Haku
Viitteet 1-10 / 83
A model of cyber threat information sharing with the novel network topology
(Association for computing machinery, 2021)
The digitized environments are particularly vulnerable to various attacks. In such a situation of a security attack, detecting and responding to attacks require effective actions. One of the most significant ways to improve ...
Predicting the electricity consumption of Finland
(Suomen automaatioseura, 2023)
Network anomaly detection based on WaveNet
(Springer, 2019)
Increasing amount of attacks and intrusions against networked systems and data networks requires sensor capability. Data in modern networks, including the Internet, is often encrypted, making classical traffic analysis ...
Compression methods for microclimate data based on linear approximation of sensor data
(Springer, 2019)
Edge computing is currently one of the main research topics in the field of Internet of Things. Edge computing requires lightweight and computationally simple algorithms for sensor data analytics. Sensing edge devices are ...
Understanding high-tech startup failures and their prevention
(European Institute for Advanced Studies in Management, 2021)
Intellectual property in the era of increased clock speed: return of knowhow?
(Academic Conferences and Publishing International, 2019)
Context-Aware Entrepreneurship Education: Exploring the Educators Perspective
(Academic conferences international, 2022)
The question that motivates the present study is whether entrepreneurship educators confront the context where entrepreneurship education is implemented. Recent studies indicate that homogenisation of entrepreneurial methods ...
Visibility estimation based on camera data and algorithm of snow recognition on traffic signs
(Liikenne- ja viestintävirasto Traficom, 2020)