Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
küberturve (subject term)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
461
Look more..
(1/1)
Export
export all inquiry results
(461)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
251
book article
Lizards in the street! Introducing cybersecurity awareness in a digital literacy context
Frydenberg, Mark
;
Lorenz, Birgy
EDSIGCON Proceedings 2019 : Cleveland Ohio, November 6-9, 2019
2019
/
Art. n4936, 13 p. : ill
http://proc.iscap.info/2019/pdf/4936.pdf
book article
252
book article
A live virtual simulator for teaching cybersecurity to information technology students
Ernits, Margus
;
Kikkas, Kaido
Learning and Collaboration Technologies : Third International Conference, LCT 2016, held as part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016 : proceedings
2016
/
p. 474-486 : ill
http://dx.doi.org/10.1007/978-3-319-39483-1_43
book article
253
dissertation
Machine learning-based detection and characterization of evolving threats in mobile and IoT Systems = Masinõppepõhine arenevate ohtude tuvastamine ning kirjeldamine mobiilseadmete ja värkvõrkude jaoks
Guerra Manzanares, Alejandro
2022
https://doi.org/10.23658/taltech.54/2022
https://digikogu.taltech.ee/et/Item/f56ae778-e5a5-4147-a8e4-4833e08fa789
https://www.ester.ee/record=b5511898*est
dissertation
Seotud publikatsioonid
14
Hybrid feature selection models for machine learning based botnet detection in IoT networks
In-depth feature selection and ranking for automated detection of mobile malware
Time-frame analysis of system calls behavior in machine learning-based mobile malware detection
Towards the integration of a post-hoc interpretation step into the machine learning workflow for IoT botnet detection
KronoDroid : time-based hybrid-featured dataset for effective android malware detection and characterization
Android malware concept drift using system calls : detection, characterization and challenges
Concept drift and cross-device behavior : challenges and implications for effective android malware detection
Cross-device behavioral consistency : benchmarking and implications for effective android malware detection
Leveraging the first line of defense : a study on the evolution and usage of android security permissions for enhanced android malware detection
On the relativity of time : implications and challenges of data drift on long-term effective android malware detection
MedBIoT : generation of an IoT Botnet Dataset in a medium-sized IoT network
Using MedBIoT dataset to build effective machine learning-based IoT botnet detection systems
On the application of active learning for efficient and effective Iot botnet detection
On the application of active learning to handle data evolution in Android malware detection
254
newspaper article
Majandusjulgeolek Eesti restart 2021 : 14. aprillil veebikonverents
Postimees
2021
/
Lk. 25
https://dea.digar.ee/article/postimees/2021/03/25/21.1
newspaper article
255
book article
Making the Cyber Mercenary - Autonomous Weapons Systems and Common Article 1 of the Geneva Conventions
Kajander, Aleksi Oskar Johannes
;
Tsybulenko, Evhen
;
Kasper, Agnes
2020 12th International Conference on Cyber Conflict : 20/20 vision : the next decade
2020
/
p. 79-95
https://ieeexplore.ieee.org/abstract/document/9131722
https://www.ester.ee/record=b5303919*est
book article
256
book article
Managing security risks in E-voting over the Internet
Tepandi, Jaak
;
Martens, Tarvi
E-challenges-2006
2006
/
p. 100
book article
257
book article
Mapping requirements specifications into a formalized blockchain-enabled authentication protocol for secured personal identity assurance
Leiding, Benjamin
;
Norta, Alexander
Future Data and Security Engineering : 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 - December 1, 2017 : proceedings
2017
/
p. 181-196 : ill
https://doi.org/10.1007/978-3-319-70004-5_13
book article
258
journal article
Maritime cyber-insurance : The Norwegian case : [abstract]
Franke, Ulrik
;
Langfeldt Friberg, Even
;
Bahsi, Hayretdin
International Journal of Critical Infrastructures
2022
/
p. 267–286
https://doi.org/10.1504/IJCIS.2022.10046729
journal article
259
journal article EST
/
journal article ENG
Maritime cyber-insurance: the Norwegian case
Franke, Ulrik
;
Friberg, Even Langfeldt
;
Bahşi, Hayretdin
International Journal of Critical Infrastructures
2022
/
p. 267-286
https://doi.org/10.1504/ijcis.2022.125816
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
260
book article EST
/
book article ENG
Mental model mapping method for cybersecurity
Kullman, Kaur
;
Buchanan, Laurin
;
Komlodi, Anita
;
Engel, Don
HCI for Cybersecurity, Privacy and Trust : Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : Proceedings
2020
/
p. 458-470
https://doi.org/10.1007/978-3-030-50309-3_30
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
Seotud publikatsioonid
1
Interactive stereoscopically perceivable multidimensional data visualizations for cybersecurity = Interaktiivsed, ruumiliselt tajutavad, mitmemõõtelised andmekuvad küberturbele
261
book article
Messung, Prüfung und Nachweis von IT-Sicherheit
Skierka-Canton, Isabel
IT-Sicherheitsrecht : Praxishandbuch
2021
/
S. 154−180
https://www.nomos-shop.de/en/nomos/title/it-sicherheitsrecht-id-86855/
book article
Seotud publikatsioonid
1
Securing digital government : towards governance mechanisms for e-state resilience = Digitaalse valitsuse turvalisus : valitsemismehhanismid e-riigi vastupidavuse tagamiseks
262
book article EST
/
book article ENG
A method for adding cyberethical behaviour measurements to computer science homework assignments
Mäses, Sten
;
Aitsam, Heleri
;
Randmann, Liina
19th Koli Calling Conference on Computing Education Research Koli Calling 2019 : November 21-24, 2019, Koli, Finland : proceedings
2019
/
5 p. : ill
https://doi.org/10.1145/3364510.3364529
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
263
book article EST
/
book article ENG
Method for evaluating information security level in organisations
Seeba, Mari
;
Mäses, Sten
;
Matulevičius, Raimundas
Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings
2022
/
p. 644-652 : ill
https://doi.org/10.1007/978-3-031-05760-1_39
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
264
book article
A method for teaching Open Source Intelligence (OSINT) using personalised cloud-based exercises
Yari, Saber
;
Mäses, Sten
;
Maennel, Olaf Manuel
Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020
2020
/
p. 480−489
https://doi.org/10.34190/ICCWS.20.091
book article
265
book article
Methodology for modelling financially motivated cyber crime
Sõmer, Tiia
16th International Conference on Cyber Warfare and Security (ICCWS 2021) : Online, 25 - 26 February 2021
2021
/
p. 326-335
http://toc.proceedings.com/58552webtoc.pdf?msclkid=97ad966dbea311ecb39e14df5abebf21
book article
Seotud publikatsioonid
1
Modelling financially motivated cyber crime = Finantsiliselt motiveeritud küberkuritegevuse modelleerimine
266
newspaper article
Miks Facebook ei tööta? Põhjuseks võib olla ebaõnnestunud tarkvarauuendus [Võrguväljaanne]
Veedla, Alice
delfi.ee
2021
"Miks Facebook ei tööta? Põhjuseks võib olla ebaõnnestunud tarkvarauuendus "
newspaper article
267
newspaper article
Millist küberstrateegiat Eesti vajab?
Lorenz, Birgy
Äripäev
2018
/
Lk. 12
https://dea.digar.ee/article/aripaev/2018/06/22/18.3
newspaper article
268
newspaper article
Mis toimub tehisintellekti „kapoti all“ ja miks me seda teadma peame? [Võrguväljaanne]
delfi.ee
2022
Mis toimub tehisintellekti „kapoti all“ ja miks me seda teadma peame?
newspaper article
269
journal article
Mis toimub tehisintellekti "kapoti all" ja miks me seda teadma peame?
Härmat, Karin
Mente et Manu
2022
/
lk. 30-33 : fot
https://www.ester.ee/record=b1242496*est
journal article
270
book article
Mixed methods research approach and experimental procedure for measuring human factors in cybersecurity using phishing simulations
Mäses, Sten
;
Kikerpill, Kristjan
;
Jüristo, Kaspar
;
Maennel, Olaf Manuel
Abstracts of Papers Presented at the 18th European Conference on Research Methodology for Business and Management Studies : ECRM 2019, Hosted By Wits Business School Johannesburg, South Africa 20-21 June, 2019
2019
/
p. 30-31
"ECRM19"
book article
271
book article
Mixed methods research approach and experimental procedure for measuring human factors in cybersecurity using phishing simulations
Mäses, Sten
;
Kikerpill, Kristjan
;
Jüristo, Kaspar
;
Maennel, Olaf Manuel
ECRM 2019 - Proceedings of the 18th European Conference on Research Methodology for Business and Management Studies ; vol. 1
2019
/
p. 218-226
http://toc.proceedings.com/49537webtoc.pdf
book article
272
journal article EST
/
journal article ENG
A 3D mixed reality visualization of network topology and activity results in better dyadic cyber team communication and cyber situational awareness
Ask, Torvald F.
;
Kullman, Kaur
;
Sütterlin, Stefan
;
Knox, Benjamin James
;
Engel, Don
;
Lugo, Ricardo Gregorio
Frontiers in Big Data
2023
/
art. 1042783, 21 p. : ill
https://doi.org/10.3389/fdata.2023.1042783
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Seotud publikatsioonid
1
Interactive stereoscopically perceivable multidimensional data visualizations for cybersecurity = Interaktiivsed, ruumiliselt tajutavad, mitmemõõtelised andmekuvad küberturbele
273
book article
Modeling and optimizing graded sequrity measures
Ojamaa, Andres
;
Tõugu, Enn
;
Kivimaa, Jüri
Info- ja kommunikatsioonitehnoloogia doktorikooli IKTDK kolmanda aastakonverentsi artiklite kogumik : 25.-26. aprill 2008, Voore külalistemaja
2008
/
p. 123-125 : ill
book article
274
journal article EST
/
journal article ENG
Modelling cyberspace to determine cybersecurity training requirements
Venables, Adrian Nicholas
Frontiers in education
2021
/
art. 768037, 16 p. : ill
https://doi.org/10.3389/feduc.2021.768037
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
275
dissertation
Modelling financially motivated cyber crime = Finantsiliselt motiveeritud küberkuritegevuse modelleerimine
Sõmer, Tiia
2022
https://doi.org/10.23658/taltech.10/2022
https://www.ester.ee/record=b5491785*est
https://digikogu.taltech.ee/et/Item/5c41eec5-0c88-43c8-9294-c9f47e7c438b
dissertation
Seotud publikatsioonid
5
Utilising journey mapping and crime scripting to combat cyber crime
Utilising journey mapping and crime scripting to combat cybercrime and cyber warfare attacks
Application of journey mapping and crime scripting to the phenomenon of trolling
Taxonomies of cybercrime : an overview and proposal to be used in mapping cyber criminal journeys
Methodology for modelling financially motivated cyber crime
Number of records 461, displaying
251 - 275
previous
7
8
9
10
11
12
13
14
15
16
next
subject term
1
1.
küberturve
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT