"Kokkonen, Tero" - Selaus tekijän mukaan Julkaisut
-
Model for cyber security information sharing in healthcare sector
Hautamäki, Jari; Kokkonen, Tero (Institute of Electrical and Electronics Engineers, 2020)In the modern society almost all services are based on data-networks and networked systems. Especially through the growing digitalization an increasing number of services is connected to data-networks. One example of a ... -
Modelling breach risk in a network of interconnected devices
Rasmus, Kai; Kokkonen, Tero
Proceedings of International Conference on Mobile and Secure Services (IEEE Institute of Electrical and Electronic Engineers, 2023) -
Modelling medical devices with honeypots
Ihanus, Jouni; Kokkonen, Tero (Springer, 2020)Cyber security is one of the key priorities in the modern digitalised and complex network totality. One of the major domains of interest is the healthcare sector where a cyber incident may cause unprecedented circumstances. ... -
Multi-National Cyber Security Exercise, Case Flagship 2
Kokkonen, Tero; Päijänen, Jani; Sipola, Tuomo
Proceedings of the 14th International Conference on Education Technology and Computers (ACM, 2023)Cyber security is not merely about securing devices and focusing on software and hardware. Staff members with skills and know-how are among the most valuable assets in the context of cyber security. Globally, there is a ... -
Network anomaly detection based on WaveNet
Kokkonen, Tero; Puuska, Samir; Alatalo, Janne; Heilimo, Eppu; Mäkelä, Antti (Springer, 2019)Increasing amount of attacks and intrusions against networked systems and data networks requires sensor capability. Data in modern networks, including the Internet, is often encrypted, making classical traffic analysis ... -
On Application Layer DDoS Attack Detection in High-Speed Encrypted Networks
Zolotukhin, Mikhail; Kokkonen, Tero; Hämäläinen, Timo; Siltanen, Jarmo (Advanced Institute of Convergence IT, 2016)Application-layer denial-of-service attacks have become a serious threat to modern high-speed computer networks and systems. Unlike network-layer attacks, application-layer attacks can be performed by using legitimate ... -
One-Pixel Attack Deceives Computer-Assisted Diagnosis of Cancer
Korpihalkola, Joni; Sipola, Tuomo; Puuska, Samir; Kokkonen, Tero (Association for computing machinery, 2021)Computer vision and machine learning can be used to automate various tasks in cancer diagnostic and detection. If an attacker can manipulate the automated processing, the results can be devastating and in the worst case ... -
One-pixel attacks against medical imaging: a conceptual framework
Sipola, Tuomo; Kokkonen, Tero
Advances in intelligent systems and computing (Springer, 2021)This paper explores the applicability of one-pixel attacks against medical imaging. Successful attacks are threats that could cause mistrust towards artificial intelligence solutions and the healthcare system in general. ... -
Participants Prefer Technical Hands-on Cyber Exercises Instead of Organisational and Societal Ones
Päijänen, Jani; Salonen, Jarno; Karinsalo, Anni; Sipola, Tuomo; Kokkonen, Tero
Proceedings of the European conference on cyber warfare and security : 1 (Academic Publishing, 2023)The current shortage of cybersecurity professionals is about 2 million people worldwide, and in Europe the industry is seeking for about 350 000 skilled professionals. There is also an enormous need for dedicated cybersecurity ... -
Pedagogical aspects of cyber security exercises
Karjalainen, Mika; Kokkonen, Tero; Puuska, Samir (Institute of Electrical and Electronics Engineers IEEE, 2019)Cyber security exercises (CSE) are complex learning experiences aimed at developing expert knowledge and competence through simulation. In this paper we examine pedagogical issues relating to CES, from exercise design to ... -
Refining Cyber Situation Awareness with Honeypots in Case of a Ransomware Attack
Ihanus, Jouni; Kokkonen, Tero; Hämäläinen, Timo
Lecture notes in networks and systems (Springer, 2024)The cyber threat landscape is vast and unstable. One of the top threats in the present moment is ransomware, which is constantly spreading in prevalence. To protect organisations’ cyber operating environment, ability to ... -
Requirements for training and evaluation dataset of network and host intrusion detection system
Nevavuori, Petteri; Kokkonen, Tero (Springer, 2019)In the cyber domain, situational awareness of the critical assets is extremely important. For achieving comprehensive situational awareness, accurate sensor information is required. An important branch of sensors are ... -
Review of pedagogical principles of cyber security exercises
Karjalainen, Mika; Kokkonen, Tero
Advances in science, technology and engineering systems journal : 5 (2020)Modern digitalized cyber domains are extremely complex ensemble. Cyber attacks or incidents against system may affect capricious effects for another system or even for physical devices. For understanding and training to ... -
Statistical evaluation of artificial intelligence -based intrusion detection system
Puuska, Samir; Kokkonen, Tero; Mutka, Petri; Alatalo, Janne; Heilimo, Eppu; Mäkelä, Antti
Advances in intelligent systems and computing (Springer, 2020)Training neural networks with captured real-world network data may fail to ascertain whether or not the network architecture is capable of learning the types of correlations expected to be present in real data. In this ...











