Tallinna Tehnikaülikool

Publikatsioonid

Sellel lehel leiad meie liikmete ja üliõpilaste poolt avaldatud olulisemad küberturbealased teadustöö publikatsioonid.

2024

Khalil, Shaymaa Mamdouh; Bahsi, Hayretdin; Korõtko, Tarmo (2024). Threat modeling of industrial control systems: A systematic literature review. Computers & Security, 136, Art. 103543; 19 pp. DOI: 10.1016/j.cose.2023.103543.

Vaarandi, Risto; Guerra-Manzanares, Alejandro (2024). Network IDS alert classification with active learning techniques. Journal of Information Security and Applications, 81, Art 103687−14 pp. DOI: 10.1016/j.jisa.2023.103687.

Vaarandi, Risto; Guerra-Manzanares, Alejandro (2024). Stream clustering guided supervised learning for classifying NIDS alerts. Future Generation Computer Systems, 155, 231−244. DOI: 10.1016/j.future.2024.01.032.

Seeba, Mari; Affia, Abasi-amefon Obot; Mäses, Sten; Matulevičius, Raimundas (2024). Create your own MUSE: A menthod for updating security level evaluation instruments. Computer Standards & Interfaces, 87, Art. no. 103776−16 pp. DOI: 10.1016/j.csi.2023.103776.

Arik, Marko; Lugo, Ricardo Gregorio; Ottis, Rain; Venables, Adrian (2024). Optimizing offensive cyber operation planner's development: exploring tailored training paths and framework evolution. Frontiers in Computer Science, 6, 01−11. DOI: 10.3389/fcomp.2024.1400360.

Erbas, Muhammed; Khalil, Shaymaa Mamdouh; Tsiopoulos, Leonidas (2024). Systematic literature review of threat modeling and risk assessment in ship cybersecurity. Ocean Engineering, 306, Art. no. 118059; 19 pp. DOI: 10.1016/j.oceaneng.2024.118059.

Dijk, Allard; Halisdemir, Emre; Melella, Cosimo; Schu, Alari; Pihelgas, Mauno; Meier, Roland (2024). ''LSPR23: A novel IDS dataset from the largest live-fire cybersecurity exercise,'' Journal of Information Security and Applications, Volume 85, 2024, article 103847. DOI: 10.1016/j.Jisa.2024.103847

Chikul, Pavel; Bahsi, Hayretdin, Maennel, Olaf (2024). The design and implementation of a semantic web framework for the event-centric digital forensics analysis. Proceedings of the 10th International Conference on Information Systems Security and Privacy, February 26-28, 2024, Rome, Italy. ScitePress, 570−581. DOI: 10.5220/0012437700003648.

Roberts, Anastasia; Venables, Adrian (2024). Military psychological operations in the digital battlespace: a practical application of the legal framework. 16th International Conference on Cyber Conflict: Over the Horizon. Ed. Kwan, C.; Lindström, L.; Giovannelli, D.; Podiņš, K.; Štrucl, D. Tallinn: CCDCOE Publications, 281−296. ( NATO CCDCOE Publications).

2023

Guerra-Manzanares, Alejandro; Bahsi, Hayretdin (2023). On the application of active learning for efficient and effective IoT botnet detection. Future Generation Computer Systems, 141,  40−53. DOI: 10.1016/j.future.2022.10.024.

Jennings, Luke; Sorell, Matthew; Espinosa, Hugo G. (2023). Interpreting the location data extracted from the Apple Health database. Forensic Science International: Digital Investigation, 44,  301504. DOI: 10.1016/j.fsidi.2023.301504.

Khalil, ShaymaaBahsi, HayretdinDola, Henry Ochieng’Korotko, TarmoMcLaughlin, KieranKotkas, Vahur (2023). Threat Modeling for Cyber-Physical Systems - A Case Study of a Microgrid System. Computers & Security, 124, ARTN 102950−16 pp. DOI: 10.1016/j.cose.2022.102950.

Maennel, Kaie; Brilingaitė, Agnė; Bukauskas, Linas; Juozapavičius, Aušrius; Knox, Benjamin James; Lugo, Ricardo Gregorio; Maennel, Olaf; Majore, Ginta; Sütterlin, Stefan (2023). A multidimensional cyber defense exercise: emphasis on emotional, social, and cognitive aspects. SAGE Open, 13 (1), 1−12. DOI: 10.1177/21582440231156367.

Mirsadeghi, Seyed Mohammad Hadi; Bahsi, Hayretdin; Vaarandi, Risto; Inoubli, Wissem (2023). Learning from few cyber-attacks:addressing the class imbalance problem in machine learning-based intrusion detection in software-defined networking. IEEE Access, 11, 140428−140442. DOI: 10.1109/ACCESS.2023.3341755.

Buldas, Ahto; Draheim, Dirk; Saarepera, Märt (2023). A theory of secure and efficient implementation of electronic money. SN Computer Science, 4 (6), Art. 861; 25 pp. DOI: 10.1007/s42979-023-02232-y.

Dobias, Patrik; Ricci, Sara; Dzurenda, Petr; Malina, Lukas; Snetkov, Nikita (2023). Lattice-Based Threshold Signature Implementation for Constrained Devices. Proceedings of the 20th International Conference on Security and Cryptography, 1: (SECRYPT 2023), Rome, Italy, 10–12 July, 2023.  Ed. Sabrina De Capitani di Vimercati and Pierangela Samarati. SciTePress, 724−730. DOI: 10.5220/0012112700003555.

Gasimov, Orkhan; Vaarandi, Risto; Pihelgas, Mauno (2023). Comparative analysis of pattern mining algorithms for event logs. 2023 IEEE International Conference on Cyber Security and Resilience (CSR).  IEEE, 1−7. DOI: 10.1109/CSR57506.2023.10224996. 

H. Iman, M. Reza; Chikul, Pavel; Jervan, Gert; Bahsi, Hayretdin; Ghasempouri, Tara (2023). Anomalous file system activity detection through temporal association rule mining. Proceedings of the 9th International Conference on Information Systems Security and Privacy (ICISSP 2023), Lisbon, Portugal, February 22-24, 2023.  Ed. Mori, Paolo; Lenzini, Gabriele;  Furnell, Steven. SciTePress, 733−740. DOI: 10.5220/0011805100003405.

Kalu, Aivo; Kus, Burak Can; Laud, Peeter; Leung, Kin Long; Snetkov, Nikita; Vakarjuk, Jelizaveta (2023). CACS: A Cloud Privacy-Preserving Attribute Management System. Proceedings of the 18th International Conference on Availability, Reliability and Security: ARES 2023, Benevento Italy, 29 August 2023 - 1 September, 2023. Association for Computing Machinery, #122. DOI: 10.1145/3600160.3605022.

Kirss, Johanna Maria; Laud, Peeter; Snetkov, Nikita; Vakarjuk, Jelizaveta (2023). Server-Supported Decryption for Mobile Devices. In: Gabriele Lenzini, Weizhi Meng (Ed.).  Security and Trust Management. (71−81).  Springer Cham. (Lecture Notes in Computer Science; 13867). DOI: 10.1007/978-3-031-29504-1_4.

Korving, Frank; Vaarandi, Risto (2023). DACA: automated attack scenarios and dataset generation. Proceedings of the 18th International Conference on Cyber Warfare and Security, ICCWS 2023, a conference hosted by Towson University, Baltimore County, Maryland, USA, 9-10 March 2023, 1. Academic Conferences International, 550−559. (International Conference on Cyber Warfare and Security Conference Proceedings; 18). DOI: 10.34190/iccws.18.1.962.

Laud, Peeter; Vakarjuk, Jelizaveta (2023). A Comparison-Based Methodology for the Security Assurance of Novel Systems. In: Computer Security. ESORICS 2022 International Workshops. (625−644). Springer. (Lecture Notes in Computer Science; 13785). DOI: 10.1007/978-3-031-25460-4_36.

Ottis, Rain (2023). Conflict in cyberspace. In: Gruszczak, Artur; Kaempf, Sebastian; (Ed.).  Routledge Handbook of the Future of Warfare. (411−420).  London: Routledge. DOI: 10.4324/9781003299011.

Mäses, Sten; Lorenz, Birgy; Kikkas, Kaido; Karmo, Kristjan (2023). Dances with the Illuminati: Hands On Social Engineering in a Classroom Setting. In: Wayne Patterson (Ed.). New Perspectives in Behavioral Cybersecurity: Human Behavior and Decision-Making Models USA: CRC Press (Fort Lauderdale). DOI: 10.1201/9781003415060-7.

Mirsadeghi, Seyed Mohammad Hadi; Bahsi, Hayretdin; Inoubli, Wissem (2023). Deep learning-based detection of cyberattack in software-defined networks. Digital Forensics and Cyber Crime : 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings: 13th EAI International Conference on Digital Forensics & Cyber Crime November 16-18, 2022 Boston, United States. Toim. Goel, Sanjay; Gladyshev, Pavel; Nikolay. Akatyev; Markowsky, George; Johnson, Daryl. Cham: Springer, 341−354. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; 508). DOI: 10.1007/978-3-031-36574-4_20.

Arik, Marko (2023). How Do NATO Members Define Cyber Operations? HCI International 2023 – Late Breaking Posters. (8−14). SpringerLink. (Communications in Computer and Information Science; 1957). DOI: 10.1007/978-3-031-49212-9_2.

Roberts, Andrew; Malayjerdi, Mohsen; Bellone, Mauro; Maennel, Olaf; Malayjerdi, Ehsan (2023). Analysing Adversarial Threats to Rule-Based Local-Planning Algorithms for Autonomous Driving. Symposium on Vehicles Security and Privacy (VehicleSec) 2023, San Diego, CA, USA, 27 Feb 2023. ISOC. DOI: 10.14722/vehiclesec.2023.23086.

2022

Buldas, Ahto; Draheim, Dirk; Gault, Mike; Laanoja, Risto; Nagumo, Takehiko; Saarepera, Märt; Shah, Syed Attique; Simm, Joosep; Steiner, Jamie; Tammet, Tanel; Truu, Ahto (2022). An Ultra-scalable Blockchain Platform for Universal Asset Tokenization: Design and Implementation. IEEE Access, 10, 77284−77322. DOI: 10.1109/ACCESS.2022.3192837.

Guerra-Manzanares, Alejandro; Bahsi, Hayretdin (2022). On the Relativity of Time: Implications and Challenges of Data Drift on Long-term Effective Android Malware Detection. Computers & Security, 122, 102835−15 pp. DOI: 10.1016/j.cose.2022.102835.

Guerra-Manzanares, Alejandro; Bahsi, Hayretdin; Luckner, Marcin (2022). Leveraging the first line of defense: a study on the evolution and usage of android security permissions for enhanced android malware detection. Journal of Computer Virology and Hacking Techniques, 1−32. DOI: 10.1007/s11416-022-00432-3.

Guerra-Manzanares, AlejandroLuckner, MarcinBahsi, Hayretdin (2022). Android malware concept drift using system calls: Detection, characterization and challenges. Expert Systems with Applications, 206, 117200−19 pp. DOI: 10.1016/j.eswa.2022.117200.

Guerra-Manzanares, Alejandro; Luckner, Marcin; Bahsi, Hayretdin (2022). Concept drift and cross-device behavior: challenges and implications for effective android malware detection. Computers & Security, 120, 102757−20 pp. DOI: 10.1016/j.cose.2022.102757.

Guerra-Manzanares, Alejandro; Välbe, Martin (2022). Cross-device behavioral consistency: Benchmarking and implications for effective android malware detection. Machine Learning with Applications, 9, 100357. DOI: 10.1016/j.mlwa.2022.100357.

Kalakoti, Rajesh; Nõmm, Sven; Bahsi, Hayretdin (2022). In-depth feature selection for the statistical machine learning based botnet detection in IoT networks. IEEE Access, 10, 94518−94535. DOI: 10.1109/ACCESS.2022.3204001.

Mäses, Sten; Maennel, Kaie; Brilingaitė, Agnė (2022). Trends and challenges for balanced scoring in cybersecurity exercises: A case study on the example of Locked Shields. Frontiers in Education, 7, Art. no. 958405−13 pp. DOI: 10.3389/feduc.2022.958405.

Osula, Anna-Maria; Kasper, Agnes; Kajander, Aleksi (2022). EU common position on international law and cyberspace. Masaryk University Journal of Law and Technology, 16 (1), 89−121. DOI: 10.5817/MUJL2022-1-4.

Sumaila, Faisal; Bahsi, Hayretdin (2022). Digital forensic analysis of mobile automotive maintenance applications. Forensic Science International Digital Investigation, 43 (S),  ARTN 301440−9 pp. DOI: 10.1016/j.fsidi.2022.301440.

Babayeva, Gulkhara; Maennel, Kaie; Maennel, Olaf Manuel (2022). Building an ontology for cyber defence exercises. 7th IEEE European Symposium on Security and Privacy Workshops, EUROS&PW 2022, proceedings. IEEE, 423−432. DOI: 10.1109/EuroSPW55150.2022.00050.

Bahsi, Hayretdin; Dola, Henry Ochieng‘; Khalil, Shaymaa Mamdouh; Korõtko, Tarmo (2022). A cyber attack taxonomy for microgrid systems. 2022 17th Annual System of Systems Engineering Conference, SOSE 2022. IEEE, 324−331. DOI: 10.1109/SOSE55472.2022.9812642.

Buldas, Ahto; Draheim, Dirk; Saarepera, Märt (2022). Secure and efficient implementation of electronic money. Future Data and Security Engineering : Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 9th International Conference, FDSE 2022, Ho Chi Minh City, Vietnam, November 23–25, 2022, proceedings. Ed. Dang, Tran Khanh; Küng, Josef; Chung, Tai M.;. Singapore: Springer, 34−51. (Communications in Computer and Information Science; 1688). DOI: 10.1007/978-981-19-8069-5_3.

Buldas, Ahto; Draheim, Dirk; Gault, Mike; Saarepera, Märt (2022). Towards a foundation of Web3. Future Data and Security Engineering : Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 9th International Conference, FDSE 2022, Ho Chi Minh City, Vietnam, November 23–25, 2022, proceedings. Ed. Dang, Tran Khanh; Küng, Josef; Chung, Tai M. Singapore: Springer, 3−18. (Communications in Computer and Information Science; 1688). DOI: 10.1007/978-981-19-8069-5_1.

Guerra-Manzanares, Alejandro; Bahsi, Hayretdin "On the application of active learning to handle data evolution in Android malware detection", 13th EAI International Conference on Digital Forensics & Cyber Crime 2022  [ilmumas].

Guerra-Manzanares, Alejandro; Medina-Galindo, Jorge; Bahsi, Hayretdin; Nõmm, Sven (2022). Using MedBIoT dataset to build effective machine learning-based IoT botnet detection systems. In: Furnell, Steven; Mori, Paolo; Weippl, Edgar; Camp, Olivier (Ed.). Information Systems Security and Privacy: 6th International Conference, ICISSP 2020, Valletta, Malta, February 25–27, 2020, Revised Selected Papers (222−243). Cham: Springer. (Communications in Computer and Information Science; 1545). DOI: 10.1007/978-3-030-94900-6_11.

Halisdemir, Emre, Maj.; Karacan, Hacer; Pihelgas, Mauno; Lepik, Toomas; Cho, Sungbaek (2022). Data quality problem in AI-based network intrusion detection systems studies and a solution proposal. 2022 14th International Conference on Cyber Conflict: Keep Moving (CyCon). Ed. Jančárková, T.; Visky, G.; Winther, I. CCDCOE Publications, 367−383. DOI: 10.23919/CyCon55549.2022.9811014.

Karimnia, Rooya; Maennel, Kaie; Shahin, Mahtab (2022). Culturally-sensitive cybersecurity awareness program design for Iranian high-school students. Proceedings of the 8th International Conference on Information Systems Security and Privacy (ICISSP), 9-11 February, 2022. SciTePress, 121−132.

Kasper, Agnes; Osula, Anna-Maria (2022). ‘Spill over’ and ‘fail forward’ in the EU’s cybersecurity regulations. In: David Ramiro Troitiño, Tanel Kerikmäe, Ondrej Hamulak (Ed.). Digital Development of the European Union. Springer [ilmumas].

Mirsadeghi, Seyed Muhammad Hadi; Bahsi, Hayretdin; Inbouli, Wissem, "Deep Learning-based Detection of Cyberattacks in Software-Defined Networks", 13th EAI International Conference on Digital Forensics & Cyber Crime 2022 [ilmumas].

Nõmm, Sven; Venables, Adrian (2022). Towards generation of synthetic data sets for hybrid conflict modelling. 15th IFAC Symposium on Analysis, Design and Evaluation of Human Machine Systems, HMS 2022, San José, USA, 12-15 September, 2022.  Ed. Zaal, Peter; Schuster, David. Elsevier, 25−30. (IFAC-PapersOnLine; 55-29). DOI: 10.1016/j.ifacol.2022.10.226.

Osula, Anna-Maria (2022). Building cyber resilience: the defensive shield for the EU. In: Boulet, Gertjan; Reiterer, Michael; Pardo, Ramon Pacheco (Ed.). EU-South Korea cybersecurity cooperation. Palgrave Macmillan. (New Security Challenges Series) [ilmumas].

Seeba, Mari; Mäses, Sten; Matulevičius, Raimundas (2022). Method for Evaluating Information Security Level in Organisations. In:  Research Challenges in Information Science: 16th International Conference, RCIS 2022, Barcelona, Spain, May 17–20, 2022, proceedings. (644−652). Cham: Springer. (Lecture Notes in Business Information Processing; 446). DOI: 10.1007/978-3-031-05760-1_39.

Sütterlin, Stefan; Knox, Benjamin J.; Maennel, Kaie; Canham, Matthew; Lugo, Ricardo Gregorio (2022). On the relationship between health sectors' digitalization and sustainable health goals: A cyber security perspective. In: Flahault, Antoine (Ed.). Transitioning to Good Health and Well-Being (1−22). MDPI.

Sütterlin, Stefan; Lugo, Ricardo G.; Ask, Torvald F.; Veng, Karl; Eck, Jonathan; Fritschi, Jonas; Özmen, Muhammed-Talha; Bärreiter, Basil; Knox, Benjamin J. (2022). The role of IT background for metacognitive accuracy, confidence and overestimation of deep fake recognition skills. In: Schmorrow, Dylan D.; Fidopiastis, Cali M. (Ed.). Augmented Cognition: 16th International Conference, AC 2022, Held as Part of the 24th HCI International Conference, HCII 2022, Virtual Event, June 26 – July 1, 2022, Proceedings. (103−119). Cham: Springer. (Lecture Notes in Computer Science; Lecture Notes in Artificial Intelligence; 13310). DOI: 10.1007/978-3-031-05457-0_9.

Vaarandi, Risto; Mäses, Sten (2022). How to build a SOC on a budget. 2022 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 171−177. DOI: 10.1109/CSR54599.2022.9850281.

Vakarjuk, J.; Snetkov, N.; Willemson, J. (2022). Russian Federal Remote E-voting Scheme of 2021 – Protocol Description and Analysis. EICC 2022: Proccedings of the European Interdisciplinary Cybersecurity Conference: EICC 2022: European Interdisciplinary Cybersecurity Conference; Barcelona, Spain, June 15 - 16, 2022. Ed. D. Megías, R. Di Pietro, J. García-Alfaro. New York, NY, United States: Association for Computing Machinery, 29−35. DOI: 10.1145/3528580.3528586.

Osula, Anna-MariaMaennel, Olaf (Toim.) (2022) 7th Interdisciplinary Cyber Research conference 2022. Konverentsi kogumik. 13. juuni 2022, Tallinna Tehnikaülikool

2021

Balogun, Taofeek M.; Bahsi, Hayretdin; Keskin, Omer F.; Tatar, Unal; (2021). A comparative framework for cyber threat modelling: case of healthcare and industrial control systems. International Journal of Critical Infrastructures. DOI: 10.1504/IJCIS.2024.10046187.

Del Mar-Raave, Joanna Rose; Bahsi, Hayretdin; Mrsic, Leo; Hausknecht, Kresimir (2021). A machine learning-based forensic tool for image classification-A design science approach. Forensic Science International Digital Investigation, 38, 301265. DOI: 10.1016/j.fsidi.2021.301265.

Domarkienė, Ingrida; Ambrozaitytė, Laima; Bukauskas, Linas; Rančelis, Tautvydas; Sütterlin, Stefan; Knox, Benjamin James; Maennel, Kaie; Maennel, Olaf; Parish, Karen; Lugo, Ricardo Gregorio; Brilingaitė, Agnė (2021). CyberGenomics : application of behavioral genetics in cybersecurity. Behavioral Sciences, 11 (11), 152. DOI: 10.3390/bs11110152.

Guerra-Manzanares, Alejandro; Bahsi, Hayretdin; Nõmm, Sven (2021). KronoDroid: time-based hybrid-featured dataset for effective android malware detection and characterization. Computers & Security, 110, 1−32. DOI: 10.1016/j.cose.2021.102399.

Franke, Ulrik; Friberg, E. Langfeldt; Bahsi, Hayretdin; (2021). Maritime Cyber Insurance: The Norwegian Case. International Journal of Critical Infrastructures, 17. DOI: 10.1504/IJCIS.2022.10046164.

Kasper. A.; Osula, A.-M.; Molnar, A. (2021). Cyber security and EU cyber diplomacy. IDP Revista de Internet Derecho y Política, 34. DOI: 10.7238/idp.v0i34.387469.

Matthews, Richard; Lovell, Kieren; Sorell, Matthew; (2021). Ghost protocol - Snapchat as a method of surveillance. Forensic Science International Digital Investigation, 36 (Supplement), 301112. DOI: 10.1016/j.fsidi.2021.301112.

Venables, Adrian (2021). Modelling cyberspace to determine cybersecurity training requirements. Frontiers in Education, 6, ARTN 768037. DOI: 10.3389/feduc.2021.768037.

Chikul, Pavel; Bahsi, Hayretdin; Maennel, Olaf (2021). An ontology engineering case study for advanced digital forensic analysis. Model and Data Engineering : 10th International Conference, MEDI 2021, Tallinn, Estonia, June 21-23, 2021, Proceedings. Ed. Attiogbé, Christian; Ben Yahia, Sadok. Cham: Springer, 67−74. (Lecture Notes in Computer Science; 12732). DOI: 10.1007/978-3-030-78428-7_6.

Firsov, Denis; Lakk, Henri; Truu, Ahto (2021). Verified multiple-time signature scheme from one-time signatures and timestamping. 2021 IEEE 34th Computer Security Foundations Symposium (CSF) : June 21-25, 2021, Virtual Conference, Proceedings. IEEE Computer Society, [1−13]. DOI: 10.1109/CSF51468.2021.00051.

Firsov, Denis; Lakk, Henri; Laur, Sven; Truu, Ahto (2021). BLT+L: efficient signatures from timestamping and endorsements. SECRYPT 2021: Proceedings of the 18th International Conference on Security and Cryptography,July 6-8, 2021. Ed. De Capitani di Vimercati, Sabrina; Samarati, Pierangela. SciTePress, 75−86. DOI: 10.5220/0010530000750086.

Haddad, Y.; Orye, E.; Maennel, O. (2021). Ghost Injection Attack on Automatic Dependent Surveillance-Broadcast Equipped Drones Impact on Human Behaviour. 2021 Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA), online, 14-22 May 2021. IEEE.

Heering, D.; Maennel, O. M.; Venables, A. N. (2021). Shortcomings in cybersecurity education for seafarers. Developments in Maritime Technology and Engineering : Proceedings of the 5th International Conference on Maritime Technology and Engineering (MARTECH 2020), Lisbon, Portugal, 16-19 November, 2020, Volume 1. Ed. Guedes Soares, C.; Santos, T. A. Boca Raton: CRC Press, 49−61. (Proceedings in Marine Technology and Ocean Engineering; 6). DOI: 10.1201/9781003216582-06.

Hovhannisyan, Kristine; Bogacki, Piotr; Colabuono, Consuelo Assunta; Lofù, Domenico; Marabello, Maria Vittoria; Maxwell, Eugene Brady (2021). Towards a healthcare cybersecurity certification scheme. 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2021) : 14-16 June 2021, Dublin, Ireland (Virtual). IEEE, 9 p. DOI: 10.1109/CyberSA52016.2021.9478255.

Kerttunen, Mika (2021). The Role of Defence in National Cyber Security. In: Cornish, Paul (Ed.). Oxford Handbook on Cyber Security (447−462). Oxford: Oxford University Press. DOI: 10.1093/oxfordhb/9780198800682.013.27.

Kikkas, Kaido; Lorenz, Birgy (2021). A digital services course to promote teaching of informatics in Estonia. Educating Engineers for Future Industrial Revolutions : Proceedings of the 23rd International Conference on Interactive Collaborative Learning (ICL2020), Volume 1. Ed. Auer, Michael E.; Rüütmann, Tiia. Cham: Springer, 711−720. (Advances in Intelligent Systems and Computing; 1328). DOI: 10.1007/978-3-030-68198-2_66.

Lenin, Aleksandr; Laud, Peeter (2021). Attribute-based encryption for named data networking. ICN 2021 : Proceedings of the 2021 8th ACM Conference on Information-Centric Networking. New York: ACM, 118−120. DOI: 10.1145/3460417.3483371.

Lorenz, Birgy; Kikkas, Kaido; Sõmer, Tiia (2021). IT as a career choice for girls : breaking the (self-imposed) glass ceiling. Proceedings of the 20th European Conference on e-Learning : a Virtual Conference hosted by University of Applied Sciences HTW, Berlin, Germany, 28-29 October, 2021. Ed. Busch, Carsten; Frieß, Regina; Steinicke, Martin; Wendler, Tilo. UK: Academic Conferences International Limited, 226−274.

Lorenz, Birgy; Kikkas, Kaido; Talisainen, Aleksei; Eomäe, Taavi (2021). CyberPin - Challenges on recognizing youngest cyber talents. HCI for Cybersecurity, Privacy and Trust : Third International Conference, HCI-CPT 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Virtual Event, July 24-29, 2021, Proceedings. Ed. Moallem, Abbas. Cham: Springer, 326−336. (Lecture notes in computer science; 12788). DOI: 10.1007/978-3-030-77392-2_21.

Maennel, Kaie; Kivimägi, Kristian; Maennel, Olaf; Sütterlin, Stefan; Ernits, Margus (2021). Remote technical Labs: an innovative and scalable component for university cybersecurity program admission. Educating Engineers for Future Industrial Revolutions : Proceedings of the 23rd International Conference on Interactive Collaborative Learning (ICL2020), Volume 2. Ed. Auer, Michael E; Rüütmann, Tiia. Cham: Springer, 521−533. (Advances in Intelligent Systems and Computing; 1329). DOI: 10.1007/978-3-030-68201-9_51.

Mäses, Sten; Maennel, Kaie; Toussaint, Mascia; Rosa, Veronica (2021). Success Factors for Designing a Cybersecurity Exercise on the Example of Incident Response. Proceedings of the 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW): 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), September 7, 2021, all digital (instead of Vienna, Austria). IEEE Computer Society Conference Publishing Services, 259−268. DOI: 10.1109/EuroSPW54576.2021.00033.

Mäses, Sten; Maennel, Olaf Manuel; Sütterlin, Stefan (2021). Using competency mapping for skills assessment in an introductory cybersecurity course. Educating Engineers for Future Industrial Revolutions : Proceedings of the 23rd International Conference on Interactive Collaborative Learning (ICL2020), Volume 2. Ed. Auer, Michael E; Rüütmann, Tiia. Cham: Springer, 572−583. (Advances in Intelligent Systems and Computing; 1329). DOI: 10.1007/978-3-030-68201-9_56.

Pihelgas, Mauno; Kont, Markus (2021). Frankenstack: Real-time Cyberattack Detection and Feedback System for Technical Cyber Exercises. Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR) - July 26-28, 2021, Virtual Conference. Rhodes, Greece: IEEE, 396−402. DOI: 10.1109/CSR51186.2021.9527923.

Roberts, Anastasia; Venables, Adrian (2021). The role of artificial intelligence in kinetic targeting from the perspective of international humanitarian law. In: Jančárková, T.; Lindström, L.; Visky, G.; Zotz, P. (Ed.). 2021 13th International Conference on Cyber Conflict: Going Viral (43−58). Tallinn: CCDCOE; IEEE. (NATO CCDCOE Publications). DOI: 10.23919/CyCon51939.2021.9468301.

Roberts, Andrew; Snetkov, Nikita; Maennel, Olaf; (2021). Cybersecurity Test Range for Autonomous Vehicle Shuttles. Proceedings of the 2021 IEEE European Symposium on Security and Privacy Workshops, September 7, 2021 (EuroS&PW). IEEE, 239−249. DOI: 10.1109/EuroSPW54576.2021.00031.

Sõmer, Tiia (2021). Methodology for Modelling Financially Motivated Cyber Crime. International Conference on Cyber Warfare and Security; Reading, (Feb 2021). DOI:10.34190/IWS.21.099

Vaarandi, Risto (2021). A stream clustering algorithm for classifying network IDS alerts. Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR) - July 26-28, 2021, Virtual Conference. IEEE, 14−19. DOI: 10.1109/CSR51186.2021.9527926.

Valtna-Dvořák, Astrid; Lips, Silvia; Tsap, Valentyna; Ottis, Rain; Priisalu, Jaan; Draheim, Dirk; (2021). Vulnerability of State-Provided Electronic Identification: The Case of ROCA in Estonia. Electronic Government and the Information Systems Perspective : 10th International Conference, EGOVIS 2021, Virtual Event, September 27-30, 2021, Proceedings. Cham: Springer, 73−85. (Lecture Notes in Computer Science; 12926).

Visky, Gabor; Lavrenovs, Arturs; Maennel, Olaf (2021). Status Detector for Fuzzing-Based Vulnerability Mining of IEC 61850 Protocol. Proceeding of the 20th European Conference on Cyber Warfare and Security: A Virtual Conference Hosted By University of Chester UK: 20th European Conference on Cyber Warfare and Security ECCWS 2021, 24th-25th June 2021. Academic Conferences International Ltd, 454−461. DOI: 10.34190/EWS.21.007.

Lorenz, Birgy; Kirna, Catlyn; Eomäe, Taavi; Hendrikson, Marily; Poudel, Diana; Saks, Hanno; Aleksei Talisainen; Mikkli, Aet; Kits Rasmus (2021). Küberpähkli uuringu raport 2020. 1−22.

2020

Bahşi, Hayretdin; Franke, Ulrik; Friberg, Even Langfeldt (2020). The cyber-insurance market in Norway. Information and Computer Security.10.1108/ICS-01-2019-0012

Buldas, Ahto; Gadyatskaya, Olga; Lenin, Aleksandr; Mauw, Sjouke; Trujillo-Rasua, Rolando (2020). Attribute Evaluation on Attack Trees with Incomplete Information. Computers & Security, 88, 101630, 1−17.10.1016/j.cose.2019.101630.

Buldas, Ahto; Draheim, Dirk; Nagumo, Takehiko; Vedeshin, Anton (2020). Blockchain technology: intrinsic technological and socio-economic barriers. FDSE'2020 Keynote. Future Data and Security Engineering : 7th International Conference, FDSE 2020, Quy Nhon, Vietnam, November 25-27, 2020, Proceedings. Ed. Dang, Tran Khanh; Küng, Josef; Takizawa, Makoto; Chung, Tai M. Cham: Springer, 3−27. (Lecture Notes in Computer Science; 12466). DOI: 10.1007/978-3-030-63924-2_1.

Caliskan, Emin; Vaarandi, Risto (2020). Career development in cyber security: bootcamp training programs. Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020. Ed. Payne, Brian K.; Wu, Hongyi. Reading, UK: Academic Conferences and Publishing International Ltd, 503−511.10.34190/ICCWS.20.080.

Ernits, Margus; Maennel, Kaie; Mäses, Sten; Lepik, Toomas; Maennel, Olaf (2020). From simple scoring towards a meaningful interpretation of learning in cybersecurity exercises. Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020. Ed. Payne, Brian K.; Wu, Hongyi. Reading, UK: Academic Conferences and Publishing International Ltd, 135−143.10.34190/ICCWS.20.046.

Firsov, Denis; Buldas, Ahto; Truu, Ahto; Laanoja, Risto (2020). Verified security of BLT signature scheme. CPP '20 : Proceedings of the 9th ACM SIGPLAN International Conference on Certified Programs and Proofs : January 20-21, 2020, New Orleans, LA, US. Ed. Blanchette, Jasmin; Hriţcu, Cătălin. New York, NY: ACM, 244−257.10.1145/3372885.3373828.

Garcia-Granados, Fernando; Bahsi, Hayretdin (2020). Cybersecurity knowledge requirements for strategic level decision makers. Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020. Ed. Payne, Brian K.; Wu, Hongyi. Reading, UK: Academic Conference and Publishing International Limited, 559−568.10.34190/ICCWS.20.102.

Guerra-Manzanares, Alejandro; Medina-Galindo, Jorge; Bahsi, Hayretdin; Nõmm, Sven (2020). MedBIoT: Generation of an IoT Botnet Dataset in a Medium-sized IoT Network. Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP, Volume 1 : February 25-27, 2020, La Valletta, Malta. La Valletta: SciTePress, 207−218.10.5220/0009187802070218.

Kerttunen, Mika (2020). Cyberterrorism: A Schrödinger's cat. In: Tikk, Eneken; Kerttunen, Mika (Ed.). Routledge Handbook of International Cybersecurity (161−173). London; New York: Routledge.10.4324/9781351038904-15.

Kerttunen, Mika; Tikk, Eneken (2020). The politics of stability: cement and change in cyber affairs. In: Tikk, Eneken; Kerttunen, Mika (Ed.). Routledge Handbook of International Cybersecurity (Ch. 4, 52−64). London; New York: Routledge.10.4324/9781351038904-6.

Kikkas, Kaido; Lorenz, Birgy (2020). Training young cybersecurity talents - the case of Estonia. HCI International 2020 - Posters : 22nd International Conference, HCII 2020, Copenhagen, Denmark, July 19-24, 2020, Proceedings, Part II. Ed. Stephanidis, Constantine; Antona, Margherita. Cham: Springer, 256−263. (Communications in Computer and Information Science; 1225).10.1007/978-3-030-50729-9_36.

Lorenz, Birgy; Kikkas, Kaido (2020). "Trust me, you will need it": Cybersecurity as extracurricular subject at estonian schools. HCI for Cybersecurity, Privacy and Trust : Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19-24, 2020, Proceedings. Ed. Moallem,Abbas. Cham: Springer, 175−188. (Lecture Notes in Computer Science; 12210).10.1007/978-3-030-50309-3_12.

Maennel, Kaie (2020). Learning analytics perspective: evidencing learning from digital datasets in cybersecurity exercises. Proceedings 5th IEEE European Symposium on Security and Privacy Workshops EUROS&PW 2020 : 7-11 September 2020, VIrtual Event. Los Alamitos, Calif.: IEEE, 27−36. DOI: 10.1109/EuroSPW51379.2020.00013.

Maennel, Kaie; Joonsoo, Kim; Sütterlin, Stefan (2020). From text mining to evidence team learning in cybersecurity exercises. Companion Proceedings of the 10th International Conference on Learning Analytics & Knowledge (LAK20) : Cyberspace, March 23-27, 2020. The Society for Learning Analytics Research (SoLAR), 107−109.

Saber, Yari; Mäses, Sten; Maennel, Olaf Manuel (2020). A method for teaching Open Source Intelligence (OSINT) using personalised cloud-based exercises. Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020. Ed. Payne, Brian K.; Wu, Hongyi. Reading, UK: Academic Conference and Publishing International Limited, 480−489.10.34190/ICCWS.20.091.

Salminen, Mirva; Kerttunen, Mika (2020). The becoming of cyber-military capabilities. In: Tikk, Eneken; Kerttunen, Mika (Ed.). Routledge Handbook of International Cybersecurity (Ch 7, 94−107). London; New York: Routledge.10.4324/9781351038904-9.

Tikk, Eneken (2020). Civil defence and cyber security: A contemporary European perspective. In: Austin, Greg (Ed.). National Cyber Emergencies: The Return to Civil Defence (Ch. 4, 76−92). Taylor and Francis.10.4324/9780429343438-5.

Tikk, Eneken (2020). What do we talk about when we talk about international cybersecurity. In: Tikk, Eneken; Kerttunen, Mika (Ed.). Routledge Handbook of International Cybersecurity (Ch. 33, 389−396). London; New York: Routledge.10.4324/9781351038904-38.

Tikk, Eneken; Schia, Niels Nagelhus (2020). The role of the UN Security Council in cybersecurity International peace and security in the digital age. In: Tikk, Eneken; Kerttunen, Mika (Ed.). Routledge Handbook of International Cybersecurity (Ch. 30, 354−365). London; New York: Routledge.10.4324/9781351038904-35.

Vaarandi, Risto; Pihelgas, Mauno (2020). NetFlow based framework for identifying anomalous end user nodes. Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020. Ed. Payne, Brian K.; Wu, Hongyi. Reading, UK: Academic Conferences and Publishing International Ltd, 448−456.10.34190/ICCWS.20.035.

Küberkriminalistika ja küberjulgeoleku keskus (2020) Eesti küberturvalisuse valdkonna teadus- ja arendustegevuse kontseptsioon

Küberkriminalistika ja küberjulgeoleku keskus (2020) Eesti küberturbe majandusharu kontseptsioon

Birgy Lorenz, Mati Leet, Taavi Eomäe, Marily Hendrikson, Kairi Osula, Catlyn Kirna, Diana Poudel, Hanno Saks, Tõnu Soop, Aet Mikkli, Maarja Punak (2020) KüberPähkel uuring. Küberpähkel 2019 sügisuuringu ülevaatest tulenevad soovitused

Osula, Anna-MariaMaennel, Olaf (Toim.) (2020) 6th Interdisciplinary Cyber Research conference 2019. Konverentsi kogumik. 7. detsember 2020, Tallinna Tehnikaülikool

2019

Herrera, Luis-Carlos; Maennel, Olaf (2019). A comprehensive instrument for identifying critical information infrastructure services. International Journal of Critical Infrastructure Protection, 25, 50−61.10.1016/j.ijcip.2019.02.001.

Motus, L.; Teichmann, M.; Kangilaski, T.; Priisalu, J.; Kaugerand, J. (2019). Some issues in modelling comprehensive situation awareness. 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC) : Bari, Italy. October 6-9, 2019. IEEE, 540−545.10.1109/SMC.2019.8914360.

Bahşi, Hayretdin; Dieves, Veiko; Kangilaski, Taivo; Laud, Peeter; Mõtus, Leo; Murumets, Jaan; Ploom, Illimar; Priisalu, Jaan; Seeba, Mari; Täks, Ermo; Tammel, Kaide; Tammpuu, Piia; Taveter, Kuldar; Trumm, Avo; Truusa, Tiia-Triin; Vihalemm, Triin (2019). Mapping the information flows for the architecture of a nationwide situation awareness system: (poster). Proceedings 2019 IEEE International Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA) : Las Vegas, NV, USA, 8-11 April 2019. Ed. Rogova, Galina L.; McGeorge, Nicolette; Gundersen, Odd Erik; Rein, Kellyn; Freiman, Mary. Las Vegas, NV: IEEE, 152−157.10.1109/COGSIMA.2019.8724167.

Blumbergs, Bernhards (2019). Remote exploit development for cyber red team computer network operations targeting industrial control systems. Proceedings of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, February 23-25, 2019, Prague, Czech Republic, Vol. 1. Ed. Mori, Paolo; Furnell, Steven; Camp, Oliver. Prague: SciTePress, 88−99.10.5220/0007310300880099.

Blumbergs, Bernhards; Ottis, Rain; Vaarandi, Risto (2019) Crossed Swords: a cyber red team oriented technical exercise. Proceedings of the 18th European Conference on Cyber Warfare and Security, ECCWS 2019: University of Coimbra, Portugal, 4-5 July 2019. Reading, UK: ACPI, 37−44. 

Buldas, Ahto; Firsov, Denis; Laanoja, Risto; Lakk, Henri; Truu, Ahto (2019). A new approach to constructing digital signature schemes: (short paper). Advances in Information and Computer Security : 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings. Ed. Attrapadung, Nuttapong; Yagi, Takeshi. Cham: Springer, 363−373. (Lecture Notes in Computer Science; 11689).10.1007/978-3-030-26834-3_21.

Çalışkan, Emin; Vaarandi, Risto; Lorenz, Birgy (2019). Improving Learning Efficiency and Evaluation Fairness for Cyber Security Courses - A Case Study. Intelligent Computing: Proceedings of the 2019 Computing Conference, Volume 2, [July 16-17, 2019, London, UK]. Ed. Arai, Kohei; Bhatia, Rahul; Kapoor, Supriya. Cham: Springer, 622−638. (Advances in Intelligent Systems and Computing; 998).10.1007/978-3-030-22868-2_45.

Guerra-Manzanares, Alejandro; Bahsi, Hayretdin; Nõmm, Sven (2019). Differences in Android behavior between real device and emulator: a malware detection perspective. 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS): Granada, Spain. October 22-25, 2019. IEEE, 399−404.10.1109/IOTSMS48152.2019.8939268.

Guerra-Manzanares, Alejandro; Bahsi, Hayretdin; Nõmm, Sven (2019). Hybrid feature selection models for machine learning based botnet detection in IoT networks. Proceedings 2019 International Conference on Cyberworlds, CW 2019: 2-4 October 2019, Kyoto, Japan. Danvers, MA: IEEE, 324−327.10.1109/CW.2019.00059.

Guerra-Manzanares, Alejandro; Nõmm, Sven; Bahsi, Hayretdin (2019). In-depth feature selection and ranking for automated detection of mobile malware. Proceedings of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, February 23-25, 2019, Prague, Czech Republic, Vol. 1. Ed. Mori, Paolo; Furnell, Steven; Camp, Oliver. Prague: SciTePress, 274−283.10.5220/0007349602740283.

Guerra-Manzanares, Alejandro; Nõmm, Sven; Bahsi, Hayretdin (2019). Time-frame analysis of system calls behavior in machine learning-based mobile malware detection. 2019 International Conference on Cyber Security for Emerging Technologies (CSET): October 27-29, Doha, Qatar. IEEE, [1−8].10.1109/CSET.2019.8904908.

Guerra-Manzanares, Alejandro; Nõmm, Sven; Bahsi, Hayretdin (2019). Towards the integration of a post-hoc interpretation step into the machine learning workflow for IoT botnet detection. Proceedings 18th IEEE International Conference on Machine Learning and Applications, ICMLA 2019: 16-19 December, Boca Raton, Florida, USA. Ed. Wani, M.Arif; Khoshgoftaar, Taghi M.; Wang, Dingding; Wang, Huanjing; Seliya, Naeem (Jim). Piscataway, NJ: IEEE, 1162−1169.10.1109/ICMLA.2019.00193.

Kullman, K.; Asher, N. B.; Sample, C. (2019). Operator Impressions of 3D Visualizations for Cybersecurity Analysts. Proceedings of the 18th European Conference on Cyber Warfare and Security, ECCWS 2019 : University of Coimbra, Portugal, 4-5 July 2019. Ed. Cruz, Tiago; Simoe, Paulo. Reading, UK: ACPI, 257−266.

Lorenz, Birgy; Kikkas, Kaido; Osula, Kairi (2019). Factors of socially engineering citizens in critical situations. Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2018 International Conference on Human Factors in Cybersecurity, July 21-25, 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida, USA. Ed. Ahram, Tareq Z.; Nicholson, Denise. Cham: Springer, 229−240. (Advances in Intelligent Systems and Computing; 782).10.1007/978-3-319-94782-2_23.

Lorenz, Birgy; Kikkas Kaido, Sõmer Tiia; Laugasson, Edmund (2019). Cybersecurity within the curricula of informatics: the Estonian perspective. Informatics in Schools.New Ideas in School Informatics: 12th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, ISSEP 2019, Larnaca, Cyprus, November 18-20, 2019, Proceedings. Ed. Pozdniakov, Sergei N.; Dagienė, Valentina. Cham: Springer, 159−171. (Lecture Notes in Computer Science; 11913).10.1007/978-3-030-33759-9_13.

Maennel, Kaie; Mäses, Sten; Sütterlin, Stefan; Ernits, Margus; Maennel, Olaf (2019). Using technical cybersecurity exercises in university admissions and skill evaluation. 14th IFAC Symposium on Analysis, Design, and Evaluation of Human Machine Systems, HMS 2019: Tallinn, Estonia, 16-19 September, Proceedings. Ed. Tsiopoulos, Leonidas. Elsevier, 169−174. (IFAC-PapersOnLine; 52-19).10.1016/j.ifacol.2019.12.169.

Mézešová, Terézia; Bahşi, Hayretdin (2019). Expert knowledge elicitation for skill level categorization of attack paths. 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2019), Oxford, United Kingdom, 3-4 June 2019, [Proceedings]. IEEE, art no 8885192, 1−8.10.1109/CyberSecurity46270.2019.

Mucci, Daniele; Blumbergs, Bernhards (2019). TED: A container based tool to perform security risk assessment for ELF binaries. Proceedings of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, February 23-25, 2019, Prague, Czech Republic, Vol. 1. Ed. Mori, Paolo; Furnell, Steven; Camp, Oliver. Prague: SciTePress, 361−369.10.5220/0007371603610369.

Mäses, Sten (2019). Evaluating cybersecurity-related competences through serious games. Proceedings 19th Koli Calling Conference on Computing Education Research Koli Calling 2019: November 21-24, 2019 Koli, Finland. New York, NY: ACM, 1−2. (ACM International Conference Proceeding Series).10.1145/3364510.3366163.

Mäses, Sten; Aitsam, Heleri; Randmann, Liina (2019). A method for adding cyberethical behaviour measurements to computer science homework assignments. Proceedings 19th Koli Calling Conference on Computing Education Research Koli Calling 2019: November 21-24, 2019 Koli, Finland. New York, NY: ACM, 1−5. (ACM International Conference Proceeding Series).10.1145/3364510.3364529.

Mäses, Sten; Kikerpill, Kristjan; Jüristo, Kaspar; Maennel, Olaf (2019). Mixed methods research approach and experimental procedure for measuring human factors in cybersecurity using phishing simulations. Proceedings of the 18th European Conference on Research Methodology for Business and Management Studies, ECRM 2019: Hosted By Wits Business School, Johannesburg, South Africa, 20-21 June 2019. Ed. Stacey, Anthony. Reading, UK: Academic Conferences and Publishing International Limited, 218−226.

Orye, Erwin; Maennel, Olaf M. (2019). Recommendations for enhancing the results of cyber effects. 2019 11th International Conference on Cyber Conflict: Silent Battle, CyCon: 28 May - 31 May, Tallinn, Estonia. Ed. Minárik, T.; Alatalu, S.; Biondi, S.; Signoretti, M.; Tolga, I.; Visky, G. Tallinn: CCDCOE; IEEE, 103−123. (NATO CCD COE Publications).10.23919/CYCON.2019.8756649.

Ott, Nikolas; Osula, Anna-Maria (2019). The rise of the regionals: how regional organisations contribute to international cyber stability negotiations at the United Nations level. 2019 11th International Conference on Cyber Conflict: Silent Battle, CyCon : 28 May - 31 May, Tallinn, Estonia. Ed. Minárik, T.; Alatalu, S.; Biondi, S.; Signoretti, M.; Tolga, I.; Visky, G. Tallinn: CCDCOE; IEEE, 321−345. (NATO CCD COE Publications).10.23919/CYCON.2019.8756863.

Pihelgas, Mauno (2019). Design and implementation of an availability scoring system for cyber defence exercises. 14th International Conference on Cyber Warfare and Security (ICCWS 2019): Stellenbosch University, South Africa, 28 February - 1 March 2019, Proceedings. Ed. van der Waag-Cowling, Noëlle; Leenen, Louise. Academic Conferences and Publishing International Limited, 329−337.

Price, Kristopher R.; Priisalu, Jaan; Nomm, Sven (2019). Analysis of the impact of poisoned data within twitter classification models. 14th IFAC Symposium on Analysis, Design, and Evaluation of Human Machine Systems, HMS 2019 : Tallinn, Estonia, 16-19 September, Proceedings. Ed. Tsiopoulos, Leonidas. Elsevier, 175−180. (IFAC-PapersOnLine; 52-19).10.1016/j.ifacol.2019.12.170.

Somer, Tiia (2019). Taxonomies of cybercrime: an overview and proposal to be used in mapping cyber criminal journeys. Proceedings of the 18th European Conference on Cyber Warfare and Security, ECCWS 2019 : University of Coimbra, Portugal, 4-5 July 2019. Ed. Cruz, Tiago; Simoes, Paulo. Reading, UK: ACPI, 475−483.

Sõmer, Tiia; Lorenz, Birgy; Ottis, Rain (2019). Developing military cyber workforce in a conscript armed forces: recruitment, challenges and options. 14th International Conference on Cyber Warfare and Security (ICCWS 2019) : Stellenbosch University, South Africa, 28 February - 1 March 2019, Proceedings. Reading, UK: Academic Conference and Publishing International, 413−421.

Tabuyo-Benito, Raquel; Bahsi, Hayretdin; Peris-Lopez, Pedro (2019). Forensics analysis of an on-line game over Steam Platform. Digital Forensics and Cyber Crime: 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings. Ed. Breitinger, Frank; Baggili, Ibrahim. Cham: Springer, 106−127. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; 259).10.1007/978-3-030-05487-8_6.

Kerttunen, Mika; Tikk, Eneken (2019) Strategically normative. Norms and principles in national cybersecurity strategies. Norms and principles in national cybersecurity strategies. EU Cyber Direct.

Lorenz, Birgy (2019). "Kas nutt taskus teeb nutikaks?" Gunda Tire, Helin Puksand, Tiit Lepmann, Imbi Henno, Kristina Lindemann, Karin Täht, Birgy Lorenz, Gerli Silm. PISA 2018 Eesti tulemused: Eesti 15-aastaste õpilaste teadmised ja oskused funktsionaalses lugemises, matemaatikas ja loodusteadustes (Ptk 7, 116−129). Tallinn: SA Innove.

Lorenz, Birgy; Leet, Mati; Eomäe, Taavi; Hendrikson, MarilyMuulmann, Triin (2019). Küberpähkli 2018 sügis koolivooru ja CyberSecurity meets Robotex ülevaatest tulenevad soovitused. 1−26.

Lorenz, Birgy; Osula, Kairi; Leet, Mati; Eomäe, Taavi; Kirna, Catlyn (2019). Küberpähkli 2018 sügisuuringu ülevaatest tulenevad soovitused. 1−19.

Buldas, Ahto; Gadyatskaya, Olga; Lenin, Aleksandr; Mauw, Sjouke; Trujillo-Rasua, Rolando (2019). Attribute evaluation on attack trees with incomplete information. A preprint. arXiv:1812.10754v2 [cs.CR] 10 Jan 2019: Cornell University.

Lorenz, BirgyKikkas Kaido (2019) Digitaalne kirjaoskus infoühiskonnas Eesti Noorsootöö Keskuse kogumikraamatus "Digiareng ja noorsootöö". Kogumik 

Osula, Anna-MariaMaennel, Olaf (Toim.) (2019) 5th Interdisciplinary Cyber Research conference 2019. Konverentsi kogumik. 29. juuni 2019, Tallinna Tehnikaülikool

Lorenz, Birgy; Antoi, Meelis; Kikkas, Kaido (2019). Digiteenused. Informaatika valikkursus gümnaasiumile. TalTech Tarkvarateaduse instituut. 

Lorenz, Birgy; Muulmann, Triin jt. (2019) Targalt internets. Küberturbe ülesanded.

Sõmer, Tiia; Lorenz, Birgy; Muulmann, Triin; Mäses, Sten (2019). Küberkaitse valikkursus gümnaasiumile. TalTech Tarkvarateaduse instituut. 

2018

Bahşi, Hayretdin; Nõmm, Sven; La Torre, Fabio Benedetto (2018). Dimensionality reduction for machine learning based IoT botnet detection. 2018 15th International Conference on Control, Automation, Robotics and Vision (ICARCV 2018) : held at the Marina Bay Sands Expo and Convention Centre, Singapore, November 18-21, 2018. IEEE, 1857−1862.10.1109/ICARCV.2018.8581205.

Bahsi, Hayretdin; Udokwu, Chibuzor Joseph; Tatar, Unal; Norta, Alexander (2018). Impact assessment of cyber actions on missions or business processes: a systematic literature review. Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018 : National Defence University, Washington DC, USA, 6-9 March 2018. Ed. Hurley, John S.; Chen, Jim Q. Reading, UK: Academic Conference and Publishing International Limited, 11−20.

Buldas, Ahto; Laanoja, Risto; Truu, Ahto (2018). A blockchain-assisted hash-based signature scheme. Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings. Ed. Gruschka, Nils. Cham: Springer, 138−153. (Lecture Notes in Computer Science; 11252).10.1007/978-3-030-03638-6_9.

Kullman, K.; Cowley, J.; Ben-Asher, N. (2018). Enhancing Cyber Defense Situational Awareness Using 3D Visualizations. Proceedings of the 13th International Conference on Cyber Warfare and Security ICCWS 2018: National Defense University, Washington DC, USA 8-9 March 2018. Ed. J. S. Hurley, J. Q. Chen. Academic Conferences and Publishing International Limited, 369−378.

Lepik, Toomas; Maennel, Kaie; Ernits, Margus; Maennel, Olaf (2018). Art and automation of teaching malware reverse engineering. Learning and Collaboration Technologies. Learning and Teaching : 5th International Conference, LCT 2018, held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part II. Ed. Zaphiris, Panayiotis; Ioannou, Andri. Cham: Springer, 461−472. (Lecture Notes in Computer Science; 10925).10.1007/978-3-319-91152-6_35.

Lorenz, Birgy; Kikkas, Kaido; Osula, Kairi (2018). Development of children's cyber security competencies in Estonia. Learning and Collaboration Technologies. Learning and Teaching : 5th International Conference, LCT 2018, held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part II. Ed. Zaphiris, Panayiotis; Ioannou, Andri. Cham: Springer, 473−482. (Lecture Notes in Computer Science; 10925).10.1007/978-3-319-91152-6_36.

Maennel, Kaie; Mäses, Sten; Maennel, Olaf Manuel (2018). Cyber Hygiene: The Big Picture. Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings. Ed. Gruschka, Nils. Cham: Springer, 291−305. (Lecture Notes in Computer Science; 11252).10.1007/978-3-030-03638-6_18.

Mäses, Sten; Randmann, Liina; Maennel, Olaf; Lorenz, Birgy (2018). Stenmap: framework for evaluating cybersecurity-related skills based on computer simulations. Learning and Collaboration Technologies. Learning and Teaching : 5th International Conference, LCT 2018, held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part II. Ed. Zaphiris, Panayiotis; Ioannou, Andri. Cham: Springer, 492−504. (Lecture Notes in Computer Science; 10925).10.1007/978-3-319-91152-6_38.

Nõmm, Sven; Bahşi, Hayretdin (2018). Unsupervised anomaly based botnet detection in IoT networks. Proceedings 17th IEEE International Conference on Machine Learning and Applications, ICMLA 2018 : 17-20 December 2018, Orlando, Florida, USA. Ed. Wani, M. A., [et al.]. Piscataway, NJ: IEEE, 1048−1053.10.1109/ICMLA.2018.00171.

Somer, Tiia; Tiido, Anna; Sample, Char; Mitchener-Nissen, Timothy (2018). Application of journey mapping and crime scripting to the phenomenon of trolling. In: Hurley, John S.; Chen, Jim Q. (Ed.). Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018 : National Defence University, Washington DC, USA, 6-9 March 2018 (465−473). Reading, UK: Academic Conference and Publishing International Limited.

Theron, Paul; Kott, Alexander; Drašar, Martin; Rzadca, Krzysztof; LeBlanc, Benoît; Pihelgas, Mauno; Mancini, Luigi; Panico, Agostino (2018). Towards an Active, Autonomous and Intelligent Cyber Defense of Military Systems: the NATO AICA Reference Architecture. 2018 International Conference on Military Communications and Information Systems (ICMCIS): International Conference on Military Communications and Information Systems; Warsaw, Poland; 22 - 23 May 2018. IEEE, 1−9.10.1109/ICMCIS.2018.8398730.

Tikk, Eneken (2018). National cybersecurity legislation: is there a magic formula? In: Bartsch, Michael; Frey, Stefanie (Ed.). Cybersecurity Best Practices : Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden (615−633). Wiesbaden: Springer.10.1007/978-3-658-21655-9_42.

Vaarandi, Risto; Blumbergs, Bernhards; Kont, Markus (2018). An unsupervised framework for detecting anomalous messages from syslog log files. NOMS 2018 IEEE/IFIP Network Operations and Management Symposium, Cognitive Management in a Cyber World : 23-27 April 2018, Taipei, Taiwan. IEEE, 1−6.10.1109/NOMS.2018.8406283.

Bahsi, Hayretdin (2018). The invisible front: a cyber resilience perspective. In: Tuohy, Emmet; Jermalavicius, Tomas; Bulakh, Anna (Ed.). The Geopolitics of Power Grids: Political and Security Aspects of Baltic Electricity Synchronization (53−68). Tallinn, Estonia: International Center for Defence and Security.

Buldas, Ahto; Jung, Martha; Kuivjõgi, Kaja; Osula, Anna-Maria; Ottis, Rain; Priisalu, Jaan; Tallinn, Liisa; Vaks, Toomas (2018) ID-kaardi kaasuse õppetunnid

Lorenz, Birgy; Sõmer, Tiia; Osula, Kairi; Ääsmäe, Kristiina; Veldre, Anto; Põldmaa, Hillar; Punak, Maarja; Üürike, Mari-Liis (2018) KüberPähkel uuring. Küberpähkli 2018 talv uuringu ülevaatest tulenevad soovitused

Tikk, Eneken; Kerttunen, Mika (2018). Parabasis: Cyber-diplomacy in Stalemate. Oslo: Norwegian Institute of International Affairs.

Kerttunen, Mika (2018). Contours: on the policy of consequences as seen through social sciences. Temple International and Comparative Law Journal, 32 (2), 171−184.

Kerttunen, Mika (2018). Cyber warfare - from science fiction to reality. Sicherheit und Frieden, 36 (1), 27−33.10.5771/0175-274X-2018-1-27.

Matthews, R., Sorell, M., Falkner, N. (2018). Isolating Lens Effects from Source Camera Identification using Photo-Response Non-Uniformity Noise. ANZFSS 24th International Symposium on the Forensic Sciences : Perth, Western Australia, 9-13 September 2019. Perth: ANZFSS,. 

Osula, Anna-MariaMaennel, Olaf (Toim.) (2018) 4th Interdisciplinary Cyber Research workshop 2018. Kogumik. 9. juuni 2018, Tallinna Tehnikaülikool

2017

Buldas, Ahto; Laanoja, Risto; Truu, Ahto (2017). Keyless signature infrastructure and PKI: hash-tree signatures in pre- and post-quantum world. International Journal of Services, Technology and Management, 23 (1/2), 117−130.10.1504/IJSTM.2017.10002708.

Priisalu, Jaan; Ottis, Rain (2017). Personal control of privacy and data: Estonian experience. Health and Technology, 7 (4), 441−451.10.1007/s12553-017-0195-1.

Venables, Adrian; Shaikh, Siraj Ahmed; Shuttleworth, James (2017). The projection and measurement of cyberpower. Security Journal, 30 (3), 1000−1011. DOI: 10.1057/sj.2015.35.

Bahsi, Hayretdin (2017). Analysis of national cyber situational awareness practices. Strategic Cyber Defence : A Multidisciplinary Perspective [Proceedings of the NATO Advanced Research Workshop on A Framework for a Military Cyber Defense Strategy, Norfolk, VA, USA, 11-13 April 2016]. Ed. Tatar, Unal; Gokce, Yasir; Gheorghe, Adrian V. IOS Press, 31−41. (NATO Science for Peace and Security Series - D: Information and Communication Security; 48).10.3233/978-1-61499-771-9-31.

Balogun, M.; Bahşi, H.; Karabacak, B. (2017). Preliminary analysis of cyberterrorism threats to Internet of things (IoT) applications. Terrorists' Use of the Internet : Assessment and Response [Proceedings of the NATO Advanced Research Workshop on Terrorists' Use of the Internet, Dublin, Ireland, 27-29 June 2016. Ed. Conway, M.; Jarvis, L.; Lehane, O.; et al. Amsterdam: IOS Press, 49−58. (NATO Science for Peace and Security Series - E: Human and Societal Dynamics; 136).10.3233/978-1-61499-765-8-49.

Blumbergs, Bernhards; Vaarandi, Risto (2017). Bbuzz: a bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis. MILCOM 2017 - IEEE Military Communications Conference : Baltimore, Maryland, USA, 23 - 25 October 2017, [Proceedings]. Baltimore, MD, USA: IEEE, 707−712.10.1109/MILCOM.2017.8170785.

Buldas, Ahto; Geihs, Matthias; Buchmann, Johannes (2017). Long-term secure commitments via extractable-binding commitments. Information Security and Privacy : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I. Ed. Pieprzyk, Josef; Suriadi, Suriadi. Cham: Springer, 65−81. (Lecture Notes in Computer Science; 10342).10.1007/978-3-319-60055-0_4.

Buldas, Ahto; Geihs, Matthias; Buchmann, Johannes (2017). Long-term secure time-stamping using preimage-aware hash functions: (Short version). Provable Security : 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings. Ed. Okamoto, Tatsuaki; et al. Cham: Springer, 251−260. (Lecture Notes in Computer Science; 10592).10.1007/978-3-319-68637-0_15.

Buldas, Ahto; Kalu, Aivo; Laud, Peeter; Oruaas, Mart (2017). Server-Supported RSA Signatures for Mobile Devices. Computer Security - ESORICS 2017 : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I, 10492. Ed. Foley, S.N. et al. Springer, 315−333. (Lecture Notes in Computer Science; 10492).10.1007/978-3-319-66402-6_19.

Buldas, Ahto; Laanoja, Risto; Truu, Ahto (2017). A server-assisted hash-based signature scheme. Secure IT Systems : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings. Ed. Lippmaa, H.; Mitrokotsa, A.; Matulevičius, R. Cham: Springer, 3−17. (Lecture Notes in Computer Science; 10674).10.1007/978-3-319-70290-2_1

Buldas, Ahto; Lenin, Aleksandr; Willemson, Jan; Charnamord, Anton (2017). Simple infeasibility certificates for attack trees. Advances in Information and Computer Security : 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings. Ed. Obana, Satoshi; Chida, Koji. Springer, 39−55. (Lecture Notes in Computer Science; 10418).10.1007/978-3-319-64200-0_3.

Buldas, Ahto; Saarepera, Märt (2017). Are the current system engineering practices sufficient to meet cyber crime? Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Ed. Tryfonas,Theo. Springer, 451−463. (Lecture Notes in Computer Science ; 10292).10.1007/978-3-319-58460-7_31.

Caliskan, Emin (2017). Risk analysis of internet censorship circumvention: case study of anonymization tools and effects. Strategic Cyber Defence : A Multidisciplinary Perspective [Proceedings of the NATO Advanced Research Workshop on A Framework for a Military Cyber Defense Strategy, Norfolk, VA, USA, 11-13 April 2016]. Ed. Tatar, Unal; Gokce, Yasir; Gheorghe, Adrian V. Amsterdam: IOS Press, 129−149. (NATO Science for Peace and Security Series - D: Information and Communication Security; 48).10.3233/978-1-61499-771-9-129.

Caliskan, Emin; Tatar, Unal; Bahsi, Hayretdin; Ottis, Rain; Vaarandi, Risto (2017). Capability detection and evaluation metrics for Cyber Security lab exercises. Proceedings of the 12th International Conference on Cyber Warfare and Security, ICCWS 2017 : Wright State University & the Center foc Cyberspace Research, Air Force Institute of Technology, Dayton, Ohio, USA, 2-3 March 2017. Ed. Bryant, A. R.; Mills, R. F.; Lopez, J. R. Jr. Reading, UK: Academic Conference and Publishing International Limited, 407−414.

Caliskan, Emin; Topgul, Oguzhan M.; Ottis, Rain (2017). Cyber security exercises: a comparison of participant evaluation metrics and scoring systems. Strategic Cyber Defence : A Multidisciplinary Perspective [Proceedings of the NATO Advanced Research Workshop on A Framework for a Military Cyber Defense Strategy, Norfolk, VA, USA, 11-13 April 2016]. Ed. Tatar, Unal; Gokce, Yasir; Gheorghe, Adrian V. Amsterdam: IOS Press, 180−190. (NATO Science for Peace and Security Series - D: Information and Communication Security; 48).10.3233/978-1-61499-771-9-180.

Farar, A. E.; Bahsi, H.; Blumbergs, B. (2017). A case study about the use and evaluation of cyber deceptive methods against highly targeted attacks. 2017 International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident) : 19-20 June, 2017, London, UK, Proceedings. London, UK: IEEE, [1−7].10.1109/CYBERINCIDENT.2017.8054640.

Hallaq, Bil; Somer, Tiia; Osula, Anna-Maria; Ngo, Kim; Mitchener-Nissen, Timothy (2017). Artificial intelligence within the military domain and cyber warfare. Proceedings of the 16th European Conference on Cyber Warfare and Security, ECCWS 2017 : Hosted by University College Dublin, Ireland, 29-30 June 2017. Ed. Scanlon, Mark; Le-Khak, Nhien-An. Reading, UK: Academic Conferences and Publishing International, 153−156.

Kont, Markus; Pihelgas, Mauno; Maennel, Kaie; Blumbergs, Bernhards; Lepik, Toomas (2017). Frankenstack: toward real-time red team feedback. MILCOM 2017 - IEEE Military Communications Conference : Baltimore, Maryland, USA, 23 - 25 October 2017, [Proceedings]. Baltimore, MD, USA: IEEE, 400−405.10.1109/MILCOM.2017.8170852.

Maennel, K.; Ottis, R.; Maennel, O. (2017). Improving and measuring learning effectiveness at cyber defense exercises. In: Lipmaa, H.; Mitrokotsa, A.; Matulevičius, R. (Ed.). Secure IT Systems : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings (123−138). Cham: Springer. (Lecture Notes in Computer Science; 10674).10.1007/978-3-319-70290-2_8.

Mäses, Sten; Hallaq, Bil; Maennel, Olaf (2017). Obtaining better metrics for complex serious games within virtualised simulation environments. In: Pivec, Maja; Gründler, Josef (Ed.). Proceedings of the 11th European Conference on Games Based Learning, ECGBL 2017, FH Joanneum University of Applied Sciences, Graz, Austria, 5 - 6 October 2017 (428−434). Reading, UK: Academic Conferences and Publishing International Limited.

Zhuge, Chen; Vaarandi, Risto (2017). Efficient event log mining with LogClusterC. Proceedings 3rd IEEE Int. Conf. on Big Data Security on Cloud (BigDataSecurity), 3rd IEEE Int. Conf. on High Performance and Smart Computing, (HPSC) and 3rd IEEE Int. Conf. on Intelligent Data and Security (IDS) : 26-28 May 2017, Beijing, China.Ed. Qiu, Meikang. Los Alamitos (Calif.): IEEE Computer Society, 261−266.10.1109/BigDataSecurity.2017.26.

Birgy Lorenz, Kaido Kikkas, Tiia Sõmer, Kairi Osula, Anto Veldre (2017). KüberPähkel uuring. Küberpähkli 2017. aasta uuringu ülevaatest tulenevad soovitused

Kontseptsioon. HITSA töörühma liikmed: Birgy Lorenz, Edmund Laugasson, Kadri Umbleja, Kersti Antoi, Marge Kusmin, Mari-Liis Peets, Tauno Palts (2017) "Uued õppeteemad põhikooli informaatika ainekavas nüüdisaegsete IT-oskuste omandamise toetamiseks" 

Ainekava. Eesti NATO Ühingu egiidi all tegutsenud töörühm koosseisus: Birgy Lorenz, Triin Muulmann, Rain Ottis, Rein Põdra, Tiia Sõmer, Anto Veldre, Tiia Mikson, Krista Mulenok, Hindrek Lootus (2017) "Valikõppeaine/Valikkursus "Küberkaitse""

Osula, Anna-MariaMaennel, Olaf (Toim.) (2017) 3rd Interdisciplinary Cyber Research workshop 2017. Kogumik. 8. juuli 2017, Tallinna Tehnikaülikool

2016

Blumbergs, B.; Pihelgas, M.; Kont, M.; Maennel, O.; Vaarandi, R. (2016). Creating and detecting IPv6 transition mechanism-based information exfiltration covert channels. Secure IT Systems : 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings. Ed. Brumley, B. B.; Röning, J. Cham: Springer, 85−100. (Lecture Notes in Computer Science; 10014).10.1007/978-3-319-47560-8_6.

Ernits, M.; Kikkas, K. (2016). A live virtual simulator for teaching cybersecurity to information technology students. Learning and Collaboration Technologies : Third International Conference, LCT 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings. Ed. Zaphiris, P.; Ioannou, A. Cham: Springer, 474−486. (Lecture Notes in Computer Science; 9753).10.1007/978-3-319-39483-1_43.

Li, J.; Stein, J.; Zhan, M.; Maennel, O. (2016). An expectation-based approach to policy-based security of the Border Gateway Protocol. 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) : GI 2016: 9th IEEE Global Internet Symposium, April 10-14, 2016, San Francisco, CA, USA. Ed. Lee, S.-J.; Petrioli, C.; Wan, P.-J.; Zheng, K. San Francisco, CA: IEEE, 340−345.10.1109/INFCOMW.2016.7562098.

Lorenz, Birgy; Kikkas, Kaido; Laanpere, Mart; Laugasson, Edmund (2016). A Model to Evaluate Digital Safety Concerns in School Environment. HCI International 2016: HCI International 2016 Toronto, Canada, 17 - 22 July 2016 The Westin Harbour Castle Hotel. Springer, 707−721.10.1007/978-3-319-39483-1_64.

Lorenz, Birgy; Laanpere, Mart; Kikkas, Kaido (2016). Digital Turn in the Schools of Estonia: Obstacles and Solutions. Learning and Collaboration Technologies: Third International Conference, LCT 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings. Springer, 722−731.10.1007/978-3-319-39483-1_65.

Somer, Tiia; Hallaq, Bil; Watson, Tim (2016). Utilising journey mapping and crime scripting to combat cyber crime. Proceedings of the 15th European Conference on Cyber Warfare and Security, ECCWS 2016 : Universität der Bundeswehr, Munich, Germany, 7-8 July 2016.

Tatar, Unal; Bahsi, Hayretdin; Gheorghe Adrian (2016). Impact assessment of cyber attacks: A quantification study on power generation systems. 2016 11th Systems of Systems Engineering Conference (SoSE), IEEE : June 12-16, 2016, Kongsberg, Norway. IEEE, 1−6.10.1109/SYSOSE.2016.7542959.

Vaarandi, R.; Kont, M.; Pihelgas, M. (2016). Event log analysis with the LogCluster tool. MILCOM 2016 - IEEE Military Communications Conference : November 1-3, 2016, Baltimore, MD, USA, Proceedings. IEEE, 982−987.10.1109/MILCOM.2016.7795458.

Yannakogeorgos, Panayotis A.; Tikk, Eneken (2016). Stuxnet as cyber-enabled sanctions enforcement. 2016 IEEE International Conference on Cyber Conflict (CyCon U.S.) Proceedings : 21-23 October 2016, Washington, DC, USA. Ed. Brantly, Aaron; Maxwell, Paul. Washington: IEEE, 160−165. DOI: 10.1109/CYCONUS.2016.7836630.

Osula, Anna-MariaMaennel, Olaf (Toim.) (2016) 2nd Interdisciplinary Cyber Research workshop 2016. Kogumik. 2. juuli 2016, Tallinna Tehnikaülikool

2015

Lutu, A.; Bagnulo, M.; Pelsser, C.; Maennel, O.; Cid-Sueiro, J. (2015). The BGP Visibility Toolkit: Detecting Anomalous Internet Routing Behavior. IEEE/ACM Transactions on Networking, 1−14.10.1109/TNET.2015.2413838.

Bahsi, H.; Maennel, O. M. (2015). A Conceptual Nationwide Cyber Situational Awareness Framework for Critical Infrastructures. In: S. Buchegger, M. Dam (Ed.). Secure IT Systems: 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19–21, 2015, Proceedings (3−10). Springer. (Lecture Notes in Computer Science; 9417).10.1007/978-3-319-26502-5_1.

Ernits, M.; Maennel, O.; Tammekänd, J. (2015). i-tee: A fully automated Cyber Defense Competition for Students. SIGCOMM '15 Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication. ACM, 113−114.10.1145/2785956.2790033.

Lorenz, Birgy; Banister, Savilla Irene; Kikkas, Kaido (2015). Impacting the Digital Divide on a Global Scale - Six Case Studies from Three Continents. Learning and Collaboration Technologies, Volume 9192 of the Lecture Notes in Computer Science series: The HCI International 2015, Los Angeles, CA, USA. Ed. Panayiotis Zaphiris; Andri Ioannou. Springer, 687−696. (Lecture Notes in Computer Science; 9192).10.1007/978-3-319-20609-7_64.

Ottis, R. (2015). Cyber Warfare. In: Lehto, M; Neittaanmäki, P. (Ed.). Cyber Security: Analytics, Technology and Automation (89−96). Springer. (Intelligent Systems, Control and Automation: Science and Engineering; 78).10.1007/978-3-319-18302-2_6.

Tikk-Ringas, Eneken (2015). Legal framework of cyber security. In: Lehto, Martti; Neittaanmäki, Pekka (Ed.). Cyber Security: Analytics, Technology and Automation (109−127). Cham: Springer. (Intelligent Systems, Control and Automation: Science and Engineering; 78). DOI: 10.1007/978-3-319-18302-2_8.

Vaarandi, R.; Blumbergs, B.; Caliskan, E. (2015). Simple Event Correlator - Best Practices for Creating Scalable Configurations. Proceedings of the 2015 IEEE CogSIMA Conference. IEEE, 96−100.10.1109/COGSIMA.2015.7108181.

Vaarandi, R.; Pihelgas, M. (2015). LogCluster - A Data Clustering and Pattern Mining Algorithm for Event Logs. Proceedings of the 11th International Conference on Network and Service Management (CNSM 2015). IEEE, 1−7.10.1109/CNSM.2015.7367331.

Venables, Adrian; Shaikh, Siraj Ahmed; Shuttleworth, James (2015). A model for characterizing cyberpower. Critical Infrastructure Protection IX : 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers. Cham: Springer, 3−16. (IFIP Advances in Information and Communication Technology; 466). DOI: 10.1007/978-3-319-26567-4_1.

Wählisch, Matthias; Schmidt, Robert; Schmidt, Thomas; Maennel, Olaf; Uhlig, Steve; Tyson, Gareth (2015). RiPKI: The Tragic Story of RPKI Deployment in the Web Ecosystem. Proceedings of the 14th ACM Workshop on Hot Topics in Networks, Philadelphia, Pennsylvania, USA, November 16-17, 2015. Ed. Jaudelice de Oliveira, Jonathan Smith. New York: ACM, 1−7.10.1145/2834050.2834102. 

Osula, Anna-MariaMaennel, Olaf (Toim.) (2015) Interdisciplinary Cyber Research workshop 2015. Kogumik. 18. juuli 2015, Tallinna Tehnikaülikool

2014

Ottis, R. (2014). Light Weight Tabletop Exercise for Cybersecurity Education. Journal of Homeland Security and Emergency Management, 11 (4), 579−592.10.1515/jhsem-2014-0031. 

Buldas, Ahto; Laanoja, Risto; Truu, Ahto; Laud, Peeter (2014). Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures. Provable Security, 8th International Conference: ProvSec 2014, Hong Kong, 09.10-10.10.2014. Springer, 130−145. (Lecture Notes in Computer Science; 8782).

Buldas, Ahto; Truu, Ahto; Laanoja, Risto; Gerhards, Rainer (2014). Efficient record-level keyless signatures for audit logs. Secure IT Systems 19th Nordic Conference, NordSec 2014: Nordsec 2014, Tromsø, Norway, 15-17 October 2014. Ed. Bernsmed, Karin; Fisher-Hübner, Simone. Springer, 149−164. (LNCS; 8788).10.1007/978-3-319-11599-3_9. 

Lenin, A.; Buldas, A. (2014). Limiting Adversarial Budget in Quantitative Security Assessment. Decision and Game Theory for Security: Conference on Decision and Game Theory for Security. Los Angeles, CA, USA. November 6-7, 2014.. Ed. R. Proovendran and W.Saad. Springer, 153−172. (8840).10.1007/978-3-319-12601-2_9. 

Lutu, Andra; Bagnulo, Marcelo; Cid-Sueiro, Jesus; Maennel, Olaf. (2014). Separating wheat from chaff: Winnowing unintended prefixes using machine learning. IEEE Infocom. 943−951.10.1109/infocom.2014.6848023.

Lutu, Andra; Bagnulo, Marcelo; Pelsser, Cristel; Maennel, Olaf. (2014). Understanding the reachability of IPv6 limited visibility prefixes. In: Lecture Notes In Computer Science (163−172).. Los Angeles, CA: Springer. (Passive and Active Measurement).10.1007/978-3-319-04918-2_16. 

Skoberne, Nejc; Maennel, Olaf; Phillips, Iain; Bush, Randy; Zorz, Jan; Ciglaric, Mojca (2014). IPv4 Address Sharing Mechanism Classification and Tradeoff Analysis. IEEE/ACM TRANSACTIONS ON NETWORKING, 22, 391−404.10.1109/TNET.2013.2256147.

Vaarandi, Risto; Pihelgas, Mauno (2014). Using Security Logs for Collecting and Reporting Technical Security Metrics. Proceedings of the 2014 IEEE Military Communications Conference. IEEE, 294−299.10.1109/MILCOM.2014.53.