Application of journey mapping and crime scripting to the phenomenon of trollingSõmer, Tiia; Tiido, Anna; Sample, Char; Mitchener-Nissen, TimothyProceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018 : National Defence University, Washington DC, USA, 6-9 March 20182018 / p. 465–473 : ill https://www.scopus.com/inward/record.uri?eid=2-s2.0-85051737104&partnerID=40&md5=7bed8e3a8250f0083f8c7702e27c6839 Artificial intelligence within the military domain and cyber warfareHallaq, Bil; Sõmer, Tiia; Osula, Anna-Maria; Ngo, Kim; Mitchener-Nissen, TimothyProceedings of the 16th European Conference on Cyber Warfare and Security, ECCWS 2017 : hosted by University College Dublin, Ireland, 29-30 June 20172017 / p. 153-156 https://www.scopus.com/record/display.uri?eid=2-s2.0-85028013021&origin=resultslist&zone=contextBox ASAT weapons : enhancing NATO’s operational capabilities in the emerging space dependent eraCarlo, Antonio; Veazoglou, NikolaosModelling and Simulation for Autonomous Systems : 6th International Conference, MESAS 2019, Palermo, Italy, October 29–31, 2019, Revised Selected Papers2020 / p. 417-426 https://doi.org/10.1007/978-3-030-43890-6_34 Building an ontology for cyber defence exercisesBabayeva, Gulkhara; Maennel, Kaie; Maennel, Olaf ManuelIEEE European Symposium on Security and Privacy Workshops (EuroS&PW)2022 / p. 423-432 https://doi.org/10.1109/EuroSPW55150.2022.00050 A case study about the use and evaluation of cyber deceptive methods against highly targeted attacksFarar, Alexandria Elaine; Bahsi, Hayretdin; Blumbergs, Bernhards2017 International Conference On Cyber Incident Response, Coordination, Containment and Control, Cyber Incident 2017 : London, United Kingdom, 19 June 2017 through 20 June 20172017 / [7] p. : ill https://doi.org/10.1109/CYBERINCIDENT.2017.8054640 The challenge of protecting space-based assets against cyber threatsCarlo, Antonio; Lacroix, Lisa; Zarkan Cesari, LaetitiaIAC 2020 congress proceedings2020 / art. 59386 https://dl.iafastro.directory/event/IAC-2020/paper/59386/ Command and control of cyber weaponsTõugu, Enn2012 4th International Conference on Cyber Conflict : 5-8 June 2012, Tallinn, Estonia : proceedings2012 / p. 333-343 : ill A conceptual nationwide cyber situational awareness framework for critical infrastructuresBahsi, Hayretdin; Maennel, Olaf ManuelSecure IT systems : 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015 : proceedings2015 / p. 3-10 : ill https://doi.org/10.1007/978-3-319-26502-5_1 Cultural, peace and conflict studies series. Vol. 6, The crisis in Ukraine and information operations of the Russian Federation2016 http://www.ester.ee/record=b4555087*est http://www.ksk.edu.ee/wp-content/uploads/2016/12/sojateadlane_2_www.pdf Cyber operations during the conflict in Ukraine and the role of international lawValuch, Josef; Hamulak, OndrejThe use of force against Ukraine and international law : jus ad bellum, jus in bello, jus post bellum2018 / p. 215-235 https://doi.org/10.1007/978-94-6265-222-4_10 Cyber warfareOttis, RainCyber security : analytics, technology and automation2015 / p. 89-96 http://dx.doi.org/10.1007/978-3-319-18302-2_6 DACA : automated attack scenarios and dataset generationKorving, Frank; Vaarandi, RistoProceedings of the 18th International Conference on Cyber Warfare and Security, ICCWS 2023, a conference hosted by Towson University, Baltimore County, Maryland, USA, 9-10 March 20232023 / p. 550-559 : ill https://papers.academic-conferences.org/index.php/iccws/article/download/962/938 https://doi.org/10.34190/iccws.18.1.962 Deep learning-based detection of cyberattacks in software-defined networksMirsadeghi, Seyed Mohammad Hadi; Bahsi, Hayretdin; Inbouli, WissemDigital forensics and cyber crime : 13th EAI international conference, ICDF2C 2022, Boston, MA, November 16-18, 2022 : proceedings2023 / p. 341-354 https://doi.org/10.1007/978-3-031-36574-4_20 Efficient semantics of parallel and serial models of attack trees = Ründepuude paralleel- ja jadamudelite efektiivsed semantikadJürgenson, Aivo2010 https://www.ester.ee/record=b2604924*est Enhancing response selection in impact estimation approachesOjamaa, AndresInfo- ja kommunikatsioonitehnoloogia doktorikooli IKTDK neljanda aastakonverentsi artiklite kogumik : 26.-27. novembril 2010, Essu mõis2010 / lk. 137-140 : ill Event-triggered cooperative control of distributed generators in a distribution network subject to jamming attacksXu, Yan; Wen, Fushuan; Palu, Ivo2020 International Conference on Smart Grids and Energy Systems (SGES): 23-26 Nov. 20202020 / p. 95-99 https://doi.org/10.1109/SGES51519.2020.00024 Factors of socially engineering citizens in critical situationsLorenz, Birgy; Kikkas, Kaido; Osula, KairiAdvances in Human Factors in Cybersecurity : proceedings of the AHFE 2018 : International Conference on Human Factors in Cybersecurity, July 21-25, 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida, USA2019 / p. 229-240 https://doi.org/10.1007/978-3-319-94782-2_23 Conference proceedings at Scopus Article at Scopus Article at WOS ForewordJakobson, Gabriel; Ottis, Rain2015 7th International Conference on Cyber Conflict : Architectures in Cyberspace : 26-29 May 2015, Tallinn, Estonia2015 / p. i http://www.ester.ee/record=b4459022*est https://ccdcoe.org/sites/default/files/multimedia/pdf/CyCon_2015_book.pdf ForewordJakobson, Gabriel; Ottis, Rain5th International Conference on Cyber Conflict : 4-7 June 2013, Tallinn, Estonia : proceedings2013 / p. vi-viii Information aggression - a battlefield of smartphonesNyman-Metcalf, Katrin MerikeThe Russian Federation in global knowledge warfare : influence operations in Europe and its neighbourhood2021 / p. 195-211 https://doi.org/10.1007/978-3-030-73955-3_10 https://www.ester.ee/record=b5434182*est Katrin Nyman-Metcalf : kosmos – lähituleviku sõjatander? [Võrguväljaanne]Nyman-Metcalf, Katrin Merikeerr.ee2021 / fot Katrin Nyman-Metcalf : kosmos – lähituleviku sõjatander? Kübersõja küsimärgid ja eripäradOttis, RainSirp : Diplomaatia2013 / lk. 9 : portr https://diplomaatia.ee/kubersoja-kusimargid-ja-eriparad/ Kübersõjas on haavatavad isegi ilma internetiühenduseta sihtmärgidPiir, Raitnovaator.err.ee2024 Kübersõjas on haavatavad isegi ilma internetiühenduseta sihtmärgid Külm kübersõda : [innovaatiliste tehnoloogiate arendamise vajadusest infotehnoloogias]Tammet, TanelEesti Päevaleht2005 / 27. sept., lk. 7 https://epl.delfi.ee/artikkel/51024946/tanel-tammet-kulm-kubersoda On antagonism between side-channel security and soft-error reliability in BNN inference enginesLai, Xinhui; Lange, Thomas; Balakrishnan, Aneesh; Alexandrescu, Dan; Jenihhin, MaksimIFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC)2021 / p. 1-6 https://doi.org/10.1109/VLSI-SoC53125.2021.9606981 Reliable and efficient determination of the likelihood of rational attacks = Ratsionaalsete rünnete tõepära efektiivne ja usaldusväärne kindlakstegemineLenin, Aleksandr2015 Securing outer space through cyber : risks and countermeasuresCarlo, Antonio; Casamassima, FrancescaIAC 2021 congress proceedings2021 / art. 64939 https://dl.iafastro.directory/event/IAC-2021/paper/64939/ Conference Proceedings at Scopus Article at Scopus Strategic cyber security : evaluating nation-state cyber attack mitigation strategies with DEMATEL = Strateegiline küberjulgeolek : küberrünnaku leevendamise strateegiate hindamine riiklikul tasandil : DEMATEL-i meetodGeers, Kenneth2011 https://digi.lib.ttu.ee/i/?592 Suurõppusel harjutatakse läbi vaenuliku saareriigi küberrünnakud naaberriigilePulk, Meinhardpostimees.ee2023 Suurõppusel harjutatakse läbi vaenuliku saareriigi küberrünnakud naaberriigile A systematic approach to offensive volunteer cyber militiaOttis, Rain2011 http://www.ester.ee/record=b2685353*est Teadlased loovad küberrünnakute tõrjumiseks Eesti interneti mudeli. TTÜ-s valmib spetsiaalne Eesti küberkaitse tarkvaraRoonemaa, HolgerEesti Päevaleht2010 / 23. veebr., lk. 1, 4 Technological sovereignty : missing the point?Maurer, Tim; Skierka-Canton, Isabel; Morgus, Robert; Hohmann, Mirko2015 7th International Conference on Cyber Conflict : Architectures in Cyberspace : 26-29 May 2015, Tallinn, Estonia2015 / p. 53-67 The becoming of cyber-military capabilitiesSalminen, Mikko; Kerttunen, MikaRoutledge handbook of international cybersecurity2020 / p. 94-107 https://www.ester.ee/record=b5308475*est The role of artificial intelligence in kinetic targeting from the perspective of international humanitarian lawRoberts, Anastasia; Venables, Adrian2021 13th International Conference on Cyber Conflict : Going viral2021 / art. 9468301, p. 43-57 https://doi.org/10.23919/CyCon51939.2021.9468301 https://www.ester.ee/record=b5417211*est 2015 7th International Conference on Cyber Conflict : Architectures in Cyberspace 26-29 May 2015, Tallinn, Estonia2015 http://www.ester.ee/record=b4459022*est https://ccdcoe.org/sites/default/files/multimedia/pdf/CyCon_2015_book.pdf 2011 : 3rd International Conference on Cyber Conflict : 7-10 June 2011, Tallinn, Estonia : proceedingsCzosseck, Christian; Tõugu, Enn; Wingfield, Thomas2011 https://www.ester.ee/record=b2634614*est 2019 11th International Conference on Cyber Conflict : Silent Battle : 28 May-31 May 2019, Tallinn, Estonia2019 https://www.ester.ee/record=b5197210*est https://doi.org/10.23919/CyCon46848.2019