „Küberkool 2024“ tõi kokku sajad noored üle EestiMäeots, MarioÕpetajate Leht2025 / lk. 16 https://dea.digar.ee/article/opetajateleht/2025/01/14/13.2
- Küberhügieen - tõhus kaitsevahendMaennel, KaieRaamatupidamisuudised2019 / lk. 43-47 : portr https://www.ester.ee/record=b1072822*est
- Küberjõulud: kuidas end pühade ajal turvalisena hoida?Sõmer, Tiiadigi.geenius.ee2024 https://digi.geenius.ee/blogi/teadus-ja-tulevik/kuberjoulud-kuidas-end-puhade-ajal-turvalisena-hoida/
- Küberkaitse komisjonMõtus, LeoEesti Teaduste Akadeemia aastaraamat = Annales academiae scientarum Estonicae 20142015 / lk. 37-38
- Küberkaitse komisjonMõtus, LeoEesti Teaduste Akadeemia aastaraamat = Annales academiae scientarum Estonicae 20132014 / lk. 39-40
- Küberkaitse suvekool Eesti MereakadeemiasHeering, DanMeremees. Veeteede Ameti teataja2018 / lk. 10 : fot http://www.ester.ee/record=b4646644*est https://xn--tt-yka.ee/public/m/mereakadeemia/ajakiri-meremees/Meremees_2018_3-4._VA_Teataja_2018_3-4.pdf
- Küberkaitse tipptegijad õpivad Eestis digitaalset ühiskonda turvama : [intervjuu TTÜ professori Olaf Maenelliga]Lõugas, Hans; Maennel, Olaf ManuelEesti Päevaleht2015 / lk. 17 https://epl.delfi.ee/artikkel/71888393/kuberkaitse-tipptegijad-opivad-eestis-digitaalset-uhiskonda-turvama
- Küberkaitse [Võrguteavik]Sõmer, Tiia; Lorenz, Birgy; Mäses, Sten; Muulmann, Triin2019 https://web.htk.tlu.ee/digitaru/kyberkaitse/
- Küberkaitse õpetamine jõuab maailmatasemele : [vastava õppekava arendamisest TTÜs]Ojakivi, MirkoEesti Päevaleht2008 / 10. okt., lk. 4
- Küberkaitseliitlased valisid uude juhatusse kindrali ja professori [Võrguväljaanne]postimees.ee2021 https://www.postimees.ee/7169078/kuberkaitseliitlased-valisid-uude-juhatusse-kindrali-ja-professori
- Küberkaitsetudengid teel MEKTORY-st RäniorguKarro, RainisStudioosus2014 / lk. 8-9 https://www.ester.ee/record=b1558644*est
- Küberkaitsjad korraga kahes ülikoolis : [TTÜ ja Tartu Ülikooli koostööst]Tammet, TanelArvutimaailm2011 / 6, lk. 8-9
- Küberkriminalistid peavad valmistuma ka inimese mällu häkkimiseksLõugas, HansEesti Päevaleht2014 / lk. 17 https://epl.delfi.ee/artikkel/70217417/kuberkriminalistid-peavad-valmistuma-ka-inimese-mallu-hakkimiseks
- Küberluurest kainestavalt : intervjuu siseministeeriumi infotehnoloogia- ja arenduskeskuse küberturbeosakonna juhi Agu KivimäegaStrandberg, Marek; Kivimägi, AguSirp2013 / lk. 21 : fot https://www.sirp.ee/s1-artiklid/c9-sotsiaalia/2013-10-20-14-20-24/
- Kübermaailmas on oluline probleeme ennetadaSõmer, TiiaMente et Manu2017 / lk. 30-33 : fot http://www.ttu.ee/public/m/mente-et-manu/MM_01_2017/index.html https://artiklid.elnet.ee/record=b2811469*est
- Kübermere piraadidVassiljev, AleksanderStudioosus2012 / lk. 4 https://www.ester.ee/record=b1558644*est
- KüberNööpnõel 2021 : Uuringu analüüsLorenz, Birgy; Eomäe, Taavi; Talisainen, Aleksei; Kasvandik, Keit2022 https://drive.google.com/file/d/1-fgLvGoTUNSI6KYAfLuF3iZeS4rxxARK/view
- KüberNööpnõel 2022 : tulemusedLorenz, Birgy; Toom, Hanna; Talisainen, Aleksei; Baum, Anu; Eomäe, Taavi2023 https://docs.google.com/document/d/1hExiVLGR88jwb82mBDKx3IJ2Fexx7uyQjXtUbJxuJts/edit
- KüberNööpnõel 2023 tulemusedLorenz, Birgy; Eomäe, Taavi; Talisainen, Aleksei; Toom, Hanna2024 https://docs.google.com/document/d/1SY5siAUVzI3o-smwP023ZmhBnpTD8R-9Si7TcHN1_Lo/edit
- Küberohud meie nina all: 4 igapäevast turvariski, mida tõsiselt ei võeta [Võrguväljaanne]digipro.geenius.ee2022 https://digipro.geenius.ee/blogi/dokobiti-blogi/kuberohud-meie-nina-all-4-igapaevast-turvariski-mida-tosiselt-ei-voeta/
- Küberolümpial selgus parim arvutisüsteemide kaitsja EestisDirector. Inseneeria2017 / lk. 135 : fot http://www.ester.ee/record=b1519314*est https://artiklid.elnet.ee/record=b2824252*est
- KüberPuuring 2021 analüüs : võistlus 7.-12. klassileLorenz, Birgy; Eomäe, Taavi; Talisainen, Aleksei; Kikas, Oliver; Rannaste, Katrin; Muulman; Muulmann, Triin; Baum, Anu2022 https://drive.google.com/file/d/1mV48eIbfSbWriYiYdWE8ZEjMs1v8rZQw/view
- KüberPuuring 2022 analüüs : võistlus 7.-12. klassileLorenz, Birgy; Eomäe, Taavi; Talisainen, Aleksei; Kikas, Oliver; Muulmann, Triin2022 https://docs.google.com/document/d/1PuBEkJrHGiMU6h9vWb_-e7eExrG3kE7aSITGtfr9vsY/edit
- Küberpuuring 2023 analüüs : võistlus 7.-12. klassile ja kutsekoolileLorenz, Birgy; Toom, Hanna; Eomäe, Taavi; Talisainen, Aleksei; Kikas, Oliver; Muulmann, Triin2024 https://docs.google.com/document/d/1pKbFPLZiN6McSAlmM8U_073i4B76V9JgsU4zDVhlko4/edit
- KüberPõgenemistubaLorenz, Birgy; Lust, Maia; Muulmann, Triin; Toom, Hanna; Kirna, Catlyn2024 https://sites.google.com/view/pogene
- KüberPähkel 2022 tulemusedLorenz, Birgy; Eomäe, Taavi; Talisainen, Aleksei; Toom, Hanna2023 https://docs.google.com/document/d/1MOEUsvhLjl8e9-DuYA7YRGLckC9aXx1nnx2eXPF9SUA/edit
- Küberpähkel 2023 analüüsLorenz, Birgy; Eomäe, Taavi; Talisainen, Aleksei; Toom, Hanna2024 https://docs.google.com/document/d/1knA665JvAkpZMudb77QixTFiIdgJLdP_PtzaNz8mMcY/edit
- Küberpähkel uuringLorenz, Birgy; Eomäe, Taavi; Kirna, Catlyn; Poudel, Diana; Talisainen, Aleksei; Sõmer, Tiia; Mikli, Aet; Pau, Annika; Baum, Anu2022 https://drive.google.com/file/d/1Aj0jzvdr6EZdt_F8AXUQlbpX8HHvj2dC/view
- KüberPähkel uuring : jaanuar 2018Lorenz, Birgy; Sõmer, Tiia; Osula, Kairi2018 https://docs.google.com/document/d/1SpZR_a4hNITSA0M8TqPS0LCcWro8ZOYECGBypgn91OI/edit#heading=h.gjdgxs
- KüberPähkel uuring : jaanuar 2019Lorenz, Birgy; Osula, Kairi; Leet, Mati; Eomäe, Taavi; Kirna, Catlyn2019 https://docs.google.com/document/d/1M8g4cgIXebXyQsFj_8bwaLocv84sdHFresuRiy9TrnE/edit
- KüberPähkel uuring : veebruar 2020Lorenz, Birgy; Osula, Kairi; Kirna, Catlyn; Leet, Mati; Eomäe, Taavi; Hendriskon, Marily; Poudel, Diana; Saks, Hanno; Soop, Tõnu; Mikkli, Aet; Punak, Maarja2020 https://docs.google.com/document/d/1EeZ4XNaCodA9xcW-tf2SYcj9asIBUp0KO_KruYI2o6M/edit
- Küberpättide nõrkuseks võivad osutuda end tõestanud ärimudelid [Võrguväljaanne]Sõmer, Tiianovaator.err.ee2022 https://novaator.err.ee/1608485480/kuberpattide-norkuseks-voivad-osutuda-end-toestanud-arimudelid
- Kübersõjas on haavatavad isegi ilma internetiühenduseta sihtmärgidPiir, Raitnovaator.err.ee2024 https://novaator.err.ee/1609283511/kubersojas-on-haavatavad-isegi-ilma-internetiuhenduseta-sihtmargid
- Kübertalendid ja nende harimineLorenz, Birgy; Toom, Hanna; Baum, Anu2022 https://drive.google.com/file/d/1dcq-evoBrvka4XxdeqTAlCF_4-IiTpA1/view
- Küberturbe ekspert: enim ohustab ettevõtet Taavi müügiosakonnast [Võrguväljaanne]Kald, Indrekituudised.ee2021 https://www.ituudised.ee/uudised/2021/09/23/kuberturbe-ekspert-enim-ohustab-ettevotet-taavi-muugiosakonnast
- Küberturbe haridus laevaohvitseride väljaõppes ning soovitused selle korraldamiseks : magistritööRoolaid, Lauri2018 https://www.ester.ee/record=b5382048*est https://www.ester.ee/record=b5382048*est
- Küberturbe magistriõppestLeis, PaulA & A2007 / 6, lk. 3-4
- #küberturvalisus. Snapchatis saadetud pildid jäävad tegelikult alles4JALEHT2020 / Lk. 12-13 : fot https://www.ester.ee/record=b5352324*est http://4dimensioon.org/2020/08/30/kuberturvalisus-snapchatis-saadetud-pildid-jaavad-tegelikult-alles/
- Küberturvalisus. Martin Hurt ja Tiia Sõmer: küberajateenistus – küberturbesektori inkubaator?Hurt, Martin; Sõmer, TiiaEdasi.org : innustav ja hariv ajakiri2021 https://edasi.org/78442/kuberturvalisus-martin-hurt-ja-tiia-somer-kuberajateenistus-kuberturbesektori-inkubaator/
- Küberturvalisus. Tark ei torma: kui midagi on liiga hea, et olla tõsi, siis see ongi nii. Mida teada investeerimiskelmustest [Võrguväljaanne]Sõmer, TiiaEdasi.org : innustav ja hariv ajakiri2021 https://edasi.org/87829/kuberturvalisus-tark-ei-torma-kui-midagi-on-liiga-hea-et-olla-tosi-siis-see-ongi-nii-mida-teada-investeerimiskelmustest/
- Küberturvalisuse ekspert Urmas Ruuto: «Küberrünnakut saab toime panna ka kaugloetavate veemõõtjatega!»postimees.ee2023 https://tehnika.postimees.ee/7771620/kuberturvalisuse-ekspert-urmas-ruuto-kuberrunnakut-saab-toime-panna-ka-kaugloetavate-veemootjatega
- Küberturvalisuse tippekspert Urmas Ruuto: “Küberrünnakut saab toime panna ka kaugloetavate veemõõtjatega”Ruuto, Urmasjarvateataja.postimees.ee2023 https://jarvateataja.postimees.ee/7771278/kuberturvalisuse-tippekspert-urmas-ruuto-kuberrunnakut-saab-toime-panna-ka-kaugloetavate-veemootjatega
- La ciberseguridad en la era de hipercompetitividad: ¿puede la Union Europea afrontar los nuevos retos?Munkoe, Malthe; Mölder, HolgerRevista CIDOB d'afers internacionals2022 / p. 69-94 https://doi.org/10.24241/rcai.2022.131.2.69
- Learning analytics perspective: evidencing learning from digital datasets in cybersecurity exercisesMaennel, KaieProceedings 5th IEEE European Symposium on Security and Privacy Workshops EUROS&PW 2020 : 7-11 September 2020, VIrtual Event, Los Alamitos, California2020 / p. 27-36 https://doi.org/10.1109/EuroSPW51379.2020.00013
- Learning from few cyber-attacks : addressing the class imbalance problem in machine learning-based intrusion detection in software-defined networkingMirsadeghi, Seyed Mohammad Hadi; Bahsi, Hayretdin; Vaarandi, Risto; Inoubli, WissemIEEE Access2023 / p. 140428 - 140442 https://doi.org/10.1109/ACCESS.2023.3341755 https://www.scopus.com/sourceid/21100374601 https://www.scopus.com/record/display.uri?eid=2-s2.0-85179784530&origin=resultslist&sort=plf-f&src=s&sid=b809bd4cf0195b89d03fdce880010424&sot=b&sdt=b&s=TITLE%28%22Learning+From+Few+Cyber-Attacks%3A+Addressing+the+Class+Imbalance+Problem+in+Machine+Learning-Based+Intrusion+Detection+in+Software-Defined+Networking%22%29&sl=111&sessionSearchId=b809bd4cf0195b89d03fdce880010424&relpos=0 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=IEEE%20ACCESS&year=2023 https://www.webofscience.com/wos/woscc/full-record/WOS:001126163700001
- Legal aspects of cybersecurity in emerging technologies : smart grids and big data : European answers to security breaches and "common" cyber crimeKasper, AgnesRegulating eTechnologies in the European Union : normative realities and trends2014 / p. 189-216 : ill
- Leveraging the European Cybersecurity Skills Framework(ECSF) in EU innovation projects : workforce development through skilling, upskilling, and reskillingRathod, Paresh; Polemi, Nineta; Lehto, Martti; Kioskli, Kitty; Wessels, Jan; Lugo, Ricardo Gregorio2024 IEEE Global Engineering Education Conference (EDUCON)2024 / 9 p. https://doi.org/10.1109/EDUCON60312.2024.10578846
- Light weight tabletop exercise for cybersecurity educationOttis, RainJournal of homeland security and emergency management2014 / p. 579-592 https://doi.org/10.1515/jhsem-2014-0031 https://www.scopus.com/sourceid/23403 https://www.scopus.com/record/display.uri?eid=2-s2.0-84925405617&origin=inward&txGid=5d53310a5c7d767169677e16f86a86d9 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=J%20HOMEL%20SECUR%20EMERG&year=2014 https://www.webofscience.com/wos/woscc/full-record/WOS:000346997400007
- Lightweight monitoring scheme for flooding DoS Attack detection in multi-tenant MPSoCsChaves Arroyave, Cesar Giovanni; Sepulveda, Johanna; Hollstein, Thomas2021 IEEE International Symposium on Circuits and Systems (ISCAS), Daegu, Korea May 22-28, 2021 : proceedings2021 / 5 p https://doi.org/10.1109/ISCAS51556.2021.9401153 https://www.scopus.com/sourceid/56190 https://www.scopus.com/record/display.uri?eid=2-s2.0-85108992010&origin=inward&txGid=bde7897522355cefb3b60c77e810efba https://www.webofscience.com/wos/woscc/full-record/WOS:000696765400099
- Lightweight testbed for IEC61162-450-related cyber security researchVisky, Gabor; Katsikas, Sokratis; Maennel, Olaf Manuel2024 IEEE International Conference on Cyber Security and Resilience (CSR) : proceedings2024 / p. 638-643 https://doi.org/10.1109/CSR61664.2024.10679439
- Lizards in the street! Introducing cybersecurity awareness in a digital literacy contextFrydenberg, Mark; Lorenz, BirgyEDSIGCON Proceedings 2019 : Cleveland Ohio, November 6-9, 20192019 / Art. n4936, 13 p. : ill http://proc.iscap.info/2019/pdf/4936.pdf
- A live virtual simulator for teaching cybersecurity to information technology studentsErnits, Margus; Kikkas, KaidoLearning and Collaboration Technologies : Third International Conference, LCT 2016, held as part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016 : proceedings2016 / p. 474-486 : ill https://doi.org/10.1007/978-3-319-39483-1_43 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-84978898089&origin=inward&txGid=25cad413a04f077fcfb2aff682a856c6 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=LECT%20NOTES%20ARTIF%20INT&year=2005 https://www.webofscience.com/wos/woscc/full-record/WOS:000389805700043
- Machine learning-based detection and characterization of evolving threats in mobile and IoT Systems = Masinõppepõhine arenevate ohtude tuvastamine ning kirjeldamine mobiilseadmete ja värkvõrkude jaoksGuerra Manzanares, Alejandro2022 https://doi.org/10.23658/taltech.54/2022 https://digikogu.taltech.ee/et/Item/f56ae778-e5a5-4147-a8e4-4833e08fa789 https://www.ester.ee/record=b5511898*est
- Majandusjulgeolek Eesti restart 2021 : 14. aprillil veebikonverentsPostimees2021 / Lk. 25 https://dea.digar.ee/article/postimees/2021/03/25/21.1
- Making the Cyber Mercenary - Autonomous Weapons Systems and Common Article 1 of the Geneva ConventionsKajander, Aleksi Oskar Johannes; Tsybulenko, Evhen; Kasper, Agnes2020 12th International Conference on Cyber Conflict : 20/20 vision : the next decade2020 / p. 79-95 https://ieeexplore.ieee.org/abstract/document/9131722 https://www.ester.ee/record=b5303919*est
- Managing security risks in E-voting over the InternetTepandi, Jaak; Martens, TarviE-challenges-20062006 / p. 100
- Mapping cyber attacks on the internet of medical things : a taxonomic reviewKondeti, Venkatesh; Bahsi, Hayretdin2024 19th Annual System of Systems Engineering Conference (SoSE)2024 / p. 84 - 91 https://doi.org/10.1109/SOSE62659.2024.10620925 https://www.scopus.com/record/display.uri?eid=2-s2.0-85202183390&origin=resultslist&sort=plf-f&src=s&sot=b&sdt=b&s=DOI%2810.1109%2FSOSE62659.2024.10620925%29&sessionSearchId=971b6d536926a71d00c3665b57fa29cc&relpos=0 https://www.webofscience.com/wos/woscc/full-record/WOS:001294376500013
- Mapping requirements specifications into a formalized blockchain-enabled authentication protocol for secured personal identity assuranceLeiding, Benjamin; Norta, AlexanderFuture Data and Security Engineering : 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 - December 1, 2017 : proceedings2017 / p. 181-196 : ill https://doi.org/10.1007/978-3-319-70004-5_13 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85036461982&origin=inward&txGid=606bbd41a3252c20d93fe400e9106a39 https://www.webofscience.com/wos/woscc/full-record/WOS:000440851600013
- Maritime cyber-insurance : The Norwegian case : [abstract]Franke, Ulrik; Langfeldt Friberg, Even; Bahsi, HayretdinInternational Journal of Critical Infrastructures2022 / p. 267–286 https://doi.org/10.1504/IJCIS.2022.10046729
- Maritime cyber-insurance: the Norwegian caseFranke, Ulrik; Friberg, Even Langfeldt; Bahşi, HayretdinInternational Journal of Critical Infrastructures2022 / p. 267-286 https://doi.org/10.1504/ijcis.2022.125816 https://www.scopus.com/sourceid/26673 https://www.scopus.com/record/display.uri?eid=2-s2.0-85140977068&origin=inward&txGid=584d07a059923f808fcb0e0c5f8d2e95 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=INT%20J%20CRIT%20INFRASTRU&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000861914700005
- Mental model mapping method for cybersecurityKullman, Kaur; Buchanan, Laurin; Komlodi, Anita; Engel, DonHCI for Cybersecurity, Privacy and Trust : Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : Proceedings2020 / p. 458-470 https://doi.org/10.1007/978-3-030-50309-3_30 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85088748602&origin=inward&txGid=0fce2187e805324c2d415919df620f69
- Merendus sektoris on küberhügieen olulisem kui kunagi varemTampere, UkuTeejuht : maal, vees ja õhus : Transpordiameti digiajakiri2024 / lk. 14-17 : fot https://digiajakiri.transpordiamet.ee/view/434325528/14/
- Messung, Prüfung und Nachweis von IT-SicherheitSkierka-Canton, IsabelIT-Sicherheitsrecht : Praxishandbuch2021 / S. 154−180 https://www.nomos-shop.de/en/nomos/title/it-sicherheitsrecht-id-86855/
- Metamorphic testing for verification and fault localization in industrial control systemsSudheerbabu, Gaadha; Ahmad, Tanwir; Truscan, Dragos; Vain, JüriCyberSecurity in a DevOps Environment: From Requirements to Monitoring2023 / p. 127 - 159 https://doi.org/10.1007/978-3-031-42212-6_5 https://www.scopus.com/record/display.uri?eid=2-s2.0-85195008338&origin=resultslist&sort=plf-f&src=s&sot=b&sdt=b&s=DOI%2810.1007%2F978-3-031-42212-6_5%29&sessionSearchId=971b6d536926a71d00c3665b57fa29cc&relpos=0
- A method for adding cyberethical behaviour measurements to computer science homework assignmentsMäses, Sten; Aitsam, Heleri; Randmann, Liina19th Koli Calling Conference on Computing Education Research Koli Calling 2019 : November 21-24, 2019, Koli, Finland : proceedings2019 / 5 p. : ill https://doi.org/10.1145/3364510.3364529 https://www.scopus.com/sourceid/11600154611 https://www.scopus.com/record/display.uri?eid=2-s2.0-85076751058&origin=inward&txGid=e51fb8d9a006db620a2782c087945ff8 https://www.webofscience.com/wos/woscc/full-record/WOS:000558063700019
- Method for evaluating information security level in organisationsSeeba, Mari; Mäses, Sten; Matulevičius, RaimundasResearch Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings2022 / p. 644-652 : ill https://doi.org/10.1007/978-3-031-05760-1_39 https://www.scopus.com/sourceid/17500155101 https://www.scopus.com/record/display.uri?eid=2-s2.0-85130946945&origin=inward&txGid=6f823040aacafd0745b3f8efcf685da5 https://www.webofscience.com/wos/woscc/summary/3d1372dd-196d-40a3-9673-72a16608c4d3-b9486d53/relevance/1
- A method for teaching Open Source Intelligence (OSINT) using personalised cloud-based exercisesYari, Saber; Mäses, Sten; Maennel, Olaf ManuelProceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 20202020 / p. 480−489 https://doi.org/10.34190/ICCWS.20.091
- Methodology for modelling financially motivated cyber crimeSõmer, Tiia16th International Conference on Cyber Warfare and Security (ICCWS 2021) : Online, 25 - 26 February 20212021 / p. 326-335 http://toc.proceedings.com/58552webtoc.pdf?msclkid=97ad966dbea311ecb39e14df5abebf21
- Miks Facebook ei tööta? Põhjuseks võib olla ebaõnnestunud tarkvarauuendus [Võrguväljaanne]Veedla, Alicedelfi.ee2021 https://www.delfi.ee/artikkel/94763953/miks-facebook-ei-toota-pohjuseks-voib-olla-ebaonnestunud-tarkvarauuendus
- Millist küberstrateegiat Eesti vajab?Lorenz, BirgyÄripäev2018 / Lk. 12 https://dea.digar.ee/article/aripaev/2018/06/22/18.3
- Mis toimub tehisintellekti „kapoti all“ ja miks me seda teadma peame? [Võrguväljaanne]delfi.ee2022 https://arileht.delfi.ee/artikkel/120004961/mis-toimub-tehisintellekti-kapoti-all-ja-miks-me-seda-teadma-peame
- Mis toimub tehisintellekti "kapoti all" ja miks me seda teadma peame?Härmat, KarinMente et Manu2022 / lk. 30-33 : fot https://www.ester.ee/record=b1242496*est
- Mixed methods research approach and experimental procedure for measuring human factors in cybersecurity using phishing simulationsMäses, Sten; Kikerpill, Kristjan; Jüristo, Kaspar; Maennel, Olaf ManuelAbstracts of Papers Presented at the 18th European Conference on Research Methodology for Business and Management Studies : ECRM 2019, Hosted By Wits Business School Johannesburg, South Africa 20-21 June, 20192019 / p. 30-31 https://www.academic-conferences.org/wp-content/uploads/dlm_uploads/2019/06/ECRM19-Booklet-2.pdf
- Mixed methods research approach and experimental procedure for measuring human factors in cybersecurity using phishing simulationsMäses, Sten; Kikerpill, Kristjan; Jüristo, Kaspar; Maennel, Olaf ManuelECRM 2019 - Proceedings of the 18th European Conference on Research Methodology for Business and Management Studies ; vol. 12019 / p. 218-226 http://toc.proceedings.com/49537webtoc.pdf
- A 3D mixed reality visualization of network topology and activity results in better dyadic cyber team communication and cyber situational awarenessAsk, Torvald F.; Kullman, Kaur; Sütterlin, Stefan; Knox, Benjamin James; Engel, Don; Lugo, Ricardo GregorioFrontiers in Big Data2023 / art. 1042783, 21 p. : ill https://doi.org/10.3389/fdata.2023.1042783 https://www.scopus.com/sourceid/21101052354 https://www.scopus.com/record/display.uri?eid=2-s2.0-85147765882&origin=inward&txGid=82ad28bbc7e3ec344278d31acbc2d88e https://jcr.clarivate.com/jcr-jp/journal-profile?journal=FRONT%20BIG%20DATA&year=2023 https://www.webofscience.com/wos/woscc/full-record/WOS:000929052400001
- Modeling and optimizing graded sequrity measuresOjamaa, Andres; Tõugu, Enn; Kivimaa, JüriInfo- ja kommunikatsioonitehnoloogia doktorikooli IKTDK kolmanda aastakonverentsi artiklite kogumik : 25.-26. aprill 2008, Voore külalistemaja2008 / p. 123-125 : ill
- Modeling the trajectory tracking accuracy of an autonomous catamaran patrol vessel under different positional data disturbance conditionsUdal, Andres; Kaugerand, Jaanus; Mõlder, Heigo; Astrov, Igor; Bauk, SanjaMT '24 : 10th International Conference on Maritime Transport : Barcelona, Spain, 5-7 June, 20242024 / p. 1-15 : ill https://doi.org/10.5821/mt.13165 http://hdl.handle.net/2117/409463
- Modelling cyberspace to determine cybersecurity training requirementsVenables, Adrian NicholasFrontiers in education2021 / art. 768037, 16 p. : ill https://doi.org/10.3389/feduc.2021.768037 https://www.scopus.com/sourceid/21100935978 https://www.scopus.com/record/display.uri?eid=2-s2.0-85120740572&origin=inward&txGid=8619ae26e8654400a268c4f7861385b1 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=FRONT%20EDUC&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000726083400001
- Modelling financially motivated cyber crime = Finantsiliselt motiveeritud küberkuritegevuse modelleerimineSõmer, Tiia2022 https://doi.org/10.23658/taltech.10/2022 https://www.ester.ee/record=b5491785*est https://digikogu.taltech.ee/et/Item/5c41eec5-0c88-43c8-9294-c9f47e7c438b
- Modelling the impact of space situational awareness disruption on the European and Arctic security landscapeCarlo, Antonio; Boschetti, NicoloModelling and Simulation for Autonomous Systems: 9th International Conference, MESAS 2022, Prague, Czech Republic, October 20–21, 2022 : Revised Selected Papers2023 / p. 299-311 https://doi.org/10.1007/978-3-031-31268-7_18 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85161697779&origin=inward&txGid=67cc2bb61c98617b60c7bc3fe8b7311a
- A multidimensional cyber defense exercise: emphasis on emotional, social, and cognitive aspectsMaennel, Kaie; Brilingaite, Agne; Bukauskas, Linas; Juozapavicius, Ausrius; Knox, Benjamin James; Lugo, Ricardo Gregorio; Maennel, Olaf Manuel; Majore, Ginta; Sütterlin, StefanSAGE Open2023 / 12 p. : ill https://doi.org/10.1177/21582440231156367 https://www.scopus.com/sourceid/21100255401 https://www.scopus.com/record/display.uri?eid=2-s2.0-85150449577&origin=inward&txGid=c423bebe99bc66d4d6c17fa5db5dfedc https://jcr.clarivate.com/jcr-jp/journal-profile?journal=SAGE%20OPEN&year=2023 https://www.webofscience.com/wos/woscc/full-record/WOS:000949286200001
- Multi-level analytical frameworks for supporting cyber security legal decision making : thesis for the degree of doctor of philosophyKasper, Agnes2015 http://www.ester.ee/record=b4511758*est
- Multi-purpose cyber environment for maritime sectorVisky, Gabor; Lavrenovs, Arturs; Orye, Erwin; Heering, Dan; Tam, KimberlyProceedings of the 17th International Conference on Cyber Warfare and SecurityState University of New York at AlbanyAlbany, New York, USA 17-18 March 20222022 / p. 349-257 https://doi.org/10.34190/iccws.17.1.26
- Nad ründasid Eestit, külvasid segadust USA-s, Ukrainas, Gruusias … Uue aja varisõdalasi tutvustab küberekspert Adrian VenablesVenables, Adrian Nicholasdigi.geenius.ee2024 https://digi.geenius.ee/blogi/teadus-ja-tulevik/nad-rundasid-eestit-kulvasid-segadust-usa-s-ukrainas-gruusias-uue-aja-varisodalasi-tutvustab-kuberekspert-adrian-venables/
- Naised küberturbes - eeskujud tüdrukuteleLorenz, Birgy; Valdmets, Maris2021 https://sites.google.com/view/eeskujud
- Naised teaduses: Olga Vovk uurib tervishoiuandmete anonüümistamist [Võrguväljaanne]Kharchenko, VyacheslavBioneer.ee2022 https://bioneer.ee/naised-teaduses-olga-vovk-uurib-tervishoiuandmete-anon%C3%BC%C3%BCmistamist
- National cybersecurity : global and regional descriptive snapshots through the analysis of 161 countriesSerrano-Iova, Radu-AntonioHalduskultuur : The Estonian journal of administrative culture and digital governance2024 https://halduskultuur.eu/journal/index.php/HKAC/index
- National cybersecurity legislation : is there a magic formula?Tikk, EnekenCybersecurity Best Practices : Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden2018 / p. 615-633 https://doi.org/10.1007/978-3-658-21655-9_42
- NATO küberkaitsekeskuse korraldatud õppuse võitis Rootsi [Võrguväljaanne]Ots, Maiterr.ee2021 https://www.err.ee/1608180778/nato-kuberkaitsekeskuse-korraldatud-oppuse-voitis-rootsi
- NATO õppusel häkiti vaenlase taristutAllik, Henry-LaurPostimees2021 / Lk. 2 https://dea.digar.ee/article/postimees/2021/12/13/3.1
- NATO's large-scale cyberdefense exercise Locked Shields underway in Tallinn [Online resource]news.err.ee2022 https://news.err.ee/1608570133/nato-s-large-scale-cyberdefense-exercise-locked-shields-underway-in-tallinn
- Navigating a Finnish take on international law : interview with Ambassador Marja Lehto, Senior Expert on Public International Law at the Ministry of Foreign Affairs, FinlandDirections : Cyber Digital Europe2020 https://directionsblog.eu/navigating-a-finnish-take-on-international-law/
- NCSS: A global census of national positions on conflict, neutrality and cooperationSerrano-Iova, Radu-Antonio; Watashiba, TomoeProceedings of the 22nd European Conference on Cyber Warfare and Security2023 / p. 420-428 : ill https://papers.academic-conferences.org/index.php/eccws/issue/view/20/23
- Netflow based framework for identifying anomalous end user nodesVaarandi, Risto; Pihelgas, MaunoProceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 20202020 / p. 448-456 https://doi.org/10.34190/ICCWS.20.035
- Network IDS alert classification with active learning techniquesVaarandi, Risto; Guerra-Manzanares, AlejandroJournal of Information Security and Applications2024 / art. 103687 https://doi.org/10.1016/j.jisa.2023.103687 https://www.scopus.com/sourceid/21100332403 https://www.scopus.com/sourceid/21100332403 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=J%20INF%20SECUR%20APPL&year=2023 https://www.webofscience.com/wos/woscc/full-record/WOS:001158335700001
- Noored häkkerid võtavad mõõtu Eesti suurimal kübervõistlusel [Võrguväljaanne]postimees.ee2022 https://haridus.postimees.ee/7661447/noored-hakkerid-votavad-mootu-eesti-suurimal-kubervoistlusel
- Nuhkiv Hiina: murekoht või liialdatud hirm?Tammet, TanelTrialoog2025 https://trialoog.taltech.ee/nuhkiv-hiina-murekoht-voi-liialdatud-hirm/
- Nutiseadme abil õpitakse meil liiga väheLorenz, BirgyÕpetajate Leht2020 / Lk. 6 https://opleht.ee/?s=nutiseadme+abil+%C3%B5pitakse+meil+
- Obtaining better metrics for complex serious games within virtualised simulation environmentsMäses, Sten; Hallaq, Bil; Maennel, Olaf Manuel11th European Conference on Games Based Learning (ECGBL 2017) : Graz, Austria, 5 - 6 October 20172017 / p. 428-434 : ill http://www.scopus.com/inward/record.uri?eid=2-s2.0-85036459293&partnerID=40&md5=2ba817e29bec893e126f50a3d4ede83c
- Offensive cyber operations exercise kicks off in Estonia [Online resource]news.err.ee2021 https://news.err.ee/1608427058/offensive-cyber-operations-exercise-kicks-off-in-estonia
- On the relationship between health sectors' digitalization and sustainable health goals : a cyber security perspectiveSütterlin, Stefan; Knox, Benjamin James; Maennel, Kaie; Canham, Matthew; Lugo, Ricardo GregorioTransitioning to good health and well-being2022 / 22 p https://www.mdpi.com/books/pdfdownload/edition/1245
- Operator impressions of 3D visualizations for cybersecurity analystsKullman, Kaur; Ben-Asher, Noam; Sample, CharProceedings of the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 20192019 / p. 257–266 https://www.researchgate.net/publication/334226184_Operator_Impressions_of_3D_Visualizations_for_Cybersecurity_Analysts
- Operator impressions of 3D visualizations for cybersecurity analystsKullman, Kaur; Ben-Asher, Noam; Sample, CharAbstracts and conference materials for the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 20192019 / p. 31-32 https://www.academic-conferences.org/conferences/eccws/eccws-future-and-past/
- Opportunities and challenges in the cyber-space nexusCarlo, Antonioispionline2023 https://www.ispionline.it/en/publication/opportunities-and-challenges-in-the-cyber-space-nexus-153013
- Otse pühapäeval kell 11.30: Targa Tuleviku Tuleproov ja Kübernaaskel 2023err.ee2023 https://www.err.ee/1609117271/otse-puhapaeval-kell-11-30-targa-tuleviku-tuleproov-ja-kubernaaskel-2023
- An overview of the functions of smart grids associated with virtual power plants including cybersecurity measuresAlvi, Anas Abdullah; Romero-Cadaval, Enrique; González-Romera, Eva; Hassan, Jamil; Vinnikov, DmitriTechnological innovation for connected cyber physical spaces : 14th IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2023, Caparica, Portugal, July 5-7, 2023 : proceedings2023 / p. 95 - 107 https://doi.org/10.1007/978-3-031-36007-7_7 https://www.scopus.com/sourceid/19400157163 https://www.scopus.com/record/display.uri?eid=2-s2.0-85164908707&origin=inward&txGid=09b4705801293d585b3da03c8eedb859
- Oxfordi ülikool toob teadmised kaasaegsest infoühiskonnast TTÜ-sseKello, LucasStudioosus2015 / lk. 18-19 https://www.ester.ee/record=b1558644*est
- Paljastus sajandi suurim tarkvaraprobleemPiir, Rait; Malmberg, Kristi; Tammet, TanelPostimees2018 / lk. 10 https://tehnika.postimees.ee/4365317/ttu-professor-suurest-kiibiveast-paljastus-sajandi-tosiseim-turvaprobleem
- Parabasis : Cyber-diplomacy in StalemateTikk, Eneken; Kerttunen, Mika2018 https://www.academia.edu/38195740/Tikk_Kerttunen_Parabasis_Cyber-diplomacy_in_stalemate.pdf
- PASCAL : timing SCA resistant design and verification flowLai, Xinhui; Jenihhin, Maksim; Raik, Jaan; Paul, Kolin2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS 2019) : 1-3 July 2019, Greece2019 / p. 239-242 : ill https://doi.org/10.1109/IOLTS.2019.8854458
- Patient informed consent, ethical and legal considerations in the context of digital vulnerability with smart, cardiac implantable electronic devicesTorgersen, Leanne N.S.; Schulz, Stefan M.; Lugo, Ricardo Gregorio; Sütterlin, StefanPLOS Digital Health2024 / art. e0000507 https://doi.org/10.1371/journal.pdig.0000507
- Pedagogical challenges and ethical considerations in developing critical thinking in cybersecurityLorenz, Birgy; Kikkas, KaidoProceedings IEEE 20th International Conference on Advanced Learning Technologies, ICALT 2020 : 6–9 July 2020, Online2020 / p. 262-263 https://doi.org/10.1109/ICALT49669.2020.00085
- Piiri ületavaid sõidukeid valgustavad läbi Hiina riigifirma röntgenseadmed = Багаж в аэропорту и транспорт на границе просвечивает потенциально опасная китайская техникаVoltri, Johanneserr.ee2024 https://www.err.ee/1609256217/piiri-uletavaid-soidukeid-valgustavad-labi-hiina-riigifirma-rontgenseadmed
- Pitfalls of machine learning methods in smart grids : a legal perspectiveAntonov, Alexander; Häring, Tobias; Korõtko, Tarmo; Rosin, Argo; Kerikmäe, Tanel; Biechl, Helmuth2021 International Symposium on Computer Science and Intelligent Controls :(ISCSIC 2021), 12-14 November 2021, Rome, Italy : proceedings2021 / p. 248-256 https://doi.org/10.1109/ISCSIC54682.2021.00053
- A pragmatic methodology for blind hardware trojan insertion in finalized layoutsHepp, Alexander; Perez, Tiago Diadami; Pagliarini, Samuel Nascimento; Sigl, GeorgICCAD '22: Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design2022 / art. 69, p. 1-9 : ill https://doi.org/10.1145/3508352.3549452 https://www.scopus.com/sourceid/51882 https://www.scopus.com/record/display.uri?eid=2-s2.0-85137785373&origin=inward&txGid=b339c373005c47ea7212f2cc0bbbf3de https://www.webofscience.com/wos/woscc/full-record/WOS:000981574300068
- PrefaceBellatreche, Ladjel; Chernishev, George; Corral, Antonio; Ouchani, Samir; Vain, JüriAdvances in Model and Data Engineering in the Digitalization Era : MEDI 2021 International Workshops : DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21–23, 2021 : proceedings2021 / p. v-vii https://link.springer.com/content/pdf/bfm:978-3-030-87657-9/1?pdf=chapter%20toc https://www.scopus.com/sourceid/17700155007 https://www.scopus.com/record/display.uri?eid=2-s2.0-85117443149&origin=inward&txGid=b80cd4b99e9759e9dca9695df9d59373
- Preliminary analysis of cyberterrorism threats to internet of things (IoT) applicationsBalogun, Taofeek Mobolarinwa; Bahsi, Hayretdin; Karabacak, BilgeTerrorists' use of the Internet2017 / p. 49-58 http://doi.org/10.3233/978-1-61499-765-8-49
- Preliminary analysis of cyberterrorism threats to internet of things (IoT) applications [Online resource]Bahsi, HayretdinAdvanced Research Workshop supported by the NATO Science for Peace and Security Programme, Terrorists’ Use of the Internet : assessment and response2016 / p. 8 http://www.cyberterrorism-project.org/wp-content/uploads/2016/11/Terrorists%E2%80%99-Use-of-the-Internet-Assessment-and-Response.pdf
- President Alar Karis külastas FinEst Targa Linna Tippkeskustgoodnews.ee2023 https://eestielu.goodnews.ee/president-alar-karis-kulastas-finest-targa-linna-tippkeskust/?utm_source=rss&utm_medium=rss&utm_campaign=president-alar-karis-kulastas-finest-targa-linna-tippkeskust
- President Karis kohtumisel Küprose riigipeaga: surve Venemaale sõja lõpetamiseks ja igakülgne toetus Ukrainale on praegu esmatähtsad [Võrguväljaanne]lounaeestlane.ee2022 https://lounaeestlane.ee/president-karis-kohtumisel-kuprose-riigipeaga-surve-venemaale-soja-lopetamiseks-ja-igakulgne-toetus-ukrainale-on-praegu-esmatahtsad/
- Principles of eVoting system security evaluationTepandi, Jaak; Forsgren, O.Innovation and the knowledge economy : issues, applications, case studies. 22005 / p. 468-473
- Proceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology [Online resource]2015 http://cybercentre.cs.ttu.ee/en/icr2015/
- Proceedings of the 2nd Interdisciplinary Cyber Research Workshop 2016 [Online resource]2016 http://cybercentre.cs.ttu.ee/wp/wp-content/uploads/2016/03/CRW_2016_lingitud.pdf http://www.ester.ee/record=b4579694*est
- Proceedings of the 3rd Interdisciplinary Cyber Research Workshop 2017 : 8th of July 2017 [Online resource]2017 http://www.ester.ee/record=b4684355*est https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/crw2017_final.pdf
- Proceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 2018 [Online resource]2018 https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/CRW_2018_lingitud.pdf https://www.ester.ee/record=b5139478*est
- Process-aware security monitoring in industrial control systems: A systematic review and future directionsUr Rehman, Muaan; Bahşi, HayretdinInternational journal of critical infrastructure protection2024 / art. 100719, 19 p. : ill https://doi.org/10.1016/j.ijcip.2024.100719 https://www.scopus.com/sourceid/17300154971 https://www.scopus.com/record/display.uri?eid=2-s2.0-85205894297&origin=resultslist&sort=plf-f&src=s&sot=b&sdt=b&s=ALL%28Process-aware+security+monitoring+in+industrial+control+systems%3A+A+systematic+review+and+future+directions%29&sessionSearchId=a1950993a8713b95c4defac4e2fbf8c1&relpos=1 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=INT%20J%20CRIT%20INFR%20PROT&year=2023 https://www.webofscience.com/wos/woscc/full-record/WOS:001332782900001
- Programmi RITA tegevuse 1 projekti „Masinõppe ja AI toega teenused“ lõpparuanneSolvak, Mihkel; Vilo, Jaak; Reisberg, Sulev; Tamm, Sirli; Oja, Marek; Ligi, Kadri; Unt, Taavi; Võrk, Andres; Leets, Peeter; Tammet, Tanel; Vaarandi, Risto; Nõmm, Sven; Lepik, Toomas; Lember, Veiko; Nõmmik, Steven; Noordt, Colin Pascal van; Kerikmäe, Tanel2022 https://www.etag.ee/wp-content/uploads/2022/05/RITA_MAITT_LOPPARUANNE_FINAL.pdf
- Pronksiöö tõi küberkaitse õppekava : [magistritaseme õppes TÜ ja TTÜ koostöös]Tisler, EveUniversitas Tartuensis : UT : Tartu Ülikooli ajakiri2010 / märts, lk. 22-23 : fot
- Pühapäeval käivitatakse küberkuu suure võistlus- ja messipäevagapealinn.ee2023 https://pealinn.ee/2023/09/30/puhapaeval-kaivitatakse-kuberkuu-suure-voistlus-ja-messipaevaga/
- Raamatukogude roll ohutuma küberruumi loomiselKont, Kate-RiinRaamatukogu2022 / lk. 22-25 https://www.ester.ee/record=b1817020*est https://issuu.com/nlib/docs/2022_6_veeb
- Rain Ottis : tõsised mängud kübermaailmas [Võrguväljaanne}Ottis, Rainerr.ee2019 / fot https://www.err.ee/935979/rain-ottis-tosised-mangud-kubermaailmas
- Rain Ottis : "Tähtis on teha asju, millesse ise usud!"Alas, AskurMente et Manu2016 / lk. 12-17 : fot https://www.ester.ee/record=b1242496*est https://artiklid.elnet.ee/record=b2767544*est
- Rain Ottis: "Tähtis on teha asju, millesse ise usud!"Alas, Askur; Ottis, RainEesti Ekspress2015 / Koolitusekspress, lk. 2-3
- REACT: Autonomous intrusion response system for intelligent vehiclesHamad, Mohammad; Finkenzeller, Andreas; Kühr, Michael; Roberts, Andrew James; Maennel, Olaf; Steinhorst, Sebastian; Prevelakis, VassilisComputers and security2024 / art. 104008, 17 p. : ill https://doi.org/10.1016/j.cose.2024.104008 https://www.scopus.com/sourceid/28898 https://www.scopus.com/record/display.uri?eid=2-s2.0-85199489024&origin=resultslist&sort=plf-f&src=s&sot=b&sdt=b&s=ALL%28%22REACT%3A+Autonomous+intrusion+response+system+for+intelligent+vehicles%22%29&sessionSearchId=a1950993a8713b95c4defac4e2fbf8c1&relpos=0 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=COMPUT%20SECUR&year=2023 https://www.webofscience.com/wos/woscc/full-record/WOS:001283366300001
- Recommendations for enhancing the results of cyber effectsOrye, Erwin; Maennel, Olaf Manuel2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings2019 / p. 103-121 https://www.ester.ee/record=b5197210*est https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf https://doi.org/10.23919/CYCON.2019.8756649
- Regulatory patterns of the Internet development : expanding the role of private stakeholders through mediatized "self-regulation"Solarte Vasquez, Maria ClaudiaBaltic journal of European studies2013 / p. 84-120 https://artiklid.elnet.ee/record=b2646912*est
- A reinforcement learning routing protocol for UAV aided public safety networksMinhas, Hassan Ishtiaq; Ahmad, Rizwan; Ahmed, Waqas; Waheed, Maham; Alam, Muhammad Mahtab; Gul, Sufi TabassumSensors2021 / Art. nr. 4121 https://doi.org/10.3390/s21124121 https://www.scopus.com/sourceid/130124 https://www.scopus.com/record/display.uri?eid=2-s2.0-85107869602&origin=inward&txGid=a8f09d2bcfcf1bc0ce6cd787344a7f53 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=SENSORS-BASEL&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000666670500001
- Relationships between access to information and the effect of the terrorist behaviorTepandi, Jaak; Vassiljev, StanislavSCI 2004 : the 8th World Multi-Conference on Systemics, Cybernetics and Informatics : July 18-21, 2004, Orlando, Florida, USA. Volume 1, Information Systems, Technologies and Applications : proceedings2004 / p. 341-346
- Remote exploit development for cyber red team computer network operations targeting industrial control systemsBlumbergs, BernhardsProceedings of the 5th International Conference on Information Systems Security and Privacy : ICISSP 2019 : February 23-25, 2019, Prague, Czech Republic. Vol. 12019 / p. 88-99 : ill https://doi.org/10.5220/0007310300880099
- Remote technical labs : an innovative and scalable component for university cybersecurity program admissionMaennel, Kaie; Kivimägi, Kristian; Maennel, Olaf Manuel; Sütterlin, Stefan; Ernits, MargusEducating Engineers for Future Industrial Revolutions : Proceedings of the 23rd International Conference on Interactive Collaborative Learning (ICL2020). Volume 22021 / p. 521-533 https://doi.org/10.1007/978-3-030-68201-9_51 https://www.scopus.com/sourceid/5100152904 https://www.scopus.com/record/display.uri?eid=2-s2.0-85103514589&origin=inward&txGid=2deafd8b0419ce61e1b8b309fd7ec89c https://www.webofscience.com/wos/woscc/full-record/WOS:000772405700051
- Restrictions of Russian internet resources in Ukraine : national security, censorship or both?Shumilo, Olga; Kerikmäe, Tanel; Chochia, ArchilBaltic journal of European studies2019 / p. 82–95 https://doi.org/10.1515/bjes-2019-0023 https://www.ester.ee/record=b2675037*est https://www.scopus.com/sourceid/21100448016 https://www.scopus.com/record/display.uri?eid=2-s2.0-85078607026&origin=inward&txGid=569f547e2b0f3adc534c63b93adff264 https://www.webofscience.com/wos/woscc/full-record/WOS:000504019400005
- Resynthesis-based attacks against logic lockingAlmeida, Felipe; Aksoy, Levent; Nguyen, Quang-Linh; Dupuis, Sophie; Flottes, Marie-Lise; Pagliarini, Samuel Nascimento2023 24th International Symposium on Quality Electronic Design (ISQED) : San Francisco, 5-7 April 20232023 / 8 p. : ill https://doi.org/10.1109/ISQED57927.2023.10129403 https://www.scopus.com/record/display.uri?eid=2-s2.0-85161555775&origin=resultslist&sort=plf-f&src=s&sid=d75ef4f2e771071f4016a3777c77ec72&sot=b&sdt=b&s https://www.webofscience.com/wos/woscc/full-record/WOS:001013619400077
- Riistvara Trooja hobuste rünnak võib ohustada nii koduarvuti kasutajat kui ka riigi digitaalset julgeolekut [Võrguväljaanne]arileht.delfi.ee2022 https://arileht.delfi.ee/artikkel/96564343/riistvara-trooja-hobuste-runnak-voib-ohustada-nii-koduarvuti-kasutajat-kui-ka-riigi-digitaalset-julgeolekut
- The Role of IT Background for Metacognitive Accuracy, Confidence and Overestimation of Deep Fake Recognition SkillsSütterlin, Stefan; Lugo, Ricardo Gregorio; Ask, Torvald F.; Veng, Karl; Eck, Jonathan; Fritschi, Jonas; Özmen, Muhammed-Talha; Bärreiter, Basil; Knox, Benjamin JamesAugmented Cognition : 16th International Conference, AC 2022, Held as Part of the 24th HCI International Conference, HCII 2022. Virtual Event, June 26 - July 1, 2022, proceedings2022 / p. 103-119 https://doi.org/10.1007/978-3-031-05457-0_9
- Routledge handbook of international cybersecurity2020 https://doi.org/10.4324/9781351038904 https://www.ester.ee/record=b5308475*est
- Safeguarding a formalized blockchain-enabled identity-authentication protocol by applying security risk-oriented patternsNorta, Alexander; Matulevičius, Raimundas; Leiding, BenjaminComputers & Security2019 / p. 253−269 https://doi.org/10.1016/j.cose.2019.05.017 https://www.scopus.com/sourceid/28898 https://www.scopus.com/record/display.uri?eid=2-s2.0-85068181119&origin=inward&txGid=c4272b532e8bdb269f1498304362354d https://jcr.clarivate.com/jcr-jp/journal-profile?journal=COMPUT%20SECUR&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000483406200015
- Safeguarding the final frontier : analyzing the legal and technical challenges to mega-constellationsJha, Devanshu; Manti, Nebile Pelin; Carlo, Antonio; Zarkan, Laetitia Cesari; Breda, Paola; Jha, AntaraJournal of space safety engineering2022 / p. 636-643 https://doi.org/10.1016/j.jsse.2022.08.006 https://www.scopus.com/sourceid/21100871641 https://www.scopus.com/record/display.uri?eid=2-s2.0-85137713301&origin=inward&txGid=f0dd7a63804a0f58feccd059d28cdc58 https://www.webofscience.com/wos/woscc/full-record/WOS:001117148200007
- Scalable and efficient authentication scheme for secure smart grid communicationHammami, Hamza; Ben Yahia, Sadok; Obaidat, Mohammad S.IET Networks2020 / p. 165-169 https://doi.org/10.1049/iet-net.2019.0225 https://www.scopus.com/sourceid/21100394100 https://www.scopus.com/record/display.uri?eid=2-s2.0-85089677801&origin=inward&txGid=a89b71b9ad30e3a2d2996a1fcc4ee138 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=IET%20NETW&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000552132700003
- Sectoral cybersecurity skills gap : The case of maritime cybersecurity certification trainingKyranoudi, Pinelopi; Polemi, Nineta; Rathod, Paresh; Lugo, Ricardo Gregorio; Ioannidis, Sotiris; Ofem, PaulinusProceedings of the 30th ICE IEEE/ITMC Conference on Engineering, Technology, and Innovation: Digital Transformation on Engineering, Technology and Innovation, ICE 2024 2024 IEEE International Conference on Engineering, Technology, and Innovation (ICE/ITMC)2024 / 9 p https://doi.org/10.1109/ICE/ITMC61926.2024.10794272
- A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption methodVedešin, Anton; Dogru, John Mehmet Ulgar; Liiv, Innar; Ben Yahia, Sadok; Draheim, DirkIEEE Access2020 / p. 40039-40056 : ill https://doi.org/10.1109/ACCESS.2019.2946730 https://www.scopus.com/sourceid/21100374601 https://www.scopus.com/record/display.uri?eid=2-s2.0-85081594046&origin=inward&txGid=0c4166bb3f0d52bd4b97e8e8e3b6ff04 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=IEEE%20ACCESS&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000525550300011
- Securing airline-turnaround processes using security risk-oriented patternsSamarütel, Silver; Matulevičius, Raimundas; Norta, Alexander; Nõukas, ReinThe Practice of Enterprise Modeling : 9th IFIP WG 8.1. Working Conference, PoEM 2016, Skövde, Sweden, November 8-10, 2016 : proceedings2016 / p. 209-224 https://doi.org/10.1007/978-3-319-48393-1_15 https://www.scopus.com/sourceid/17500155101 https://www.scopus.com/record/display.uri?eid=2-s2.0-84994835004&origin=inward&txGid=0ef0cae804e77bfd4514574b0bab9a24 https://www.webofscience.com/wos/woscc/full-record/WOS:000398841300015
- Securing free and fair European ElectionsWenda, Gregor; Stein, RobertJusletter IT Internet of Things - Digital Edition of Proceedings of the 22nd International Legal Informatics Symposium 2019 : proceedings2019 https://jusletter-it.weblaw.ch/en/issues/2019/IRIS/volksbegehren-online_d9db4211c5.html__ONCE&login=false
- Securing outer space through cyber : risks and countermeasuresCarlo, Antonio; Casamassima, FrancescaIAC 2021 congress proceedings2021 / art. 64939 https://dl.iafastro.directory/event/IAC-2021/paper/64939/ https://www.scopus.com/sourceid/21100255701 https://www.scopus.com/record/display.uri?eid=2-s2.0-85127453125&origin=inward&txGid=4531c27593a436cb8cfbec6b01cd95ae
- Securing self-aware cyber-physical systems using digital twinsMeeran, Mohammad Tariq2024 19th Biennial Baltic Electronics Conference (BEC)2024 / 5 p. : ill https://doi.org/10.1109/BEC61458.2024.10737954 https://www.scopus.com/sourceid/21100228125 https://www.scopus.com/record/display.uri?eid=2-s2.0-85210592252&origin=resultslist&sort=plf-f&src=s&sot=b&sdt=b&s=TITLE-ABS-KEY%28%22Securing+Self-aware+Cyber-physical+Systems+Using+Digital+Twins%22%29&sessionSearchId=720044c030ecd4be2c873494c1a60274&relpos=0
- Security risk management in the aviation turnaround sectorMatulevičius, Raimundas; Norta, Alexander; Udokwu, Chibuzor; Nõukas, ReinFuture Data and Security Engineering : Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016 : proceedings2016 / p. 119-140 : ill https://doi.org/10.1007/978-3-319-48057-2_8 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-84995543015&origin=inward&txGid=f3f2bf5968c6599904f8f7a98d1ecc15 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=LECT%20NOTES%20ARTIF%20INT&year=2005 https://www.webofscience.com/wos/woscc/full-record/WOS:000583654100008
- Security-by-design approaches for critical infrastructure : mapping the landscape of cyber and space lawCarlo, Antonio; Salmeri, AntoninoNATO legal gazette2021 / p. 97-113 https://www.act.nato.int/wp-content/uploads/2023/05/legal_gazette_42.pdf
- Service measurement map for large-scale cyber defense exercisesPihelgas, Mauno; Rubio Melon, Francisco Jesus; Priisalu, JaanCyber Defence Situation Awareness : STO-MP-IST-1482016 / p. 9-1 - 9-10 : ill http://dx.doi.org/10.14339/STO-MP-IST-148
- Shortcomings in cybersecurity education for seafarersHeering, Dan; Maennel, Olaf Manuel; Venables, Adrian NicholasDevelopments in Maritime Technology and Engineering : Celebrating 40 years of teaching in Naval Architecture and Ocean Engineering in Portugal and the 25th anniversary of CENTEC, Volume 12021 / p. 49−61 https://doi.org/10.1201/9781003216582
- Side-channel Trojan insertion - a practical foundry-side attack via ECOPerez, Tiago Diadami; Imran, Malik; Vaz, Pablo; Pagliarini, Samuel Nascimento2021 IEEE International Symposium on Circuits and Systems (ISCAS), Daegu, Korea, May 22-28, 2021 : proceedings2021 / 5 p. : ill https://doi.org/10.1109/ISCAS51556.2021.9401481 https://www.scopus.com/sourceid/56190 https://www.scopus.com/record/display.uri?eid=2-s2.0-85109036293&origin=inward&txGid=ab42f2e6641a52d32027b1dc4f2126b6 https://www.webofscience.com/wos/woscc/full-record/WOS:000706507900007
- Signature-based approach to detecting malicious outgoing trafficPetliak, Nataliia; Klots, Yurii; Titova, Vira; Cheshun, Viktor; Boyarchuk, ArtemIntelITSIS 2023: Intelligent Information Technologies & Systems of Information Security 2023 : proceedings of the 4th International Workshop on Intelligent Information Technologies & Systems of Information Security : Khmelnytskyi, Ukraine, March 22-24, 20232023 / p. 486 - 506 https://ceur-ws.org/Vol-3373/paper33.pdf https://www.scopus.com/sourceid/21100218356 https://www.scopus.com/record/display.uri?eid=2-s2.0-85154051773&origin=inward&txGid=a0cdf0b694b441556d5cc34c9da83f6c
- Simulating a cyber-attack on an autonomous sea surface vessel's rudder controllerAstrov, Igor; Bauk, Sanja2024 13th Mediterranean Conference on Embedded Computing (MECO), 11-14 June 2024, Budva, Montenegro2024 / 7 p. : ill https://doi.org/10.1109/MECO62516.2024.10577872 https://www.scopus.com/record/display.uri?eid=2-s2.0-85199487761&origin=resultslist&sort=plf-f&src=s&sot=b&sdt=b&s=ALL%28%22Simulating+a+cyber-attack+on+an+autonomous+sea+surface+vessel%27s+rudder+controller%22%29&sessionSearchId=f53bb18a788748acab088b0e35200e2d&relpos=1 https://www.webofscience.com/wos/woscc/full-record/WOS:001268606200063
- Simulating a cyber-attack on an autonomous sea surface vessel's rudder controllerAstrov, Igor; Bauk, Sanja2024 13th Mediterranean Conference on Embedded Computing, MECO 20242024 / 1 p. https://journals.scholarsportal.info/browse/26379511
- Situational states influence on team workload demands in cyber defense exerciseAsk, Torvald F.; Sütterlin, Stefan; Knox, Benjamin James; Lugo, Ricardo GregorioHCI International 2021 - late breaking papers : cognition, inclusion, learning, and culture : 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021 : proceedings2021 / p. 3-20 : ill https://doi.org/10.1007/978-3-030-90328-2_1 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85119873108&origin=inward&txGid=3b556645514ef2c78a66b5799d8dadbd https://jcr.clarivate.com/jcr-jp/journal-profile?journal=LECT%20NOTES%20ARTIF%20INT&year=2005 https://www.webofscience.com/wos/woscc/full-record/WOS:000765928500001
- Small unmanned surface vessels — a review and critical analysis of relations to safety and safety assurance of larger autonomous shipsBolbot, Victor; Sandru, Andrei; Saarniniemi, Ture; Puolakka, Otto; Kujala, Pentti Jouko Sakari; Valdez Banda, Osiris A.Journal of marine science and engineering2023 / art. 2387, 38 p. : ill https://doi.org/10.3390/jmse11122387 https://www.scopus.com/sourceid/21100830140 https://www.scopus.com/record/display.uri?eid=2-s2.0-85180642087&origin=inward&txGid=51a7b19c9ab9672bde7a7ed75db25e7b https://jcr.clarivate.com/jcr-jp/journal-profile?journal=J%20MAR%20SCI%20ENG&year=2023 https://www.webofscience.com/wos/woscc/full-record/WOS:001131208400001
- Software technology for cyber security simulations = Tarkvaratehnika küberturbe simulatsioonide jaoksOjamaa, Andres2016 http://www.ester.ee/record=b4640099*est
- Space as NATO’s operational domain : the case of the cyberthreats against GNSSZarkan Cesari, Laetitia; Carlo, Antonio; Roux, Lucille; Toukebri, Raina; Pelin Manti, NebileIAC 2021 congress proceedings2021 / art. 66298 https://dl.iafastro.directory/event/IAC-2021/paper/66298/
- Specialized cyber red team responsive computer network operations = Vastutegevusele orienteeritud punase meeskonna küberoperatsioonidBlumbergs, Bernhards2019 https://digi.lib.ttu.ee/i/?12015
- ‘Spill Over’ and ‘Fail Forward’ in the EU’s Cybersecurity RegulationsKasper, Agnes; Osula, Anna-MariaDigital development of the European Union : an interdisciplinary perspective2023 / p. 21-44 : ill https://doi.org/10.1007/978-3-031-27312-4_3 https://www.ester.ee/record=b5557935*est
- Standing Committee on Cyber SecurityMõtus, LeoEstonian Academy of Sciences year book = Annales Academiae Scientiarum Estonicae 20132014 / p. 44-45
- Status Detector for Fuzzing-Based Vulnerability Mining of IEC 61850 ProtocolVisky, Gabor; Lavrenovs, Arturs; Maennel, Olaf ManuelProceeding of the 20th European Conference on Cyber Warfare and Security2021 / p. 454-461 https://doi.org/10.34190/EWS.21.007
- Stenmap : framework for evaluating cybersecurity-related skills based on computer simulationsMäses, Sten; Randmann, Liina; Maennel, Olaf Manuel; Lorenz, BirgyLearning and Collaboration Technologies : Learning and Teaching : 5th International Conference : LCT 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018 : Proceedings, Part II2018 / p. 492-504 https://doi.org/10.1007/978-3-319-91152-6_38 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85050483501&origin=inward&txGid=b02c58d535d0cef55da41247d5ec7429 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=LECT%20NOTES%20ARTIF%20INT&year=2005 https://www.webofscience.com/wos/woscc/full-record/WOS:000554414000038
- Strategic cyber security : evaluating nation-state cyber attack mitigation strategies with DEMATEL = Strateegiline küberjulgeolek : küberrünnaku leevendamise strateegiate hindamine riiklikul tasandil : DEMATEL-i meetodGeers, Kenneth2011 https://digi.lib.ttu.ee/i/?592
- Strategically normative. Norms and principles in national cybersecurity strategiesKerttunen, Mika; Tikk, Eneken2019 https://eucyberdirect.eu/wp-content/uploads/2019/04/kerttunen_tikk-strategically-normative-april-2019-eucyberdirect_.pdf
- A stream clustering algorithm for classifying network IDS alertsVaarandi, RistoProceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings2021 / p. 14-19 https://doi.org/10.1109/CSR51186.2021.9527926
- Stream clustering guided supervised learning for classifying NIDS alertsVaarandi, Risto; Guerra Manzanares, AlejandroFuture generation computer systems2024 / p. 231-244 : ill https://doi.org/10.1016/j.future.2024.01.032 https://www.scopus.com/sourceid/12264 https://www.scopus.com/record/display.uri?eid=2-s2.0-85185711530&origin=resultslist&sort=plf-f&src=s&sot=b&sdt=b&s=ALL%28%22Stream+clustering+guided+supervised+learning+for+classifying+NIDS+alerts%22%29&sessionSearchId=fd90d0e9983d9a88c6a21e7c6aafecbb&relpos=0 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=FUTURE%20GENER%20COMP%20SY&year=2023 https://www.webofscience.com/wos/woscc/full-record/WOS:001188873700001
- Success factors for designing a cybersecurity exercise on the example of incident responseMäses, Sten; Maennel, Kaie; Toussaint, Mascia; Rosa, Veronica2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)2021 / p. 259-268 https://doi.org/10.1109/EuroSPW54576.2021.00033
- Survey on architectural attacks : a unified classification and attack modelGhasempouri, Tara; Raik, Jaan; Reinbrecht, Cezar; Hamdioui, Said; Hamdioui, SaidACM Computing Surveys2023 / art. 42 https://doi.org/10.1145/3604803 https://www.scopus.com/sourceid/23038 https://www.scopus.com/record/display.uri?eid=2-s2.0-85174677921&origin=resultslist&sort=plf-f&src=s&sid=5017a1c9d633ac6f0480b4ae72b5920a&sot=b&sdt=b&s=TITLE-ABS-KEY%28%22Survey+on+Architectural+Attacks%3A+A+Unified+Classification+and+Attack+Model%22%29&sl=91&sessionSearchId=5017a1c9d633ac6f0480b4ae72b5920a&relpos=0 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=ACM%20COMPUT%20SURV&year=2023 https://www.webofscience.com/wos/woscc/full-record/WOS:001085637600017
- Surveying pervasive public safety communication technologies in the context of terrorist attacksMasood, Ali; Scazzoli, Davide; Sharma, Navuday; Le Moullec, Yannick; Ahmad, Rizwan; Reggiani, Luca; Magarini, Maurizio; Alam, Muhammad MahtabPhysical communication2020 / art. 101109, https://doi.org/10.1016/j.phycom.2020.101109 https://www.scopus.com/sourceid/11300153720 https://www.scopus.com/record/display.uri?eid=2-s2.0-85084543208&origin=inward&txGid=e0516996ab3588cdcae832c95ddbfe56 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=PHYS%20COMMUN-AMST&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000540750200024
- Suurõppusel harjutatakse läbi vaenuliku saareriigi küberrünnakud naaberriigilePulk, Meinhardpostimees.ee2023 https://www.postimees.ee/7757513/suuroppusel-harjutatakse-labi-vaenuliku-saareriigi-kuberrunnakud-naaberriigile
- Suvekool: kas sina pead nendele IT-küsimustele vastamiseks spikerdama?digi.geenius.ee2024 https://digi.geenius.ee/blogi/teadus-ja-tulevik/suvekool-kas-sina-pead-nendele-it-kusimustele-vastamiseks-spikerdama/
- System for determination of legal responsibility/penalty for a cybersecurity breachHovorushchenko, Tetiana; Herts, Alla; Boyarchuk, Artem; Pavlova, OlgaITTAP 2022 - Proceedings of the 2nd International Workshop on Information Technologies: Theoretical and Applied Problems2022 / p. 233-240 https://ceur-ws.org/Vol-3309/short9.pdf https://www.scopus.com/sourceid/21100218356 https://www.scopus.com/record/display.uri?eid=2-s2.0-85145587592&origin=inward&txGid=b66b16368f4151beb46ccde98c0e510a
- A systematic approach to offensive volunteer cyber militiaOttis, Rain2011 http://www.ester.ee/record=b2685353*est
- Systematic literature review of threat modeling and risk assessment in ship cybersecurityErbas, Muhammed; Khalil, Shaymaa Mamdouh; Tsiopoulos, LeonidasOcean engineering2024 / art. 118059 https://doi.org/10.1016/j.oceaneng.2024.118059 https://www.scopus.com/sourceid/28339 https://www.scopus.com/record/display.uri?eid=2-s2.0-85191986724&origin=resultslist&sort=plf-f&src=s&sot=b&sdt=b&s=ALL%28%22Systematic+literature+review+of+threat+modeling+and+risk+assessment+in+ship+cybersecurity%22%29&sessionSearchId=fd90d0e9983d9a88c6a21e7c6aafecbb&relpos=2 https://www.scopus.com/sourceid/28339 https://www.webofscience.com/wos/woscc/full-record/WOS:001239240200001
- Tallinn võõrustab taas suurt rahvusvahelist küberkaitseõppustLiiviste, Priitpealinn.ee2022 https://pealinn.ee/2022/04/20/tallinn-voorustab-taas-suurt-rahvusvahelist-kuberkaitseoppust/
- Tallinnas toimub Eesti-Poola ühine küberturbe konverents [Võrguväljaanne]am.ee2022 https://www.am.ee/node/8605
- Tallinnas toimuva küberturbe konverentsi korraldajad: Ida-Euroopa hääl peab olema kuulda ka Brüsselis ja väljaspool Euroopa Liitudigi.geenius.ee2023 https://digi.geenius.ee/blogi/teadus-ja-tulevik/tallinnas-toimuva-kuberturbe-konverentsi-korraldajad-ida-euroopa-haal-peab-olema-kuulda-ka-brusselis-ja-valjaspool-euroopa-liitu/
- Taltech avaldas, mis erialad toovad taskusse kahekordse keskmise palgapostimees.ee2023 https://majandus.postimees.ee/7749532/taltech-avaldas-mis-erialad-toovad-taskusse-kahekordse-keskmise-palga
- TalTech hoiatab petukirjade eest [Võrguväljaanne]Laan, Triinuohtuleht.ee2021 https://www.ohtuleht.ee/1042617/taltechhoiatab-petukirjade-eest
- TalTech issues spam email warning [Võrguväljaanne]err.ee2021 https://news.err.ee/1608327860/taltech-issues-spam-email-warning
- TalTech korraldab mahuka infoturbejuhtide koolitusprogrammiam.ee2023 https://www.am.ee/node/8848
- TalTech loob tüdrukutele suunatud kogumiku naistest Eesti küberturbes [Võrguväljaanne]Liiviste, Priitpealinn.ee2021 https://pealinn.ee/2021/09/15/taltech-loob-tudrukutele-suunatud-kogumiku-naistest-eesti-kuberturbes/
- TalTechi arvutisüsteemide professori uudne tehnoloogia raskendab spionaaži [Võrguväljaanne]Kald, Indrekituudised.ee2021 https://www.ituudised.ee/uudised/2021/03/15/taltechi-arvutisusteemide-professori-uudne-tehnoloogia-muudab-spionaazi-voimatuks
- TalTechi kaasatud professor Stefan Sütterlin: küberrünnakus proovitakse esimesena murda inimenedigi.geenius.ee2023 https://digi.geenius.ee/blogi/teadus-ja-tulevik/taltechi-kaasatud-professor-stefan-sutterlin-kuberrunnakus-proovitakse-esimesena-murda-inimene/
- TalTechi kõige noorem tudeng Vira naudib küberturbe tehnoloogiate maailma = Самая юная студентка TalTech Вира осваивает технологии кибербезопасностиMustamäe2024 / lk. 3 : fot https://www.ester.ee/record=b1072635*est
- TalTechi riistvara turvalisuse keskuse doktorandid saavutasid rahvusvahelisel konkurentsitihedal võistlusel kolmanda koha [Võrguväljaanne]digi.geenius.ee2022 https://digi.geenius.ee/rubriik/teadus-ja-tulevik/taltechi-riistvara-turvalisuse-keskuse-doktorandid-saavutasid-rahvusvahelisel-konkurentsitihedal-voistlusel-kolmanda-koha/
- TalTechi tarkvarateaduse instituut sai uue rakendusliku masinõppe professoriKald, Indrekituudised.ee2023 https://www.ituudised.ee/uudised/2023/12/27/taltechi-tarkvarateaduse-instituut-sai-uue-rakendusliku-masinoppe-professori
- Tartus peetud küberlahingu võitsid Rootsi eetilised häkkeridKübarsepp, Irisarileht.delfi.ee2024 https://arileht.delfi.ee/artikkel/120333624/tartus-peetud-kuberlahingu-voitsid-rootsi-eetilised-hakkerid
- Teaching pentesting to social sciences students using experiential learning techniques to improve attitudes towards possible cybersecurity careersMelnikovas, Aleksandras; Lugo, Ricardo Gregorio; Maennel, Kaie; Brilingaite, Agne; Sütterlin, Stefan; Juozapavicius, AusriusProceedings of the 22nd European Conference on Cyber Warfare and Security2023 / p. 294-302 https://doi.org/10.34190/eccws.22.1.1145
- Teadlane arutleb : missugused on moodsa kübersõja eetilised aspektid ja kas me suudame ennast kaitsta?Leier, Mairodigi.geenius.ee2024 https://digi.geenius.ee/blogi/teadus-ja-tulevik/teadlane-arutleb-missugused-on-moodsa-kubersoja-eetilised-aspektid-ja-kas-me-suudame-ennast-kaitsta/
- Teadlased loovad küberrünnakute tõrjumiseks Eesti interneti mudeli. TTÜ-s valmib spetsiaalne Eesti küberkaitse tarkvaraRoonemaa, HolgerEesti Päevaleht2010 / 23. veebr., lk. 1, 4
- Teaduse populariseerimise auhinnaga pärjatud Birgy Lorenzi jaoks on oluline noorte turvaline käitumine internetis [Võrguväljaanne]digi.geenius.ee2022 https://digi.geenius.ee/rubriik/teadus-ja-tulevik/teaduse-populariseerimise-auhinnaga-parjatud-birgy-lorenzi-jaoks-on-oluline-noorte-turvaline-kaitumine-internetis/
- Teaduste akadeemia korraldas uuringu, mille kohal lasub selge huvide konfliktPau, Aivardelfi.ee2024 https://forte.delfi.ee/artikkel/120329322/teaduste-akadeemia-korraldas-uuringu-mille-kohal-lasub-selge-huvide-konflikt
- Team learning in cybersecurity exercisesMaennel, Kaie; Kim, Joonsoo; Sütterlin, StefanProceedings of the 5th Interdisciplinary Cyber Research Conference 2019 : 29th of June 2019, Tallinn University of Technology2019 / p. 17−19 https://www.ester.ee/record=b5238490*est
- Technological sovereignty : missing the point?Maurer, Tim; Skierka-Canton, Isabel; Morgus, Robert; Hohmann, Mirko2015 7th International Conference on Cyber Conflict : Architectures in Cyberspace : 26-29 May 2015, Tallinn, Estonia2015 / p. 53-67
- TED : a container based tool to perform security risk assessment for ELF binariesMucci, Daniele; Blumbergs, BernhardsProceedings of the 5th International Conference on Information Systems Security and Privacy : ICISSP 2019 : February 23-25, 2019, Prague, Czech Republic. Vol. 12019 / p. 361–369 : tab http://doi.org/10.5220/0007371603610369
- Tehismõistus õpetab masinaidTammet, TanelTehnikamaailm2024 / lk. 60-65 : ill., fot., portr https://www.ester.ee/record=b1073050*est
- Tehnikaülikool ja NATO küberkaitsekoostöö keskus alustavad partnerlust teadus- ja õppetöösMente et Manu2017 / lk. 11 : fot http://www.ester.ee/record=b1242496*est https://artiklid.elnet.ee/record=b2830862*est
- Tehnoloogia ja küberturvalisuse tasakaal merenduses : esikohale eetika ja heaoluMaripuu, HelenaMeremees : Eesti merendusajakiri = Estonian maritime magazine2023 / lk. 6-7 : fot https://issuu.com/ajakirimeremees/docs/meremees322 https://www.ester.ee/record=b4646644*est
- The becoming of cyber-military capabilitiesSalminen, Mikko; Kerttunen, MikaRoutledge handbook of international cybersecurity2020 / p. 94-107 https://www.ester.ee/record=b5308475*est
- The EU’s common security and defence policy in facing new security challenges and its impact on cyber defenceKasper, Agnes; Mölder, HolgerThe EU in the 21st century : challenges and opportunities for the European integration process2020 / p. 271-294 https://doi.org/10.1007/978-3-030-38399-2_15
- The EU's cybersecurity : a strategic narrative of a cyber power or a confusing policy for a local common market?Kasper, Agnes; Vernygora, Vlad AlexCuadernos Europeos de Deusto = Deusto Journal of European Studies2021 / p. 29–71 https://doi.org/10.18543/ced-65-2021pp29-71 https://www.scopus.com/sourceid/21100854772 https://www.scopus.com/record/display.uri?eid=2-s2.0-85116724892&origin=inward&txGid=ee2ed084474d54bc70f5255330a67f42 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=CUAD%20EUR%20DEUSTO&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000701745500003
- The Main challenges and barriers to the successful "Smart Shipping"Alop, AnatoliTransNav: International Journal on Marine Navigation and Safety of Sea Transportation2019 / p. 521-528 https://doi.org/10.12716/1001.13.03.05
- The politics of stability: cement and change in cyber affairsKerttunen, Mika; Tikk, EnekenRoutledge handbook of international cybersecurity2020 / p. 52-64 https://www.ester.ee/record=b5308475*est https://doi.org/10.4324/9781351038904-6
- The regulatory intersections between artificial intelligence, data protection and cyber security : challenges and opportunities for the EU legal frameworkAndraško, Jozef; Mesarčik, Matuš; Hamulak, OndrejAI & Society2021 / p. 623–636 https://doi.org/10.1007/s00146-020-01125-5
- The rise of the regionals: how regional organisations contribute to international cyber stability negotiations at the United Nations levelOtt, Nikolas; Osula, Anna-Maria2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings2019 / p. 321-345 https://doi.org/10.23919/CYCON.2019.8756863 https://www.ester.ee/record=b5197210*est https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf
- The role of artificial intelligence in kinetic targeting from the perspective of international humanitarian lawRoberts, Anastasia; Venables, Adrian Nicholas2021 13th International Conference on Cyber Conflict : Going viral2021 / art. 9468301, p. 43-57 https://doi.org/10.23919/CyCon51939.2021.9468301 https://www.ester.ee/record=b5417211*est
- The role of defence in national cybersecurity get access arrowKerttunen, MikaThe Oxford handbook of cyber security2021 / p. 447–462 https://doi.org/10.1093/oxfordhb/9780198800682.013.27
- The role of the UN Security Council in cybersecurity : International peace and security in the digital ageTikk, Eneken; Schia, Niels NagelhusRoutledge handbook of international cybersecurity2020 / p. 354-356 https://doi.org/10.4324/9781351038904-35 https://www.ester.ee/record=b5308475*est
- The space-cyber nexus : ensuring the resilience, security and defence of critical infrastructure = Kosmose ja kübervaldkonna vaheline seos : elutähtsa taristu vastupanuvõime, julgeoleku ja kaitse kindlustamineCarlo, Antonio2024 https://www.ester.ee/record=b5687577*est https://digikogu.taltech.ee/et/Item/aef0d0fa-b76a-431f-800a-0b6b2ba0da74 https://doi.org/10.23658/taltech.32/2024
- Tiia Sõmer : kuidas küberkurjategijad tegutsevad ja miks nad on edukad? [võrguväljaanne]Sõmer, Tiiaerr.ee2019 / fot https://www.err.ee/947778/tiia-somer-kuidas-kuberkurjategijad-tegutsevad-ja-miks-nad-on-edukad
- Tiia Sõmer : kuidas küberkurjategijad tegutsevad ja miks nad on edukad? [võrguväljaanne]Sõmer, TiiaEdasi.org : innustav ja hariv ajakiri2019 / fot https://edasi.org/41087/tiia-somer-kuidas-kuberkurjategijad-tegutsevad-ja-miks-nad-on-edukad/
- Tiia Sõmer : kuidas küberkurjategijad tegutsevad ja miks nad on edukad? [võrguväljaanne]Sõmer, Tiiaerr.ee2019 https://www.err.ee/947778/tiia-somer-kuidas-kuberkurjategijad-tegutsevad-ja-miks-nad-on-edukad
- Tiia Sõmer: kuidas küberkurjategijad tegutsevad ja miks nad on edukad? [Võrguväljaanne]Sõmer, TiiaEdasi.org : innustav ja hariv ajakiri2019 https://edasi.org/41087/tiia-somer-kuidas-kuberkurjategijad-tegutsevad-ja-miks-nad-on-edukad/
- Time for cyber Maastricht? [Online resource]Kasper, AgnesDirections2020 https://directionsblog.eu/time-for-cyber-maastricht/
- Tippkeskus EXCITE ühendab Eesti IT-teaduse absoluutseid tippe [Võrguväljaanne]digi.geenius.ee2021 https://digi.geenius.ee/rubriik/teadus-ja-tulevik/tippkeskus-excite-uhendab-eesti-it-teaduse-absoluutseid-tippe/
- Toimus Eesti suurim häkkimisvõistlus KüberNaaskel : vaata, kes olid paremate seasgeenius.ee2022 https://digi.geenius.ee/rubriik/teadus-ja-tulevik/toimus-eesti-suurim-hakkimisvoistlus-kubernaaskel-vaata-kes-olid-paremate-seas/
- TOP SECRET TalTechi vilistlase Carl-Robert Reidolfi magistritöö pälvis riigi kõrgendatud huvi. “Me ei ela enam sõjaeelses, vaid juba sõjaaegses ühiskonnas”Reidolf, Carl-Robertdigi.geenius.ee2024 https://digi.geenius.ee/blogi/teadus-ja-tulevik/top-secret-taltechi-vilistlase-carl-robert-reidolfi-magistritoo-palvis-riigi-korgendatud-huvi-me-ei-ela-enam-sojaeelses-vaid-juba-sojaaegses-uhiskonnas/
- Towards a Cyber Maastricht : two steps forward, one step backKasper, Agnes; Vernygora, Vlad AlexThe future of the European Union : demisting the debate2020 / p. 186-210 https://www.um.edu.mt/library/oar/handle/123456789/52310 https://www.um.edu.mt/library/oar/bitstream/123456789/52310/1/Towards_a_%e2%80%98Cyber_Maastricht%e2%80%99_two_steps_forward_one_step_back_2020.pdf
- Towards a healthcare cybersecurity certification schemeHovhannisyan, Kristine; Bogacki, Piotr; Colabuono, Consuelo Assunta; Lofu, Domenico; Marabello, Maria Vittoria; Maxwell, Brady Eugen2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)2021 / p. 1-9 https://doi.org/10.1109/CyberSA52016.2021.9478255
- Towards a machine learning-based framework for DDOS attack detection in software-defined IoT (SD-IoT) networksBhayo, Jalal; Shah, Syed Attique; Hameed, Sufian; Ahmed, Awais; Nasir, Jamal; Draheim, DirkEngineering Applications of Artificial Intelligence2023 / art. 106432 https://doi.org/10.1016/j.engappai.2023.106432 https://www.scopus.com/sourceid/24182 https://www.scopus.com/record/display.uri?eid=2-s2.0-85159780293&origin=resultslist&sort=plf-f&src=s&sid=13d6b29721fc4ff8628ddb8b7c253ffa&sot=b&sdt=b&s=TITLE%28%22Towards+a+machine+learning-based+framework+for+DDOS+attack+detection+in+software-defined+IoT+%28SD-IoT%29+networks%22%29&sl=140&sessionSearchId=13d6b29721fc4ff8628ddb8b7c253ffa&relpos=0 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=ENG%20APPL%20ARTIF%20INTEL&year=2023 https://www.webofscience.com/wos/woscc/full-record/WOS:001011000000001
- Towards a resilient cyber architecture for space infrastructures : mitigating the new attack vectorsCarlo, Antonio; Pelin Manti, Nebile; Breda, Paola; Rollinde de Beaumont, Maelys; Jha, DevanshuIAC 2022 congress proceedings Proceedings of the International Astronautical Congress, IAC2023 / art. 78079 https://dl.iafastro.directory/event/IAC-2023/paper/78079/ https://www.scopus.com/record/display.uri?eid=2-s2.0-85187998432&origin=resultslist&sort=plf-f&src=s&sid=77ec5d5f45b210f7a763895548883cfe&sot=b&sdt=b&s=TITLE-ABS-KEY%28Towards+a+Resilient+Cyber+Architecture+for+Space+Infrastructures%3A+Mitigating+the+New+Attack+Vectors%29&sl=114&sessionSearchId=77ec5d5f45b210f7a763895548883cfe&relpos=0 https://www.scopus.com/sourceid/21100255701 https://www.scopus.com/record/display.uri?eid=2-s2.0-85187998432&origin=inward&txGid=19b7c04bd1610d471c9a13159461c598
- Towards an Open-source Intrusion Detection System Integration Into Marine VehiclesVisky, Gabor; Khisteva, Dariana; Vaarandi, Risto; Maennel, Olaf Manuel2024 International Symposium ELMAR Proceedings of ELMAR-2024 : 66th International Symposium ELMAR. 16-18 September 2024, Zadar, Croatia2024 / p. 263-268 https://doi.org/10.1109/ELMAR62909.2024.10694518 https://www.scopus.com/sourceid/145063 https://www.scopus.com/record/display.uri?eid=2-s2.0-85207219851&origin=resultslist&sort=plf-f&src=s&sot=b&sdt=b&s=ALL%28%22Towards+an+open-source+intrusion+detection+system+integration+into+marine+vehicles%22%29&sessionSearchId=d07c77c718047b6144759fe6ff06e437&relpos=0
- Towards conceptualizing EU cybersecurity law : Discussion Paper ; C 253Kasper, Agnes; Antonov, Alexander2019 https://bonndoc.ulb.uni-bonn.de/xmlui/handle/20.500.11811/9849
- Towards formal verification of cache access-based side-channel attacksNiazmand, Behrad; Reinbrecht, Cezar; Raik, Jaan; Jervan, Gert; Sepulveda, JohannaTestmethoden und Zuverlässigkeit von Schaltungen und Systemen, TUZ 20192019 / 2 p. : tab http://www.informatik.uni-bremen.de/tuz/2019
- Towards pollution-control in cyberspace : problem structure and institutional design in international cybersecurityKasper, Agnes; Krasznay, CsabaInternational and comparative law review2019 / p. 76–96 https://doi.org/10.2478/iclr-2019-0015.
- Towards the integration of a post-hoc interpretation step into the machine learning workflow for IoT botnet detectionGuerra Manzanares, Alejandro; Nõmm, Sven; Bahsi, Hayretdin18th IEEE International Conference on Machine Learning and Applications : ICMLA 2019, 16–19 December 2019, Boca Raton, Florida, USA : proceedings2019 / p. 1162-1169 : ill https://doi.org/10.1109/ICMLA.2019.00193
- Training young cybersecurity talents – The case of EstoniaKikkas, Kaido; Lorenz, BirgyHCI International 2020 - Posters : 22nd International Conference, HCII 2020, Copenhagen, Denmark, July 19-24, 2020, Proceedings, Part II2020 / p. 256-263 https://doi.org/10.1007/978-3-030-50729-9_36 https://www.scopus.com/sourceid/17700155007 https://www.scopus.com/record/display.uri?eid=2-s2.0-85089245134&origin=inward&txGid=a02a255f35cc02d7c0b263db5f517850
- Trends and challenges for balanced scoring in cybersecurity exercises : a case study on the example of Locked ShieldsMäses, Sten; Maennel, Kaie; Brilingaite, AgneFrontiers in education2022 / art. 958405 https://doi.org/10.3389/feduc.2022.958405 https://www.scopus.com/sourceid/21100935978 https://www.scopus.com/record/display.uri?eid=2-s2.0-85139211730&origin=inward&txGid=950746323fcfaade80cd2824a956b2dd https://jcr.clarivate.com/jcr-jp/journal-profile?journal=FRONT%20EDUC&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000867258500001
- "Trust me, you will need it" : cybersecurity as extracurricular subject at Estonian schoolsLorenz, Birgy; Kikkas, KaidoHCI for Cybersecurity, Privacy and Trust : Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : proceedings2020 / p. 175-188 https://doi.org/10.1007/978-3-030-50309-3_12 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85088749122&origin=inward&txGid=3d91115284d90e43c0452511484408cb
- TTÜ ja TÜ valmistavad koos ette küberkaitse, tarkvaratehnika ning energeetika spetsialisteInseneeria2009 / 6(14), lk. 6
- TTÜ kübervastuluure start-up Silicon ValleysKoha, Aleks; Romanello, LeonardoMente et Manu2017 / lk. 34-35 https://www.ttu.ee/public/m/mente-et-manu/MM_02_2017/index.html https://artiklid.elnet.ee/record=b2816035*est
- TTÜ loob küberkriminalistika ja küberjulgeoleku keskusePostimees2014 / lk. 4 https://www.postimees.ee/2984857/ttu-loob-kuberkriminalistika-ja-kuberjulgeoleku-keskuse
- TTÜ professor: Hiina äppide keelamise asemel tuleks keskenduda küberhügieenile [Võrguväljaanne]Klementi, Joakimerr.ee2020 / fot https://www.err.ee/1127433/ttu-professor-hiina-appide-keelamise-asemel-tuleks-keskenduda-kuberhugieenile
- Tuhat eurot palgale juurde! Just nii palju rohkem teenid, kui astud selle ühe sammu!Jervan, Gertarileht.delfi.ee2024 https://arileht.delfi.ee/artikkel/120282700/tuhat-eurot-palgale-juurde-just-nii-palju-rohkem-teenid-kui-astud-selle-uhe-sammu
- Tulemas küberkaitse magistriõpe : [2007/2008. a. kevadsemestrist avatakse ülikoolidevaheline küberturbe õppemoodul : lühisõnum]Mente et Manu2008 / 30. jaan., lk. 1 https://www.ester.ee/record=b1242496*est
- 2015 7th International Conference on Cyber Conflict : Architectures in Cyberspace 26-29 May 2015, Tallinn, Estonia2015 http://www.ester.ee/record=b4459022*est https://ccdcoe.org/sites/default/files/multimedia/pdf/CyCon_2015_book.pdf
- 2011 : 3rd International Conference on Cyber Conflict : 7-10 June 2011, Tallinn, Estonia : proceedingsCzosseck, Christian; Tõugu, Enn; Wingfield, Thomas2011 https://www.ester.ee/record=b2634614*est
- 2019 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia2019 https://www.ester.ee/record=b5197210*est https://doi.org/10.23919/CyCon46848.2019
- Täna tähistatakse rahvusvahelist turvalise interneti päevagoodnews.ee2024 https://eestielu.goodnews.ee/tana-tahistatakse-rahvusvahelist-turvalise-interneti-paeva-3/
- Understanding space vulnerabilities : developing technical and legal frameworks for AI and cybersecurity in the spatial fieldCarlo, Antonio; Pelin Manti, Nebile; A.S.W.A.M., Bintang; Casamassima, Francesca; Boschetti, Nicolo; Breda, Paola; Rahloff, TobiasIAC 2022 congress proceedings2022 / art. 70406 https://dl.iafastro.directory/event/IAC-2022/paper/70406/ https://www.scopus.com/sourceid/21100255701 https://www.scopus.com/record/display.uri?eid=2-s2.0-85167582797&origin=inward&txGid=9973e358529359ef047c4b7f4bd2c486
- Unfortunately, our world is entering an era of large-scale conventional warsTsybulenko, Evhentaltech.ee2024 https://taltech.ee/en/news/unfortunately-our-world-entering-era-large-scale-conventional-wars
- Unlocking latent potential : a longitudinal study on enhancing skill diversity in cybersecurity through competitionsLorenz, Birgy; Kikkas, Kaido; Toom, HannaEDULEARN24 Proceedings2024
- Urmas Ruuto: veel 25 aastat tagasi tundus 2Mb/s võimatuSarv, Mari Öödelfi.ee2023 https://forte.delfi.ee/artikkel/120165602/intervjuu-urmas-ruuto-veel-25-aastat-tagasi-tundus-2mbs-voimatu
- Use of force in cyberspaceValuch, Josef; Hamulak, OndrejInternational and comparative law review2020 / p. 174−191 https://doi.org/10.2478/iclr-2020-0023
- User interactions in Virtual Data ExplorerKullman, Kaur; Engel, DonAugmented Cognition : 16th International Conference, AC 2022, Held as Part of the 24th HCI International Conference, HCII 2022. Virtual Event, June 26 - July 1, 2022, proceedings2022 / p. 333-347 https://doi.org/10.1007/978-3-031-05457-0_26 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85133274063&origin=inward&txGid=496db21684e55a639026b4160b2d0b20 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=LECT%20NOTES%20ARTIF%20INT&year=2005 https://www.webofscience.com/wos/woscc/summary/1faa047e-5fef-45d1-807e-dc908c7afc5f-b943b2d0/relevance/1
- Using competency mapping for skills assessment in an introductory cybersecurity courseMäses, Sten; Maennel, Olaf Manuel; Sütterlin, StefanEducating Engineers for Future Industrial Revolutions : Proceedings of the 23rd International Conference on Interactive Collaborative Learning (ICL2020). Volume 22021 / p. 572-583 https://doi.org/10.1007/978-3-030-68201-9_56 https://www.scopus.com/sourceid/5100152904 https://www.scopus.com/record/display.uri?eid=2-s2.0-85103499540&origin=inward&txGid=da7f34b43b0015786c5c1ba14b3c871b https://www.webofscience.com/wos/woscc/full-record/WOS:000772405700056
- Using multiplayer games to create secure communicationHenno, Jaak; Jaakkola, Hannu; Mäkelä, JukkaEighth Workshop on Software Quality Analysis, Monitoring, Improvement, and Applications : SQAMIA 2019 : Ohrid, North Macedonia, 22 - 25. 09. 2019 : proceedings2019 / p. 4-4:13 : ill https://perun.pmf.uns.ac.rs/pracner/down/sqamia2019/sqamia2019-proc.pdf
- Using technical cybersecurity exercises in university admissions and skill evaluationMaennel, Kaie; Mäses, Sten; Sütterlin, Stefan; Ernits, Margus; Maennel, Olaf ManuelIFAC-PapersOnLine2019 / p. 169-174 https://doi.org/10.1016/j.ifacol.2019.12.169 https://www.scopus.com/sourceid/21100456158 https://www.scopus.com/record/display.uri?eid=2-s2.0-85079610135&origin=inward&txGid=f7624b00cb3dc6a8024f6ac982847529 https://www.webofscience.com/wos/woscc/full-record/WOS:000504294500030
- Utilising journey mapping and crime scripting to combat cyber crimeSõmer, Tiia; Hallaq, Bil; Watson, TimProceedings of the 15th European Conference on Cyber Warfare and Security : ECCWS 2016 : hosted by Universität der Bundeswehr, Munich, Germany, 7-8 July 20162016 / p. 276-281 : ill
- Utilising journey mapping and crime scripting to combat cybercrime and cyber warfare attacksSõmer, Tiia; Hallaq, Bil; Watson, TimJournal of information warfare2016 / p. 39-49 https://www.jinfowar.com/journal-issue/volume-15-issue-4
- Vabaduse valvurist sai Vihasool jalgrattamuuseumi omanikTohver, AndresVirumaa Teataja / Lk. 4 https://dea.digar.ee/article/virumaateataja/2022/09/15/6.1
- Vaenujalal riigid õhutavad konflikte küberrünnakuid tehes [Võrguväljaanne]Sinisalu, Handoituudised.ee2021 https://www.ituudised.ee/uudised/2021/04/19/vaenujalal-riigid-ohutavad-konflikte-kuberrunnakuid-tehes
- Variable self-efficacy as a measurement for behaviors in cyber security operationsLugo, Ricardo Gregorio; Knox, Benjamin James; Josok, Oyvind; Sütterlin, StefanAugmented Cognition. Human Cognition and Behavior : 14th International Conference, AC 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : proceedings, Part II2020 / p. 395-404 https://doi.org/10.1007/978-3-030-50439-7_27 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85088754277&origin=inward&txGid=d1b2847ac39b537babb0866f24e6b8a6
- Verified security of BLT signature schemeFirsov, Denis; Buldas, Ahto; Truu, Ahto; Laanoja, RistoCPP 2020 - Proceedings of the 9th ACM SIGPLAN International Conference on Certified Programs and Proofs, co-located with POPL 2020, New Orleans 20 January 2020 through 21 January 20202020 / p. 244-257 https://doi.org/10.1145/3372885.3373828
- What do we talk about when we talk about international cybersecurityTikk, EnekenRoutledge handbook of international cybersecurity2020 / p. 389-396 https://doi.org/10.4324/9781351038904-38 https://www.ester.ee/record=b5308475*est
- When shutdown is no option : identifying the notion of the digital government continuity paradox in Estonia's eID crisisSkierka-Canton, IsabelGovernment information quarterly2023 / art. 101781, 12 p. : ill https://doi.org/10.1016/j.giq.2022.101781 https://www.scopus.com/sourceid/14735 https://www.scopus.com/record/display.uri?eid=2-s2.0-85146241729&origin=inward&txGid=2273357459e24259e1dc49b3be4f2301 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=GOV%20INFORM%20Q&year=2023 https://www.webofscience.com/wos/woscc/full-record/WOS:000993329200001
- 5G - ohust on asi kaugelTikk, EnekenPostimees2019 / lk. 16 https://arvamus.postimees.ee/6576219/eneken-tikk-5g-ohust-on-asi-kaugel
- 5G and digital sovereignty of the EU : the Slovak wayGabriš, Tomaš; Hamulak, OndrejTalTech Journal of European Studies2021 / p. 25−47 https://doi.org/10.2478/bjes-2021-0013
- Visualising cyber crime based on the E-Crime Project : mapping the journeys of cyber criminals [Online resource]Sõmer, TiiaProceedings of the 2nd Interdisciplinary Cyber Research Workshop 20162016 / p. 26 http://cybercentre.cs.ttu.ee/wp/wp-content/uploads/2016/03/CRW_2016_lingitud.pdf http://www.ester.ee/record=b4579694*est
- Women in tech – role models for girls. Estonian caseLorenz, BirgyEducational media international2023 / p. 292-305 https://doi.org/10.1080/09523987.2023.2324599 https://www.scopus.com/sourceid/20748 https://www.scopus.com/record/display.uri?eid=2-s2.0-85186556542&origin=inward&txGid=35d709ee01025545d69e5309f1c4a60e https://jcr.clarivate.com/jcr-jp/journal-profile?journal=EDUC%20MEDIA%20INT&year=2023 https://www.webofscience.com/wos/woscc/full-record/WOS:001171775400001
- Õpilased asuvad küberkaitsevõistluses päästma jõule küberkatastroofist [Võrguväljaanne]postimees.ee2021 https://haridus.postimees.ee/7402633/opilased-asuvad-kuberkaitsevoistluses-paastma-joule-kuberkatastroofist
- Üleilmne teadmistesõda, strateegiline ettekujutus, ebakindlus ja hirmMölder, Holger; Shiraev, EricSõjateadlane = Estonian journal of military studies2021 / lk. 33–61 https://www.ester.ee/record=b4555087*est https://www.kvak.ee/files/2022/02/ST_17_veebifail.pdf
- Ülisalajane NATO õppus : sõbralike riikide häkkerid harjutasid Tallinnas vaenulike riikide ründamist [Võrguväljaanne]Allik, Henry-Laurpostimees.ee2021 https://leht.postimees.ee/7407007/salajane-oppus-sobralike-riikide-hakkerid-harjutasid-tallinnas-vaenulike-riikide-rundamist
- Ülo Jaaksoo: Huvitav on see, et meie Eestis usaldame oma riikiJaaksoo, ÜloPostimees2022 https://dea.digar.ee/article/ak/2022/07/16/2.1
- В Тарту прошел финал соревнований по кибербезопасности Cyber Battle of Estonia [Online resource]Punamäe, Ode Mariarus.err.ee2021 https://rus.err.ee/1608388313/v-tartu-proshel-final-sorevnovanij-po-kiberbezopasnosti-cyber-battle-of-estonia
- Європейська парадигма кібербезпеки, Эвропейская парадигма кибербезпекиKasper, AgnesKharkiv International Legal Forum, 24-28 september, 2019 = ПРОГРАМА ІІІ ХАРКІВСЬКОГО МІЖНАРОДНОГО ЮРИДИЧНОГО ФОРУМУ III2019 / с. 9
- Карис: сейчас важнее всего всесторонне поддерживать Украину [Online resource]Stolitsa.ee2022 https://stolitsa.ee/estoniya/karis-seychas-vazhnee-vsego-vsestoronne-podderzhivat-ukrainu
- Мошенники рассылают фишинговые письма от имени ректора ТТУ [Online resource]rus.err.ee2021 https://rus.err.ee/1608327473/moshenniki-rassylajut-fishingovye-pisma-ot-imeni-rektora-ttu
- На учениях проверена готовность Tallinna Vesi к кибератакам [Online resource]Stolitsa.ee2022 https://stolitsa.ee/tallinn/na-ucheniyakh-proverena-gotovnost-tallinna-vesi-k-kiberatakam
- Причины авиакатастрофы в Литве: что думают эстонские специалистыrus.delfi.ee2024 https://rus.delfi.ee/statja/120339094/prichiny-aviakatastrofy-v-litve-chto-dumayut-estonskie-specialisty
- Эстонские и польские эксперты обсудят кибербезопасность [Online resource]Stolitsa.ee2022 https://stolitsa.ee/estoniya/estonskie-i-polskie-eksperty-obsudyat-kiberbezopasnost