Automating defences against cyber operations in computer networks = Arvutivõrkude kaitse automatiseerimine küberoperatsioonide vastuPihelgas, Mauno2021 https://doi.org/10.23658/taltech.36/2021 https://www.ester.ee/record=b5449710*est https://digikogu.taltech.ee/et/Item/beb3e841-9c6e-4496-a73a-17148bc941ef Bbuzz : a Bit-aware fuzzing framework for network protocol systematic reverse engineering and analysisBlumbergs, Bernhards; Vaarandi, RistoMILCOM 2017 - 2017 IEEE Military Communications Conference : Baltimore, Maryland, USA, 23-25 October 20172017 / p. 707-712 https://doi.org/10.1109/MILCOM.2017.8170785 A breadth-first algorithm for mining frequent patterns from event logsVaarandi, RistoIntelligence in Communication Systems : IFIP International Conference, INTELLCOMM 2004, Bangkok, Thailand, November 23-26, 2004 : proceedings2004 / p. 293-308 https://link.springer.com/chapter/10.1007/978-3-540-30179-0_27 Capability detection and evaluation metrics for cyber security lab exercisesCaliskan, Emin; Tatar, Unal; Bahsi, Hayretdin; Ottis, Rain; Vaarandi, RistoProceedings of the 12th International Conference on Cyber Warfare and Security, ICCWS 20172017 / p. 407-414 : ill https://www.scopus.com/record/display.uri?eid=2-s2.0-85018944652&origin=inward&txGid=dad813d957372581ca0932bf6e4fb5d8 Career development in cyber security: Bootcamp training programsCaliskan, Emin; Vaarandi, RistoProceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 20202020 / p. 503-511 https://doi.org/10.34190/ICCWS.20.080 A clustering algorithm for loglife data setsVaarandi, RistoProceedings of the Eighth Symposium on Programming Languages and Software Tools, SPLST'03 : Kuopio, Finland, June 17-18, 20032003 / p. 152-162 Creating and detecting IPv6 transition mechanism-based information exfiltration covert channelsBlumbergs, Bernhards; Pihelgas, Mauno; Kont, Markus; Maennel, Olaf Manuel; Vaarandi, RistoSecure IT Systems : 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016 : proceedings2016 / p. 85-100 : ill http://dx.doi.org/10.1007/978-3-319-47560-8_6 Crossed swords : a cyber red team oriented technical exerciseBlumbergs, Bernhards; Ottis, Rain; Vaarandi, RistoProceedings of the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 20192019 / p. 37-44 https://www.scopus.com/record/display.uri?eid=2-s2.0-85070019446&origin=inward&txGid=b3ce06db78a90b7b9e8a79c0d7b1f9c7 A cyber red team oriented technical exerciseBlumbergs, Bernhards; Ottis, Rain; Vaarandi, RistoAbstracts and conference materials for the 18th European Conference on Cyber Warfare and Security, University of Coimbra Portugal, 4-5th July 20192019 / p. 10-11 https://www.academic-conferences.org/conferences/eccws/eccws-future-and-past/ DACA : automated attack scenarios and dataset generationKorving, Frank; Vaarandi, RistoProceedings of the 18th International Conference on Cyber Warfare and Security, ICCWS 2023, a conference hosted by Towson University, Baltimore County, Maryland, USA, 9-10 March 20232023 / p. 550-559 : ill https://papers.academic-conferences.org/index.php/iccws/article/download/962/938 https://doi.org/10.34190/iccws.18.1.962 A data clustering algorithm for mining patterns from event logosVaarandi, RistoProceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM2003) :Kansas City, Missouri, USA, October 1-3, 20032003 / p. 119-126 : tab Efficient event log mining with LogClusterCZhuge, Chen; Vaarandi, RistoThe Third IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2017 : The Third IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2017 : The Second IEEE International Conference on Intelligent Data and Security, IEEE IDS 2017 : proceedings : 26-28 May 2017, Beijing, China2017 / p. 261-266 : tab http://doi.org/10.1109/BigDataSecurity.2017.26 Event log analysis with the LogCluster toolVaarandi, Risto; Kont, Markus; Pihelgas, Mauno2016 IEEE Military Communications Conference : MILCOM 2016 : Baltimore, MD, USA, November 1-3, 20162016 / p. 982-987 https://doi.org/10.1109/MILCOM.2016.7795458 How to build a SOC on a budgetVaarandi, Risto; Mäses, Sten2022 IEEE International Conference on Cyber Security and Resilience (CSR)2022 / p. 171-177 : ill https://doi.org/10.1109/CSR54599.2022.9850281 Improving learning efficiency and evaluation fairness for cyber security courses : a case studyCaliskan, Emin; Vaarandi, Risto; Lorenz, BirgyIntelligent Computing : Proceedings of the 2019 Computing Conference. Volume 22019 / p. 622-638 https://doi.org/10.1007/978-3-030-22868-2_45 Conference proceedings at Scopus Article at Scopus LogCluster - a data clustering and pattern mining algorithm for event logsVaarandi, Risto; Pihelgas, Mauno11th International Conference on Network and Service Management, CNSM 2015 : Barcelona, Spain, November 9-13, 20152015 / p. 1-7 Netflow based framework for identifying anomalous end user nodesVaarandi, Risto; Pihelgas, MaunoProceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 20202020 / p. 448-456 https://doi.org/10.34190/ICCWS.20.035 Platform independent event correlation tool for network managementVaarandi, RistoNOMS 2002 : 2002 IEEE/IFIP Network Operations and Management Symposium "Management Solutions for the New Communications World" : proceedings2002 / p. 907-909 Platform independent tool for local event correlationVaarandi, RistoSPLST'2001 : Seventh Symposium on Programming Language and Software Tools : Hungary, University of Szeged, June 15-16, 20012001 / p. 119-134 Programmi RITA tegevuse 1 projekti „Masinõppe ja AI toega teenused“ lõpparuanneSolvak, Mihkel; Vilo, Jaak; Reisberg, Sulev; Tamm, Sirli; Oja, Marek; Ligi, Kadri; Unt, Taavi; Võrk, Andres; Leets, Peeter; Tammet, Tanel; Vaarandi, Risto; Nõmm, Sven; Lepik, Toomas; Lember, Veiko; Nõmmik, Steven; Noordt, Colin Pascal van; Kerikmäe, Tanel2022 Programmi RITA tegevuse 1 projekti „Masinõppe ja AI toega teenused“ lõpparuanne Simple event correlator - best practices for creating scalable configurationsVaarandi, Risto; Blumbergs, Bernhards; Caliskan, Emin2015 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision (CogSIMA 2015) : 9-12 March 2015, Orlando, Florida, USA2015 / p. 96-100 http://dx.doi.org/10.1109/COGSIMA.2015.7108181 Specialized cyber red team responsive computer network operations = Vastutegevusele orienteeritud punase meeskonna küberoperatsioonidBlumbergs, Bernhards2019 https://digi.lib.ttu.ee/i/?12015 A stream clustering algorithm for classifying network IDS alertsVaarandi, RistoProceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), July 26–28, 2021 : Virtual Conference : proceedings2021 / p. 14-19 https://doi.org/10.1109/CSR51186.2021.9527926 Tools and Techniques for event log analysisVaarandi, Risto2005 https://www.ester.ee/record=b2045293*est An unsupervised framework for detecting anomalous messages from syslog log filesVaarandi, Risto; Blumbergs, Bernhards; Kont, MarkusNetwork operations and management symposium : cognitive mangement in a cyber world, 23-27 april 2018, Taipei, Taiwan2018 / 6 p http://doi.org/10.1109/NOMS.2018.8406283 Vabavaralised lahendused infosüsteemide monitooringuksVaarandi, RistoA & A2004 / 4/5, lk. 110-116