Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

ERA Chair in Maritime Cyber Security at Tallinn University of Technology

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Schedule of schools and conferences for Years 4 and 5 (opens in new window)

Schedule of summer and/or winter schools (Task 4.1) and international conferences (Task 4.2) for Years 4 and 5.

Project newsletters produced in Period 1 (opens in new window)

Collection of project newsletters produced in Period 1

Progress report on Postgraduate Training Programmes in Period 1 (opens in new window)

Progress report on Postgraduate Training Programmes in Period 1 PhD training in Task 22 and Masters training in Task 23

Schedule of schools and conferences for Years 2 and 3 (opens in new window)

Schedule of summer andor winter schools Task 41 and international conferences Task 42 for Years 2 and 3

Set of training material on project management (opens in new window)

Training materials presentations online resources and handouts with practical advice on how to effectively manage national and EU funded RD projects developed by the Research Administration Manager in close consultation with TalTechs Research Administration Office see Task 34

Strategic Research Programme - midterm version (opens in new window)

Midterm version of the Strategic Research Programme for the new, multidisciplinary Centre for Maritime Cyber Security at TalTech produced by the ERA Chair Holder according to Task 2.1.

Project leaflet and poster (opens in new window)

Short description of the project leaflet 2 pages A4 size and project poster A1 size

One-page statement that Task 6.3 has been completed (opens in new window)

Onepage statement that Task 63 has been completed The task will be to introduce in the Continuous reporting tool on the Funding and tenders portal before the end of month 2 of the project peerreviewed publications in the particular field of research of the coordinating entity during the three years preceding the start date of the project

Set of training material on proposal writing (opens in new window)

Training materials presentations online resources and handouts with practical advice on how to write competitive proposals for national and EU funding RD programmes developed by the Research Administration Manager in close consultation with TalTechs Research Administration Office see Task 32

Progress report on Postgraduate Training Programmes in Period 2 (opens in new window)

Progress report on Postgraduate Training Programmes in Period 2 (PhD training in Task 2.2 and Master's training in Task 2.3)

Strategic Research Programme - initial version (opens in new window)

Initial version of the Strategic Research Programme for the new multidisciplinary Centre for Maritime Cyber Security at TalTech produced by the ERA Chair Holder according to Task 21

Project newsletters produced in Period 2 (opens in new window)

Collection of project newsletters produced in Period 2.

Project website (opens in new window)

Short report describing the design and implementation of the project website

Publications

Blockchain Implementation Barriers in Maritime: A Case Study based on ISM and MICMAC Techniques

Author(s): Sanja Bauk, Lindani Handsome Ntshangase
Published in: Journal of Maritime Research, Issue Vol XX. No. III (2023), 2023, Page(s) 72-80, ISSN 1697-4840
Publisher: University of Cantabria

The role of trait and state mindfulness in cognitive performance of male adolescents (opens in new window)

Author(s): Firth, A., Sütterlin, S., & Lugo, R.
Published in: Psychology Research and Behavior Management, Issue Vol16, 2023, Page(s) 3939-3948, ISSN 1179-1578
Publisher: Dove Medical Press Ltd
DOI: 10.2147/prbm.s409737

A Model-Based Adaptive Control of Turning Maneuver for CatamaranAutonomous Surface Vessel (opens in new window)

Author(s): IGOR ASTROV, IRINA ASTROVA
Published in: WSEAS TRANSACTIONS on SYSTEMS and CONTROL, Issue Volume 19, 2024, Page(s) 135-142, ISSN 2224-2856
Publisher: WSEAS Transactions on Systems and Control
DOI: 10.37394/23203.2024.19.14

Using Technical Cybersecurity Exercises in University Admissions and Skill Evaluation (opens in new window)

Author(s): Kaie Maennel, Sten Mäses, Stefan Sütterlin, Margus Ernits, Olaf Maennel
Published in: IFAC-PapersOnLine, Issue 52/19, 2019, Page(s) 169-174, ISSN 2405-8963
Publisher: IFAC Paper
DOI: 10.1016/j.ifacol.2019.12.169

Threat modeling of industrial control systems: A systematic literature review (opens in new window)

Author(s): Khalil, Shaymaa Mamdouh; Bahsi, Hayretdin; Korõtko, Tarmo
Published in: Computers & Security, Issue Vol136, 2023, Page(s) 19, ISSN 0167-4048
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2023.103543

The Role of Emotion Regulation for General Self-Efficacy in Adolescents Assessed Through Both Neurophysiological and Self-Reported Measures (opens in new window)

Author(s): Natalie Marie Lande, Torvald F Ask, Sjur Skjørshammer Sætren, Ricardo Gregorio Lugo, Stefan Sütterlin
Published in: Psychology Research and Behavior Management, Issue Volume 2023:16, 2023, Page(s) 3373—3383, ISSN 1179-1578
Publisher: Dove Medical Press Ltd
DOI: 10.2147/prbm.s406702

Systematic literature review of threat modeling and risk assessment in ship cybersecurity (opens in new window)

Author(s): Muhammed Erbas, Shaymaa Mamdouh Khalil, Leonidas Tsiopoulos
Published in: Ocean Engineering, Issue Vol 306, 2024, ISSN 0029-8018
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.oceaneng.2024.118059

Misconfiguration-Free Compositional SDN for Cloud Networks (opens in new window)

Author(s): H. Pan, Z. Li, P. Zhang, P. Cui, K. Salamatian and G. Xie
Published in: IEEE Transactions on Dependable and Secure Computing, Issue Vol20, issue 3, 2023, Page(s) 2484 - 2499, ISSN 1545-5971
Publisher: IEEE Computer Society
DOI: 10.1109/tdsc.2022.3185096

Stream clustering guided supervised learning for classifying NIDS alerts (opens in new window)

Author(s): Risto Vaarandi and Alejandro Guerra-Manzanares
Published in: Future Generation Computer Systems, Issue Vol 155, 2024, Page(s) 231-244, ISSN 0167-739X
Publisher: Elsevier BV
DOI: 10.1016/j.future.2024.01.032

The UnCODE system: A neurocentric systems approach for classifying the goals and methods of Cognitive Warfare. (opens in new window)

Author(s): Ask, T. F., Lugo, R., Sütterlin, S., Canham, M., Hermansen, D., & Knox, B. J. (2023)
Published in: NATO STO-MP-HFM-361, 2023, ISSN 2331-8422
Publisher: PsyArXiv
DOI: 10.31234/osf.io/7c2ez

Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners (opens in new window)

Author(s): Dan Heering
Published in: TransNav, the International Journal on Marine Navigation and Safety of Sea Transportation, Issue 14/2, 2020, Page(s) 271-278, ISSN 2083-6473
Publisher: TransNav
DOI: 10.12716/1001.14.02.01

Network IDS alert classification with active learning techniques (opens in new window)

Author(s): Risto Vaarandi and Alejandro Guerra-Manzanares
Published in: Journal of Information Security and Applications, Issue Vol. 81, article 103687, 2024, ISSN 2214-2126
Publisher: Elsevier B.V.
DOI: 10.1016/j.jisa.2023.103687

A comprehensive instrument for identifying critical information infrastructure services (opens in new window)

Author(s): Luis-Carlos Herrera, Olaf Maennel
Published in: International Journal of Critical Infrastructure Protection, Issue 25, 2019, Page(s) 50-61, ISSN 1874-5482
Publisher: Elsevier BV
DOI: 10.1016/j.ijcip.2019.02.001

Enhancing Forensic-Tool Security with Rust: Development of a String Extraction Utility (opens in new window)

Author(s): Jens Getreu, Olaf Maennel
Published in: The Journal of Digital Forensics, Security and Law, 2019, ISSN 1558-7223
Publisher: Association of Digital Forensics, Security and Law (ADFSL)
DOI: 10.15394/jdfsl.2019.1607

Gamification as a neuroergonomic approach to improving interpersonal situational awareness in cyber defense. (opens in new window)

Author(s): Ask, T. F., Knox, B. J., Lugo, R. G., Hoffmann, L., & Sütterlin, S.
Published in: Frontiers in Education, Issue 2023, Vol. 8, 2023
Publisher: Frontiers
DOI: 10.3389/feduc.2023.988043

Editorial: The human factor in cyber security education (opens in new window)

Author(s): Ricardo G. Lugo, Stefan Sütterlin, Benjamin James Knox, Linas Bukauskas, Agnė Brilingaitė, Olaf Manuel Maennel
Published in: Frontiers in Education, Issue 2023, Vol. 8, 2023
Publisher: Frontiers
DOI: 10.3389/feduc.2023.1277282

Cyber Hygiene: The Big Picture (opens in new window)

Author(s): Kaie Maennel, Sten Mäses, Olaf Maennel
Published in: Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings, Issue 11252, 2018, Page(s) 291-305, ISBN 978-3-030-03637-9
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-03638-6_18

Conflict in cyberspace (opens in new window)

Author(s): Ottis, Rain
Published in: Routledge Handbook of the Future of Warfare, Issue 1st Edition, 2023, Page(s) 411−420
Publisher: Routledge
DOI: 10.4324/9781003299011

Stenmap: Framework for Evaluating Cybersecurity-Related Skills Based on Computer Simulations (opens in new window)

Author(s): Sten Mäses, Liina Randmann, Olaf Maennel, Birgy Lorenz
Published in: Learning and Collaboration Technologies. Learning and Teaching, Issue 10925, 2018, Page(s) 492-504, ISBN 978-3-319-91151-9
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-91152-6_38

A few observations on data science

Author(s): Bauk, Sanja
Published in: New Trends and Best Practices in Socioeconomic Research, 2023, Page(s) 23-24, ISBN 978-9940-673-18-5
Publisher: Economic Laboratory for Transition Research, Montenegro; Center for Sociological Research Szczecin, Poland; Adriatic University Bar, Faculty of Mediterranean Business studies Tivat, Montenegro; and University Mediterranean, Montenegro

Art and Automation of Teaching Malware Reverse Engineering (opens in new window)

Author(s): Toomas Lepik, Kaie Maennel, Margus Ernits, Olaf Maennel
Published in: Learning and Collaboration Technologies. Learning and Teaching, Issue 10925, 2018, Page(s) 461-472, ISBN 978-3-319-91151-9
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-91152-6_35

Metacognitive Processes Involved in Human Robot Interaction in the School Learning Environment (opens in new window)

Author(s): Deepti Mishra, Ricardo G. Lugo, Karen Parish ,Solveig Tilden
Published in: LNCS International Conference on Human-Computer Interaction, Issue Human-Computer Interaction, 2023, Page(s) 85-100, ISBN 978-3-031-35599-8
Publisher: Springer
DOI: 10.1007/978-3-031-35599-8

A method for teaching Open Source Intelligence (OSINT) using personalised cloud-based exercises

Author(s): Saber, Yari; Mäses, Sten; Maennel, Olaf Manuel
Published in: Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020, 2020
Publisher: Old Dominion University (ODU)

Anomalous file system activity detection through temporal association rule mining. (opens in new window)

Author(s): H. Iman, M. Reza; Chikul, Pavel; Jervan, Gert; Bahsi, Hayretdin; Ghasempouri, Tara
Published in: Proceedings of the 9th International Conference on Information Systems Security and Privacy ICISSP, Issue Vol1, 2023, Page(s) 733-740, ISBN 978-989-758-624-8
Publisher: Scitepress
DOI: 10.5220/0011805100003405

Recommendations for Enhancing the Results of Cyber Effects (opens in new window)

Author(s): Erwin Orye, Olaf M. Maennel
Published in: 2019 11th International Conference on Cyber Conflict (CyCon), 2019, Page(s) 1-19, ISBN 978-9949-9904-5-0
Publisher: IEEE
DOI: 10.23919/cycon.2019.8756649

Individual Deep Fake Recognition Skills are Affected by Viewer’s Political Orientation, Agreement with Content and Device Used

Author(s): Stefan Sütterlin, Torvald F. Ask, Sophia Mägerle, Sandra Glöckler, Leandra Wolf, Julian Schray, Alava Chandi, Teodora Bursac, Ali Khodabakhsh4, Benjamin J. Knox, Matthew Canham, and Ricardo G. Lugo.
Published in: Human-Computer Interaction, Issue Proceedings, Part II, 2023
Publisher: Springer

Comparative Analysis of Pattern Mining Algorithms for Event Logs (opens in new window)

Author(s): Gasimov, Orkhan; Vaarandi, Risto; Pihelgas, Mauno
Published in: 2023 IEEE International Conference on Cyber Security and Resilience, 2023, Page(s) 1-7, ISBN 979-8-3503-1170-9
Publisher: IEEE
DOI: 10.1109/csr57506.2023.10224996

Learning Supplementary NLP Features for CTR Prediction in Sponsored Search (opens in new window)

Author(s): Dong Wang, Shaoguang Yan, Yunqing Xia, Kavé Salamatian, Weiwei Deng, Qi Zhang
Published in: KDD '22: Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Issue 28, 2022, Page(s) 4010–4020
Publisher: ACM Digital library
DOI: 10.1145/3534678.3539064

Blockchain applications and cybersecurity threats: A review (opens in new window)

Author(s): L. H. Ntshangase and S. Bauk
Published in: 28th International Conference on Information Technology (IT), 2024, Page(s) 1-4, ISBN 979-8-3503-6961-8
Publisher: IEEE
DOI: 10.1109/it61232.2024.10475777

DACA: Automated Attack Scenarios and Dataset Generation (opens in new window)

Author(s): Korving, Frank; Vaarandi, Risto
Published in: Proceedings of the 18th International Conference on Cyber Warfare and Security, ICCWS 2023, Issue Vol. 18 No. 1 (2023): Proceedings of the 18th International Conference on Cyber Warfare and Security, 2023, Page(s) 550−559
Publisher: Academic Conferences International Limited
DOI: 10.34190/iccws.18.1.962

From simple scoring towards a meaningful interpretation of learning in cybersecurity exercises

Author(s): Ernits, Margus; Maennel, Kaie; Mäses, Sten; Lepik, Toomas; Maennel, Olaf
Published in: Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020, 2020
Publisher: Old Dominion University (ODU)

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0