"Kokkonen, Tero" - Selaus tekijän mukaan Julkaisut
-
A design model for a degree programme in cyber security
Saharinen, Karo; Karjalainen, Mika; Kokkonen, Tero
Proceedings of the 2019 11th International Conference on Education Technology and Computers. ICETC 2019 (Association for Computing Machinery, 2019)The need for skillful cyber security workforce has increased dramatically during the last ten years. The contents of the degree programmmes have not been able to respond to this need adequately and the curriculum contents ... -
Analysis of approaches to Internet traffic generation for cyber security research and excercise
Kokkonen, Tero; Hämäläinen, Timo; Silokunnas, Marko; Siltanen, Jarmo; Zolotukhin, Mikhail; Neijonen, Mikko
Lecture Notes in Computer Science (Springer, 2015)Because of the severe global security threat of malwares, vulnerabilities and attacks against networked systems cyber-security research, training and exercises are required for achieving cyber resilience of organizations. ... -
Anomaly-Based Network Intrusion Detection Using Wavelets and Adversarial Autoencoders
Puuska, Samir; Kokkonen, Tero; Alatalo, Janne; Heilimo, Eppu
Lecture Notes in Computer Science book series (Springer, 2019)The number of intrusions and attacks against data networks and networked systems increases constantly, while encryption has made it more difficult to inspect network traffic and classify it as malicious. In this paper, an ... -
Architecture for the Cyber Security Situational Awareness System
Kokkonen, Tero (Springer, 2016)Abstract. Networked software systems have a remarkable and critical role in the modern society. There are critical software systems in every business area. At the same time, the amount of cyber-attacks against those critical ... -
Artificial Intelligence Cyberattacks in Red Teaming: A Scoping Review
Al-Azzawi, Mays; Doan, Dung; Sipola, Tuomo; Hautamäki, Jari; Kokkonen, Tero
Lecture notes in networks and systems (Springer Nature, 2024)Advances in artificial intelligence are creating possibilities to use these methods in red team activities, such as cyberattacks. These AI attacks can automate the process of penetrating a target or collecting sensitive ... -
Artificial Intelligence in the IoT Era: A Review of Edge AI Hardware and Software
Sipola, Tuomo; Alatalo, Janne; Kokkonen, Tero; Rantonen, Mika
Proceedings of the 31st Conference of Open Innovations Association FRUCT : 1 (FRUCT, 2022)The modern trend of moving artificial intelligence computation near to the origin of data sources has increased the demand for new hardware and software suitable for such environments. We carried out a scoping study to ... -
Blue team communication and reporting for enhancing situational awareness from white team perspective in cyber security exercises
Kokkonen, Tero; Puuska, Samir (Springer, 2018)Cyber security exercises allow individuals and organisations to train and test their skills in complex cyber attack situations. In order to effectively organise and conduct such exercise, the exercise control team must ... -
Chromatic and Spatial Analysis of One-Pixel Attacks Against an Image Classifier
Alatalo, Janne; Korpihalkola, Joni; Sipola, Tuomo; Kokkonen, Tero
Networked Systems (Springer International Publishing, 2022) -
Color-optimized one-pixel attack against digital pathology images
Korpihalkola, Joni; Sipola, Tuomo; Kokkonen, Tero (Fruct oy, 2021)Modern artificial intelligence based medical imaging tools are vulnerable to model fooling attacks. Automated medical imaging methods are used for supporting the decision making by classifying samples as regular or as ... -
Comprehensive cyber arena; the next generation cyber range
Karjalainen, Mika; Kokkonen, Tero (IEEE, 2020)The cyber domain and all the interdependencies between networked systems form an extremely complex ensemble. Incidents in the cyber domain may have an abundance effect on the physical domain. For example, a cyber attack ... -
Cyber Range Technical Federation: Case Flagship 1 Exercise
Kokkonen, Tero; Sipola, Tuomo; Päijänen, Jani; Piispanen, Juha
Advanced Sciences and Technologies for Security Applications (Springer, 2023)Modern cyber domain is an extremely complex field to master. There are numerous capricious dependencies between networked systems and data. In cyber security, technology has a major role, but the knowledge and skills of ... -
Cyber range: preparing for crisis or something just for technical people?
Päijänen, Jani; Saharinen, Karo; Salonen, Jarno; Sipola, Tuomo; Vykopal, Jan; Kokkonen, Tero (Academic conferences international, 2021)Digitalization has increased the significance of cybersecurity within the current highly interconnected society. The number and complexity of different cyber-attacks as well as other malicious activities has increased ... -
Cyber Security Information Sharing During a Large Scale Real Life Cyber Security Exercise
Hautamäki, Jari; Kokkonen, Tero; Sipola, Tuomo
Lecture notes in networks and systems (Springer Nature, 2024)In the event of a cyber attack, the efficient production and utilisation of situational information is achieved by sharing information with other actors. In our research, we have discovered how information related to cyber ... -
Detecting One-Pixel Attacks Using Variational Autoencoders
Alatalo, Janne; Sipola, Tuomo; Kokkonen, Tero
Lecture notes in networks and systems (Springer, 2022) -
Distribution of Invalid Users on an SSH Server
Rasmus, Kai; Kokkonen, Tero; Hämäläinen, Timo
Lecture notes in networks and systems (Springer Nature, 2024)The Secure Shell (SSH) server on a Unix-like system is a viable way for users to login and execute programs on the system remotely. Remote access is something that hackers also want to achieve, making SSH servers a target ... -
Food supply chain cyber threats: a scoping review
Alatalo, Janne; Sipola, Tuomo; Kokkonen, Tero
Lecture notes in networks and systems (Springer Nature, 2024)Cyber attacks against the food supply chain could have serious effects on our society. As more networked systems control all aspects of the food supply chain, understanding these threats has become more critical. This ... -
Key elements of on-line cyber security exercise and survey of learning during the on-line cyber security exercise.
Karjalainen, Mika; Kokkonen, Tero; Taari, Niko
Computational Methods in Applied Sciences (Springer, 2022) -
Measuring Learning in a Cyber Security Exercise
Karjalainen, Mika; Puuska, Samir; Kokkonen, Tero
Proceedings of the 2020 12th International Conference on Education Technology and Computers. ICETC 2020 (Association for Computing Machinery, 2020)In recent years, cyber security exercises have established themselves as an integral part of cyber security education. Cyber security professionals usually work as a part of a team that monitors and responds to incidents ... -
Model fooling attacks against medical imaging: a short survey
Sipola, Tuomo; Puuska, Samir; Kokkonen, Tero (ProCon, 2020)This study aims to find a list of methods to fool artificial neural networks used in medical imaging. We collected a short list of publications related to machine learning model fooling to see if these methods have been ... -
Model Fooling Threats Against Medical Imaging
Sipola, Tuomo; Kokkonen, Tero; Karjalainen, Mika (Springer, 2022)














