Haku
Viitteet 1-10 / 82
A model of cyber threat information sharing with the novel network topology
(Association for computing machinery, 2021)
The digitized environments are particularly vulnerable to various attacks. In such a situation of a security attack, detecting and responding to attacks require effective actions. One of the most significant ways to improve ...
Requirements for energy efficient edge computing: a survey
(Springer, 2018)
Internet of Things is evolving heavily in these times. One of the major obstacle is energy consumption in the IoT devices (sensor nodes and wireless gateways). The IoT devices are often battery powered wireless devices and ...
Network anomaly detection based on WaveNet
(Springer, 2019)
Increasing amount of attacks and intrusions against networked systems and data networks requires sensor capability. Data in modern networks, including the Internet, is often encrypted, making classical traffic analysis ...
Compression methods for microclimate data based on linear approximation of sensor data
(Springer, 2019)
Edge computing is currently one of the main research topics in the field of Internet of Things. Edge computing requires lightweight and computationally simple algorithms for sensor data analytics. Sensing edge devices are ...
Model for cyber security information sharing in healthcare sector
(Institute of Electrical and Electronics Engineers, 2020)
In the modern society almost all services are based on data-networks and networked systems. Especially through the growing digitalization an increasing number of services is connected to data-networks. One example of a ...
The impact of capital structure on firm performance and risk in Finland
(Springer, 2020)
The decision pertaining to the capital structure is one of the most strategic, perpetual, and at the same time challenging corporate decisions. Having an optimum capital structure is an important aspect of the financing ...
Measuring Learning in a Cyber Security Exercise
(Association for Computing Machinery, 2020)
In recent years, cyber security exercises have established themselves as an integral part of cyber security education. Cyber security professionals usually work as a part of a team that monitors and responds to incidents ...
Understanding high-tech startup failures and their prevention
(European Institute for Advanced Studies in Management, 2021)
Comprehensive cyber arena; the next generation cyber range
(IEEE, 2020)
The cyber domain and all the interdependencies between networked systems form an extremely complex ensemble. Incidents in the cyber domain may have an abundance effect on the physical domain. For example, a cyber attack ...