Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
cyber security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
30
Vaata veel..
(2/224)
Ekspordi
ekspordi kõik päringu tulemused
(30)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Anomaly detection and classification in power system state estimation: Combining model-based and data-driven methods
Asefi, Sajjad
;
Mitrovic, Mile
;
Cetenovic, Dragan
;
Levi, Victor
;
Gryazina, Elena
;
Terzija, Vladimir
Sustainable energy, grids and networks
2023
/
art. 101116, 14 p. : ill
https://doi.org/10.1016/j.segan.2023.101116
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
2
artikkel kogumikus
ASAT weapons : enhancing NATO’s operational capabilities in the emerging space dependent era
Carlo, Antonio
;
Veazoglou, Nikolaos
Modelling and Simulation for Autonomous Systems : 6th International Conference, MESAS 2019, Palermo, Italy, October 29–31, 2019, Revised Selected Papers
2020
/
p. 417-426
https://doi.org/10.1007/978-3-030-43890-6_34
artikkel kogumikus
3
artikkel kogumikus
Building cyber resilience : the defensive shield for the EU
Osula, Anna-Maria
Cybersecurity policy in the EU and South Korea from consultation to action : theoretical and comparative perspectives
2022
/
p. 179-196
https://doi.org/10.1007/978-3-031-08384-6_9
artikkel kogumikus
4
artikkel kogumikus
Capability detection and evaluation metrics for cyber security lab exercises
Caliskan, Emin
;
Tatar, Unal
;
Bahsi, Hayretdin
;
Ottis, Rain
;
Vaarandi, Risto
Proceedings of the 12th International Conference on Cyber Warfare and Security, ICCWS 2017
2017
/
p. 407-414 : ill
https://www.scopus.com/record/display.uri?eid=2-s2.0-85018944652&origin=inward&txGid=dad813d957372581ca0932bf6e4fb5d8
artikkel kogumikus
5
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Cyber attacks on critical infrastructures and satellite communications
Carlo, Antonio
;
Obergfaell, Kim
International Journal of Critical Infrastructure Protection
2024
/
art. 100701, 8 p.
https://doi.org/10.1016/j.ijcip.2024.100701
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
6
artikkel kogumikus
Cyber attacks on power system automation and protection and impact analysis
Rajkumar, Vetrivel Subramaniam
;
Tealane, Marko
;
Stefanov, Alexandru
;
Presekal, Alfan
;
Palensky, Peter
Proceedings of 2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), 26-28 October, 2020
2020
/
p. 247–254
https://doi.org/10.1109/ISGT-Europe47291.2020.9248840
artikkel kogumikus
7
artikkel kogumikus
Cyber attacks on protective relays in digital substations and impact analysis
Rajkumar, Vetrivel Subramaniam
;
Tealane, Marko
;
Stefanov, Alexandru
;
Palensky, Peter
8th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems(MSCPES), Virtual Workshop, online, from April 21, 2020 : proceedings
2020
/
6 p. : ill
https://doi.org/10.1109/MSCPES49613.2020.9133698
artikkel kogumikus
8
artikkel kogumikus
Cyber commands - universal solution to a universal cyber security problem?
Alatalu, Siim
Proceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 2018
2018
/
p. 21-22
https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/CRW_2018_lingitud.pdf
artikkel kogumikus
9
artikkel kogumikus EST
/
artikkel kogumikus ENG
Cyber range and digital twin technologies for space resiliency and security
Carlo, Antonio
;
Manti, Nebile Pelin
;
Edl, András
;
Bintang Alam Semesta Wisran, A.M.
;
Breda, Paola
57th IAA Symposium on Safety, Quality and Knowledge Management in Space Activities : held at the 75th International Astronautical Congress (IAC 2024) : Milan, Italy, 14-18 October 2024
Proceedings of the International Astronautical Congress, IAC
2024
/
p. 322-332
https://doi.org/10.52202/078376-0032
Conference proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
10
artikkel kogumikus
Educational computer game for cyber security : game concept [Online resource]
Sõmer, Tiia
Proceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology
2015
/
p. 17-19
http://cybercentre.cs.ttu.ee/en/icr2015/
artikkel kogumikus
11
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Heering, Dan
TransNav : the international journal on marine navigation and safety of sea transportation
2020
/
p. 271−278
https://doi.org/10.12716/1001.14.02.01
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
12
artikkel ajakirjas
Envisioning the future renewable and resilient energy grids – a power grid revolution enabled by renewables, energy storage, and energy electronics
Peng, Fang Zheng
;
Liu, Chen-Ching
;
Li, Yuan
;
Jain, Akshay Kumar
;
Vinnikov, Dmitri
IEEE journal of emerging and selected topics in industrial electronics
2024
/
p. 8-26
https://doi.org/10.1109/JESTIE.2023.3343291
Journal metrics at WOS
Article at WOS
artikkel ajakirjas
13
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
EU Common position on international law and cyberspace
Osula, Anna-Maria
;
Kasper, Agnes
;
Kajander, Aleksi Oskar Johannes
Masaryk University journal of law and technology
2022
/
p. 89-123
https://doi.org/10.5817/MUJLT2022-1-4
Journal metrics at Scopus
Article at Scopus
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
14
artikkel kogumikus
Hacking on the high seas: How automated reverse-engineering can assist vulnerability discovery of a proprietary communication protocol
Visky, Gabor
;
Rohl, Alexander
;
Vaarandi, Risto
;
Katsikas, Sokratis
;
Maennel, Olaf Manuel
2024 IEEE 49th Conference on Local Computer Networks (LCN)
2024
/
7 p
https://doi.org/10.1109/LCN60385.2024.10639746
Article at Scopus
Article at WOS
artikkel kogumikus
Seotud publikatsioonid
1
Cybersecurity for maritime operational technology: challenges, considerations, and solutions = Merendustehnoloogia küberturvalisus: väljakutsed, kaalutlused ja lahendused
15
artikkel kogumikus
How to build a SOC on a budget
Vaarandi, Risto
;
Mäses, Sten
2022 IEEE International Conference on Cyber Security and Resilience (CSR)
2022
/
p. 171-177 : ill
https://doi.org/10.1109/CSR54599.2022.9850281
artikkel kogumikus
16
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Hunting for vulnerabilities : call for European protection of security researchers
Rampašek, Michal
;
Andraško, Jozef
;
Sokol, Pavol
;
Hamulak, Ondrej
Journal of Cybersecurity
2026
/
art. tyag002 ; 18 p
https://doi.org/10.1093/cybsec/tyag002
https://academic.oup.com/cybersecurity/article/12/1/tyag002/8449232
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
17
artikkel kogumikus
Lightweight testbed for IEC61162-450-related cyber security research
Visky, Gabor
;
Katsikas, Sokratis
;
Maennel, Olaf Manuel
2024 IEEE International Conference on Cyber Security and Resilience (CSR) : proceedings
2024
/
p. 638-643
https://doi.org/10.1109/CSR61664.2024.10679439
Article at Scopus
Article at WOS
artikkel kogumikus
Seotud publikatsioonid
1
Cybersecurity for maritime operational technology: challenges, considerations, and solutions = Merendustehnoloogia küberturvalisus: väljakutsed, kaalutlused ja lahendused
18
artikkel kogumikus EST
/
artikkel kogumikus ENG
A live virtual simulator for teaching cybersecurity to information technology students
Ernits, Margus
;
Kikkas, Kaido
Learning and Collaboration Technologies : Third International Conference, LCT 2016, held as part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016 : proceedings
2016
/
p. 474-486 : ill
https://doi.org/10.1007/978-3-319-39483-1_43
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
19
artikkel kogumikus EST
/
artikkel kogumikus ENG
Modelling the impact of space situational awareness disruption on the European and Arctic security landscape
Carlo, Antonio
;
Boschetti, Nicolo
Modelling and Simulation for Autonomous Systems: 9th International Conference, MESAS 2022, Prague, Czech Republic, October 20–21, 2022 : Revised Selected Papers
2023
/
p. 299-311
https://doi.org/10.1007/978-3-031-31268-7_18
Journal metrics at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
20
artikkel kogumikus
Open Source Intrusion Detection Systems' Performance Analysis Under Resource Constraints
Visky, Gabor
;
Adam, Balint
;
Vaarandi, Risto
;
Pihelgas, Mauno
;
Maennel, Olaf Manuel
2024 IEEE 22nd Jubilee International Symposium on Intelligent Systems and Informatics (SISY)
2024
/
p. 000201-000208
https://doi.org//10.1109/SISY62279.2024.10737571
Article at Scopus
artikkel kogumikus
Seotud publikatsioonid
1
Cybersecurity for maritime operational technology: challenges, considerations, and solutions = Merendustehnoloogia küberturvalisus: väljakutsed, kaalutlused ja lahendused
21
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Process-aware security monitoring in industrial control systems: A systematic review and future directions
Rehman, Muaan Ur
;
Bahsi, Hayretdin
International journal of critical infrastructure protection
2024
/
art. 100719, 19 p. : ill
https://doi.org/10.1016/j.ijcip.2024.100719
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
22
artikkel kogumikus EST
/
artikkel kogumikus ENG
Russia
Munkoe, Malthe
;
Foster, Noel
;
Mölder, Holger
The Palgrave Handbook on Cyber Diplomacy
2025
/
p. 517-541
https://doi.org/10.1007/978-3-031-93385-1_23
artikkel kogumikus EST
/
artikkel kogumikus ENG
23
artikkel kogumikus
Statistical Analysis-Based Feature Selection for Anomaly Detection in AIS Dataset
Visky, Gabor
;
Vaarandi, Risto
;
Katsikas, Sokratis
;
Maennel, Olaf Manuel
2025 IEEE 23rd World Symposium on Applied Machine Intelligence and Informatics (SAMI)
2025
/
p. 000159-000164
https://doi.org//10.1109/SAMI63904.2025.10883201
artikkel kogumikus
Seotud publikatsioonid
1
Cybersecurity for maritime operational technology: challenges, considerations, and solutions = Merendustehnoloogia küberturvalisus: väljakutsed, kaalutlused ja lahendused
24
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A systematic literature review of cyber security monitoring in maritime
Vaarandi, Risto
;
Tsiopoulos, Leonidas
;
Visky, Gabor
;
Rehman, Muaan Ur
;
Bahsi, Hayretdin
IEEE Access
2025
/
p. 85307-85329
https://doi.org/10.1109/ACCESS.2025.3567385
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Seotud publikatsioonid
1
Cybersecurity for maritime operational technology: challenges, considerations, and solutions = Merendustehnoloogia küberturvalisus: väljakutsed, kaalutlused ja lahendused
25
artikkel kogumikus
Technological sovereignty : missing the point?
Maurer, Tim
;
Skierka-Canton, Isabel
;
Morgus, Robert
;
Hohmann, Mirko
2015 7th International Conference on Cyber Conflict : Architectures in Cyberspace : 26-29 May 2015, Tallinn, Estonia
2015
/
p. 53-67
artikkel kogumikus
Seotud publikatsioonid
1
Securing digital government : towards governance mechanisms for e-state resilience = Digitaalse valitsuse turvalisus : valitsemismehhanismid e-riigi vastupidavuse tagamiseks
Kirjeid leitud 30, kuvan
1 - 25
eelmine
1
2
järgmine
võtmesõna
218
1.
cyber security
2.
cyber security education
3.
cyber security exercises
4.
cyber security monitoring
5.
cyber security monitoring in maritime
6.
cyber security strategies
7.
cyber-security
8.
maritime cyber security
9.
maritime cyber security operations centers
10.
national cyber security strategy
11.
cyber-physical system security
12.
automated cyber defense
13.
autonomous vehicle cyber range
14.
cloud-based cyber-physical systems (C2PS)
15.
cognitive cyber warfare
16.
cyber
17.
Cyber “Maastricht”
18.
cyber architecture
19.
cyber attacks
20.
cyber battle damage assessment
21.
Cyber Bio-analytical Physical Systems (CBPSs)
22.
cyber challenge
23.
cyber command
24.
Cyber Command organisational structure
25.
cyber conflict
26.
cyber contingency
27.
cyber crime
28.
cyber crime pathways
29.
cyber crime scripting
30.
Cyber crisis management
31.
cyber defence
32.
cyber defence exercise
33.
cyber defence exercises
34.
cyber defense education
35.
cyber defense exercise
36.
cyber defense exercises
37.
cyber dependence
38.
cyber diplomacy
39.
cyber exercise
40.
cyber hygiene
41.
cyber impact assessment
42.
cyber incidents
43.
cyber insurance
44.
cyber intrusion detection
45.
cyber kill chain
46.
cyber operation
47.
cyber operation officer
48.
cyber operations
49.
cyber operations exercises
50.
cyber physical energy systems
51.
cyber physical power system (CPPS)
52.
Cyber Physical Production System
53.
cyber physical production systems (CPPS)
54.
cyber physical social system
55.
cyber physical social systems (cpss)
56.
cyber physical system
57.
Cyber Planning tool
58.
cyber power Europe
59.
cyber ranges
60.
cyber red teaming
61.
cyber resilience
62.
cyber resilience at sea
63.
cyber risk
64.
cyber risk management in shipping
65.
cyber situational awareness
66.
cyber stability
67.
cyber team communication
68.
cyber threat
69.
cyber threat communication
70.
Cyber Threat Intelligence
71.
cyber threats
72.
cyber war
73.
cyber warfare
74.
cyber warriors
75.
cyber weapons
76.
cyber-attack
77.
cyber-attack pathways
78.
Cyber-attacks
79.
cyber-insurance
80.
cyber-paternalism
81.
cyber-physical energy systems
82.
cyber-physical social system (CPSS)
83.
cyber-physical system
84.
Cyber-Physical System (CPS)
85.
cyber-physical system logistic robot
86.
cyber-physical systems
87.
Cyber-Physical Systems (CPS)
88.
cyber-risks
89.
cyber-space nexus
90.
cyber-vulnerabilities
91.
Defensive Cyber Operations
92.
EU cyber policy
93.
international cyber norms
94.
military cyber
95.
mobile cyber-physical system
96.
NATO cyber operations definitions
97.
NATO Cyber Range
98.
Offensive Cyber Operations
99.
perceived cyber risks and threats
100.
responsive cyber defence
101.
Socio-Cyber-Physical Systems
102.
space cyber range
103.
technical cyber exercise
104.
Visualising Cyber Planning
105.
ad-hoc sensor networks security
106.
Automatic Security Verification
107.
Blockchain security
108.
cache security
109.
cloud security
110.
communication system security
111.
comprehensive system of economic security
112.
computer security
113.
cooperative security dilemma
114.
data and information security
115.
data security
116.
development of security cameras
117.
digital security practices
118.
drinking water security
119.
economic security
120.
economic security of enterprise
121.
emotional security
122.
energy security
123.
energy security indicator
124.
Estonian information security standard
125.
graded security
126.
hardware security
127.
hardware security primitive
128.
high level of security
129.
Homeland security
130.
human security
131.
information security
132.
information security and privacy
133.
initial level of security
134.
internal security
135.
international security
136.
investment and innovation security
137.
IPv6 security
138.
IT security
139.
IT security management
140.
job security
141.
long-term security
142.
Maritime Security Operations Center (M-SOC)
143.
medium level of security
144.
metadata model for security measures
145.
Middle Eastern security
146.
Mobile security
147.
national security
148.
NATO. Science for Peace and Security Program
149.
network security
150.
network security monitoring
151.
OSCE (Organization for Security and Co-operation in Europe)
152.
passenger’s security
153.
policy-based routing security
154.
political and security cultures
155.
post-quantum security
156.
power system security
157.
quantitative security
158.
regional security
159.
RISC-V Security Verification
160.
Safety and Security in Sea Transportation
161.
safety and security testing
162.
security
163.
security adaptation
164.
security alert prioritization
165.
security analysis
166.
security and justice (AFSJ)
167.
Security and political science
168.
security and privacy
169.
security and privacy in smart grids
170.
Security Assertion
171.
Security Assertion Mining
172.
security closure
173.
Security Coverage
174.
security dataset
175.
security dilemma
176.
Security evaluation
177.
security evaluation instruments
178.
Security Level Evaluation
179.
Security limitations
180.
security log analysis
181.
security management
182.
security model
183.
security monitoring
184.
security notion
185.
security objectives
186.
security of data
187.
security of supply
188.
security operation center
189.
security operations center
190.
security patterns
191.
security policy
192.
security problem definition
193.
security proof
194.
security protocols
195.
security requirements
196.
security requirements engineering
197.
security research
198.
security risk assessment
199.
security risk management
200.
security risks
201.
security science and technology
202.
security strategies
203.
security systems for military objects
204.
security testing
205.
security training
206.
security verification
207.
security-by-design
208.
social security planning
209.
societal security
210.
software security
211.
software security level
212.
software security subcharacteristics
213.
sufficient level of security
214.
system of economic security
215.
system security
216.
terrorism security
217.
transmission System Security
218.
voting privacy and security
märksõna
6
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
5.
National Computer Security Incident Response Teams (N-CSIRTs)
6.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT