Site logo

2020

Bahşi, Hayretdin; Franke, Ulrik; Friberg, Even Langfeldt (2020). The cyber-insurance market in Norway. Information and Computer Security.10.1108/ICS-01-2019-0012

Buldas, Ahto; Gadyatskaya, Olga; Lenin, Aleksandr; Mauw, Sjouke; Trujillo-Rasua, Rolando (2020). Attribute Evaluation on Attack Trees with Incomplete Information. Computers & Security, 88, 101630, 1−17.10.1016/j.cose.2019.101630.

 

Caliskan, Emin; Vaarandi, Risto (2020). Career development in cyber security: bootcamp training programs. Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020. Ed. Payne, Brian K.; Wu, Hongyi. Reading, UK: Academic Conferences and Publishing International Ltd, 503−511.10.34190/ICCWS.20.080.

Ernits, Margus; Maennel, Kaie; Mäses, Sten; Lepik, Toomas; Maennel, Olaf (2020). From simple scoring towards a meaningful interpretation of learning in cybersecurity exercises. Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020. Ed. Payne, Brian K.; Wu, Hongyi. Reading, UK: Academic Conferences and Publishing International Ltd, 135−143.10.34190/ICCWS.20.046.

Firsov, Denis; Buldas, Ahto; Truu, Ahto; Laanoja, Risto (2020). Verified security of BLT signature scheme. CPP '20 : Proceedings of the 9th ACM SIGPLAN International Conference on Certified Programs and Proofs : January 20-21, 2020, New Orleans, LA, US. Ed. Blanchette, Jasmin; Hriţcu, Cătălin. New York, NY: ACM, 244−257.10.1145/3372885.3373828.

Garcia-Granados, Fernando; Bahsi, Hayretdin (2020). Cybersecurity knowledge requirements for strategic level decision makers. Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020. Ed. Payne, Brian K.; Wu, Hongyi. Reading, UK: Academic Conference and Publishing International Limited, 559−568.10.34190/ICCWS.20.102.

Guerra-Manzanares, Alejandro; Medina-Galindo, Jorge; Bahsi, Hayretdin; Nõmm, Sven (2020). MedBIoT: Generation of an IoT Botnet Dataset in a Medium-sized IoT Network. Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP, Volume 1 : February 25-27, 2020, La Valletta, Malta. La Valletta: SciTePress, 207−218.10.5220/0009187802070218.

Kerttunen, Mika (2020). Cyberterrorism: A Schrödinger's cat. In: Tikk, Eneken; Kerttunen, Mika (Ed.). Routledge Handbook of International Cybersecurity (161−173). London; New York: Routledge.10.4324/9781351038904-15.

Kerttunen, Mika (2020). The Role of Defence in National Cyber Security. In: Cornish, Paul (Ed.). Oxford Handbook on Cyber Security. Oxford: Oxford University Press [forthcoming].

Kerttunen, Mika; Tikk, Eneken (2020). The politics of stability: cement and change in cyber affairs. In: Tikk, Eneken; Kerttunen, Mika (Ed.). Routledge Handbook of International Cybersecurity (Ch. 4, 52−64). London; New York: Routledge.10.4324/9781351038904-6.

Kikkas, Kaido; Lorenz, Birgy (2020). Training young cybersecurity talents - the case of Estonia. HCI International 2020 - Posters : 22nd International Conference, HCII 2020, Copenhagen, Denmark, July 19-24, 2020, Proceedings, Part II. Ed. Stephanidis, Constantine; Antona, Margherita. Cham: Springer, 256−263. (Communications in Computer and Information Science; 1225).10.1007/978-3-030-50729-9_36.

Lorenz, Birgy; Kikkas, Kaido (2020). "Trust me, you will need it": Cybersecurity as extracurricular subject at estonian schools. HCI for Cybersecurity, Privacy and Trust : Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19-24, 2020, Proceedings. Ed. Moallem,Abbas. Cham: Springer, 175−188. (Lecture Notes in Computer Science; 12210).10.1007/978-3-030-50309-3_12.

Maennel, Kaie (2020). Learning Analytics Perspective: Evidencing Learning from Digital Datasets in Cybersecurity Exercises. 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW): Workshop on Cyber Range Technologies and Applications (CACOE) in conjunction with IEEE EuroS&P, September 2020. IEEE, [forthcoming].

Maennel, Kaie; Joonsoo, Kim; Sütterlin, Stefan (2020). From text mining to evidence team learning in cybersecurity exercises. Companion Proceedings of the 10th International Conference on Learning Analytics & Knowledge (LAK20) : Cyberspace, March 23-27, 2020. The Society for Learning Analytics Research (SoLAR), 107−109.

Maennel, Kaie; Kivimägi, Kristian; Maennel, Olaf; Sütterlin, Stefan; Ernits, Margus (2020). Remote Technical Labs: an Innovative and Scalable Component for University Cybersecurity Program Admission. Educating Engineers for Future Industrial Revolutions Proceedings of the 23rd International Conference on Interactive Collaborative Learning: ICL2020: Educating Engineers for Future Industrial Revolutions, 23-25 September 2020, Tallinn, Estonia. Ed. Michael E. Auer and Tiia Rüütmann. Springer,. (Advances in Intelligent Systems and Computing) [forthcoming].

Saber, Yari; Mäses, Sten; Maennel, Olaf Manuel (2020). A method for teaching Open Source Intelligence (OSINT) using personalised cloud-based exercises. Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020. Ed. Payne, Brian K.; Wu, Hongyi. Reading, UK: Academic Conference and Publishing International Limited, 480−489.10.34190/ICCWS.20.091.

Salminen, Mirva; Kerttunen, Mika (2020). The becoming of cyber-military capabilities. In: Tikk, Eneken; Kerttunen, Mika (Ed.). Routledge Handbook of International Cybersecurity (Ch 7, 94−107). London; New York: Routledge.10.4324/9781351038904-9.

Sütterlin, Stefan; Knox, Benjamin James; Maennel, Kaie; Canham, Matthew; Lugo, Ricardo Gregorio (2020). On the relationship between health sectors digitalization and sustainable health goals: A cyber security perspective. In: Flahault, Antoine (Ed.). Transitioning to Good Health and Well-Being. MDPI [forthcoming].

Tikk, Eneken (2020). Civil defence and cyber security: A contemporary European perspective. In: Austin, Greg (Ed.). National Cyber Emergencies: The Return to Civil Defence (Ch. 4, 76−92). Taylor and Francis.10.4324/9780429343438-5.

Tikk, Eneken (2020). What do we talk about when we talk about international cybersecurity. In: Tikk, Eneken; Kerttunen, Mika (Ed.). Routledge Handbook of International Cybersecurity (Ch. 33, 389−396). London; New York: Routledge.10.4324/9781351038904-38.

Tikk, Eneken; Schia, Niels Nagelhus (2020). The role of the UN Security Council in cybersecurity International peace and security in the digital age. In: Tikk, Eneken; Kerttunen, Mika (Ed.). Routledge Handbook of International Cybersecurity (Ch. 30, 354−365). London; New York: Routledge.10.4324/9781351038904-35.

Vaarandi, Risto; Pihelgas, Mauno (2020). NetFlow based framework for identifying anomalous end user nodes. Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020. Ed. Payne, Brian K.; Wu, Hongyi. Reading, UK: Academic Conferences and Publishing International Ltd, 448−456.10.34190/ICCWS.20.035.

Centre for Digital Forensics and Cyber Security (2020) Estonian Cybersecurity R&D Concept

Centre for Digital Forensics and Cyber Security (2020) Estonia's Industrial Policy Concept for Cyber Security Market

Birgy Lorenz, Mati Leet, Taavi Eomäe, Marily Hendrikson, Kairi Osula, Catlyn Kirna, Diana Poudel, Hanno Saks, Tõnu Soop, Aet Mikkli, Maarja Punak (2020) KüberPähkel uuring. Küberpähkel 2019 sügisuuringu ülevaatest tulenevad soovitused

2019

Hallaq, BilSõmer, Tiia (2019). Darkweb Cyber Threat Intelligence Mining. [forthcoming].

Herrera, Luis-Carlos; Maennel, Olaf (2019). A comprehensive instrument for identifying critical information infrastructure services. International Journal of Critical Infrastructure Protection, 25, 50−61.10.1016/j.ijcip.2019.02.001.

Matthews, R.; Sorell, M.; Falkner, N. (2019) An analysis of optical contributions to a photo-sensor's ballistic fingerprints. Digital Investigation, 28, 139−145.

Motus, L.; Teichmann, M.; Kangilaski, T.; Priisalu, J.; Kaugerand, J. (2019). Some issues in modelling comprehensive situation awareness. 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC) : Bari, Italy. October 6-9, 2019. IEEE, 540−545.10.1109/SMC.2019.8914360.

Sõmer, Tiia (2019). Developing a universal mapping methodology for cyber crimes. Policing: A Journal of Policy and Practice [forthcoming].

Bahşi, Hayretdin; Dieves, Veiko; Kangilaski, Taivo; Laud, Peeter; Mõtus, Leo; Murumets, Jaan; Ploom, Illimar; Priisalu, Jaan; Seeba, Mari; Täks, Ermo; Tammel, Kaide; Tammpuu, Piia; Taveter, Kuldar; Trumm, Avo; Truusa, Tiia-Triin; Vihalemm, Triin (2019). Mapping the information flows for the architecture of a nationwide situation awareness system: (poster). Proceedings 2019 IEEE International Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA) : Las Vegas, NV, USA, 8-11 April 2019. Ed. Rogova, Galina L.; McGeorge, Nicolette; Gundersen, Odd Erik; Rein, Kellyn; Freiman, Mary. Las Vegas, NV: IEEE, 152−157.10.1109/COGSIMA.2019.8724167.

Blumbergs, Bernhards (2019). Remote exploit development for cyber red team computer network operations targeting industrial control systems. Proceedings of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, February 23-25, 2019, Prague, Czech Republic, Vol. 1. Ed. Mori, Paolo; Furnell, Steven; Camp, Oliver. Prague: SciTePress, 88−99.10.5220/0007310300880099.

Blumbergs, Bernhards; Ottis, Rain; Vaarandi, Risto (2019) Crossed Swords: a cyber red team oriented technical exercise. Proceedings of the 18th European Conference on Cyber Warfare and Security, ECCWS 2019: University of Coimbra, Portugal, 4-5 July 2019. Reading, UK: ACPI, 37−44. 

Buldas, Ahto; Firsov, Denis; Laanoja, Risto; Lakk, Henri; Truu, Ahto (2019). A new approach to constructing digital signature schemes: (short paper). Advances in Information and Computer Security : 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings. Ed. Attrapadung, Nuttapong; Yagi, Takeshi. Cham: Springer, 363−373. (Lecture Notes in Computer Science; 11689).10.1007/978-3-030-26834-3_21.

Çalışkan, Emin; Vaarandi, Risto; Lorenz, Birgy (2019). Improving Learning Efficiency and Evaluation Fairness for Cyber Security Courses - A Case Study. Intelligent Computing: Proceedings of the 2019 Computing Conference, Volume 2, [July 16-17, 2019, London, UK]. Ed. Arai, Kohei; Bhatia, Rahul; Kapoor, Supriya. Cham: Springer, 622−638. (Advances in Intelligent Systems and Computing; 998).10.1007/978-3-030-22868-2_45.

Guerra-Manzanares, Alejandro; Bahsi, Hayretdin; Nõmm, Sven (2019). Differences in Android behavior between real device and emulator: a malware detection perspective. 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS): Granada, Spain. October 22-25, 2019. IEEE, 399−404.10.1109/IOTSMS48152.2019.8939268.

Guerra-Manzanares, Alejandro; Bahsi, Hayretdin; Nõmm, Sven (2019). Hybrid feature selection models for machine learning based botnet detection in IoT networks. Proceedings 2019 International Conference on Cyberworlds, CW 2019: 2-4 October 2019, Kyoto, Japan. Danvers, MA: IEEE, 324−327.10.1109/CW.2019.00059.

Guerra-Manzanares, Alejandro; Nõmm, Sven; Bahsi, Hayretdin (2019). In-depth feature selection and ranking for automated detection of mobile malware. Proceedings of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, February 23-25, 2019, Prague, Czech Republic, Vol. 1. Ed. Mori, Paolo; Furnell, Steven; Camp, Oliver. Prague: SciTePress, 274−283.10.5220/0007349602740283.

Guerra-Manzanares, Alejandro; Nõmm, Sven; Bahsi, Hayretdin (2019). Time-frame analysis of system calls behavior in machine learning-based mobile malware detection. 2019 International Conference on Cyber Security for Emerging Technologies (CSET): October 27-29, Doha, Qatar. IEEE, [1−8].10.1109/CSET.2019.8904908.

Guerra-Manzanares, Alejandro; Nõmm, Sven; Bahsi, Hayretdin (2019). Towards the integration of a post-hoc interpretation step into the machine learning workflow for IoT botnet detection. Proceedings 18th IEEE International Conference on Machine Learning and Applications, ICMLA 2019: 16-19 December, Boca Raton, Florida, USA. Ed. Wani, M.Arif; Khoshgoftaar, Taghi M.; Wang, Dingding; Wang, Huanjing; Seliya, Naeem (Jim). Piscataway, NJ: IEEE, 1162−1169.10.1109/ICMLA.2019.00193.

Kullman, K.; Asher, N. B.; Sample, C. (2019). Operator Impressions of 3D Visualizations for Cybersecurity Analysts. Proceedings of the 18th European Conference on Cyber Warfare and Security, ECCWS 2019 : University of Coimbra, Portugal, 4-5 July 2019. Ed. Cruz, Tiago; Simoe, Paulo. Reading, UK: ACPI, 257−266.

Lorenz, Birgy; Kikkas, Kaido; Osula, Kairi (2019). Factors of socially engineering citizens in critical situations. Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2018 International Conference on Human Factors in Cybersecurity, July 21-25, 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida, USA. Ed. Ahram, Tareq Z.; Nicholson, Denise. Cham: Springer, 229−240. (Advances in Intelligent Systems and Computing; 782).10.1007/978-3-319-94782-2_23.

Lorenz, Birgy; Kikkas Kaido, Sõmer Tiia; Laugasson, Edmund (2019). Cybersecurity within the curricula of informatics: the Estonian perspective. Informatics in Schools.New Ideas in School Informatics: 12th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, ISSEP 2019, Larnaca, Cyprus, November 18-20, 2019, Proceedings. Ed. Pozdniakov, Sergei N.; Dagienė, Valentina. Cham: Springer, 159−171. (Lecture Notes in Computer Science; 11913).10.1007/978-3-030-33759-9_13.

Maennel, Kaie; Mäses, Sten; Sütterlin, Stefan; Ernits, Margus; Maennel, Olaf (2019). Using technical cybersecurity exercises in university admissions and skill evaluation. 14th IFAC Symposium on Analysis, Design, and Evaluation of Human Machine Systems, HMS 2019: Tallinn, Estonia, 16-19 September, Proceedings. Ed. Tsiopoulos, Leonidas. Elsevier, 169−174. (IFAC-PapersOnLine; 52-19).10.1016/j.ifacol.2019.12.169.

Mézešová, Terézia; Bahşi, Hayretdin (2019). Expert knowledge elicitation for skill level categorization of attack paths. 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2019), Oxford, United Kingdom, 3-4 June 2019, [Proceedings]. IEEE, art no 8885192, 1−8.10.1109/CyberSecurity46270.2019.

Mucci, Daniele; Blumbergs, Bernhards (2019). TED: A container based tool to perform security risk assessment for ELF binaries. Proceedings of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, February 23-25, 2019, Prague, Czech Republic, Vol. 1. Ed. Mori, Paolo; Furnell, Steven; Camp, Oliver. Prague: SciTePress, 361−369.10.5220/0007371603610369.

Mäses, Sten (2019). Evaluating cybersecurity-related competences through serious games. Proceedings 19th Koli Calling Conference on Computing Education Research Koli Calling 2019: November 21-24, 2019 Koli, Finland. New York, NY: ACM, 1−2. (ACM International Conference Proceeding Series).10.1145/3364510.3366163.

Mäses, Sten; Aitsam, Heleri; Randmann, Liina (2019). A method for adding cyberethical behaviour measurements to computer science homework assignments. Proceedings 19th Koli Calling Conference on Computing Education Research Koli Calling 2019: November 21-24, 2019 Koli, Finland. New York, NY: ACM, 1−5. (ACM International Conference Proceeding Series).10.1145/3364510.3364529.

Mäses, Sten; Kikerpill, Kristjan; Jüristo, Kaspar; Maennel, Olaf (2019). Mixed methods research approach and experimental procedure for measuring human factors in cybersecurity using phishing simulations. Proceedings of the 18th European Conference on Research Methodology for Business and Management Studies, ECRM 2019: Hosted By Wits Business School, Johannesburg, South Africa, 20-21 June 2019. Ed. Stacey, Anthony. Reading, UK: Academic Conferences and Publishing International Limited, 218−226.

Orye, Erwin; Maennel, Olaf M. (2019). Recommendations for enhancing the results of cyber effects. 2019 11th International Conference on Cyber Conflict: Silent Battle, CyCon: 28 May - 31 May, Tallinn, Estonia. Ed. Minárik, T.; Alatalu, S.; Biondi, S.; Signoretti, M.; Tolga, I.; Visky, G. Tallinn: CCDCOE; IEEE, 103−123. (NATO CCD COE Publications).10.23919/CYCON.2019.8756649.

Ott, Nikolas; Osula, Anna-Maria (2019). The rise of the regionals: how regional organisations contribute to international cyber stability negotiations at the United Nations level. 2019 11th International Conference on Cyber Conflict: Silent Battle, CyCon : 28 May - 31 May, Tallinn, Estonia. Ed. Minárik, T.; Alatalu, S.; Biondi, S.; Signoretti, M.; Tolga, I.; Visky, G. Tallinn: CCDCOE; IEEE, 321−345. (NATO CCD COE Publications).10.23919/CYCON.2019.8756863.

Pihelgas, Mauno (2019). Design and implementation of an availability scoring system for cyber defence exercises. 14th International Conference on Cyber Warfare and Security (ICCWS 2019): Stellenbosch University, South Africa, 28 February - 1 March 2019, Proceedings. Ed. van der Waag-Cowling, Noëlle; Leenen, Louise. Academic Conferences and Publishing International Limited, 329−337.

Price, Kristopher R.; Priisalu, Jaan; Nomm, Sven (2019). Analysis of the impact of poisoned data within twitter classification models. 14th IFAC Symposium on Analysis, Design, and Evaluation of Human Machine Systems, HMS 2019 : Tallinn, Estonia, 16-19 September, Proceedings. Ed. Tsiopoulos, Leonidas. Elsevier, 175−180. (IFAC-PapersOnLine; 52-19).10.1016/j.ifacol.2019.12.170.

Somer, Tiia (2019). Taxonomies of cybercrime: an overview and proposal to be used in mapping cyber criminal journeys. Proceedings of the 18th European Conference on Cyber Warfare and Security, ECCWS 2019 : University of Coimbra, Portugal, 4-5 July 2019. Ed. Cruz, Tiago; Simoes, Paulo. Reading, UK: ACPI, 475−483.

Sõmer, Tiia; Lorenz, Birgy; Ottis, Rain (2019). Developing military cyber workforce in a conscript armed forces: recruitment, challenges and options. 14th International Conference on Cyber Warfare and Security (ICCWS 2019) : Stellenbosch University, South Africa, 28 February - 1 March 2019, Proceedings. Reading, UK: Academic Conference and Publishing International, 413−421.

Tabuyo-Benito, Raquel; Bahsi, Hayretdin; Peris-Lopez, Pedro (2019). Forensics analysis of an on-line game over Steam Platform. Digital Forensics and Cyber Crime: 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings. Ed. Breitinger, Frank; Baggili, Ibrahim. Cham: Springer, 106−127. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; 259).10.1007/978-3-030-05487-8_6.

Kerttunen, Mika; Tikk, Eneken (2019) Strategically normative. Norms and principles in national cybersecurity strategies. Norms and principles in national cybersecurity strategies. EU Cyber Direct.

Lorenz, Birgy (2019). "Kas nutt taskus teeb nutikaks?" Gunda Tire, Helin Puksand, Tiit Lepmann, Imbi Henno, Kristina Lindemann, Karin Täht, Birgy Lorenz, Gerli Silm. PISA 2018 Eesti tulemused: Eesti 15-aastaste õpilaste teadmised ja oskused funktsionaalses lugemises, matemaatikas ja loodusteadustes (Ptk 7, 116−129). Tallinn: SA Innove.

Lorenz, Birgy; Leet, Mati; Eomäe, Taavi; Hendrikson, MarilyMuulmann, Triin (2019). Küberpähkli 2018 sügis koolivooru ja CyberSecurity meets Robotex ülevaatest tulenevad soovitused. 1−26.

Lorenz, Birgy; Osula, Kairi; Leet, Mati; Eomäe, Taavi; Kirna, Catlyn (2019). Küberpähkli 2018 sügisuuringu ülevaatest tulenevad soovitused. 1−19.

Buldas, Ahto; Gadyatskaya, Olga; Lenin, Aleksandr; Mauw, Sjouke; Trujillo-Rasua, Rolando (2019). Attribute evaluation on attack trees with incomplete information. A preprint. arXiv:1812.10754v2 [cs.CR] 10 Jan 2019: Cornell University.

Kerttunen, Mika (2019). Contours. Policy of Consequences as Seen through Social Sciences. Temple International and Comparative Law Journal, 32 (2) [forthcoming].

Lorenz, Birgy; Kikkas Kaido (2019) Digital literacy in information society in an article collection "Digitalization and Youth Work"

Osula, Anna-MariaMaennel, Olaf (Toim.) (2019) 5th Interdisciplinary Cyber Research conference 2019. Konverentsi kogumik. 29. juuni 2019, Tallinna Tehnikaülikool

Lorenz, Birgy; Antoi, Meelis; Kikkas, Kaido (2019). Secondary School Informatics Online workbook, Digital Services. TalTech Department of Software Science. 

Lorenz, Birgy; Muulmann, Triin and other (2019) Beginner guide and Exercise portal for young cybersecurity talent. The guide was made in cooperation with the project "Targalt Internetis".

Sõmer, Tiia; Lorenz, Birgy; Muulmann, Triin; Mäses, Sten (2019). Secondary School CyberSecurity Online Workbook. TalTech Department of Software Science. 

2018

Hallaq, Bil; Somer, Tiia (2018). Darkweb Cyber Threat Intelligence Mining.

Smithers, Lisa G.; Haag, Dandara G.; Agnew, Benjamin; Lynch, John; Sorell, Matthew (2018). Food advertising on Australian television: Frequency, duration and monthly pattern of advertising from a commercial network (four channels) for the entire 2016. Journal of Paediatrics and Child Health, 54 (9), 962−967

Sõmer Tiia (2018). Developing a universal mapping methodology for cyber crimes. Policing: A Journal of Policy and Practice

Bahşi, Hayretdin; Nõmm, Sven; La Torre, Fabio Benedetto (2018). Dimensionality reduction for machine learning based IoT botnet detection. 2018 15th International Conference on Control, Automation, Robotics and Vision (ICARCV 2018) : held at the Marina Bay Sands Expo and Convention Centre, Singapore, November 18-21, 2018. IEEE, 1857−1862.10.1109/ICARCV.2018.8581205.

Bahsi, Hayretdin; Udokwu, Chibuzor Joseph; Tatar, Unal; Norta, Alexander (2018). Impact assessment of cyber actions on missions or business processes: a systematic literature review. Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018 : National Defence University, Washington DC, USA, 6-9 March 2018. Ed. Hurley, John S.; Chen, Jim Q. Reading, UK: Academic Conference and Publishing International Limited, 11−20.

Buldas, Ahto; Laanoja, Risto; Truu, Ahto (2018). A blockchain-assisted hash-based signature scheme. Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings. Ed. Gruschka, Nils. Cham: Springer, 138−153. (Lecture Notes in Computer Science; 11252).10.1007/978-3-030-03638-6_9.

Kullman, K.; Cowley, J.; Ben-Asher, N. (2018). Enhancing Cyber Defense Situational Awareness Using 3D Visualizations. Proceedings of the 13th International Conference on Cyber Warfare and Security ICCWS 2018: National Defense University, Washington DC, USA 8-9 March 2018. Ed. J. S. Hurley, J. Q. Chen. Academic Conferences and Publishing International Limited, 369−378.

Lepik, Toomas; Maennel, Kaie; Ernits, Margus; Maennel, Olaf (2018). Art and automation of teaching malware reverse engineering. Learning and Collaboration Technologies. Learning and Teaching : 5th International Conference, LCT 2018, held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part II. Ed. Zaphiris, Panayiotis; Ioannou, Andri. Cham: Springer, 461−472. (Lecture Notes in Computer Science; 10925).10.1007/978-3-319-91152-6_35.

Lorenz, Birgy; Kikkas, Kaido; Osula, Kairi (2018). Development of children's cyber security competencies in Estonia. Learning and Collaboration Technologies. Learning and Teaching : 5th International Conference, LCT 2018, held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part II. Ed. Zaphiris, Panayiotis; Ioannou, Andri. Cham: Springer, 473−482. (Lecture Notes in Computer Science; 10925).10.1007/978-3-319-91152-6_36.

Maennel, Kaie; Mäses, Sten; Maennel, Olaf Manuel (2018). Cyber Hygiene: The Big Picture. Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings. Ed. Gruschka, Nils. Cham: Springer, 291−305. (Lecture Notes in Computer Science; 11252).10.1007/978-3-030-03638-6_18.

Mäses, Sten; Randmann, Liina; Maennel, Olaf; Lorenz, Birgy (2018). Stenmap: framework for evaluating cybersecurity-related skills based on computer simulations. Learning and Collaboration Technologies. Learning and Teaching : 5th International Conference, LCT 2018, held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part II. Ed. Zaphiris, Panayiotis; Ioannou, Andri. Cham: Springer, 492−504. (Lecture Notes in Computer Science; 10925).10.1007/978-3-319-91152-6_38.

Nõmm, Sven; Bahşi, Hayretdin (2018). Unsupervised anomaly based botnet detection in IoT networks. Proceedings 17th IEEE International Conference on Machine Learning and Applications, ICMLA 2018 : 17-20 December 2018, Orlando, Florida, USA. Ed. Wani, M. A., [et al.]. Piscataway, NJ: IEEE, 1048−1053.10.1109/ICMLA.2018.00171.

Somer, Tiia; Tiido, Anna; Sample, Char; Mitchener-Nissen, Timothy (2018). Application of journey mapping and crime scripting to the phenomenon of trolling. In: Hurley, John S.; Chen, Jim Q. (Ed.). Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018 : National Defence University, Washington DC, USA, 6-9 March 2018 (465−473). Reading, UK: Academic Conference and Publishing International Limited.

Theron, Paul; Kott, Alexander; Drašar, Martin; Rzadca, Krzysztof; LeBlanc, Benoît; Pihelgas, Mauno; Mancini, Luigi; Panico, Agostino (2018). Towards an Active, Autonomous and Intelligent Cyber Defense of Military Systems: the NATO AICA Reference Architecture. 2018 International Conference on Military Communications and Information Systems (ICMCIS): International Conference on Military Communications and Information Systems; Warsaw, Poland; 22 - 23 May 2018. IEEE, 1−9.10.1109/ICMCIS.2018.8398730.

Tikk, Eneken (2018). National cybersecurity legislation: is there a magic formula? In: Bartsch, Michael; Frey, Stefanie (Ed.). Cybersecurity Best Practices : Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden (615−633). Wiesbaden: Springer.10.1007/978-3-658-21655-9_42.

Vaarandi, Risto; Blumbergs, Bernhards; Kont, Markus (2018). An unsupervised framework for detecting anomalous messages from syslog log files. NOMS 2018 IEEE/IFIP Network Operations and Management Symposium, Cognitive Management in a Cyber World : 23-27 April 2018, Taipei, Taiwan. IEEE, 1−6.10.1109/NOMS.2018.8406283.

Buldas, Ahto; Jung, Martha; Kuivjõgi, Kaja; Osula, Anna-Maria; Ottis, Rain; Priisalu, Jaan; Tallinn, Liisa; Vaks, Toomas (2018) ID-kaardi kaasuse õppetunnid
Overview in English

Lorenz, Birgy; Sõmer, Tiia; Osula, Kairi; Ääsmäe, Kristiina; Veldre, Anto; Põldmaa, Hillar; Punak, Maarja; Üürike, Mari-Liis (2018) KüberPähkel uuring. Küberpähkli 2018 talv uuringu ülevaatest tulenevad soovitused

Tikk, Eneken; Kerttunen, Mika (2018). Parabasis: Cyber-diplomacy in Stalemate. Oslo: Norwegian Institute of International Affairs.

Bahsi, Hayretdin (2018). The invisible front: a cyber resilience perspective. In: Tuohy, Emmet; Jermalavicius, Tomas; Bulakh, Anna (Ed.). The Geopolitics of Power Grids: Political and Security Aspects of Baltic Electricity Synchronization (53−68). Tallinn, Estonia: International Center for Defence and Security.

Kerttunen, Mika (2018). Cyber warfare - from science fiction to reality. Sicherheit und Frieden, 36 (1), 27−33.10.5771/0175-274X-2018-1-27.

Kerttunen, Mika (2018). Contours. Policy of Consequences as Seen through Social Sciences. Temple International and Comparative Law Journal, 32 (2) [ilmumas].

Matthews, R., Sorell, M., Falkner, N. (2018). Isolating Lens Effects from Source Camera Identification using Photo-Response Non-Uniformity Noise. ANZFSS 24th International Symposium on the Forensic Sciences : Perth, Western Australia, 9-13 September 2019. Perth: ANZFSS,. 

Osula, Anna-Maria; Maennel, Olaf, Eds (2018). Proceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 2018, Tallinn University of Technology, [Abstracts]. Tallinn: Tallinn University of Technology, Department of Software Science.

2017

Buldas, Ahto; Laanoja, Risto; Truu, Ahto (2017). Keyless signature infrastructure and PKI: hash-tree signatures in pre- and post-quantum world. International Journal of Services, Technology and Management, 23 (1/2), 117−130.10.1504/IJSTM.2017.10002708.

Priisalu, Jaan; Ottis, Rain (2017). Personal control of privacy and data: Estonian experience. Health and Technology, 7 (4), 441−451.10.1007/s12553-017-0195-1.

Osula, A.-M.; Zoetekouw, M. (2017). The Notification Requirement in Transborder Remote Search and Seizure: Domestic and International Law Perspectives. Masaryk University Journal of Law and Technology, 11 (1), 103−128.10.5817/MUJLT2017-1-6.

Bahsi, Hayretdin (2017). Analysis of national cyber situational awareness practices. Strategic Cyber Defence : A Multidisciplinary Perspective [Proceedings of the NATO Advanced Research Workshop on A Framework for a Military Cyber Defense Strategy, Norfolk, VA, USA, 11-13 April 2016]. Ed. Tatar, Unal; Gokce, Yasir; Gheorghe, Adrian V. IOS Press, 31−41. (NATO Science for Peace and Security Series - D: Information and Communication Security; 48).10.3233/978-1-61499-771-9-31.

Balogun, M.; Bahşi, H.; Karabacak, B. (2017). Preliminary analysis of cyberterrorism threats to Internet of things (IoT) applications. Terrorists' Use of the Internet : Assessment and Response [Proceedings of the NATO Advanced Research Workshop on Terrorists' Use of the Internet, Dublin, Ireland, 27-29 June 2016. Ed. Conway, M.; Jarvis, L.; Lehane, O.; et al. Amsterdam: IOS Press, 49−58. (NATO Science for Peace and Security Series - E: Human and Societal Dynamics; 136).10.3233/978-1-61499-765-8-49.

Blumbergs, Bernhards; Vaarandi, Risto (2017). Bbuzz: a bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis. MILCOM 2017 - IEEE Military Communications Conference : Baltimore, Maryland, USA, 23 - 25 October 2017, [Proceedings]. Baltimore, MD, USA: IEEE, 707−712.10.1109/MILCOM.2017.8170785.

Buldas, Ahto; Geihs, Matthias; Buchmann, Johannes (2017). Long-term secure commitments via extractable-binding commitments. Information Security and Privacy : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I. Ed. Pieprzyk, Josef; Suriadi, Suriadi. Cham: Springer, 65−81. (Lecture Notes in Computer Science; 10342).10.1007/978-3-319-60055-0_4.

Buldas, Ahto; Geihs, Matthias; Buchmann, Johannes (2017). Long-term secure time-stamping using preimage-aware hash functions: (Short version). Provable Security : 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings. Ed. Okamoto, Tatsuaki; et al. Cham: Springer, 251−260. (Lecture Notes in Computer Science; 10592).10.1007/978-3-319-68637-0_15.

Buldas, Ahto; Kalu, Aivo; Laud, Peeter; Oruaas, Mart (2017). Server-Supported RSA Signatures for Mobile Devices. Computer Security - ESORICS 2017 : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I, 10492. Ed. Foley, S.N. et al. Springer, 315−333. (Lecture Notes in Computer Science; 10492).10.1007/978-3-319-66402-6_19.

Buldas, Ahto; Laanoja, Risto; Truu, Ahto (2017). A server-assisted hash-based signature scheme. Secure IT Systems : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings. Ed. Lippmaa, H.; Mitrokotsa, A.; Matulevičius, R. Cham: Springer, 3−17. (Lecture Notes in Computer Science; 10674).10.1007/978-3-319-70290-2_1

Buldas, Ahto; Lenin, Aleksandr; Willemson, Jan; Charnamord, Anton (2017). Simple infeasibility certificates for attack trees. Advances in Information and Computer Security : 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings. Ed. Obana, Satoshi; Chida, Koji. Springer, 39−55. (Lecture Notes in Computer Science; 10418).10.1007/978-3-319-64200-0_3.

Buldas, Ahto; Saarepera, Märt (2017). Are the current system engineering practices sufficient to meet cyber crime? Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Ed. Tryfonas,Theo. Springer, 451−463. (Lecture Notes in Computer Science ; 10292).10.1007/978-3-319-58460-7_31.

Caliskan, Emin (2017). Risk analysis of internet censorship circumvention: case study of anonymization tools and effects. Strategic Cyber Defence : A Multidisciplinary Perspective [Proceedings of the NATO Advanced Research Workshop on A Framework for a Military Cyber Defense Strategy, Norfolk, VA, USA, 11-13 April 2016]. Ed. Tatar, Unal; Gokce, Yasir; Gheorghe, Adrian V. Amsterdam: IOS Press, 129−149. (NATO Science for Peace and Security Series - D: Information and Communication Security; 48).10.3233/978-1-61499-771-9-129.

Caliskan, Emin; Tatar, Unal; Bahsi, Hayretdin; Ottis, Rain; Vaarandi, Risto (2017). Capability detection and evaluation metrics for Cyber Security lab exercises. Proceedings of the 12th International Conference on Cyber Warfare and Security, ICCWS 2017 : Wright State University & the Center foc Cyberspace Research, Air Force Institute of Technology, Dayton, Ohio, USA, 2-3 March 2017. Ed. Bryant, A. R.; Mills, R. F.; Lopez, J. R. Jr. Reading, UK: Academic Conference and Publishing International Limited, 407−414.

Caliskan, Emin; Topgul, Oguzhan M.; Ottis, Rain (2017). Cyber security exercises: a comparison of participant evaluation metrics and scoring systems. Strategic Cyber Defence : A Multidisciplinary Perspective [Proceedings of the NATO Advanced Research Workshop on A Framework for a Military Cyber Defense Strategy, Norfolk, VA, USA, 11-13 April 2016]. Ed. Tatar, Unal; Gokce, Yasir; Gheorghe, Adrian V. Amsterdam: IOS Press, 180−190. (NATO Science for Peace and Security Series - D: Information and Communication Security; 48).10.3233/978-1-61499-771-9-180.

Farar, A. E.; Bahsi, H.; Blumbergs, B. (2017). A case study about the use and evaluation of cyber deceptive methods against highly targeted attacks. 2017 International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident) : 19-20 June, 2017, London, UK, Proceedings. London, UK: IEEE, [1−7].10.1109/CYBERINCIDENT.2017.8054640.

Hallaq, Bil; Somer, Tiia; Osula, Anna-Maria; Ngo, Kim; Mitchener-Nissen, Timothy (2017). Artificial intelligence within the military domain and cyber warfare. Proceedings of the 16th European Conference on Cyber Warfare and Security, ECCWS 2017 : Hosted by University College Dublin, Ireland, 29-30 June 2017. Ed. Scanlon, Mark; Le-Khak, Nhien-An. Reading, UK: Academic Conferences and Publishing International, 153−156.

Kont, Markus; Pihelgas, Mauno; Maennel, Kaie; Blumbergs, Bernhards; Lepik, Toomas (2017). Frankenstack: toward real-time red team feedback. MILCOM 2017 - IEEE Military Communications Conference : Baltimore, Maryland, USA, 23 - 25 October 2017, [Proceedings]. Baltimore, MD, USA: IEEE, 400−405.10.1109/MILCOM.2017.8170852.

Maennel, K.; Ottis, R.; Maennel, O. (2017). Improving and measuring learning effectiveness at cyber defense exercises. In: Lipmaa, H.; Mitrokotsa, A.; Matulevičius, R. (Ed.). Secure IT Systems : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings (123−138). Cham: Springer. (Lecture Notes in Computer Science; 10674).10.1007/978-3-319-70290-2_8.

Mäses, Sten; Hallaq, Bil; Maennel, Olaf (2017). Obtaining better metrics for complex serious games within virtualised simulation environments. In: Pivec, Maja; Gründler, Josef (Ed.). Proceedings of the 11th European Conference on Games Based Learning, ECGBL 2017, FH Joanneum University of Applied Sciences, Graz, Austria, 5 - 6 October 2017 (428−434). Reading, UK: Academic Conferences and Publishing International Limited.

Schmitt, Michael; Vihul, Liis; Akande, Dapo, Brown, Gary; Ducheine, Paul; Gill, Terry; Heinstchel von Heinegg, Wolff; Hernandez, Gleider; Housen-Couriel, Deborah; Huang, Zhixiong; Talbot Jensen, Eric; Kittichaisaree, Kringsak; Kozik, Andrey; Kreiss, Claus; McCormak, Tim; Nakatani, Kazuhiro; Rona, Gabor; Spector, Phillip; Watts, Sean; Blumbergs, Bernhards (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. United Kingdom: Cambridge University Press.

Zhuge, Chen; Vaarandi, Risto (2017). Efficient event log mining with LogClusterC. Proceedings 3rd IEEE Int. Conf. on Big Data Security on Cloud (BigDataSecurity), 3rd IEEE Int. Conf. on High Performance and Smart Computing, (HPSC) and 3rd IEEE Int. Conf. on Intelligent Data and Security (IDS) : 26-28 May 2017, Beijing, China.Ed. Qiu, Meikang. Los Alamitos (Calif.): IEEE Computer Society, 261−266.10.1109/BigDataSecurity.2017.26.

Birgy Lorenz, Kaido Kikkas, Tiia Sõmer, Kairi Osula, Anto Veldre (2017). KüberPähkel uuring. Küberpähkli 2017. aasta uuringu ülevaatest tulenevad soovitused

Kontseptsioon. HITSA töörühma liikmed: Birgy Lorenz, Edmund Laugasson, Kadri Umbleja, Kersti Antoi, Marge Kusmin, Mari-Liis Peets, Tauno Palts (2017) "Uued õppeteemad põhikooli informaatika ainekavas nüüdisaegsete IT-oskuste omandamise toetamiseks

Ainekava. Eesti NATO Ühingu egiidi all tegutsenud töörühm koosseisus: Birgy Lorenz, Triin Muulmann, Rain Ottis, Rein Põdra, Tiia Sõmer, Anto Veldre, Tiia Mikson, Krista Mulenok, Hindrek Lootus (2017) "Valikõppeaine/Valikkursus "Küberkaitse""

Osula, Anna-Maria; Maennel, Olaf Manuel, (Eds) (2017). Proceedings of the 3rd Interdisciplinary Cyber Research Workshop 2017 : 8th of July 2017, Tallinn University of Technology, [abstracts]. Tallinn: Tallinn University of Technology, Department of Software Science.

2016

Minárik, Tomas; Osula, Anna-Maria (2016). Tor does not stink: Use and abuse of the Tor anonymity network from the perspective of law. Computer Law and Security Review, 32 (1), 111−127.10.1016/j.clsr.2015.12.002.

Osula, Anna-Maria (2016). Remote search and seizure in domestic criminal procedure: Estonian case study. International Journal of Law and Information Technology, 24 (4), 343−373.10.1093/ijlit/eaw010. 

Blumbergs, B.; Pihelgas, M.; Kont, M.; Maennel, O.; Vaarandi, R. (2016). Creating and detecting IPv6 transition mechanism-based information exfiltration covert channels. Secure IT Systems : 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings. Ed. Brumley, B. B.; Röning, J. Cham: Springer, 85−100. (Lecture Notes in Computer Science; 10014).10.1007/978-3-319-47560-8_6.

Ernits, M.; Kikkas, K. (2016). A live virtual simulator for teaching cybersecurity to information technology students. Learning and Collaboration Technologies : Third International Conference, LCT 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings. Ed. Zaphiris, P.; Ioannou, A. Cham: Springer, 474−486. (Lecture Notes in Computer Science; 9753).10.1007/978-3-319-39483-1_43.

Li, J.; Stein, J.; Zhan, M.; Maennel, O. (2016). An expectation-based approach to policy-based security of the Border Gateway Protocol. 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) : GI 2016: 9th IEEE Global Internet Symposium, April 10-14, 2016, San Francisco, CA, USA. Ed. Lee, S.-J.; Petrioli, C.; Wan, P.-J.; Zheng, K. San Francisco, CA: IEEE, 340−345.10.1109/INFCOMW.2016.7562098.

Lorenz, Birgy; Kikkas, Kaido; Laanpere, Mart; Laugasson, Edmund (2016). A Model to Evaluate Digital Safety Concerns in School Environment. HCI International 2016: HCI International 2016 Toronto, Canada, 17 - 22 July 2016 The Westin Harbour Castle Hotel. Springer, 707−721.10.1007/978-3-319-39483-1_64.

Lorenz, Birgy; Laanpere, Mart; Kikkas, Kaido (2016). Digital Turn in the Schools of Estonia: Obstacles and Solutions. Learning and Collaboration Technologies: Third International Conference, LCT 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings. Springer, 722−731.10.1007/978-3-319-39483-1_65.

Somer, Tiia; Hallaq, Bil; Watson, Tim (2016). Utilising journey mapping and crime scripting to combat cyber crime. Proceedings of the 15th European Conference on Cyber Warfare and Security, ECCWS 2016 : Universität der Bundeswehr, Munich, Germany, 7-8 July 2016.

Tatar, Unal; Bahsi, Hayretdin; Gheorghe Adrian (2016). Impact assessment of cyber attacks: A quantification study on power generation systems. 2016 11th Systems of Systems Engineering Conference (SoSE), IEEE : June 12-16, 2016, Kongsberg, Norway. IEEE, 1−6.10.1109/SYSOSE.2016.7542959.

Vaarandi, R.; Kont, M.; Pihelgas, M. (2016). Event log analysis with the LogCluster tool. MILCOM 2016 - IEEE Military Communications Conference : November 1-3, 2016, Baltimore, MD, USA, Proceedings. IEEE, 982−987.10.1109/MILCOM.2016.7795458.

Velasco, Cristos; Hörnle, Julia; Osula, Anna-Maria (2016). Global Views on Internet Jurisdiction and Trans-border Access. In: Gutwirth, Serge; Leenes, Ronald; De Hert, Paul (Ed.). Data Protection on the Move (465−476). Springer Netherlands. (Law, Governance and Technology Series; 24).

Osula, Anna-Maria; Maennel, Olaf; (Eds.) (2016). Proceedings of the 2nd Interdisciplinary Cyber Research Workshop 2016 : 2nd of July 2016, Tallinn University of Technology, [abstracts]. Tallinn: Tallinn University of Technology, Faculty of Information Technology, Department of Computer Science.

2015

Lutu, A.; Bagnulo, M.; Pelsser, C.; Maennel, O.; Cid-Sueiro, J. (2015). The BGP Visibility Toolkit: Detecting Anomalous Internet Routing Behavior. IEEE/ACM Transactions on Networking, 1−14.10.1109/TNET.2015.2413838.

Bahsi, H.; Maennel, O. M. (2015). A Conceptual Nationwide Cyber Situational Awareness Framework for Critical Infrastructures. In: S. Buchegger, M. Dam (Ed.). Secure IT Systems: 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19–21, 2015, Proceedings (3−10). Springer. (Lecture Notes in Computer Science; 9417).10.1007/978-3-319-26502-5_1.

Ernits, M.; Maennel, O.; Tammekänd, J. (2015). i-tee: A fully automated Cyber Defense Competition for Students. SIGCOMM '15 Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication. ACM, 113−114.10.1145/2785956.2790033.

Lorenz, Birgy; Banister, Savilla Irene; Kikkas, Kaido (2015). Impacting the Digital Divide on a Global Scale - Six Case Studies from Three Continents. Learning and Collaboration Technologies, Volume 9192 of the Lecture Notes in Computer Science series: The HCI International 2015, Los Angeles, CA, USA. Ed. Panayiotis Zaphiris; Andri Ioannou. Springer, 687−696. (Lecture Notes in Computer Science; 9192).10.1007/978-3-319-20609-7_64.

Ottis, R. (2015). Cyber Warfare. In: Lehto, M; Neittaanmäki, P. (Ed.). Cyber Security: Analytics, Technology and Automation (89−96). Springer. (Intelligent Systems, Control and Automation: Science and Engineering; 78).10.1007/978-3-319-18302-2_6.

Vaarandi, R.; Blumbergs, B.; Caliskan, E. (2015). Simple Event Correlator - Best Practices for Creating Scalable Configurations. Proceedings of the 2015 IEEE CogSIMA Conference. IEEE, 96−100.10.1109/COGSIMA.2015.7108181.

Vaarandi, R.; Pihelgas, M. (2015). LogCluster - A Data Clustering and Pattern Mining Algorithm for Event Logs. Proceedings of the 11th International Conference on Network and Service Management (CNSM 2015). IEEE, 1−7.10.1109/CNSM.2015.7367331.

Wählisch, Matthias; Schmidt, Robert; Schmidt, Thomas; Maennel, Olaf; Uhlig, Steve; Tyson, Gareth (2015). RiPKI: The Tragic Story of RPKI Deployment in the Web Ecosystem. Proceedings of the 14th ACM Workshop on Hot Topics in Networks, Philadelphia, Pennsylvania, USA, November 16-17, 2015. Ed. Jaudelice de Oliveira, Jonathan Smith. New York: ACM, 1−7.10.1145/2834050.2834102. 

Osula, Anna-Maria; Maennel, Olaf; (Eds.) (2015). Proceedings of the 1st Interdisciplinary Cyber Research Workshop 2015 : 18th of July 2015, Tallinn University of Technology, [abstracts]. Tallinn: Tallinn University of Technology, Faculty of Information Technology, Department of Computer Science.

2014

Ottis, R. (2014). Light Weight Tabletop Exercise for Cybersecurity Education. Journal of Homeland Security and Emergency Management, 11 (4), 579−592.10.1515/jhsem-2014-0031. 

Buldas, Ahto; Laanoja, Risto; Truu, Ahto; Laud, Peeter (2014). Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures. Provable Security, 8th International Conference: ProvSec 2014, Hong Kong, 09.10-10.10.2014. Springer, 130−145. (Lecture Notes in Computer Science; 8782).

Buldas, Ahto; Truu, Ahto; Laanoja, Risto; Gerhards, Rainer (2014). Efficient record-level keyless signatures for audit logs. Secure IT Systems 19th Nordic Conference, NordSec 2014: Nordsec 2014, Tromsø, Norway, 15-17 October 2014. Ed. Bernsmed, Karin; Fisher-Hübner, Simone. Springer, 149−164. (LNCS; 8788).10.1007/978-3-319-11599-3_9. 

Lenin, A.; Buldas, A. (2014). Limiting Adversarial Budget in Quantitative Security Assessment. Decision and Game Theory for Security: Conference on Decision and Game Theory for Security. Los Angeles, CA, USA. November 6-7, 2014.. Ed. R. Proovendran and W.Saad. Springer, 153−172. (8840).10.1007/978-3-319-12601-2_9. 

Lutu, Andra; Bagnulo, Marcelo; Cid-Sueiro, Jesus; Maennel, Olaf. (2014). Separating wheat from chaff: Winnowing unintended prefixes using machine learning. IEEE Infocom. 943−951.10.1109/infocom.2014.6848023.

Lutu, Andra; Bagnulo, Marcelo; Pelsser, Cristel; Maennel, Olaf. (2014). Understanding the reachability of IPv6 limited visibility prefixes. In: Lecture Notes In Computer Science (163−172).. Los Angeles, CA: Springer. (Passive and Active Measurement).10.1007/978-3-319-04918-2_16. 

Skoberne, Nejc; Maennel, Olaf; Phillips, Iain; Bush, Randy; Zorz, Jan; Ciglaric, Mojca (2014). IPv4 Address Sharing Mechanism Classification and Tradeoff Analysis. IEEE/ACM TRANSACTIONS ON NETWORKING, 22, 391−404.10.1109/TNET.2013.2256147.

Vaarandi, Risto; Pihelgas, Mauno (2014). Using Security Logs for Collecting and Reporting Technical Security Metrics. Proceedings of the 2014 IEEE Military Communications Conference. IEEE, 294−299.10.1109/MILCOM.2014.53.