Viitteet 1-10 / 31
Maidonkeräilykuljetusten suunnittelu : Arla Ingman Oy ab
(Jyväskylän ammattikorkeakoulu, 2012)
Kuljetuskustannukset ovat merkittävä osa teollisuuden kustannusrakennetta. Kehittämällä kuljetusjärjestelmää voidaan saavuttaa merkittäviä parannuksia yrityksen kannattavuuteen. Säästöpaineita kuljetuskustannuksille on ...
Network anomaly detection based on WaveNet
Increasing amount of attacks and intrusions against networked systems and data networks requires sensor capability. Data in modern networks, including the Internet, is often encrypted, making classical traffic analysis ...
Model for cyber security information sharing in healthcare sector
(Institute of Electrical and Electronics Engineers, 2020)
In the modern society almost all services are based on data-networks and networked systems. Especially through the growing digitalization an increasing number of services is connected to data-networks. One example of a ...
Measuring Learning in a Cyber Security Exercise
(Association for Computing Machinery, 2020)
In recent years, cyber security exercises have established themselves as an integral part of cyber security education. Cyber security professionals usually work as a part of a team that monitors and responds to incidents ...
Review of pedagogical principles of cyber security exercises
Modern digitalized cyber domains are extremely complex ensemble. Cyber attacks or incidents against system may affect capricious effects for another system or even for physical devices. For understanding and training to ...
Food supply chain cyber threats: a scoping review
(Springer Nature, 2024)
Comprehensive cyber arena; the next generation cyber range
The cyber domain and all the interdependencies between networked systems form an extremely complex ensemble. Incidents in the cyber domain may have an abundance effect on the physical domain. For example, a cyber attack ...
Model fooling attacks against medical imaging: a short survey
This study aims to find a list of methods to fool artificial neural networks used in medical imaging. We collected a short list of publications related to machine learning model fooling to see if these methods have been ...
Anomaly-Based Network Intrusion Detection Using Wavelets and Adversarial Autoencoders
The number of intrusions and attacks against data networks and networked systems increases constantly, while encryption has made it more difficult to inspect network traffic and classify it as malicious. In this paper, an ...