"Kokkonen, Tero" - Selaus tekijän mukaan Julkaisut

    • A design model for a degree programme in cyber security 

      Saharinen, Karo; Karjalainen, Mika; Kokkonen, Tero
      Proceedings of the 2019 11th International Conference on Education Technology and Computers. ICETC 2019 (Association for Computing Machinery, 2019)
      The need for skillful cyber security workforce has increased dramatically during the last ten years. The contents of the degree programmmes have not been able to respond to this need adequately and the curriculum contents ...
    • Analysis of approaches to Internet traffic generation for cyber security research and excercise 

      Kokkonen, Tero; Hämäläinen, Timo; Silokunnas, Marko; Siltanen, Jarmo; Zolotukhin, Mikhail; Neijonen, Mikko
      Lecture Notes in Computer Science (Springer, 2015)
      Because of the severe global security threat of malwares, vulnerabilities and attacks against networked systems cyber-security research, training and exercises are required for achieving cyber resilience of organizations. ...
    • Anomaly-Based Network Intrusion Detection Using Wavelets and Adversarial Autoencoders 

      Puuska, Samir; Kokkonen, Tero; Alatalo, Janne; Heilimo, Eppu
      Lecture Notes in Computer Science book series (Springer, 2019)
      The number of intrusions and attacks against data networks and networked systems increases constantly, while encryption has made it more difficult to inspect network traffic and classify it as malicious. In this paper, an ...
    • Architecture for the Cyber Security Situational Awareness System 

      Kokkonen, Tero (Springer, 2016)
      Abstract. Networked software systems have a remarkable and critical role in the modern society. There are critical software systems in every business area. At the same time, the amount of cyber-attacks against those critical ...
    • Artificial Intelligence Cyberattacks in Red Teaming: A Scoping Review 

      Al-Azzawi, Mays; Doan, Dung; Sipola, Tuomo; Hautamäki, Jari; Kokkonen, Tero
      Lecture notes in networks and systems (Springer Nature, 2024)
      Advances in artificial intelligence are creating possibilities to use these methods in red team activities, such as cyberattacks. These AI attacks can automate the process of penetrating a target or collecting sensitive ...
    • Artificial Intelligence in the IoT Era: A Review of Edge AI Hardware and Software 

      Sipola, Tuomo; Alatalo, Janne; Kokkonen, Tero; Rantonen, Mika
      Proceedings of the 31st Conference of Open Innovations Association FRUCT : 1 (FRUCT, 2022)
      The modern trend of moving artificial intelligence computation near to the origin of data sources has increased the demand for new hardware and software suitable for such environments. We carried out a scoping study to ...
    • Blue team communication and reporting for enhancing situational awareness from white team perspective in cyber security exercises 

      Kokkonen, Tero; Puuska, Samir (Springer, 2018)
      Cyber security exercises allow individuals and organisations to train and test their skills in complex cyber attack situations. In order to effectively organise and conduct such exercise, the exercise control team must ...
    • Chromatic and Spatial Analysis of One-Pixel Attacks Against an Image Classifier 

      Alatalo, Janne; Korpihalkola, Joni; Sipola, Tuomo; Kokkonen, Tero
      Networked Systems (Springer International Publishing, 2022)
    • Color-optimized one-pixel attack against digital pathology images 

      Korpihalkola, Joni; Sipola, Tuomo; Kokkonen, Tero (Fruct oy, 2021)
      Modern artificial intelligence based medical imaging tools are vulnerable to model fooling attacks. Automated medical imaging methods are used for supporting the decision making by classifying samples as regular or as ...
    • Comprehensive cyber arena; the next generation cyber range 

      Karjalainen, Mika; Kokkonen, Tero (IEEE, 2020)
      The cyber domain and all the interdependencies between networked systems form an extremely complex ensemble. Incidents in the cyber domain may have an abundance effect on the physical domain. For example, a cyber attack ...
    • Cyber Range Technical Federation: Case Flagship 1 Exercise 

      Kokkonen, Tero; Sipola, Tuomo; Päijänen, Jani; Piispanen, Juha
      Advanced Sciences and Technologies for Security Applications (Springer, 2023)
      Modern cyber domain is an extremely complex field to master. There are numerous capricious dependencies between networked systems and data. In cyber security, technology has a major role, but the knowledge and skills of ...
    • Cyber range: preparing for crisis or something just for technical people? 

      Päijänen, Jani; Saharinen, Karo; Salonen, Jarno; Sipola, Tuomo; Vykopal, Jan; Kokkonen, Tero (Academic conferences international, 2021)
      Digitalization has increased the significance of cybersecurity within the current highly interconnected society. The number and complexity of different cyber-attacks as well as other malicious activities has increased ...
    • Cyber Security Information Sharing During a Large Scale Real Life Cyber Security Exercise 

      Hautamäki, Jari; Kokkonen, Tero; Sipola, Tuomo
      Lecture notes in networks and systems (Springer Nature, 2024)
      In the event of a cyber attack, the efficient production and utilisation of situational information is achieved by sharing information with other actors. In our research, we have discovered how information related to cyber ...
    • Detecting One-Pixel Attacks Using Variational Autoencoders 

      Alatalo, Janne; Sipola, Tuomo; Kokkonen, Tero
      Lecture notes in networks and systems (Springer, 2022)
    • Distribution of Invalid Users on an SSH Server 

      Rasmus, Kai; Kokkonen, Tero; Hämäläinen, Timo
      Lecture notes in networks and systems (Springer Nature, 2024)
      The Secure Shell (SSH) server on a Unix-like system is a viable way for users to login and execute programs on the system remotely. Remote access is something that hackers also want to achieve, making SSH servers a target ...
    • Food supply chain cyber threats: a scoping review 

      Alatalo, Janne; Sipola, Tuomo; Kokkonen, Tero
      Lecture notes in networks and systems (Springer Nature, 2024)
      Cyber attacks against the food supply chain could have serious effects on our society. As more networked systems control all aspects of the food supply chain, understanding these threats has become more critical. This ...
    • Key elements of on-line cyber security exercise and survey of learning during the on-line cyber security exercise. 

      Karjalainen, Mika; Kokkonen, Tero; Taari, Niko
      Computational Methods in Applied Sciences (Springer, 2022)
    • Measuring Learning in a Cyber Security Exercise 

      Karjalainen, Mika; Puuska, Samir; Kokkonen, Tero
      Proceedings of the 2020 12th International Conference on Education Technology and Computers. ICETC 2020 (Association for Computing Machinery, 2020)
      In recent years, cyber security exercises have established themselves as an integral part of cyber security education. Cyber security professionals usually work as a part of a team that monitors and responds to incidents ...
    • Model fooling attacks against medical imaging: a short survey 

      Sipola, Tuomo; Puuska, Samir; Kokkonen, Tero (ProCon, 2020)
      This study aims to find a list of methods to fool artificial neural networks used in medical imaging. We collected a short list of publications related to machine learning model fooling to see if these methods have been ...
    • Model Fooling Threats Against Medical Imaging 

      Sipola, Tuomo; Kokkonen, Tero; Karjalainen, Mika (Springer, 2022)