Bahşi, Hayretdin; Dieves, Veiko; Kangilaski, Taivo; Laud, Peeter; Mõtus, Leo; Murumets, Jaan; Ploom, Illimar; Priisalu, Jaan; Seeba, Mari; Täks, Ermo; Tammel, Kaide; Tammpuu, Piia; Taveter, Kuldar; Trumm, Avo; Truusa, Tiia-Triin; Vihalemm, Triin (2019). Mapping the information flows for the architecture of a nationwide situation awareness system: (poster). Proceedings 2019 IEEE International Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA) : Las Vegas, NV, USA, 8-11 April 2019. Ed. Rogova, Galina L.; McGeorge, Nicolette; Gundersen, Odd Erik; Rein, Kellyn; Freiman, Mary. Las Vegas, NV: IEEE, 152−157.10.1109/COGSIMA.2019.8724167.
Blumbergs, Bernhards (2019). Remote exploit development for cyber red team computer network operations targeting industrial control systems. Proceedings of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, February 23-25, 2019, Prague, Czech Republic, Vol. 1. Ed. Mori, Paolo; Furnell, Steven; Camp, Oliver. Prague: SciTePress, 88−99.10.5220/0007310300880099.
Blumbergs, Bernhards; Ottis, Rain; Vaarandi, Risto (2019) Crossed Swords: a cyber red team oriented technical exercise. Proceedings of the 18th European Conference on Cyber Warfare and Security, ECCWS 2019: University of Coimbra, Portugal, 4-5 July 2019. Reading, UK: ACPI, 37−44.
Buldas, Ahto; Firsov, Denis; Laanoja, Risto; Lakk, Henri; Truu, Ahto (2019). A new approach to constructing digital signature schemes: (short paper). Advances in Information and Computer Security : 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings. Ed. Attrapadung, Nuttapong; Yagi, Takeshi. Cham: Springer, 363−373. (Lecture Notes in Computer Science; 11689).10.1007/978-3-030-26834-3_21.
Çalışkan, Emin; Vaarandi, Risto; Lorenz, Birgy (2019). Improving Learning Efficiency and Evaluation Fairness for Cyber Security Courses - A Case Study. Intelligent Computing: Proceedings of the 2019 Computing Conference, Volume 2, [July 16-17, 2019, London, UK]. Ed. Arai, Kohei; Bhatia, Rahul; Kapoor, Supriya. Cham: Springer, 622−638. (Advances in Intelligent Systems and Computing; 998).10.1007/978-3-030-22868-2_45.
Guerra-Manzanares, Alejandro; Bahsi, Hayretdin; Nõmm, Sven (2019). Differences in Android behavior between real device and emulator: a malware detection perspective. 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS): Granada, Spain. October 22-25, 2019. IEEE, 399−404.10.1109/IOTSMS48152.2019.8939268.
Guerra-Manzanares, Alejandro; Bahsi, Hayretdin; Nõmm, Sven (2019). Hybrid feature selection models for machine learning based botnet detection in IoT networks. Proceedings 2019 International Conference on Cyberworlds, CW 2019: 2-4 October 2019, Kyoto, Japan. Danvers, MA: IEEE, 324−327.10.1109/CW.2019.00059.
Guerra-Manzanares, Alejandro; Nõmm, Sven; Bahsi, Hayretdin (2019). In-depth feature selection and ranking for automated detection of mobile malware. Proceedings of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, February 23-25, 2019, Prague, Czech Republic, Vol. 1. Ed. Mori, Paolo; Furnell, Steven; Camp, Oliver. Prague: SciTePress, 274−283.10.5220/0007349602740283.
Guerra-Manzanares, Alejandro; Nõmm, Sven; Bahsi, Hayretdin (2019). Time-frame analysis of system calls behavior in machine learning-based mobile malware detection. 2019 International Conference on Cyber Security for Emerging Technologies (CSET): October 27-29, Doha, Qatar. IEEE, [1−8].10.1109/CSET.2019.8904908.
Guerra-Manzanares, Alejandro; Nõmm, Sven; Bahsi, Hayretdin (2019). Towards the integration of a post-hoc interpretation step into the machine learning workflow for IoT botnet detection. Proceedings 18th IEEE International Conference on Machine Learning and Applications, ICMLA 2019: 16-19 December, Boca Raton, Florida, USA. Ed. Wani, M.Arif; Khoshgoftaar, Taghi M.; Wang, Dingding; Wang, Huanjing; Seliya, Naeem (Jim). Piscataway, NJ: IEEE, 1162−1169.10.1109/ICMLA.2019.00193.
Kullman, K.; Asher, N. B.; Sample, C. (2019). Operator Impressions of 3D Visualizations for Cybersecurity Analysts. Proceedings of the 18th European Conference on Cyber Warfare and Security, ECCWS 2019 : University of Coimbra, Portugal, 4-5 July 2019. Ed. Cruz, Tiago; Simoe, Paulo. Reading, UK: ACPI, 257−266.
Lorenz, Birgy; Kikkas, Kaido; Osula, Kairi (2019). Factors of socially engineering citizens in critical situations. Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2018 International Conference on Human Factors in Cybersecurity, July 21-25, 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida, USA. Ed. Ahram, Tareq Z.; Nicholson, Denise. Cham: Springer, 229−240. (Advances in Intelligent Systems and Computing; 782).10.1007/978-3-319-94782-2_23.
Lorenz, Birgy; Kikkas Kaido, Sõmer Tiia; Laugasson, Edmund (2019). Cybersecurity within the curricula of informatics: the Estonian perspective. Informatics in Schools.New Ideas in School Informatics: 12th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, ISSEP 2019, Larnaca, Cyprus, November 18-20, 2019, Proceedings. Ed. Pozdniakov, Sergei N.; Dagienė, Valentina. Cham: Springer, 159−171. (Lecture Notes in Computer Science; 11913).10.1007/978-3-030-33759-9_13.
Maennel, Kaie; Mäses, Sten; Sütterlin, Stefan; Ernits, Margus; Maennel, Olaf (2019). Using technical cybersecurity exercises in university admissions and skill evaluation. 14th IFAC Symposium on Analysis, Design, and Evaluation of Human Machine Systems, HMS 2019: Tallinn, Estonia, 16-19 September, Proceedings. Ed. Tsiopoulos, Leonidas. Elsevier, 169−174. (IFAC-PapersOnLine; 52-19).10.1016/j.ifacol.2019.12.169.
Mézešová, Terézia; Bahşi, Hayretdin (2019). Expert knowledge elicitation for skill level categorization of attack paths. 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2019), Oxford, United Kingdom, 3-4 June 2019, [Proceedings]. IEEE, art no 8885192, 1−8.10.1109/CyberSecurity46270.2019.
Mucci, Daniele; Blumbergs, Bernhards (2019). TED: A container based tool to perform security risk assessment for ELF binaries. Proceedings of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, February 23-25, 2019, Prague, Czech Republic, Vol. 1. Ed. Mori, Paolo; Furnell, Steven; Camp, Oliver. Prague: SciTePress, 361−369.10.5220/0007371603610369.
Mäses, Sten (2019). Evaluating cybersecurity-related competences through serious games. Proceedings 19th Koli Calling Conference on Computing Education Research Koli Calling 2019: November 21-24, 2019 Koli, Finland. New York, NY: ACM, 1−2. (ACM International Conference Proceeding Series).10.1145/3364510.3366163.
Mäses, Sten; Aitsam, Heleri; Randmann, Liina (2019). A method for adding cyberethical behaviour measurements to computer science homework assignments. Proceedings 19th Koli Calling Conference on Computing Education Research Koli Calling 2019: November 21-24, 2019 Koli, Finland. New York, NY: ACM, 1−5. (ACM International Conference Proceeding Series).10.1145/3364510.3364529.
Mäses, Sten; Kikerpill, Kristjan; Jüristo, Kaspar; Maennel, Olaf (2019). Mixed methods research approach and experimental procedure for measuring human factors in cybersecurity using phishing simulations. Proceedings of the 18th European Conference on Research Methodology for Business and Management Studies, ECRM 2019: Hosted By Wits Business School, Johannesburg, South Africa, 20-21 June 2019. Ed. Stacey, Anthony. Reading, UK: Academic Conferences and Publishing International Limited, 218−226.
Orye, Erwin; Maennel, Olaf M. (2019). Recommendations for enhancing the results of cyber effects. 2019 11th International Conference on Cyber Conflict: Silent Battle, CyCon: 28 May - 31 May, Tallinn, Estonia. Ed. Minárik, T.; Alatalu, S.; Biondi, S.; Signoretti, M.; Tolga, I.; Visky, G. Tallinn: CCDCOE; IEEE, 103−123. (NATO CCD COE Publications).10.23919/CYCON.2019.8756649.
Ott, Nikolas; Osula, Anna-Maria (2019). The rise of the regionals: how regional organisations contribute to international cyber stability negotiations at the United Nations level. 2019 11th International Conference on Cyber Conflict: Silent Battle, CyCon : 28 May - 31 May, Tallinn, Estonia. Ed. Minárik, T.; Alatalu, S.; Biondi, S.; Signoretti, M.; Tolga, I.; Visky, G. Tallinn: CCDCOE; IEEE, 321−345. (NATO CCD COE Publications).10.23919/CYCON.2019.8756863.
Pihelgas, Mauno (2019). Design and implementation of an availability scoring system for cyber defence exercises. 14th International Conference on Cyber Warfare and Security (ICCWS 2019): Stellenbosch University, South Africa, 28 February - 1 March 2019, Proceedings. Ed. van der Waag-Cowling, Noëlle; Leenen, Louise. Academic Conferences and Publishing International Limited, 329−337.
Price, Kristopher R.; Priisalu, Jaan; Nomm, Sven (2019). Analysis of the impact of poisoned data within twitter classification models. 14th IFAC Symposium on Analysis, Design, and Evaluation of Human Machine Systems, HMS 2019 : Tallinn, Estonia, 16-19 September, Proceedings. Ed. Tsiopoulos, Leonidas. Elsevier, 175−180. (IFAC-PapersOnLine; 52-19).10.1016/j.ifacol.2019.12.170.
Somer, Tiia (2019). Taxonomies of cybercrime: an overview and proposal to be used in mapping cyber criminal journeys. Proceedings of the 18th European Conference on Cyber Warfare and Security, ECCWS 2019 : University of Coimbra, Portugal, 4-5 July 2019. Ed. Cruz, Tiago; Simoes, Paulo. Reading, UK: ACPI, 475−483.
Sõmer, Tiia; Lorenz, Birgy; Ottis, Rain (2019). Developing military cyber workforce in a conscript armed forces: recruitment, challenges and options. 14th International Conference on Cyber Warfare and Security (ICCWS 2019) : Stellenbosch University, South Africa, 28 February - 1 March 2019, Proceedings. Reading, UK: Academic Conference and Publishing International, 413−421.
Tabuyo-Benito, Raquel; Bahsi, Hayretdin; Peris-Lopez, Pedro (2019). Forensics analysis of an on-line game over Steam Platform. Digital Forensics and Cyber Crime: 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings. Ed. Breitinger, Frank; Baggili, Ibrahim. Cham: Springer, 106−127. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; 259).10.1007/978-3-030-05487-8_6.