"kyberturvallisuus" - Selaus asiasanan mukaan Julkaisut
Viitteet 1-17 / 17
-
A design model for a degree programme in cyber security
Proceedings of the 2019 11th International Conference on Education Technology and Computers. ICETC 2019 (Association for Computing Machinery, 2019)The need for skillful cyber security workforce has increased dramatically during the last ten years. The contents of the degree programmmes have not been able to respond to this need adequately and the curriculum contents ... -
Assessing cyber security education through NICE cybersecurity workforce framework
ICETC: International Conference on Education Technology and Computers (2020)This paper presents the results of research and assessment of cyber security education in higher education in Europe and the United States of America. The quantitative research data of the education curricula was gathered ... -
Color-optimized one-pixel attack against digital pathology images
(Fruct oy, 2021)Modern artificial intelligence based medical imaging tools are vulnerable to model fooling attacks. Automated medical imaging methods are used for supporting the decision making by classifying samples as regular or as ... -
Comprehensive cyber arena; the next generation cyber range
(IEEE, 2020)The cyber domain and all the interdependencies between networked systems form an extremely complex ensemble. Incidents in the cyber domain may have an abundance effect on the physical domain. For example, a cyber attack ... -
Cyber range: preparing for crisis or something just for technical people?
(Academic conferences international, 2021)Digitalization has increased the significance of cybersecurity within the current highly interconnected society. The number and complexity of different cyber-attacks as well as other malicious activities has increased ... -
Cyber security exercise – literature review to pedagogical methodology
INTED proceedings : 13 (International Association of Technology Education and Development, 2019) -
Kyberturvallisuus alkutuotannossa - käsikirja kyberpoikkeamien hallintaan
(Jyväskylän ammattikorkeakoulu, 2023) -
Kyberturvallisuus elintarviketeollisuudessa - käsikirja kyberpoikkeamien hallintaan
(Jyväskylän ammattikorkeakoulu, 2023) -
Kyberturvallisuus kaupan ja jakelun alalla - käsikirja kyberpoikkeamien hallintaan
(Jyväskylän ammattikorkeakoulu, 2023) -
Measuring Learning in a Cyber Security Exercise
Proceedings of the 2020 12th International Conference on Education Technology and Computers. ICETC 2020 (Association for Computing Machinery, 2020)In recent years, cyber security exercises have established themselves as an integral part of cyber security education. Cyber security professionals usually work as a part of a team that monitors and responds to incidents ... -
Model for cyber security information sharing in healthcare sector
(Institute of Electrical and Electronics Engineers, 2020)In the modern society almost all services are based on data-networks and networked systems. Especially through the growing digitalization an increasing number of services is connected to data-networks. One example of a ... -
Modelling medical devices with honeypots
(Springer, 2020)Cyber security is one of the key priorities in the modern digitalised and complex network totality. One of the major domains of interest is the healthcare sector where a cyber incident may cause unprecedented circumstances. ... -
One-Pixel Attack Deceives Computer-Assisted Diagnosis of Cancer
(Association for computing machinery, 2021)Computer vision and machine learning can be used to automate various tasks in cancer diagnostic and detection. If an attacker can manipulate the automated processing, the results can be devastating and in the worst case ... -
Pedagogical aspects of cyber security exercises
(Institute of Electrical and Electronics Engineers IEEE, 2019)Cyber security exercises (CSE) are complex learning experiences aimed at developing expert knowledge and competence through simulation. In this paper we examine pedagogical issues relating to CES, from exercise design to ... -
Requirements for training and evaluation dataset of network and host intrusion detection system
(Springer, 2019)In the cyber domain, situational awareness of the critical assets is extremely important. For achieving comprehensive situational awareness, accurate sensor information is required. An important branch of sensors are ... -
Review of pedagogical principles of cyber security exercises
Advances in science, technology and engineering systems journal : 5 (2020)Modern digitalized cyber domains are extremely complex ensemble. Cyber attacks or incidents against system may affect capricious effects for another system or even for physical devices. For understanding and training to ... -
Vastuullisuus näkyväksi : Eväitä matkailun vastuullisuusviestintään
Jyväskylän ammattikorkeakoulun julkaisuja (Jyväskylän ammattikorkeakoulu, 2021)Jyväskylän ammattikorkeakoulu ja Visit Jyväskylä Region toimivat vastuullisuusviestinnän yhteiskehittämisen edelläkävijöinä Matkailun vastuullisuus näkyväksi Keski-Suomessa-hankkeessa. Tämä julkaisu koottiin vastuullisuu ...
















