Haku
Viitteet 1-8 / 8
A model of cyber threat information sharing with the novel network topology
(Association for computing machinery, 2021)
The digitized environments are particularly vulnerable to various attacks. In such a situation of a security attack, detecting and responding to attacks require effective actions. One of the most significant ways to improve ...
A systematic literature review of cybersecurity scales assessing information security awareness
(Elsevier, 2023)
Information Security Awareness (ISA) is a significant concept that got considerable attention recently and can assist in minimizing the risks associated with information security breaches. Several measurement scales have ...
Cyber Security Information Sharing During a Large Scale Real Life Cyber Security Exercise
(Springer Nature, 2024)
In the event of a cyber attack, the efficient production and utilisation of situational information is achieved by sharing information with other actors. In our research, we have discovered how information related to cyber ...
Model for cyber security information sharing in healthcare sector
(Institute of Electrical and Electronics Engineers, 2020)
In the modern society almost all services are based on data-networks and networked systems. Especially through the growing digitalization an increasing number of services is connected to data-networks. One example of a ...
Social engineering intrusion: a case study
(2020)
Social engineering is a very old method to influence people in their daily actions. The same methods added with new techniques have been implemented to create effective penetration mechanisms against organizations. The ...
Cyber security exercise – literature review to pedagogical methodology
(International Association of Technology Education and Development, 2019)
Predictive pumping based on sensor data and weather forecast
(Institute of Electrical and Electronics Engineers, 2019)
In energy production, peat extraction has a significant role in Finland. However, protection of nature has become more and more important globally. How do we solve this conflict of interests respecting both views? In peat ...
Artificial Intelligence Cyberattacks in Red Teaming: A Scoping Review
(Springer Nature, 2024)
Advances in artificial intelligence are creating possibilities to use these methods in red team activities, such as cyberattacks. These AI attacks can automate the process of penetrating a target or collecting
sensitive ...





