Küberkriminalistika ja küberjulgeoleku keskus
TalTech prioriteetne teadussuund
Klassifikaator (Frascati)
Uurimisrühma juht
Uurimisrühma liige
Doktorant
Võtmesõna
küberkaitse
digitaalne ekspertiis
krüptograafia
Ülevaade
TalTechi küberkriminalistika ja küberjulgeoleku keskus on multidistsiplinaarne ja mitmekülgne uurimisrühm. Rühma tegevus hõlmab võrguturbe, digitaalse ekspertiisi, küberoperatsioonide, krüptograafia, küberturbealase hariduse ja inimaspektide, küberjulgeoleku õiguslike aspektide ja merenduse küberjulgeoleku uurimisvaldkondi.TalTech küberkriminalistika ja küberjulgeoleku keskuse eesmärk on Eesti küberjulgeoleku kompetentsi ja võimekuse tõstmine haridus-, teadus- ja arendustegevuse abil. Keskuse peamised uurimissuunad on: elutähtsa infotaristu kaitse (fookusega e-valitsemise ja transpordisektoritel), krüptrograafia, võrgumonitooring, digitaalne ekspertiis, haridusteadus ning küberjulgeoleku strateegilised küsimused.Olulisematest teadustulemustest võib välja tuua professor Buldase plokiahela teemalist uurimistööd koostöös ettevõttega Guardtime, millest on avaldatud kõrgetasemelisi publikatsioone.
Tähtsamad tulemused
2023. a olulisematest teadustulemustest võib välja tuua professor Buldase plokiahela teemalist uurimistööd koostöös ettevõttega Guardtime
Seotud projektid
Seotud struktuuriüksus
Teadusgrupiga seotud publikatsioonid
- Guerra Manzanares, A., Luckner, M., Bahsi, H. Android malware concept drift using system calls : detection, characterization and challenges // Expert systems with applications (2022) Vol. 206, art. 117200, 19 p. : ill.
https://doi.org/10.1016/j.eswa.2022.117200 - Guerra Manzanares, A., Bahsi, H. On the relativity of time : implications and challenges of data drift on long-term effective android malware detection // Computers & Security (2022) Vol. 122, art. 102835, 15 p. : ill.
https://doi.org/10.1016/j.cose.2022.102835 - Guerra Manzanares, A., Luckner, M., Bahsi, H. Concept drift and cross-device behavior : challenges and implications for effective android malware detection // Computers & Security (2022) Vol. 120, art. 102757, 20 p. : ill.
https://doi.org/10.1016/j.cose.2022.102757 - Guerra-Manzanares, A., Bahsi, H., Nõmm, S. KronoDroid : time-based hybrid-featured dataset for effective android malware detection and characterization // Computers & Security (2021) vol. 110, art. 102399, 32 p.
https://doi.org/10.1016/j.cose.2021.102399 - Chikul, P., Bahsi, H., Maennel, O. M. An ontology engineering case study for advanced digital forensic analysis // Model and Data Engineering : 10th International Conference, MEDI 2021, Tallinn, Estonia, June 21–23, 2021 : proceedings. Cham : Springer Nature, 2021. p. 67–74. (Lecture Notes in Computer Science ; 12732).
https://doi.org/10.1007/978-3-030-78428-7_6 - Maennel, K., Kivimägi, K., Maennel, O., Sütterlin, S., Ernits, M. Remote technical labs : an innovative and scalable component for university cybersecurity program admission // Educating Engineers for Future Industrial Revolutions : Proceedings of the 23rd International Conference on Interactive Collaborative Learning (ICL2020). Volume 2. Cham : Springer, 2021. p. 521-533. (Advances in Intelligent Systems and Computing ; 1329).
https://doi.org/10.1007/978-3-030-68201-9_51 - Buldas, A., Gadyatskaya, O., Lenin, A., Mauw, S., Trujillo-Rasua, R. Attribute evaluation on attack trees with incomplete information // Computers & Security (2020) vol. 88, art. 101630, 17 p. : ill.
https://doi.org/10.1016/j.cose.2019.101630 - Buldas, A., Draheim, D., Gault, M., Laanoja, R., Nagumo, T., Saarepera, M., Shah, S. A., Simm, J., Steiner, J., Tammet, T., Truu, A. An ultra-scalable blockchain platform for universal asset tokenization : design and implementation // IEEE Access (2022) vol. 10, p. 77284-77322 : ill.
https://doi.org/10.1109/ACCESS.2022.3192837 - Farooq, A., Ahmad, F., Khadam, N., Lorenz, B. et al. The impact of perceived security on intention to use E-learning among students // Proceedings IEEE 20th International Conference on Advanced Learning Technologies, ICALT 2020 : 6–9 July 2020, Online. Danvers : IEEE, 2020. p. 360-364.
https://doi.org/10.1109/ICALT49669.2020.00115 - Maennel, K. Learning analytics perspective: evidencing learning from digital datasets in cybersecurity exercises // Proceedings 5th IEEE European Symposium on Security and Privacy Workshops EUROS&PW 2020 : 7-11 September 2020, VIrtual Event, Los Alamitos, California. Danvers : IEEE, 2020. p. 27-36.
https://doi.org/10.1109/EuroSPW51379.2020.00013 - Bahsi, H., Franke, U., Friberg, E.L. The cyber-insurance market in Norway // Information and computer security (2020) vol. 28, 1, p. 54−67.
https://doi.org/10.1108/ICS-01-2019-0012 - Kalakoti, R., Nõmm, S., Bahsi, H. In-depth feature selection for the statistical machine learning-based botnet detection in IoT networks // IEEE Access (2022) vol. 10, p. 94518-94535.
https://doi.org/10.1109/ACCESS.2022.3204001 - Buldas A., Draheim D., Nagumo T., Vedeshin A. Blockchain technology: Intrinsic technological and socio-economic barriers: FDSE'2020 Keynote // Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications : 7th International Conference, FDSE 2020, Quy Nhon, Vietnam, November 25–27, 2020 : proceedings. Cham : Springer Nature, 2020. p. 3-27. (Lecture notes in computer science ; 12466, Information Systems and Applications, incl. Internet/Web, and HCI ; 12466).
https://doi.org/10.1007/978-3-030-63924-2_1 - Sütterlin, S., Lugo, R. G., Ask, T. F., Veng, K., Eck, J., Fritschi, J., Özmen, M-T., Bärreiter, B., Knox, B. J. The Role of IT Background for Metacognitive Accuracy, Confidence and Overestimation of Deep Fake Recognition Skills // Augmented Cognition : 16th International Conference, AC 2022, Held as Part of the 24th HCI International Conference, HCII 2022. Virtual Event, June 26 - July 1, 2022, proceedings. Cham : Springer Nature, 2022. p. 103-119. (Lecture notes in computer science ; 13310).
https://doi.org/10.1007/978-3-031-05457-0_9 - Heering, D. Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners // TransNav : the international journal on marine navigation and safety of sea transportation (2020) vol. 14, 2, p. 271−278.
https://doi.org/10.12716/1001.14.02.01 - Kullman, K., Buchanan, L., Komlodi, A., Engel, D. Mental model mapping method for cybersecurity // HCI for Cybersecurity, Privacy and Trust : Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : Proceedings. Cham : Springer, 2020. p. 458-470. (Lecture notes in computer science ; 12210).
https://doi.org/10.1007/978-3-030-50309-3_30 - Bahsi, H., Dola, H. O., Khalil, S. M., Korõtko, T. A cyber attack taxonomy for microgrid systems // 2022 17th Annual System of Systems Engineering Conference (SOSE). : IEEE, 2022. p. 324-331.
https://doi.org/10.1109/SOSE55472.2022.9812642 - Heering, D., Maennel, O.M., Venables, A.N. Shortcomings in cybersecurity education for seafarers // Developments in Maritime Technology and Engineering : Celebrating 40 years of teaching in Naval Architecture and Ocean Engineering in Portugal and the 25th anniversary of CENTEC, Volume 1. London : CRC Press, 2021. p. 49−61. (Marine technology and ocean engineering series ; 6).
https://doi.org/10.1201/9781003216582 - Del Mar-Raave, J. R., Bahsi, H., Mrsic, L., Hausknecht, K. A machine learning-based forensic tool for image classification - a design science approach // Forensic Science International : Digital Investigation (2021) vol. 38, art. 301265, 13 p.
https://doi.org/10.1016/j.fsidi.2021.301265 - Kullman, K., Engel, D. User interactions in Virtual Data Explorer // Augmented Cognition : 16th International Conference, AC 2022, Held as Part of the 24th HCI International Conference, HCII 2022. Virtual Event, June 26 - July 1, 2022, proceedings. Cham : Springer, 2022. p. 333-347. (Lecture notes in computer science ; 13310).
https://doi.org/10.1007/978-3-031-05457-0_26 - Ernits, M., Mäses, S., Lepik, T., Maennel, O. From simple scoring towards a meaningful interpretation of learning in cybersecurity exercises // Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020. Reading : Academic Conferences International, 2020. p. 135-143.
https://doi.org/10.34190/ICCWS.20.046 - Tikk, E., Kerttunen, M. (eds.). Routledge handbook of international cybersecurity. London : Routledge, 2020. xix, 402 p. : ill.
https://doi.org/10.4324/9781351038904 https://www.ester.ee/record=b5308475*est - Vaarandi, R., Mäses, S. How to build a SOC on a budget // 2022 IEEE International Conference on Cyber Security and Resilience (CSR). Piscataway : IEEE, 2022. p. 171-177 : ill.
https://doi.org/10.1109/CSR54599.2022.9850281 - Mäses, S., Maennel, K., Toussaint, M., Rosa, V. Success factors for designing a cybersecurity exercise on the example of incident response // 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). : IEEE, 2021. p. 259-268.
https://doi.org/10.1109/EuroSPW54576.2021.00033 - Vakarjuk, J., Snetkov, N., Willemson. J. Russian Federal remote E-voting scheme of 2021 - protocol description and analysis // EICC '22: Proceedings of the 2022 European Interdisciplinary Cybersecurity Conference. : ACM, 2022. p. 29-35.
https://doi.org/10.1145/3528580.3528586 - Osula, A-M., Kasper, A., Kajander, A. EU Common position on international law and cyberspace // Masaryk University journal of law and technology (2022) vol. 16, 1, p. 89-123.
https://doi.org/10.5817/MUJLT2022-1-4 - Buldas, A., Draheim, D., Saarepera, M. Secure and efficient implementation of electronic money // Future Data and Security Engineering : Big Data, Security and Privacy, Smart City and Industry 4.0 Applications : 9th International Conference, FDSE 2022, Ho Chi Minh City, Vietnam, November 23-25, 2022 : proceedings. Singapore : Springer Nature, 2022. p. 34-51. (Communications in computer and information science ; 1688).
https://doi.org/10.1007/978-981-19-8069-5_3 - Garcia-Granados F., Bahsi, H. Cybersecurity knowledge requirements for strategic level decision makers // Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020. Reading : Academic Conferences International, 2020. p. 559-568.
https://doi.org/ - Krutskikh, A., Streltsov, A., Tikk, E. International information security: Problems and ways of solving them // Routledge handbook of international cybersecurity. London : Routledge, 2020. p. 260-268.
https://doi.org/10.4324/9781351038904-26 https://www.ester.ee/record=b5308475*est - Domarkiene, I., Ambrozaityte, L., Bukauskas, L., Rančelis, T., Sütterlin, S., Knox, B. J., Maennel, K., Maennel, O., Parish, K., Lugo, R. G., Brilingaite, A. CyberGenomics : application of behavioral genetics in cybersecurity // Behavioral Sciences (2021) vol. 11, 11, art. 152.
https://doi.org/10.3390/bs11110152 - Vaarandi, R. A stream clustering algorithm for classifying network IDS alerts // Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings. Danvers : IEEE, 2021. p. 14-19.
https://doi.org/10.1109/CSR51186.2021.9527926 - Valtna-Dvorak, A., Lips, S., Tsap, V., Ottis, R., Priisalu, J., Draheim, D. Vulnerability of state-provided electronic identification : the case of ROCA in Estonia // Electronic Government and the Information Systems Perspective : 10th International Conference, EGOVIS 2021, Virtual Event, September 27–30, 2021 : proceedings. Cham : Springer Nature, 2021. p. 73–85. (Lecture notes in computer science ; 12926).
https://doi.org/10.1007/978-3-030-86611-2_6 - Venables, A. N. Modelling cyberspace to determine cybersecurity training requirements // Frontiers in education (2021) vol. 6, art. 768037, 16 p. : ill.
https://doi.org/10.3389/feduc.2021.768037 - Roberts, A., Malayjerdi, M., Malayjerdi, E., Maennel, O. M. Combined safety and cybersecurity testing methodology for autonomous driving algorithms // CSCS '22 : Proceedings of the 6th ACM Computer Science in Cars Symposium. : ACM, 2022. art. 12, 10 p.
https://doi.org/10.1145/3568160.3570235 - Guerra-Manzanares, A., Medina-Galindo, J., Bahsi, H., Nõmm, S. MedBIoT : generation of an IoT Botnet Dataset in a medium-sized IoT network // Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP : February 25-27, 2020, La Valletta, Malta. Vol. 1. : SciTePress, 2020. p. 207-218 : ill.
https://doi.org/10.5220/0009187802070218 - Kasper, A., Osula, A.-M., Molnár, A. Ciberseguridad y ciberdiplomacia de la UE // IDP Revista de Internet Derecho y Política (2021) vol. 34, p. 1-15.
https://doi.org/10.7238/idp.v0i34.387469 - Roberts, A., Snetkov, N., Maennel, O. Cybersecurity test range for autonomous vehicle shuttles // 2021 IEEE European Symposium on Security and Privacy Workshops EuroS&PW 2021 : Virtual Conference, 6-10 September 2021 : proceedings. : IEEE, 2021. p. 239-249 : ill.
https://doi.org/10.1109/EuroSPW54576.2021.00031 - Halisdemir, E., Karacan, H., Pihelgas, M., Lepik, T., Cho, S. Data quality problem in AI-based network intrusion detection systems studies and a solution proposal // 14th International Conference on Cyber Conflict : Keep Moving. : CCDCOE Publications, 2022. p. 367-383.
https://ccdcoe.org/uploads/2022/06/CyCon_2022_book.pdf - Buldas, A., Draheim, D., Gault, M., Saarepera, M. Towards a foundation of Web3 // Future Data and Security Engineering : Big Data, Security and Privacy, Smart City and Industry 4.0 Applications : 9th International Conference, FDSE 2022, Ho Chi Minh City, Vietnam, November 23-25, 2022 : proceedings. Singapore : Springer Nature, 2022. p. 3-18. (Communications in computer and information science ; 1688).
https://doi.org/10.1007/978-981-19-8069-5_1 - Seeba, M., Mäses, S., Matulevičius, R. Method for evaluating information security level in organisations // Research Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings. Cham : Springer Nature, 2022. p. 644-652 : ill. (Lecture Notes in Business Information Processing ; 446).
https://doi.org/10.1007/978-3-031-05760-1_39 - Matthews, R., Lovell, K., Sorell, M. Ghost protocol – Snapchat as a method of surveillance // Forensic Science International : Digital Investigation (2021) vol. 36, supp., art. 301112.
https://doi.org/10.1016/j.fsidi.2021.301112 - Babayeva, G., Maennel, K., Maennel, O. M. Building an ontology for cyber defence exercises // IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). : IEEE, 2022. p. 423-432.
https://doi.org/10.1109/EuroSPW55150.2022.00050 - Shokri-Manninen, F., Tsiopoulos, L., Vain, J., Walden, M. Integration of iUML-B and UPPAAL timed automata for development of real-time systems with concurrent processes // Rigorous State-Based Methods 7th International Conference, ABZ 2020, Ulm, Germany, May 27–29, 2020 : proceedings. Cham : Springer, 2020. p. 186-202. (Lecture notes in computer science ; 12071).
https://doi.org/10.1007/978-3-030-48077-6_13 - Vain, J., Tsiopoulos, L., Kanter, G. Aspect-oriented Model-based testing with UPPAAL timed automata // Model and Data Engineering : 10th International Conference, MEDI 2021, Tallinn, Estonia, June 21–23, 2021 : proceedings. Cham : Springer Nature, 2021. p. 117-124. (Lecture notes in computer science ; 12732).
https://doi.org/10.1007/978-3-030-78428-7_10 - Sumaila, F., Bahsi, H. Digital forensic analysis of mobile automotive maintenance applications // Forensic Science International : Digital Investigation (2022) vol. 43, suppl., art. 301440.
https://doi.org/10.1016/j.fsidi.2022.301440 - Lorenz, B., Kikkas, K., Talisainen, A., Eomäe, T. CyberPin - Challenges on recognizing youngest cyber talents // HCI for Cybersecurity, Privacy and Trust : Third International Conference, HCI-CPT 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021 : proceedings. Cham : Springer, 2021. p. 326-336. (Lecture notes in computer science ; 12788).
https://doi.org/10.1007/978-3-030-77392-2_21 - Tikk, E., Schia, N. N. The role of the UN Security Council in cybersecurity : International peace and security in the digital age // Routledge handbook of international cybersecurity. London : Routledge, 2020. p. 354-356.
https://doi.org/10.4324/9781351038904-35 https://www.ester.ee/record=b5308475*est - Lorenz, B., Kikkas, K. Pedagogical challenges and ethical considerations in developing critical thinking in cybersecurity // Proceedings IEEE 20th International Conference on Advanced Learning Technologies, ICALT 2020 : 6–9 July 2020, Online. Danvers : IEEE, 2020. p. 262-263.
https://doi.org/10.1109/ICALT49669.2020.00085 - Vaarandi, R., Pihelgas, M. Netflow based framework for identifying anomalous end user nodes // Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020. Reading : Academic Conferences International, 2020. p. 448-456.
https://doi.org/10.34190/ICCWS.20.035 - Kerttunen, M., Tikk, E. Introduction // Routledge handbook of international cybersecurity. London : Routledge, 2020. p. 1-8.
https://doi.org/10.4324/9781351038904-1 https://www.ester.ee/record=b5308475*est - Firsov, D., Buldas, A., Truu, A., Laanoja, R. Verified security of BLT signature scheme // CPP 2020 - Proceedings of the 9th ACM SIGPLAN International Conference on Certified Programs and Proofs, co-located with POPL 2020, New Orleans 20 January 2020 through 21 January 2020. New York : ACM, 2020. p. 244-257.
https://doi.org/10.1145/3372885.3373828 - Mäses, S., Maennel, O., Sütterlin, S. Using competency mapping for skills assessment in an introductory cybersecurity course // Educating Engineers for Future Industrial Revolutions : Proceedings of the 23rd International Conference on Interactive Collaborative Learning (ICL2020). Volume 2. Cham : Springer, 2021. p. 572-583. (Advances in Intelligent Systems and Computing ; 1329).
https://doi.org/10.1007/978-3-030-68201-9_56 - Guin, J., Vain, J., Tsiopoulos, L., Valdek, G. Temporal multi-view contracts for efficient test models // Digital Business and Intelligent Systems : 15th International Baltic Conference, Baltic DB&IS 2022, Riga, Latvia, July 4-6, 2022 : proceedings. Cham : Springer Nature, 2022. p. 136–151. (Communications in Computer and Information Science ; 1598).
https://doi.org/10.1007/978-3-031-09850-5_10 - Guerra-Manzanares, A., Medina-Galindo, J., Bahsi, H., Nõmm, S. Using MedBIoT dataset to build effective machine learning-based IoT botnet detection systems // Information Systems Security and Privacy : 6th International Conference, ICISSP 2020, Valletta, Malta, February 25–27, 2020 : revised selected papers. Cham : Springer Nature, 2022. p. 222–243. (Communications in Computer and Information Science ; 1545).
https://doi.org/10.1007/978-3-030-94900-6_11 - Tikk, E. What do we talk about when we talk about international cybersecurity // Routledge handbook of international cybersecurity. London : Routledge, 2020. p. 389-396.
https://doi.org/10.4324/9781351038904-38 https://www.ester.ee/record=b5308475*est - Haddad, Y., Orye, E., Maennel, O. Ghost injection attack on automatic dependent surveillance–broadcast equipped drones impact on human behaviour // 2021 IEEE International Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA) : Virtual Conference, 14-22 May 2021 : proceedings. Danvers : IEEE, 2021. p. 161-166.
https://doi.org/10.1109/CogSIMA51574.2021.9475928 - Nõmm, S., Venables, A. N. Towards generation of synthetic data sets for hybrid conflict modelling // IFAC-Papers OnLine (2022) Vol. 55, 29, p. 25-30.
https://doi.org/10.1016/j.ifacol.2022.10.226 - Bolmsten, J., Kasepold, K., Kaizer, A., Ziemska, M., Heering, D., Alop, A., Chesnokova, M., Olena, S. Sustainable development processes of education technologies - a multiple case
study // Proceedings of the International Association of Maritime Universities. Alexandria : Arab Academy for Science, Technology and Maritime Transport, 2021. p. 364-373.
https://aga21.aast.edu/templates/frontend/aga21/ltr/templates/AGA21-Conference-Proceedings.pdf - Yari, S., Mäses, S., Maennel, O.M. A method for teaching Open Source Intelligence (OSINT) using personalised cloud-based exercises // Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020. Reading : Academic Conferences International, 2020. p. 480−489.
https://doi.org/10.34190/ICCWS.20.091 - Kikkas, K., Lorenz, B. A digital services course to promote teaching of informatics in Estonia // Educating Engineers for Future Industrial Revolutions : Proceedings of the 23rd International Conference on Interactive Collaborative Learning (ICL2020). Volume 1. Cham : Springer, 2021. p. 711-720. (Advances in Intelligent Systems and Computing ; 1328).
https://doi.org/10.1007/978-3-030-68198-2_66 - Lorenz, B., Kikkas, K., Sõmer, T. IT as a career choice for girls: breaking the (self-imposed) glass ceiling // Proceedings of the 20th European Conference on e-Learning : a Virtual Conference hosted by University of Applied Sciences HTW, Berlin, Germany, 28-29 October, 2021. Reading : Academic Conferences International, 2021. p. 226–274.
IT as a career choice for girls : breaking the (self-imposed) glass ceiling - Lorenz, B., Kikkas, K. "Trust me, you will need it" : cybersecurity as extracurricular subject at Estonian schools // HCI for Cybersecurity, Privacy and Trust : Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : proceedings. Cham : Springer, 2020. p. 175-188. (Lecture notes in computer science ; 12210).
https://doi.org/10.1007/978-3-030-50309-3_12 - Mäses, S., Maennel, K., Brilingaite, A. Trends and challenges for balanced scoring in cybersecurity exercises : a case study on the example of Locked Shields // Frontiers in education (2022) vol. 7, art. 958405.
https://doi.org/10.3389/feduc.2022.958405 - Kerttunen, M., Tikk, E. The politics of stability: cement and change in cyber affairs // Routledge handbook of international cybersecurity. London : Routledge, 2020. p. 52-64.
https://www.ester.ee/record=b5308475*est https://doi.org/10.4324/9781351038904-6 - Tikk, E. Civil defence and cyber security: A contemporary European perspective // National cyber emergencies: the return to civil defence. London : Routledge, 2020. p. 76-92.
https://doi.org/10.4324/9780429343438 - Tsiopoulos, L., Kuusik, A., Vain, J., Bahsi, H. Model-based analysis of secure and patient-dependent pacemaker monitoring system // Body Area Networks. Smart IoT and Big Data for Intelligent Health : 15th EAI International Conference, BODYNETS 2020, Tallinn, Estonia, October 21, 2020 : proceedings. Cham : ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2020. p. 77-91. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; 330).
https://doi.org/10.1007/978-3-030-64991-3_6 - Guin, J., Vain, J., Tsiopoulos, L., Valdek, G. Temporal multi-view contracts help developing efficient test models // Baltic journal of modern computing (2022) vol. 10, 4, p. 710-737.
https://doi.org/10.22364/bjmc.2022.10.4.07 - Kikkas K., Lorenz B. Training young cybersecurity talents – The case of Estonia // HCI International 2020 - Posters : 22nd International Conference, HCII 2020, Copenhagen, Denmark, July 19-24, 2020, Proceedings, Part II. Cham : Springer, 2020. p. 256-263. (Communications in computer and information science ; 1225).
https://doi.org/10.1007/978-3-030-50729-9_36 - Osula, A.-M. Building cyber resilience : the defensive shield for the EU // Cybersecurity policy in the EU and South Korea from consultation to action : theoretical and comparative perspectives. Cham : Springer, 2022. p. 179-196. (New security challanges).
https://doi.org/10.1007/978-3-031-08384-6_9 - Roberts, A., Venables, A. N. The role of artificial intelligence in kinetic targeting from the perspective of international humanitarian law // 2021 13th International Conference on Cyber Conflict : Going viral. Tallinn : NATO CCD COE, 2021. art. 9468301, p. 43-57.
https://doi.org/10.23919/CyCon51939.2021.9468301 https://www.ester.ee/record=b5417211*est - Franke, U., Friberg, E.L., Bahşi, H. Maritime cyber-insurance: the Norwegian case // International Journal of Critical Infrastructures (2022) vol. 18, 3, p. 267-286.
https://doi.org/10.1504/ijcis.2022.125816 - Karimnia, R., Maennel, K., Shahin, M. Culturally-sensitive cybersecurity awareness program design for Iranian high-school students // Proceedings of the 8th International Conference on Information Systems Security and Privacy (ICISSP), 9-11 February, 2022. [S.l.] : SciTePress, 2022. p. 121-132.
https://doi.org/10.5220/0010824800003120 - Vain, J., Tsiopoulos, L., Kanter, G. Provably correct aspect-oriented modeling with UPPAAL timed automata // System assurances : modeling and management. : Elsevier, 2022. p. 447-476. (Emerging methodologies and applications in modelling, identification and control).
https://doi.org/10.1016/B978-0-323-90240-3.00025-4 - Lugo, R.G., Knox, B.J., Josøk, Ø., Sütterlin, S. Variable self-efficacy as a measurement for behaviors in cyber security operations // Augmented Cognition. Human Cognition and Behavior : 14th International Conference, AC 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : proceedings, Part II. Cham : Springer, 2020. p. 395-404. (Lecture notes in computer science ; 12197).
https://doi.org/10.1007/978-3-030-50439-7_27 - Sõmer, T., Lorenz, B., Ottis, R. Developing military cyber workforce in a conscript armed forces : recruitment, challenges and options // 14th International Conference on Cyber Warfare and Security (ICCWS 2019) : Stellenbosch University, South Africa, 28 February - 1 March 2019 : proceedings. Red Hook : Academic Conferences International, 2019. p. 413−421.
http://toc.proceedings.com/48113webtoc.pdf "ICCWS 2019" - Mäses, S. Evaluating cybersecurity-related competences through serious games // 19th Koli Calling Conference on Computing Education Research Koli Calling 2019 : November 21-24, 2019, Koli, Finland : proceedings. New York : ACM, 2019. 2 p.
https://doi.org/10.1145/3364510.3366163 - Vain, J., Tsiopoulos, L., Kharchenko, V., Kaur, A., Jenihhin, M., Raik, J., Nõmm, S. Energy-efficient multi-fragment Markov model guided online model-based testing for MPSoC // Green IT Engineering: Social, Business and Industrial Applications. Cham : Springer Nature, 2019. p. 273-297. (Studies in systems, decision and control ; 171).
https://doi.org/10.1007/978-3-030-00253-4_12 - Lorenz, B., Kikkas, K., Osula, K. Factors of socially engineering citizens in critical situations // Advances in Human Factors in Cybersecurity : proceedings of the AHFE 2018 : International Conference on Human Factors in Cybersecurity, July 21-25, 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida, USA. Cham : Springer, 2019. p. 229-240. (Advances in Intelligent Systems and Computing ; 782).
https://doi.org/10.1007/978-3-319-94782-2_23 - Guerra-Manzanares, A., Nõmm, S., Bahsi, H. In-depth feature selection and ranking for automated detection of mobile malware // Proceedings of the 5th International Conference on Information Systems Security and Privacy : ICISSP 2019 : February 23-25, 2019, Prague, Czech Republic. Vol. 1. [S.l.] : SciTePress, 2019. p. 274-283 : ill.
https://doi.org/10.5220/0007349602740283 - Ott, N., Osula, A.-M. The rise of the regionals: how regional organisations contribute to international cyber stability negotiations at the United Nations level // 2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings. Tallinn : NATO CCD COE Publications, 2019. p. 321-345.
https://doi.org/10.23919/CYCON.2019.8756863 https://www.ester.ee/record=b5197210*est https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf - Bolmsten, J., Kasepõld, K., Heering, D., Alop, A. et al. Maritime innovation management - a concept of an innovative course for young maritime professionals // Proceedings of the International Association of Maritime Universities (IAMU) Conference, Japan, Tokyo : the 20th Commemorative Annual General Assembly, AGA20 : International Association of Maritime Universities 30 October - 1 November 2019, Tokyo Japan. Tokyo : International Association of Maritime Universities, 2019. p. 268-274.
http://iamu-edu.org/wp-content/uploads/2019/11/IAMUC2019_Proceedings-1.pdf - Mõtus, L.; Teichmann, M.; Kangilaski, T.; Priisalu, J.; Kaugerand, J. Some issues in modelling comprehensive situation awareness // 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC). [S.l.] : IEEE, 2019. p. 540–545 : ill.
http://doi.org/10.1109/SMC.2019.8914360 - Mäses, S., Aitsam, H., Randmann, L. A method for adding cyberethical behaviour measurements to computer science homework assignments // 19th Koli Calling Conference on Computing Education Research Koli Calling 2019 : November 21-24, 2019, Koli, Finland : proceedings. New York : ACM, 2019. 5 p. : ill.
https://doi.org/10.1145/3364510.3364529 - Vain, J., Kaur, A., Tsiopoulus, L., Raik, J., Jenihhin, M. Multi-view modeling for MPSoC design aspects [Online resource] // BEC 2018 : 2018 16th Biennial Baltic Electronics Conference (BEC) : proceedings of the 16th Biennial Baltic Electronics Conference, October 8-10, 2018. : IEEE, 2018. 4 p.: ill.
https://doi.org/10.1109/BEC.2018.8600986 - Bahsi, H., Dieves, V., Kangilaski, T., Mõtus, L., Priisalu, J., Täks, E., Tammpuu, P., Taveter, K. et al. Mapping the information flows for the architecture of a nationwide situation awareness system : (Poster) // Proceedings 2019 IEEE International Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA) : Las Vegas, NV, USA, 8-11 April 2019. Danvers : IEEE, 2019. p. 152–157.
https://doi.org/10.1109/COGSIMA.2019.8724167 - Blumbergs, B., Ottis, R., Vaarandi, R. Crossed swords : a cyber red team oriented technical exercise // Proceedings of the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 2019. : Academic Conferences International, 2019. p. 37-44.
https://www.scopus.com/record/display.uri?eid=2-s2.0-85070019446&origin=inward&txGid=b3ce06db78a90b7b9e8a79c0d7b1f9c7 - Mezešova, T., Bahsi, H. Expert knowledge elicitation for skill level categorization of attack paths // 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). : IEEE, 2019. 8 p. : tab.
https://doi.org/10.1109/CyberSecPODS.2019.8885192 - Lorenz, B., Kikkas K., Sõmer T., Laugasson, E. Cybersecurity within the curricula of informatics : the Estonian perspective // Informatics in Schools. New Ideas in School Informatics :12th International Conference on Informatics in Schools : Situation, Evolution, and Perspectives, ISSEP 2019, Larnaca, Cyprus, November 18–20, 2019 : proceedings. Cham : Springer Nature, 2019. p. 159-171. (Lecture notes in computer science ; 11913, Theoretical computer science and general issues; 11913).
https://doi.org/10.1007/978-3-030-33759-9_13 - Sõmer, T., Tiido, A., Sample, C., Mitchener-Nissen, T. Application of journey mapping and crime scripting to the phenomenon of trolling // Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018 : National Defence University, Washington DC, USA, 6-9 March 2018. Reading : Academic Conferences International, 2018. p. 465–473 : ill.
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85051737104&partnerID=40&md5=7bed8e3a8250f0083f8c7702e27c6839 - Orye, E., Maennel, O.M. Recommendations for enhancing the results of cyber effects // 2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings. Tallinn : NATO CCD COE, 2019. p. 103-121.
https://www.ester.ee/record=b5197210*est https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf https://doi.org/10.23919/CYCON.2019.8756649 - Maennel, K., Mäses, S., Sütterlin, S., Ernits, M., Maennel, O. Using technical cybersecurity exercises in university admissions and skill evaluation // IFAC-PapersOnLine (2019) vol. 52, 19, p. 169-174.
https://doi.org/10.1016/j.ifacol.2019.12.169 - Çalışkan, E., Vaarandi, R., Lorenz, B. Improving learning efficiency and evaluation fairness for cyber security courses : a case study // Intelligent Computing : Proceedings of the 2019 Computing Conference. Volume 2. Cham : Springer Nature, 2019. p. 622-638. (Advances in intelligent systems and computing ; 998).
https://doi.org/10.1007/978-3-030-22868-2_45 - Lepik, T., Maennel, K., Ernits, M., Maennel, O. Art and automation of teaching malware reverse engineering // Learning and Collaboration Technologies : Learning and Teaching : 5th International Conference : LCT 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018 : Proceedings, Part II. Cham : Springer, 2018. p. 461-472. (Lecture notes in computer science ; 10925, Information Systems and Applications, incl. Internet/Web, and HCI ; 10925).
https://doi.org/10.1007/978-3-319-91152-6_35 - Price, C., Piirsalu, J., Nõmm, S. Analysis of the impact of poisoned data within Twitter classification models // IFAC-PapersOnLine (2019) vol. 52, 19, p. 175-180.
https://doi.org/10.1016/j.ifacol.2019.12.170 - Kullman, K., Ryan, M., Trossbach, L. VR/MR supporting the future of defensive cyber operations // IFAC-PapersOnLine (2019) vol. 52, 19, p. 181-186 : ill.
https://doi.org/10.1016/j.ifacol.2019.12.093 - Mäses, S., Kikerpill, K., Jüristo, K., Maennel, O. Mixed methods research approach and experimental procedure for measuring human factors in cybersecurity using phishing simulations // ECRM 2019 - Proceedings of the 18th European Conference on Research Methodology for Business and Management Studies ; vol. 1. Reading : Academic Conferences International, 2019. p. 218-226.
http://toc.proceedings.com/49537webtoc.pdf - Sõmer, T. Taxonomies of cybercrime : an overview and proposal to be used in mapping cyber criminal journeys // Proceedings of the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 2019. : Academic Conferences International, 2019. p. 475-483.
https://www.scopus.com/record/display.uri?eid=2-s2.0-85070000837&origin=inward&txGid=cfdba1921c713b02f4496e8cf8daee7d https://www.proceedings.com/content/049/049816webtoc.pdf - Tabuyo-Benito, R., Bahsi, H., Peris-Lopez, P. Forensics analysis of an on-line game over Steam Platform // Digital Forensics and Cyber Crime : 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10–12, 2018, Proceedings. Cham : Springer, 2019. p. 106-127. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; 259).
https://doi.org/10.1007/978-3-030-05487-8_6 - Lorenz, B., Kikkas, K., Osula, K. Development of children's cyber security competencies in Estonia // Learning and Collaboration Technologies : Learning and Teaching : 5th International Conference : LCT 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018 : Proceedings, Part II. Cham : Springer, 2018. p. 473–482. (Lecture notes in computer science ; 10925, Information Systems and Applications, incl. Internet/Web, and HCI ; 10925).
https://doi.org/10.1007/978-3-319-91152-6_36 - Kullman, K., Cowley, J., Ben-Asher, N. Enhancing cyber defense situational awareness using 3D visualizations // 13th International Conference on Cyber Warfare and Security (ICCWS 2018), Washington, DC, USA, 8 – 9 March 2018. Red Hook : Curran Associates, 2018. p. 369-378.
http://toc.proceedings.com/38822webtoc.pdf - Buldas, A., Firsov, D., Laanoja, R., Lakk, H., Truu, A. A New approach to constructing digital dignature schemes // Advances in Information and Computer Security : 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28–30, 2019 : proceedings. Cham : Springer, 2019. p. 363-373. (Lecture notes in computer science ; 11689).
https://doi.org/10.1007/978-3-030-26834-3_21 - Kullman, K., Ben-Asher, N., Sample, C. Operator impressions of 3D visualizations for cybersecurity analysts // Proceedings of the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 2019. : Academic Conferences International, 2019. p. 257–266.
https://www.researchgate.net/publication/334226184_Operator_Impressions_of_3D_Visualizations_for_Cybersecurity_Analysts - Buldas, A., Laanoja, R., Truu, A. A blockchain-assisted hash-based signature scheme // Secure IT Systems : 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28–30, 2018 : proceedings. Cham : Springer Nature, 2018. p. 138–153 : ill. (Lecture notes in computer science ; 11252).
https://doi.org/10.1007/978-3-030-03638-6_9 - Guerra-Manzanares, A., Nõmm, S., Bahsi, H. Time-frame analysis of system calls behavior in machine learning-based mobile malware detection // 2019 International Conference on Cyber Security for Emerging Technologies : CSET 2019, Doha, Qatar, 27 October 2019 through 29 October 2019. : IEEE, 2019. art. 89049088 ; 8 p. : ill.
https://doi.org/10.1109/CSET.2019.8904908 - Guerra-Manzanares, A., Bahsi, H., Nõmm, S. Differences in Android behavior between real device and emulator : a malware detection perspective // 6th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Granada, Spain, October 22-25, 2019. Denver : IEEE, 2019. art. 8939268, p. 399-404.
https://doi.org/10.1109/IOTSMS48152.2019.8939268 - Mäses, S., Randmann, L., Maennel, O., Lorenz, B. Stenmap : framework for evaluating cybersecurity-related skills based on computer simulations // Learning and Collaboration Technologies : Learning and Teaching : 5th International Conference : LCT 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018 : Proceedings, Part II. Cham : Springer, 2018. p. 492-504. (Lecture notes in computer science ; 10925, Information Systems and Applications, incl. Internet/Web, and HCI ; 10925).
https://doi.org/10.1007/978-3-319-91152-6_38 - Bahsi, H., Udokwu, C.J., Tatar, U., Norta, A. Impact assessment of cyber actions on missions or business processes : a systematic literature review // Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018 : National Defence University, Washington DC, USA, 6-9 March 2018. Red Hook : Academic Conferences International, 2018. p. 11-20 : ill.
http://toc.proceedings.com/38822webtoc.pdf - Guerra-Manzanares, A., Nõmm, S., Bahsi, H. Towards the integration of a post-hoc interpretation step into the machine learning workflow for IoT botnet detection // 18th IEEE International Conference on Machine Learning and Applications : ICMLA 2019, 16–19 December 2019, Boca Raton, Florida, USA : proceedings. Danvers : IEEE, 2019. p. 1162-1169 : ill.
https://doi.org/10.1109/ICMLA.2019.00193 - Maennel, K., Mäses, S., Maennel, O.M. Cyber hygiene : the big picture // Secure IT Systems : 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28–30, 2018 : proceedings. Cham : Springer Nature, 2018. p. 291-305 : ill. (Lecture notes in computer science ; 11252).
https://doi.org/10.1007/978-3-030-03638-6_18 - Herrera, L-C., Maennel, O. A comprehensive instrument for identifying critical information infrastructure services // International Journal of Critical Infrastructure Protection (2019) vol. 25, p. 50-61 : ill.
https://doi.org/10.1016/j.ijcip.2019.02.001 - Vaarandi, R., Blumbergs, B., Kont, M. An unsupervised framework for detecting anomalous messages from syslog log files // Network operations and management symposium : cognitive mangement in a cyber world, 23-27 april 2018, Taipei, Taiwan. : IEEE, 2018. 6 p.
http://doi.org/10.1109/NOMS.2018.8406283 - Guerra-Manzanares, A., Bahsi, H., Nõmm, S. Hybrid feature selection models for machine learning based botnet detection in IoT networks // 2019 International Conference on Cyberworlds : CW 2019 : 2-4 October 2019, Kyoto, Japan : proceedings. Danvers : IEEE, 2019. p. 324-327 : ill.
https://doi.org/10.1109/CW.2019.00059 - Bahsi, H., Nõmm, S., Dimensionality reduction for machine learning based IoT botnet detection // 15th International Conference on Control, Automation, Robotics and Vision (ICARCV 2018) : Singapore, November 18-21, 2018. S.l. : IEEE, 2018. p. 1857-1862 : ill.
https://doi.org/10.1109/ICARCV.2018.8581205 - Nõmm, S., Bahsi, H. Unsupervised anomaly based botnet detection in IoT networks // 17th IEEE International Conference on Machine Learning and Applications : ICMLA 2018, 17–20 December 2018, Orlando, Florida, USA : proceedings. Danvers : IEEE, 2018. p. 1048-1053.
https://doi.org/10.1109/ICMLA.2018.00171 - Khalil, S.M., Bahsi, H., Henry Ochieng’ Dola, Korõtko, T., McLaughlin, K., Kotkas, V. Threat modeling of cyber-physical systems - a case study of a microgrid system // Computers & Security (2023) vol. 125, art. 102950, 16 p. : ill.
https://doi.org/10.1016/j.cose.2022.102950