Haku
Viitteet 81-90 / 110
Social engineering intrusion: a case study
(2020)
Social engineering is a very old method to influence people in their daily actions. The same methods added with new techniques have been implemented to create effective penetration mechanisms against organizations. The ...
Pedagogical aspects of cyber security exercises
(Institute of Electrical and Electronics Engineers IEEE, 2019)
Cyber security exercises (CSE) are complex learning experiences aimed at developing expert knowledge and competence through simulation. In this paper we examine pedagogical issues relating to CES, from exercise design to ...
Comprehensive cyber arena; the next generation cyber range
(IEEE, 2020)
The cyber domain and all the interdependencies between networked systems form an extremely complex ensemble. Incidents in the cyber domain may have an abundance effect on the physical domain. For example, a cyber attack ...
A design model for a degree programme in cyber security
(Association for Computing Machinery, 2019)
The need for skillful cyber security workforce has increased dramatically during the last ten years. The contents of the degree programmmes have not been able to respond to this need adequately and the curriculum contents ...
Measuring Learning in a Cyber Security Exercise
(Association for Computing Machinery, 2020)
In recent years, cyber security exercises have established themselves as an integral part of cyber security education. Cyber security professionals usually work as a part of a team that monitors and responds to incidents ...
Identifying electric power system fault types with Deep Neural Network
(IEEE, 2023)
Reliable electric power distribution is crucial in modern society. Modern society is vulnerable to power outages because so many functionalities are using electric power. All the modern communication systems require electric ...
Requirements for energy efficient edge computing: a survey
(Springer, 2018)
Internet of Things is evolving heavily in these times. One of the major obstacle is energy consumption in the IoT devices (sensor nodes and wireless gateways). The IoT devices are often battery powered wireless devices and ...
Linearity-based Sensor Data Online Compression Methods for Environmental Applications
(IEEE, 2023)
Environmental monitoring is a typical Internet of Things (IoT) application. Environmental monitoring plays a significant role, for example, in smart farming and smart city applications. Environmental magnitudes are usually ...
Robotic process automation as a change agent for business processes: experiences and expectations
(Academic conferences international, 2020)
Abstract: Robotic Process Automation (RPA) is a technology area that has quickly become part of business processes both in public administration as well as in corporations. The expectations for RPA lie in its potential to ...
Predictive pumping based on sensor data and weather forecast
(Institute of Electrical and Electronics Engineers, 2019)
In energy production, peat extraction has a significant role in Finland. However, protection of nature has become more and more important globally. How do we solve this conflict of interests respecting both views? In peat ...









