Creating and detecting IPv6 transition mechanism-based information exfiltration covert channelsBlumbergs, Bernhards; Pihelgas, Mauno; Kont, Markus; Maennel, Olaf Manuel; Vaarandi, RistoSecure IT Systems : 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016 : proceedings2016 / p. 85-100 : ill http://dx.doi.org/10.1007/978-3-319-47560-8_6 Event log analysis with the LogCluster toolVaarandi, Risto; Kont, Markus; Pihelgas, Mauno2016 IEEE Military Communications Conference : MILCOM 2016 : Baltimore, MD, USA, November 1-3, 20162016 / p. 982-987 https://doi.org/10.1109/MILCOM.2016.7795458 Event management and incident response framework for small companies [Online resource]Kont, MarkusProceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology2015 / p. 52-53 http://cybercentre.cs.ttu.ee/en/icr2015/ Frankenstack : toward real-time red team feedbackKont, Markus; Pihelgas, Mauno; Maennel, Kaie; Blumbergs, Bernhards; Lepik, ToomasMILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 20172017 / p. 400-405 : ill http://doi.org/10.1109/MILCOM.2017.8170852 Frankenstack: real-time cyberattack detection and feedback system for technical cyber exercisesPihelgas, Mauno; Kont, MarkusProceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings2021 / p. 396–402 https://doi.org/10.1109/CSR51186.2021.9527923 Insider threat detection study [Online resource]Kont, Markus; Pihelgas, Mauno; Wojtkowiak, Jesse; Trinberg, Lorena; Osula, Anna-Maria2015 https://ccdcoe.org/sites/default/files/multimedia/pdf/Insider_Threat_Study_CCDCOE.pdf An unsupervised framework for detecting anomalous messages from syslog log filesVaarandi, Risto; Blumbergs, Bernhards; Kont, MarkusNetwork operations and management symposium : cognitive mangement in a cyber world, 23-27 april 2018, Taipei, Taiwan2018 / 6 p http://doi.org/10.1109/NOMS.2018.8406283