Haku
Viitteet 1-10 / 31
Maidonkeräilykuljetusten suunnittelu : Arla Ingman Oy ab
(Jyväskylän ammattikorkeakoulu, 2012)
Kuljetuskustannukset ovat merkittävä osa teollisuuden kustannusrakennetta. Kehittämällä kuljetusjärjestelmää voidaan saavuttaa merkittäviä parannuksia yrityksen kannattavuuteen. Säästöpaineita kuljetuskustannuksille on ...
Network anomaly detection based on WaveNet
(Springer, 2019)
Increasing amount of attacks and intrusions against networked systems and data networks requires sensor capability. Data in modern networks, including the Internet, is often encrypted, making classical traffic analysis ...
Model for cyber security information sharing in healthcare sector
(Institute of Electrical and Electronics Engineers, 2020)
In the modern society almost all services are based on data-networks and networked systems. Especially through the growing digitalization an increasing number of services is connected to data-networks. One example of a ...
Measuring Learning in a Cyber Security Exercise
(Association for Computing Machinery, 2020)
In recent years, cyber security exercises have established themselves as an integral part of cyber security education. Cyber security professionals usually work as a part of a team that monitors and responds to incidents ...
Review of pedagogical principles of cyber security exercises
(2020)
Modern digitalized cyber domains are extremely complex ensemble. Cyber attacks or incidents against system may affect capricious effects for another system or even for physical devices. For understanding and training to ...
Comprehensive cyber arena; the next generation cyber range
(IEEE, 2020)
The cyber domain and all the interdependencies between networked systems form an extremely complex ensemble. Incidents in the cyber domain may have an abundance effect on the physical domain. For example, a cyber attack ...
Cyber Range Technical Federation: Case Flagship 1 Exercise
(Springer, 2023)
Modern cyber domain is an extremely complex field to master. There are numerous capricious dependencies between networked systems and data. In cyber security, technology has a major role, but the knowledge and skills of ...
Detecting One-Pixel Attacks Using Variational Autoencoders
(Springer, 2022)
Model Fooling Threats Against Medical Imaging
(Springer, 2022)