Haku
Viitteet 41-50 / 110
Implications for training the trainers in work-based learning – the Baltic context
(Latvia University, 2018)
Work-Based Learning (WBL) is increasingly becoming part of the Vocational Education and Training (VET) systems across Europe. A crucial element for successful implementation of WBL approaches is the existence of competent ...
Sensor data stream on-line compression with linearity-based methods
(IEEE Computer Society, 2020)
The escalation of the Internet of Things applications has put on display the different sensor data processing methods. The sensor data compression is one of the fundamental methods to reduce the amount of data needed to ...
Modelling medical devices with honeypots
(Springer, 2020)
Cyber security is one of the key priorities in the modern digitalised and complex network totality. One of the major domains of interest is the healthcare sector where a cyber incident may cause unprecedented circumstances. ...
Developing insightful and technology enhanced internship in digital marketing context
(Iated Academy, 2023)
Requirements for training and evaluation dataset of network and host intrusion detection system
(Springer, 2019)
In the cyber domain, situational awareness of the critical assets is extremely important. For achieving comprehensive situational awareness, accurate sensor information is required. An important branch of sensors are ...
Smart collaboration for skills and competitiveness in engineering education
(European Society for Engineering Education, 2019)
Linear approximation based compression algorithms efficiency to compress environmental data sets
(Springer, 2020)
Measuring some environmental magnitudes is a very typical application in the field of Internet of Things. Wireless sensor nodes measuring these environmental magnitudes are often battery powered devices. Thus, the energy ...
Blue team communication and reporting for enhancing situational awareness from white team perspective in cyber security exercises
(Springer, 2018)
Cyber security exercises allow individuals and organisations to train and test their skills in complex cyber attack situations. In order to effectively organise and conduct such exercise, the exercise control team must ...
Modelling breach risk in a network of interconnected devices
(IEEE Institute of Electrical and Electronic Engineers, 2023)








