Haku
Viitteet 1-5 / 5
A model of cyber threat information sharing with the novel network topology
(Association for computing machinery, 2021)
The digitized environments are particularly vulnerable to various attacks. In such a situation of a security attack, detecting and responding to attacks require effective actions. One of the most significant ways to improve ...
Model for cyber security information sharing in healthcare sector
(Institute of Electrical and Electronics Engineers, 2020)
In the modern society almost all services are based on data-networks and networked systems. Especially through the growing digitalization an increasing number of services is connected to data-networks. One example of a ...
Social engineering intrusion: a case study
(2020)
Social engineering is a very old method to influence people in their daily actions. The same methods added with new techniques have been implemented to create effective penetration mechanisms against organizations. The ...
Cyber security exercise – literature review to pedagogical methodology
(International Association of Technology Education and Development, 2019)
Predictive pumping based on sensor data and weather forecast
(Institute of Electrical and Electronics Engineers, 2019)
In energy production, peat extraction has a significant role in Finland. However, protection of nature has become more and more important globally. How do we solve this conflict of interests respecting both views? In peat ...