Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysisBlumbergs, Bernhards; Vaarandi, RistoMILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 20172017 / p. 707-712 https://doi.org/10.1109/MILCOM.2017.8170785 A case study about the use and evaluation of cyber deceptive methods against highly targeted attacksFarar, Alexandria Elaine; Bahsi, Hayretdin; Blumbergs, Bernhards2017 International Conference On Cyber Incident Response, Coordination, Containment and Control, Cyber Incident 2017 : London, United Kingdom, 19 June 2017 through 20 June 20172017 / [7] p. : ill https://doi.org/10.1109/CYBERINCIDENT.2017.8054640 Creating and detecting IPv6 transition mechanism-based information exfiltration covert channelsBlumbergs, Bernhards; Pihelgas, Mauno; Kont, Markus; Maennel, Olaf Manuel; Vaarandi, RistoSecure IT Systems : 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016 : proceedings2016 / p. 85-100 : ill http://dx.doi.org/10.1007/978-3-319-47560-8_6 Crossed swords : a cyber red team oriented technical exerciseBlumbergs, Bernhards; Ottis, Rain; Vaarandi, RistoProceedings of the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 20192019 / p. 37-44 https://www.scopus.com/record/display.uri?eid=2-s2.0-85070019446&origin=inward&txGid=b3ce06db78a90b7b9e8a79c0d7b1f9c7 A cyber red team oriented technical exerciseBlumbergs, Bernhards; Ottis, Rain; Vaarandi, RistoAbstracts and conference materials for the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 20192019 / p. 10-11 https://www.academic-conferences.org/conferences/eccws/eccws-future-and-past/ Frankenstack : toward real-time red team feedbackKont, Markus; Pihelgas, Mauno; Maennel, Kaie; Blumbergs, Bernhards; Lepik, ToomasMILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 20172017 / p. 400-405 : ill http://doi.org/10.1109/MILCOM.2017.8170852 Remote exploit development for cyber red team computer network operations targeting industrial control systemsBlumbergs, BernhardsProceedings of the 5th International Conference on Information Systems Security and Privacy : ICISSP 2019 : February 23-25, 2019, Prague, Czech Republic. Vol. 12019 / p. 88-99 : ill https://doi.org/10.5220/0007310300880099 Simple event correlator - best practices for creating scalable configurationsVaarandi, Risto; Blumbergs, Bernhards; Caliskan, Emin2015 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision (CogSIMA 2015) : 9-12 March 2015, Orlando, Florida, USA2015 / p. 96-100 http://dx.doi.org/10.1109/COGSIMA.2015.7108181 Specialized cyber red team responsive computer network operations = Vastutegevusele orienteeritud punase meeskonna küberoperatsioonidBlumbergs, Bernhards2019 https://digi.lib.ttu.ee/i/?12015 TED : a container based tool to perform security risk assessment for ELF binariesMucci, Daniele; Blumbergs, BernhardsProceedings of the 5th International Conference on Information Systems Security and Privacy : ICISSP 2019 : February 23-25, 2019, Prague, Czech Republic. Vol. 12019 / p. 361–369 : tab http://doi.org/10.5220/0007371603610369 An unsupervised framework for detecting anomalous messages from syslog log filesVaarandi, Risto; Blumbergs, Bernhards; Kont, MarkusNetwork operations and management symposium : cognitive mangement in a cyber world, 23-27 april 2018, Taipei, Taiwan2018 / 6 p http://doi.org/10.1109/NOMS.2018.8406283