Theseus - Selaus tekijän mukaan "Dzemyda, Gintautas"
-
Artificial Intelligence Cyberattacks in Red Teaming: A Scoping Review
Al-Azzawi, Mays; Doan, Dung; Sipola, Tuomo; Hautamäki, Jari; Kokkonen, Tero
Lecture notes in networks and systems (Springer Nature, 2024)Advances in artificial intelligence are creating possibilities to use these methods in red team activities, such as cyberattacks. These AI attacks can automate the process of penetrating a target or collecting sensitive ... -
Cyber Security Information Sharing During a Large Scale Real Life Cyber Security Exercise
Hautamäki, Jari; Kokkonen, Tero; Sipola, Tuomo
Lecture notes in networks and systems (Springer Nature, 2024)In the event of a cyber attack, the efficient production and utilisation of situational information is achieved by sharing information with other actors. In our research, we have discovered how information related to cyber ... -
Detecting One-Pixel Attacks Using Variational Autoencoders
Alatalo, Janne; Sipola, Tuomo; Kokkonen, Tero
Lecture notes in networks and systems (Springer, 2022) -
Distribution of Invalid Users on an SSH Server
Rasmus, Kai; Kokkonen, Tero; Hämäläinen, Timo
Lecture notes in networks and systems (Springer Nature, 2024)The Secure Shell (SSH) server on a Unix-like system is a viable way for users to login and execute programs on the system remotely. Remote access is something that hackers also want to achieve, making SSH servers a target ... -
Food supply chain cyber threats: a scoping review
Alatalo, Janne; Sipola, Tuomo; Kokkonen, Tero
Lecture notes in networks and systems (Springer Nature, 2024)Cyber attacks against the food supply chain could have serious effects on our society. As more networked systems control all aspects of the food supply chain, understanding these threats has become more critical. This ... -
Refining Cyber Situation Awareness with Honeypots in Case of a Ransomware Attack
Ihanus, Jouni; Kokkonen, Tero; Hämäläinen, Timo
Lecture notes in networks and systems (Springer, 2024)The cyber threat landscape is vast and unstable. One of the top threats in the present moment is ransomware, which is constantly spreading in prevalence. To protect organisations’ cyber operating environment, ability to ...
