Algavad koolitused aitavad tõsta ettevõtete digivõimekustparnu.postimees.ee2023 Algavad koolitused aitavad tõsta ettevõtete digivõimekust TalTech korraldab mahuka infoturbejuhtide koolitusprogrammi Analysis of the impact of poisoned data within Twitter classification modelsPrice, Christopher; Piirsalu, Jaan; Nõmm, SvenIFAC-PapersOnLine2019 / p. 175-180 https://doi.org/10.1016/j.ifacol.2019.12.170 CACS: A cloud privacy-preserving attribute management systemKalu, Aivo; Kus, Burak Can; Laud, Peeter; Leung, Kin Long; Snetkov, Nikita; Vakarjuk, JelizavetaProceedings of the 18th International Conference on Availability, Reliability and Security (ARES), Benevento Italy, 29 August 2023 - 1 September, 20232023 / art. 122, p. 1-9 https://doi.org/10.1145/3600160.3605022 Condition monitoring of electrical machines and its relation to industrial internetBelahcen, Anouar; Gyftakis, Konstantinos N.; Martinez, Javier; Climente-Alarcon, Vicente; Vaimann, Toomas2015 IEEE Workshop on Electrical Machines Design, Control and Diagnosis (WEMDCD) : proceedings : Castello del Valentino, Torino, Italy, 26-27 March, 20152015 / p. 233-241 : ill http://dx.doi.org/10.1109/WEMDCD.2015.7194535 Co-operation in the field of information securityTepandi, JaakInformation technology in public administration of Estonia : yearbook 20072008 / p. 16-18 Cybersecurity knowledge requirements for strategic level decision makersGarcia-Granados, F.; Bahsi, HayretdinProceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 20202020 / p. 559-568 https://doi.org/ Developing requirements for the new encryption mechanisms in the Estonian eID infrastructureOruaas, Mart; Willemson, JanDatabases and Information Systems : 14th International Baltic Conference, DB&IS 2020, Tallinn, Estonia, June 16-19, 2020 : Proceedings2020 / p. 13-20 https://doi.org/10.1007/978-3-030-57672-1_2 Eesti infoturbe kontseptsioon menetlusesPraust, ValdoArvutimaailm1998 / 3, lk. 58-59 Eesti riigi infoturbekontseptsioonistPraust, ValdoInfotehnoloogia haldusjuhtimises : aastaraamat 19971997 / lk. 174-176 Efficiency bounds for adversary constructions in black-box reductionsBuldas, Ahto; Jürgenson, Aivo; Niitsoo, MargusInformation Security and Privacy : 14th Australasian Conference : ACISP 2009 : Brisbane, Australia, July 1-3, 2009 : proceedings2009 / p. 264-275 https://link.springer.com/chapter/10.1007/978-3-642-02620-1_19 Efficient semantics of parallel and serial models of attack trees = Ründepuude paralleel- ja jadamudelite efektiivsed semantikadJürgenson, Aivo2010 https://www.ester.ee/record=b2604924*est eGovernment services : How to develop them, how to manage them?Kalja, Ahto; Kindel, Kristiina; Kivi, Riina; Robal, TarmoProceedings of PICMET'07 : Management of Converging Technologies : Portland, OR, USA, 5-9. August 20072007 / p. 2795-2798 https://ieeexplore.ieee.org/document/4349620 Gaps in European Cyber Education and Professional Training WG5 I Education : training, awareness, cyber ranges [Online resource]Maennel, Olaf Manuel; Csaba, Virag2018 https://www.ecs-org.eu/documents/publications/5bf7e01bf3ed0.pdf Gert Jervan: TalTechi uurimisrühma tulemusel on Eesti kui digiriigi eestvedaja paremini kaitstudKald, Indrekituudised.ee2023 Gert Jervan: TalTechi uurimisrühma tulemusel on Eesti kui digiriigi eestvedaja paremini kaitstud Hash-based server-assisted digital signature solutions = Räsifunktsioonidel põhinevad serveri toega digitaalse signeerimise lahendusedTruu, Ahto2020 https://digikogu.taltech.ee/et/Item/a972cc4b-53ec-4c82-8de0-b3e941cce345 Ideological networks and security in the two-speed world - Venia Legendi [Electronic resource]Erne, JaanikaSSRN working paper series2013 / [26] p http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2285465 Information security in the Republic of Estonia : whence it started, and whereto it tendsOit, Monika; Praust, ValdoInformation technology in public administration of Estonia : yearbook 19981999 / p. 93-95 Information security interoperability framework, version 2Tepandi, JaakEstonian information society yearbook 2011/20122012 / p. 46-47 Infosüsteemide turveHanson, Vello; Buldas, Ahto1997 https://www.ester.ee/record=b1059903*est Infoturbe juhi elukutsestLeis, PaulA & A2003 / 5, lk. 27-35 : ill https://artiklid.elnet.ee/record=b1014185*est Infoturbe koosvõime raamistiku ver 2Tepandi, JaakEesti infoühiskonna aastaraamat 2011/20122012 / lk. 46-47 Infoturve Eesti Vabariigis : millal ja kuidas alustati ning kuhu minnakse?Oit, Monika; Praust, ValdoInfotehnoloogia haldusjuhtimises : aastaraamat 19981999 / lk. 109-111 Infoturve: kes ise ennast aitab, seda aitab ka internetTepandi, JaakSaldo2006 / 1, lk. 58-59 KronoDroid : time-based hybrid-featured dataset for effective android malware detection and characterizationGuerra Manzanares, Alejandro; Bahsi, Hayretdin; Nõmm, SvenComputers & Security2021 / art. 102399, 32 p https://doi.org/10.1016/j.cose.2021.102399 Journal metrics at Scopus Article at Scopus Journal metrics at WOS Article at WOS Method for evaluating information security level in organisationsSeeba, Mari; Mäses, Sten; Matulevičius, RaimundasResearch Challenges in Information Science : 16th International Conference, RCIS 2022 : Barcelona, Spain, May 17–20, 2022 : proceedings2022 / p. 644-652 : ill https://doi.org/10.1007/978-3-031-05760-1_39 Conference Proceedings at Scopus Article at Scopus Article at WOS Personal control of privacy and data : Estonian experiencePriisalu, Jaan; Ottis, RainHealth and technology2017 / p. 441-451 https://doi.org/10.1007/s12553-017-0195-1 Proceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology [Online resource]2015 http://cybercentre.cs.ttu.ee/en/icr2015/ Proceedings of the 2nd Interdisciplinary Cyber Research Workshop 2016 [Online resource]2016 http://cybercentre.cs.ttu.ee/wp/wp-content/uploads/2016/03/CRW_2016_lingitud.pdf http://www.ester.ee/record=b4579694*est Proceedings of the 3rd Interdisciplinary Cyber Research Workshop 2017 : 8th of July 2017 [Online resource]2017 http://www.ester.ee/record=b4684355*est https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/crw2017_final.pdf Proceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 2018 [Online resource]2018 https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/CRW_2018_lingitud.pdf https://www.ester.ee/record=b5139478*est Rational choice of security measures via multi-parameter attack treesBuldas, Ahto; Laud, Peeter; Priisalu, Jaan; Saarepera, Märt; Willemson, Jan1st International Workshop on Critical Information Infrastructures Security : Samos Island, Greece, August 30 - September 2, 20062006 / p. 232-243 https://link.springer.com/chapter/10.1007/11962977_19 Reliable and efficient determination of the likelihood of rational attacks = Ratsionaalsete rünnete tõepära efektiivne ja usaldusväärne kindlakstegemineLenin, Aleksandr2015 Riistvara Trooja hobuste rünnak võib ohustada nii koduarvuti kasutajat kui ka riigi digitaalset julgeolekut [Võrguväljaanne]arileht.delfi.ee2022 Riistvara Trooja hobuste rünnak võib ohustada nii koduarvuti kasutajat kui ka riigi digitaalset julgeolekut A server-assisted hash-based signature schemeBuldas, Ahto; Laanoja, Risto; Truu, AhtoSecure IT Systems : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017 : proceedings2017 / p. 3-17 : ill https://doi.org/10.1007/978-3-319-70290-2_1 Sharing confidential commercial information for ensuring availability of critical infrastructure : technology opportunities and perspectivesPreden, Jürgo-SörenEnergy security forum2013 / p. 23-27 : ill Strategically normative. Norms and principles in national cybersecurity strategiesKerttunen, Mika; Tikk, Eneken2019 https://eucyberdirect.eu/wp-content/uploads/2019/04/kerttunen_tikk-strategically-normative-april-2019-eucyberdirect_.pdf The Estonian national concept of information securityPraust, ValdoInformation technology in public administration of Estonia : yearbook 19971998 / p. 97-99 The first ten years of X-roadKalja, AhtoEstonian information society yearbook 2011/20122012 / p. 78-80 The rise of the regionals: how regional organisations contribute to international cyber stability negotiations at the United Nations levelOtt, Nikolas; Osula, Anna-Maria2019 : 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia : proceedings2019 / p. 321-345 https://doi.org/10.23919/CYCON.2019.8756863 https://www.ester.ee/record=b5197210*est https://ccdcoe.org/uploads/2019/06/CyCon_2019_BOOK.pdf Студента TalTech ждал неприятный сюрприз в начале учебного года: как такое могло произойти?postimees.ee2023 Студента TalTech ждал неприятный сюрприз в начале учебного года: как такое могло произойти?