DSpace at University of Tartu

Communities in dspace.

Select a community to browse its collections.

  • Dissertatsioonid 2004 – Theses, MSc, PhD (ETD)   3414
  • E-õppe materjalid   697
  • Eesti Muusika- ja Teatriakadeemia   112
  • Eesti Teadusagentuur ja teised asutused   18
  • Haridus- ja Teadusministeerium   484
  • Humanitaarteaduste ja kunstide valdkond   6177
  • Loodus- ja täppisteaduste valdkond   8293
  • Meditsiiniteaduste valdkond   2390
  • Northern European Association for Language Technology (NEALT)   1153
  • Sotsiaalteaduste valdkond   12317
  • Tartu Ülikooli Kirjastus   26
  • Tartu Ülikooli muuseumid   3625
  • Tartu Ülikooli Raamatukogu   53067
  • Tartu Ülikooli teadusettekanded   70

Recent Submissions

Thumbnail Image

Databases and e-journals

Databases accessible for the university of tartu.

The databases open for the University of Tartu can be accessed via the link  Databases   on the Library homepage. The link leads to an alphabetical list of databases. To find databases on your subject, choose one of the Faculties : Medicina, Realia et naturalia, Socialia or Humaniora and then click on Filter databases .

c

Many specialities are provided with  bibliographic or abstracts databases  that enable to get an overview of all materials published in the given field (newspaper articles and other sources, e.g. conference proceedings, dissertations, articles in various collections, books, book reviews, etc.). Besides bibliographic data, abstracts databases also contain abstracts of articles or other documents. For example, ERIC (education),  PsycInfo ( psychology   ,  MLA International Bibliography  (linguistics and literary science), SciFinder Scholar (chemistry). Medline (medcine),  SportDiscus  and many others.

Some databases may be both bibliographic and full text databases at the same time. For instance, the EBSCO database Academic Search Complete offers bibliographic data and abstracts for 12500 journal titles, and full texts of articles for 8500 journal titles. Recently, a new multidisciplinary database, Academic Search Ultimate , has been added with an even larger selection of journals. Databases are interlinked. Quite often it is possible, when searching a bibliographic or reference database, to get information whether the item can be accessed and read immediately.

Many databases are accessible from a common platform and they can be searched by a common user interface. Abstracts and full text databases of different fields of science, as well as the multidisciplinary abstracts and full text database Academic Search Complete , are accessible via  EBSCO host  on the EBSCO platform. On the search page you can specify which databases you want to search. 

With  EBSCO Discovery    you can at once search from most databases and other information resources that are accessible for University of Tartu.  

With  Web of Science  you can access the Clarivate Analytics citation database  Web of Science Core Collection and the  Journal Citation Reports database, reflecting journal impact factors.  Essential Science Indicators   is a database that helps to analyse and evaluate the quality of research on the levels of scientists, institutions and countries.

SCOPUS  is a multidisciplinary abstracts and citations database that belongs to the information and analytics company Elsevier. It offers abstracts for more than 15 000 scientific journals. By the publisher’s assessment, the database includes about 80% of international peer-reviewed scientific journals. Web of Science Core Collection and SCOPUS are similar to a certain extent, their main difference being the fact that the SCOPUS’s selection of journals is wider, but the WOS’s selection has a longer temporal range. These databases complement each other and the University of Tartu Library is happy to have access to both of them.

There are also a number of publisher-scpecific databases that contain the e-journals of a single publisher. These publishers offer their e-journals in their own databases on separate platforms. The University of Tartu Library has access to the following publishers’  e-journal databases , containing journals from different fields of science. Cambridge Journals   Emerald  Insight   Oxford Journals   Sage Journals Online   ScienceDirect   Springer Link     Taylor & Francis Online    Wiley Online Library  

JSTOR   (Journal Storage – The Scholarly Journal Archive)  is an important multidisciplinary full text database. This is an archive of scholarly journals, giving access mainly to older volumes of journals, mostly from the beginning of the publication of the journals. The database does not include 3-5 recent volumes of the journals. Access to recent volumes of these journals should be checked at the library portal of e-journals.

Project Muse   is a collection of e-journals on the humanities and social sciences. 

Annual Reviews   contains review journals on different subject areas.

There are a number of  other full text databases  that contain journals on only one subject area either from one or several different publishers, such as e-journals of the  American Chemical Society  and  American Physical Society ,  American Society for Microbiology ,  Beck-Online  (law),  BioOne Fulltext  (biology and environmental science),  BREPOLIS databases  (the humanities),  CSIRO Publishing   (natural sciences),  IEEE Xplore  (computer science, electronics),  Institute of Physics (IOP) electronic journals ,  Nature Publishing e-journals ,  PsycArticles  and others.

The University of Tartu Library also offers access to the  statistics database  IMD World Competitiveness Online .   

  • e-book databases
  • Remote access to databases
  • The catalogue of e-journals and e-books

university of tartu thesis database

Cyber Security Hub

  • Research projects
  • PhD research

Euroopa Regionaalarengu Fond

MSc thesis on Cyber Security related topics defended at the University of Tartu :

  • Dissanayake. P.G., "A Comparison of Security Risk Analysis in the In-house IT Infrastructure and Cloud Infrastructure for the Payment Gateway System"
  • Mammadzada. K., "Blockchain Oracles"
  • Matsalu. M., "The Development of Digital Forensics Workforce Competency on the Example of Estonian Defence League"
  • Padur. K., "Information Security Risk Assessment in the Context of Outsourcing in a Financial Institution"
  • Puniani. R., "Conceptualization of a Blockchain Based Voting Ecosystem in Estonia"
  • Pure. I., "An Automated Methodology for Validating Web Related Cyber Threat Intelligence by Implementing a Honeyclient"
  • Produit. B.D., "Optimization of the ROCA (CVE-2017-15361) Attack"
  • Sarapuu. D., "Penetration Testing of Glia’s Web Application"
  • Seeba. M., "A Specification of Layer-Based Information Security Management System for the Issue Tracking System"
  • Simisker. M., "Security of Health Information Databases"
  • Tõnisson. R., "Tighter Post-quantum Secure Encryption Schemes Using Semi-classical Oracles"
  • Yerokhin. M., "Multi-level Policy-aware Privacy Analysis"

See more at the thesis database .

  • Abbasi A., GDPR Implementation in an Airline’s Contact Center
  • Akande A., Disruptive Power of Blockchain on the Insurance Industry
  • Avramenko V., Cost-Benefit Analysis of a Hybrid Terrorist Attack on a Power Plant

  • Affia A-A. O., Security Risk Management of E-commerce Systems
  • Çelebi I., 
Privacy Enhanced Secure Tropos:
 A Privacy Modeling Language for GDPR Compliance
  • Cherednychenko O., Designing Visually Effective and Intuitive Modelling Notations for Security Risk Management
  • Elazazy A. A. A. A., HoneyProxy Implementation in Cloud Environment with Docker Container HoneyFarm
  • Filipczak K. M., Testing the Security Awareness using Open-Source Tools: Spear Phishing
  • Islami L., Assessing Generational Differences in Susceptibility to Social Engineering Attacks. A Comparison Between Millennial and Baby Boomer Generations
  • Jüristo K., How to Conduct Email Phishing Experiments
  • Kaasik M., A Tool for Supporting Multi-perspective System Development Through Security Risk Management
  • Kopylash V., An Ethereum-Based Real Estate Application with Tampering-Resilient Document Storage
  • Luomala M., Evaluation of Efficiency of Cybersecurity
  • Mendelman K., Fingerprint Organization Using Metadata of Public Documents
  • Mitt S., Blockchain Application - Case Study on Hyperledger Fabric
  • Mohamed G. Z. A. R., Detecting Social Spamming on Facebook Platform
  • Nugis R., Forensic Data Properties of Digital Signature BDOC and ASiC-E Files on Classic Disk Drives
  • Orange A., Blockchain-based Provenance Solution for Handcrafted Jewellery
  • Oras A., Online Cyber Security Exercise to Evaluate and Improve Individual Technical Specialists’ Cyber Incident Reporting Skills
  • Rebane R.-M., Post-Quantum Secure Time-Stamping
  • Ristikivi A., Ensuring the Integrity of Electronic Health Records
  • Räni E., Prediction Model for tendencies in Cybercesurity
  • Sing E., A Meta-Model Driven Method for Establishing Business Process Compliance to GDPR
  • Shapaval R., Security Risk Management for the IoT systems
  • Soonberg M., The Employee-Based Information Security Risks on the Example of the Estonian Literary Museum
  • Sõgel K., Distributed Ledger Technology and External Mandatory Reporting in Banking Industry
  • Velázquez J. A. S., ''Securing openHAB Smart Home Through User Authentication and Authorization'
  • Värva I., Autonomy and Efficiency Trade-offs on an Ethereum-Based Real Estate Application
  • Zaitsev A., Comparison of STS and ArchiMate Risk and Security Overlay
  • AbuSeada W. M. F. A., Alternative Approach to Automate Detection of DOM-XSS Vulnerabilities
  • Bascuñana G. F., Method for Effective PDF Files Manipulation Detection
  • Brodar G., Analysis of Exploit-kit Incidents and Campaigns Through a Graph Database Framework
  • Djagilev V., Android Chat Application Forensic Process Improvement & XRY Support
  • Ellervee A., A Reference Model for Blockchain-Based Distributed Ledger Technology
  • Jõgi M., Establishing, Implementing and Auditing Linux Operating System Hardening Standard for Security Compliance
  • Kinger M., Enterprise Cloud Security Guidance and Strategies for Enterprises
  • Kuldmaa A., On Secure Bulletin Boards for E-Voting
  • Lahesoo P., The Electronic Evidence Examination Reporting System by the Example of West Prefecture
  • Lashkarara S., Managing Security Risks Using Attack-Defense Trees
  • Maennel K., Improving and Measuring Learning Effectiveness at Cyber Defence Exercises
  • Nafies A., A New Heuristic Based Phishing Detection Approach Utilizing Selenium Web-driver
  • Sivalingapandi D., Comparison and Alignment of Access Control Models
  • Oksvort R., A Prototype for Learning Privacy-Preserving Data Publishing
  • Pappas S., Investigation of JTAG and ISP Techniques for Forensic Procedures
  • Proskurin A., Adapting a Stress Testing Framework to a Multi-module Security-oriented Spring Application
  • Treier D., Research and Proof of Concept of Selected ISKE Highest Level Integrity Requirements
  • Tschida C., The Way to the Specialist and Management Level of Cyber Hygiene Initiative
  • Tsintsabadze L., A Prototype to Analyze Role- and Attribute-Based Access Control Models
  • Vallaots A., Federation of Cyber Ranges
  • Vunk M., A Framework for Assessing Organisational IT Governance Risk and Compliance
  • Allyson I. H., Designing Digital Forensics Challenges for Multinational Cyber Defense Exercises
  • Duran S. A. U., Organizational Interaction Mechanisms Affecting Strategic Decision-Making During Cybercrime Investigations
  • Herrera V. L. C., A Comprehensive Instrument for Identifying Critical Information Infrastructure Services
  • Martínez F. C. A., Tabletop Exercise For Cybersecurity Educational Training; Theoretical Grounding and Development
  • Pantoja V. C. A., Analysis of the Cyber Attacks against ADS-B Perspective of Aviation Experts
  • Pinto R. Y. A., Development of National Cyber Security Strategies (NCSSs), and an Application of Perspective to the Colombian Case
  • Rozario V. I. D. J., Model-based Role Based Access Control for RESTful Spring applications
  • Samarütel S., Revision of Security Risk-oriented Patterns for Distributed Systems
  • Sarmiento B. S. A., Detection Solution Analysis for Simplistic Spoofing Attacks in Commercial Mini and Micro UAVs
  • Sergeev A., Role Based Access Control as SecureUML Model in Web Applications Development with Spring Security
  • Siim J., Secure and Efficient Mix-Nets
  • Siim S., A Comprehensive Protocol Suite for Secure Two-Party Computation
  • Sokk V., An Improved Type System for a Privacy-aware Programming Language and its Practical Applications
  • Suarez M. D. D., Assessment of Web-based Information Security Awareness Courses
  • Velasquez H. L. A., Colombia and the Intelligence Cycle in the 21st Century, the Digital Age
  • Guler S., Secure Bitcoin Wallet
  • Kiiver J., NFC Security Solution for Web Applications
  • Kolk K., An Empirical Comparison of Approaches for Security Requirements Elicitation
  • Rao S. P. Analysis and Mitigation of Recent Attacks on Mobile Communication Backend
  • Rrenja A., Pattern Based Security Requirements Derivation with Security Risk-aware Secure Tropos
  • Tursunova S., Comparing Security Risk-oriented Modelling Languages to Manage Social Engineering Risks
  • Vaht M., The Analysis and Design of a Privacy-Preserving Survey System
  • AbuLamddi M., Safety and Security Dependability Analysis
  • Helbig C., An Experience Report of Eliciting Security Requirements from Business Processes
  • Khilji W. A., Evaluation Framework for Software Security Requirements Engineering Tools
  • Kurt S., Interplay of Misuse Case and Fault Tree Analysis for Security and Safety Analysis
  • Okugbeni J., Security Implementation of Mission Control System for ESTCube-1 Satellite
  • Pikma T., Auditing of Secure Multiparty Computations
  • Preobrazenskaja A., Development of Security Risk Measurement Model within Misuse Cases and BPMN
  • Teder T. Extracting Bole-based Access Control Models from Business Process Event Logs
  • Tovstukha I., Management of Security Risks in the Enterprise Architecture using ArchiMate and Mal-activities
  • Turban T., A Secure Multi-Party Computation Protocol Suite Inspired by Shamir’s Secret Sharing Scheme
  • Altuhhova O., Developing System Security through Business Process Modelling
  • Onchukova A., Transformation rules between MUC and MAD
  • Pankova A., Insecurity of Transformation-Based Privacy-Preserving Linear Programming
  • Pullonen P., Actively Secure Two-Party Computation: Efficient Beaver Triple Generation
  • Rebane R., A Feasibility Analysis of Secure Multiparty Computation Deployments
  • Tark K., Role Based Access Model in XML based Documents
  • Cakabey O., Role-based Access Control Using Knowledge Acquisition in Automated Specification
  • Khan N. H., A Pattern-based Development of Secure Business Processes
  • Lakk H., Model-driven Role-based Access Control for Databases
  • Soomro I. U., Alignment of Misuse Cases to ISSRM
  • Turan Y., Extension and Application of Event-driven Process Chain for Information System Security Risk Management
  • Chowdhury M. J. M., Modeling Security Risks at the System Design Stage: Alignment of Mal Activity Diagrams and SecureUML to the ISSRM Domain Model
  • Seeba I., Adding a transformation language to the Cryptoanalyser
  • Talviste R., Deploying secure multiparty computation for joint data analysis - a case study
  • 1.1 Important Deadlines for January 2025 Defence
  • 1.2 Important Deadlines for May/June 2024 Defence
  • 1.3.1 Registration and submission of problem statement and research design document
  • 1.3.2 Submission to Reviewer
  • 1.3.3 OIS declaration
  • 1.3.4 Submission of Final Copy
  • 1.3.5 The defence procedure
  • 1.4 Formal Requirements and recommendations
  • 1.5 Topic and supervisor
  • 1.6.1 From Marko Arik, Industry PhD student, Talgen Cybersecurity Ltd. [email protected]
  • 1.6.2 From Sille Arikas, Industry PhD student, Clarified Security
  • 1.6.3 From Hayretdin Bahsi, Tallinn University of Technology, [email protected]
  • 1.6.4 From Aivo Kalu, Cybernetica AS
  • 1.6.5 From Shaymaa Khalil, PhD STudent, TalTech
  • 1.6.6 From Toomas Lepik, Tallinn University of Technology
  • 1.6.7 From Birgy Lorenz, Tallinn University of Technology
  • 1.6.8 From Seyed Mohammad Hadi Mirsadeghi, PhD Student, Tallinn University of Technology
  • 1.6.9 From Sten Mäses, Tallinn University of Technology
  • 1.6.10 From Andrew Roberts, PhD Student, Tallinn University of Technology
  • 1.6.11 From Aleksi Kajander, Tallinn University of Technology
  • 1.6.12 From Rain Ottis, Tallinn University of Technology
  • 1.6.13 From Mauno Pihelgas NATO CCDCOE
  • 1.6.14 From Jaan Priisalu, Tallinn University of Technology
  • 1.6.15 From Muaan Ur Rehman, PhD Student, Tallinn University of Technology
  • 1.6.16 From Nikita Snetkov, Industry PhD Student, Cybernetica / Tallinn University of Technology
  • 1.6.17 From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia
  • 1.6.18 From Eneken Tikk, Tallinn University of Technology
  • 1.6.19 From Risto Vaarandi, Tallinn University of Technology
  • 1.6.20 From Jelizaveta Vakarjuk, Industry PhD Student, Cybernetica / Tallinn University of Technology
  • 1.6.21 From Adrian Venables, Tallinn University of Technology
  • 1.6.22 From Gabor Visky, PhD Student, NATO CCDCOE / TalTech
  • 1.6.23 From Kaido Kikkas, Tallinn University of Technology, IT College. [email protected]
  • 1.6.24 From Ricardo Gregorio Lugo, Tallinn University of Technology, Estonian Maritime Academy
  • 1.6.25 From the TalTech IT office
  • 1.6.26 From the TalTech Space Centre
  • 1.6.27 From the University of Tartu
  • 1.6.28 From Estonian Police
  • 1.7 Useful links

Thesis info for Cyber Security students

Important deadlines for january 2025 defence.

  • Submission of the problem statement and research design document: 12 August 2024
  • Declaring your thesis topic in your study plan in ois: 9 September 2024
  • Submission of the thesis to the reviewer: TBA
  • OIS declaration: 16 December 2024
  • Submission of the final version of the thesis: TBA
  • Defences: TBA

Moodle: TBA

Important Deadlines for May/June 2024 Defence

  • Submission of problem statement and research design document: 11 December 2023
  • Declaring your thesis topic in your study plan in ois: 5 February 2024
  • Submission of the thesis to the reviewer: 14 April 2024
  • OIS declaration: 6 May 2024
  • Submission of the final version of the thesis: 12 May 2024
  • Defences: 27. - 30 May 2024

Moodle: https://moodle.taltech.ee/course/view.php?id=32866#section-0

Thesis Defence Overview

Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area. This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.

Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.

In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.

The next step in the process would be conducting the research. As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent. Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation. This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.

At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&A from the opponent, committee, supervisor & audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence.

Below some more detailed information.

Registration and submission of problem statement and research design document

Each student is required to submit a problem statement and research design document having a length up to 10 pages. The document must include your name and also the names of thesis and supervisor (and co-supervisor if exists).

About half a year before the defence, the students are required to indicate their intent to defend by this document. See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences. You will need to submit this via the TTU Moodle link given in "important deadlines" section of relevant defence period. You'll have to self-enrol yourself in that link. Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.

The document should include the following sections and content:

• The topic of the thesis

• The name of the author

• The name of the supervisor

• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.

• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).

• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.

• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.

• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.

• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.

• References: The resources referenced in the document are listed here.

This document is evaluated according to the following criteria:

Whether the author

• has a well-defined problem statement,

• successfully presents the significance of the problem,

• knows the literature and the limits of existing solutions,

• have thought about possible methods,

• have thought about how to validate the proposed solution,

• brings a novelty to the literature.

You can find detailed information about research methods here.

Submission to Reviewer

Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master's degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee.

A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:

  • short description of the thesis
  • strengths and weaknesses of the thesis
  • recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.
  • at least three questions that can be asked during the defence.

Based on the student's performance at the defence the reviewer may change the recommended grade.

The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis. The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week). The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version. The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.

OIS declaration

Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.

OIS declaration deadlines can be found in the Academic Calendar!

Submission of Final Copy

Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in "important deadlines" section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.

If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.

NB! Do not forget that you need to prepare a 15 min presentation for your defence . This should really not be left to the evening before the defence!

The defence procedure

On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.

The defence procedure for each student consists of the following steps:

  • the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.
  • the student presents his or her thesis in 15 minutes.
  • the student answers the reviewer's questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.
  • the student answers questions from the committee.
  • the student answers questions from the audience.
  • the supervisor gives his or her opinion of the thesis and recommends a grade.

NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.

  • After the thesis defence, you may visit the Dean's Office for more information about final formalities if you'd like.
  • Upload your thesis if you would like to have it public

Formal Requirements and recommendations

Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given here ). Please note that you will have to change the title page as of 01.01.2017:

  • write "School of Information Technology" instead of "Faculty of Information Technology"
  • write "Department of Software Science" instead of "Department of Computer Engineering".

The thesis code for IVCM is ITC70LT.

The following advices can be considered for a master thesis

  • a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis
  • 50-80 pages + appendices if needed
  • Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text
  • Headings are numbered and no more than 3 levels used
  • Don't forget page numbers

Topic and supervisor

Every student must have a supervisor when writing the thesis. The supervisor's role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor's duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.

Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the leading institute of the curriculum to be an official co-supervisor. All (co-)supervisors must have at least a Master's degree.

When refining a topic idea, make sure it has a clear connection with cyber security.

NB! Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager.

If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://cs.ut.ee/en/content/thesis-deadlines-and-guidelines In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Paula Luks ([email protected]).

Potential supervisors & proposed topics

The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.

From Marko Arik, Industry PhD student, Talgen Cybersecurity Ltd. [email protected]

  • Cyber Operations
  • Informational Environment
  • Individual competences in Cyber

From Sille Arikas, Industry PhD student, Clarified Security

  • No topics available for 2023/2024

From Hayretdin Bahsi, Tallinn University of Technology, [email protected]

I am interested in various topics which can be categorized as technical and organizational. If you already have specific topics in your mind, we can discuss them and decide to work together.

Technical Topics

  • Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, code security review, intrusion detection in cyber-physical systems, IoT network or robotic systems
  • Cyber security of IoT, cyber-physical systems: Development of a security testbed, threat modelling, honeypots, intrusion detection systems
  • Digital Forensics: Forensics issues in cyber-physical systems, IoT networks or robotics systems, mobile forensics, blockchain forensics

Organizational Topics

  • Security operation center (SOC) models
  • Case studies for the improvement of SOC processes such as threat monitoring, incident handling, vulnerability management or situational awareness

From Aivo Kalu, Cybernetica AS

No topics available for 2023/2024 academic year.

From Shaymaa Khalil, PhD STudent, TalTech

Interested in (but not limited to) topics related to:

  • Industrial Control Systems: threat modeling, security, testbeds for education, penetration testing and digital forensics
  • Digital forensics related topics, especially topics related to IoT, Windows OS and Digital Forensics tools benchmarking

From Toomas Lepik, Tallinn University of Technology

[email protected]

General areas:

  • Network Forensic (related data analysis)
  • Reverse engineering (including malware analysis)
  • SCADA security
  • Incident Handling.
  • Log Analysis

Specific ideas:

  • Implications of DOH on security and availability + next step from https://www.netmeister.org/blog/doh-dot-dnssec.html
  • Domain name availability and how DNS registrant and registrar policy changes affect cybercrime
  • Heuristics on ip leasing operations
  • Defending organization that does not have internal network
  • Do applications do what they promise
  • Identifying specific applications based network fingerprints
  • Evaluation log collecting methods for Microsoft networks considering log poisoning attacks
  • Log collecting frameworks for organisations without internal networks
  • Information attributes and their influence on the organisational security beyond CIA
  • Frame works for cybersecurity devices / software evaluation
  • Evaluation specific software /hardware using ATT&CK Framwork
  • ATT&CK -Descriptions and false positives
  • Anatomy of cyber fractions during the Russian-Ukrainian war
  • Forensic Leaked materials of cyber criminal groups.

From Birgy Lorenz, Tallinn University of Technology

[email protected]

No topics as of 2023/2024

From Seyed Mohammad Hadi Mirsadeghi, PhD Student, Tallinn University of Technology

Students can approach Hadi with topics in the following: adversarial machine learning, deep learning, network security, intrusion detection/prevention, software-defined networking (SDN), programmable networking, distributed intelligence [email protected]

From Sten Mäses, Tallinn University of Technology

  • Creating educational hands-on virtual labs in rangeforce.com platform

From Andrew Roberts, PhD Student, Tallinn University of Technology

Topics: 1. Evaluation of Methods for Threat and Risk Assessment of Autonomous Self-Driving Vehicles 2. Design and Development of a cyber range for Autonomous self-driving vehicles Contribution:

Topic 1: The outcome of this work will form part of TUT contribution to standards and methods research within the International Alliance for Mobility Testing and Standardisation (IAMTS).

Topic 2: The developed cyber range will be integrated into the EU ECHO-Federated Cyber Range.

From Aleksi Kajander, Tallinn University of Technology

  • legal aspects of cyber security
  • international law

From Rain Ottis, Tallinn University of Technology

  • national cyber security
  • serious games in cyber security/cyber security exercises

From Mauno Pihelgas NATO CCDCOE

  • system and network monitoring
  • observability and situation awareness
  • IDS/IPS systems
  • automating cyber defences

From Jaan Priisalu, Tallinn University of Technology

From muaan ur rehman, phd student, tallinn university of technology.

Research focus is on machine learning in intrusion detection, security monitoring of maritime systems and android malware analysis. Students can come up with their own idea/research topic and contact Rehman through email [email protected]

From Nikita Snetkov, Industry PhD Student, Cybernetica / Tallinn University of Technology

  • Comparative study of migration to post-quantum cryptography in Estonia
  • Implementing post-quantum cryptography on ID-card
  • Implementing post-quantum variant of Smart-ID
  • Blind Smart-ID signatures

Topics are not limited by ones above. If a student has a topic in mind, Nikita's research interests are cryptography, e-voting, digital identity, cryptographic security proofs, post-quantum cryptography.

From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia

Matthew James Sorell <[email protected]>

Topics in digital forensic science may be available. Students should come with an idea that can be turned into a proposal.

From Eneken Tikk, Tallinn University of Technology

  • Technical and organizational implementation of the GDPR
  • Monetization of personal data
  • Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains)
  • Cyber insurance
  • Non-military strategies for national and international cybersecurity
  • Legal aspects of cybersecurity

From Risto Vaarandi, Tallinn University of Technology

Here are potential areas for selecting a thesis topic:

  • event log collection
  • event log analysis
  • event correlation
  • network monitoring
  • intrusion detection
  • data mining methods for security monitoring
  • machine learning methods for security monitoring
  • any area that is connected to security monitoring
  • other system security engineering topics (for example, system hardening or firewalling)

When applying for supervision, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.

From Jelizaveta Vakarjuk, Industry PhD Student, Cybernetica / Tallinn University of Technology

Jelizaveta's general research interest includes different privacy-preserving technologies and multiparty computation with its usage for the digital identity management systems. Additionally, post-quantum cryptography (with main focus on digital signatures) and migration to post-quantum cryptography. She does not have any specific topics to offer for the 2023/2024 academic year, but if something from her research interest sound appealing, please feel free to contact her ([email protected]).

From Adrian Venables, Tallinn University of Technology

  • Cyber security aspects of Information Warfare
  • Strategic Communications doctrine development
  • Information Operations doctrine development
  • Cognitive Warfare in the Digital Information Environment

Note: a background in International Relations, Political Science or Strategic Studies is required

From Gabor Visky, PhD Student, NATO CCDCOE / TalTech

Gabor Visky <[email protected]>

  • Network traffic analysis in the maritime cyber-lab

From Kaido Kikkas, Tallinn University of Technology, IT College. [email protected]

  • Cyber security risks in telepresence robotics and their mitigation (practical experimenting is possible at IT College; see [1]
  • Cyber security lessons from the COVID-19 pandemic (incl. surveys in Estonia)
  • Evolution of Cyberwar (Estonia 2007, Georgia 2007, Ukraine 2014/2022
  • Total defence in cyberspace (might try to suggest a strategy for Estonia)
  • Specific traits of cyber capabilities in totalitarian societies

Some more possible keywords to spark Thesis topic ideas: (e-)learning/training, FLOSS/Linux, smart devices, IoT, social engineering, usability/accessibility vs security/privacy

Also might study cyber counterparts to (legal) self-defence and citizen's arrest

From Ricardo Gregorio Lugo, Tallinn University of Technology, Estonian Maritime Academy

Any topic from Human Aspects and cyberpsychology are actual.

Topics can include:

  • Human performance in cybersecurity
  • Individual and Team Processes in Cybersecurity defense/exercises
  • Human computer interaction in cybersecurity
  • Human-AI trust and decision-making
  • Communication and Decision-making in recognized cyber threat situations
  • Human Perception and Information Visualizations in cybersecurity
  • Cognitive factors in risk perception and decision-making
  • Mental Health in Cybersecurity

From the TalTech IT office

  • Security implications in Migrating Taltech Campus LAN to IPv6; Toomas Lepik
  • Improving SOC and Information security processes; Toomas Lepik
  • Auditing Taltech EITS compliance based on public information; Toomas Lepik
  • Improving Log analysis pipelines; Toomas Lepik

From the TalTech Space Centre

NB: Please contact Adrian Venables, if interested in any of these topics.

  • Methods and tools for capturing, identifying, analyzing, and reverse engineering satellite protocols
  • Study of security features and use of cryptography in nanosatellite communication protocols
  • Reusable low-footprint cryptographic primitives for microcontrollers with limited resources
  • Testing framework for nanosatellite communication protocol implementation correctness and robustness
  • Adaptation of existing protocol or designing a new protocol for the next Taltech nanosatellite
  • Implementation of a fully reusable and secure protocol stack as part of the platform for future nanosatellites
  • Implementation of the new Taltech nanosatellite protocol for ground station
  • Security review of TTU100/TTU101 software to identify errors and risks that should be avoided in software for the next satellites
  • Suitability, performance, properties, and security of LoRa technologies when used for nanosatellites

From the University of Tartu

NB! Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager. If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://cs.ut.ee/en/content/thesis-deadlines-and-guidelines In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Paula Luks ([email protected]).

Cybersecurity-related research in the University of Tartu is conducted by the following persons:

- Arnis Paršovs, University of Tartu, <[email protected]>

- Danielle Morgan, University of Tartu, <[email protected]>

- Alo Peets, University of Tartu, <[email protected]>

- Dominique Unruh, University of Tartu, <[email protected]>

- Vitaly Skachek, University of Tartu, <[email protected]>

- Mubashar Iqbal, University of Tartu, <[email protected]>

- Abasi-Amefon Obot Affia, University of Tartu, <[email protected]>

- Mari Seeba, University of Tartu, <[email protected]>

- Sabah Suhail, University of Tartu,

- Raimundas Matulevicius, University of Tartu, <[email protected]>

Some topics are provided at < https://infosec.cs.ut.ee/Main/ThesisTopics >. For other topics, students can contact directly the supervisors and course lecturers.

A full list of thesis topics offered by the Applied Cyber Security Group (UT) is available in the thesis topics database . Students can also get access to various hardware that can be used for research experiments.

From Estonian Police

Useful links.

ITX8040 Thesis advice slides

Format requirements of a thesis and MS-Word Template (TalTech)

LATEX template for master thesis (TalTech) (accessible by UNI-ID)

Databases, books, research papers accessible from the TTU network

An Overview of Research Methods

Previously Defended Theses

Navigeerimismenüü

Department of Bioinformatics

University of tartu & estonian biocentre.

university of tartu thesis database

For scientists

PUBLICATIONS

Here are listed all our scientific publications since year 2000.

Brief overview of our main research topics.

Funding sources and project names.

PUBLIC AWARENESS ACIVITIES

Japan Studies

  • いらっしゃいませ!Welcome!
  • Primary, Secondary, & Tertiary Sources This link opens in a new window

Japan Studies Databases

Multidisciplinary databases, dissertations.

  • News & Newspapers
  • Explore Special Collections Materials This link opens in a new window
  • Citation Management
  • Inter-Library Loan

Databases are structured collections of data created to facilitate accessibility. Databases can help you find all kinds of resources including books, journal articles, dissertations, newspapers, government documents, photographs, sound recordings, etc. Below, you will find relevant databases for Japan Studies by category.

UK or on-campus users only

Art Index  is an art research database providing high-quality indexing for hundreds of national and international art periodicals, including 370 active indexed journals. In addition to indexed journals, Art Index includes information about more than 14,000 art dissertations and more than 229,000 image reproductions. (Please note our subscription allows 8 simultaneous users across any location. To help other researchers, please close the browser when you are finished using this database.)

As the official digital dissertations archive for the Library of Congress, ProQuest Dissertations and Theses includes millions of searchable citations to dissertations and theses from 1861 to the present day with over a million full-text dissertations. The database offers full text for most dissertations added since 1997 and retrospective full-text coverage for older graduate works.

Not restricted to UK or on-campus users

  • << Previous: Primary, Secondary, & Tertiary Sources
  • Next: News & Newspapers >>

Modern & Classical Languages Librarian

Profile Photo

  • Last Updated: May 22, 2024 1:52 PM
  • URL: https://libguides.uky.edu/japan

Home

Bibliographic database of Elsevier Science publishers, abstracting more than 24 000 scholarly journals. This multidisciplinary database excludes only journals on the humanities. According to the publisher, the database contains about 80% of international pre-reviewed scholarly journals.

Share this page

This website uses cookies to improve your user experience. This website uses  Facebook Pixel  and  Google Analytics . Read more in the  Data Protection Policy .

IMAGES

  1. Master thesis at the University of Tartu

    university of tartu thesis database

  2. The University of Tartu among the 250 best universities in the world

    university of tartu thesis database

  3. Main building of the University of Tartu

    university of tartu thesis database

  4. University of Tartu Thesis Template

    university of tartu thesis database

  5. Тартуский университет

    university of tartu thesis database

  6. The University of Tartu achieves a new record in the world rankings

    university of tartu thesis database

VIDEO

  1. TARTU UNIVERSITY BS/TARTU BUSSIKESKUS 2008

  2. Thesis Database: How to access full text thesis ?

  3. Tartu Ülikooli Akadeemiline Naiskoor at NSSS 2014 in Tartu, Estonia

  4. What do Estonians know about Azerbaijan?

  5. Tartu Smart Bike Share: unlocking 2 bikes with 1 account

  6. Business Process Management

COMMENTS

  1. Databases

    Sinica Sinoweb is one of the e-databases supported by the National Central Library (NCL) in Taiwan after the Taiwan Resource Centre of Chinese Studies (TRCCS) was set up in the University of Tartu in 2021. Sinica Sinoweb is the most in-depth, complete, and accurate research tool of Taiwan humanities.

  2. University of Tartu Library

    29. 30. 1. Online Exhibitions in University of Tartu Library. Early Western European Prints. 19th-century artists in Tartu. 2. Online Exhibitions in University of Tartu Library. Early Western European Prints.

  3. Thesis deadlines and guidelines

    Thesis submission deadline is 07.03.2024. 04. - 07.06 and 10. - 12.06.2024. Thesis submission deadline is 15.05.2024. All defenses take place on site. Students are requested to submit their thesis in our online Graduation Theses Registry. Requirements for graduation theses and their grading at the University of Tartu Institute of Computer ...

  4. DSpace Repository :: Home

    DSpace at University of Tartu. Search interfaces such as BASE and DART-Europe provide integrated access to millions records worldwide. The availability of this content to local and global audiences, is possible thanks to the OAI-PMH interface and Google Scholar optimizations. DSpace issues permanent urls and trustworthy identifiers, including ...

  5. Databases and e-journals

    The databases open for the University of Tartu can be accessed via the link Databases on the Library homepage. The link leads to an alphabetical list of databases. To find databases on your subject, choose one of the Faculties: Medicina, Realia et naturalia, Socialia or Humaniora and then click on Filter databases.. On the Databases page, by clicking on the icon after the database name a brief ...

  6. Institute of Computer Science

    UT Institute of Computer Science Graduation Theses Registry Completed theses ( Submit your thesis ) Graduation theses topics ( Submit a thesis topic ) Defence year: 2024 2023 2022 2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2005 ALL

  7. Doctoral studies

    Doctoral studies at the University of Tartu. The University of Tartu has 1,136 doctoral students, comprised of around 30% international students. University in brief. Research is the main component of doctoral studies, constituting at least 75% of the programme. The focus in all the activities of a doctoral programme is the doctoral thesis ...

  8. MSc thesis

    See more at the thesis database. 2015: Guler S., Secure Bitcoin Wallet; Kiiver J., NFC Security Solution for Web Applications; Kolk K., An Empirical Comparison of Approaches for Security Requirements Elicitation; ... University of Tartu Narva mnt 18, 51009 Tartu, Estonia Phone: +(372) 737 5445

  9. PDF Requirements for graduation theses and their grading ...

    the Institute of Computer Science of the University of Tartu Introduction These guidelines have been drawn up to assist the students of the Institute of Computer Sci-ence of the University of Tartu. The aim of the guidelines is to improve the quality of defend-ed theses and to give advice for writing theses and for the defence procedure in general.

  10. DataDOI repository

    DataDoi is the UT repository for long-term safe preservation of research data. Uploading research data is free of charge for the UT members. The research data repository enables the preservation, sharing, reusing and citing of research data, making the research conducted at the UT more visible in the world.

  11. PDF Guidelines for preparing and grading of graduation theses at the

    of the University of Tartu. The guidelines aim to improve the quality of defended theses and give general advice for writing and defending them. These guidelines also define the principles of grading theses. 1. The volume, goals and outputs of a thesis The University of Tartu, as an academic institution, offers its students the opportunity to be

  12. PDF UNIVERSITY OF TARTU

    UNIVERSITY OF TARTU Institute of Computer Science ... SCHEME DESIGN IN NON-RELATIONAL MODEL DATABASE TO MIGRATE DATA FROM RELATIONAL MODEL DATABASE Master Thesis (30 ECTS) Supervisor(s): Pelle Jakovits, PhD Tartu 2020. Scheme Design in Non-Relational Model Database to Migrate Data from Relational Model Database Abstract: The usual preference of ...

  13. Thesis

    If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University. ... (UT) is available in the thesis topics database. Students can also get access to various hardware that can be used for research experiments. From Estonian Police. TBD

  14. Publication Procedure for Graduation Theses

    Publication Procedure for Graduation Theses. Regular or external students must submit their graduation thesis for defence along with an electronic licence (permit) authorising the preservation and publication of the thesis on the Internet in the digital archives of the University of Tartu Library. This non-exclusive licence must be submitted as ...

  15. Requirements for graduation thesis and procedure for defence

    The graduation thesis is defended in the form of an open academic debate which includes: 20.1. the author's presentation of the main results of the thesis (up to 10 minutes for a bachelor's thesis, up to 15 minutes for a master's thesis); 20.2. academic discussion between the reviewer (s) and the author;

  16. For scientists

    Student theses (Eesti) Erialaste terminite eestindused; Tools and services. On-line services; Data and software for downloading; Database and build versions (Eesti) MAMBA kasutusjuhendid (Eesti) LINUX algajatele ... University of Tartu Tel: +372-7375001 / Riia 23, Tartu 51010 ...

  17. Master's theses

    2022. In 2022 the fourth intake of the Industrial Master's Programme graduated. Three master's theses were defended: Richard Nõmm : Optimizing Processes for Timber Company Using Data Science. Partner organizations: Barrus, Columbus. Supervisors: Anna Aljanaki, Kristen Pugi, Vaido Otsar.

  18. Home

    The University of Tartu is the oldest and largest higher education institution in Estonia and has been the centre of Estonian academic life for almost four centuries. It is ranked in the top 1.2% of the world's universities making it one of the leading universities in Northern Europe. Here, 13 000 students and 3000 staff members study and work ...

  19. PDF M.A. Thesis Guidelines Philosophy 20.9.21

    An M.A. thesis must conform to the following template: Title page (including name of the university, institute and department, author, title of the thesis, supervisor, number of characters in the main body of text, date and time - e.g. Tartu 2015); Table of Contents; Main text; Summary/abstract (maximum 200 words);

  20. University of Tartu Digital Archive on DSpace

    URL: https://dspace.ut.ee. DSpace at University of Tartu is a repository for all electronic materials incl e-theses and e-publications, digitized theses and books, manuscripts and images etc.

  21. Databases: Books, Articles, and More...

    Art Index is an art research database providing high-quality indexing for hundreds of national and international art periodicals, including 370 active indexed journals.In addition to indexed journals, Art Index includes information about more than 14,000 art dissertations and more than 229,000 image reproductions.

  22. DataDOI

    DataDOI is an institutional research data repository managed by University of Tartu Library. DataDOI gathers all fields of research data and stands for encouraging open science and FAIR (Findable, Accessible, Interoperable, Reusable) principles. DataDOI is made for long-term preservation of research data. Each dataset is given a DOI (Digital Object Identifier) through DataCite

  23. Scopus

    Bibliographic database of Elsevier Science publishers, abstracting more than 24 000 scholarly journals. This multidisciplinary database excludes only journals on the humanities. According to the publisher, the database contains about 80% of international pre-reviewed scholarly journals.