Haku
Viitteet 1-10 / 22
Network anomaly detection based on WaveNet
(Springer, 2019)
Increasing amount of attacks and intrusions against networked systems and data networks requires sensor capability. Data in modern networks, including the Internet, is often encrypted, making classical traffic analysis ...
Detecting One-Pixel Attacks Using Variational Autoencoders
(Springer, 2022)
Cyber range: preparing for crisis or something just for technical people?
(Academic conferences international, 2021)
Digitalization has increased the significance of cybersecurity within the current highly interconnected society. The number and complexity of different cyber-attacks as well as other malicious activities has increased ...
Modelling medical devices with honeypots
(Springer, 2020)
Cyber security is one of the key priorities in the modern digitalised and complex network totality. One of the major domains of interest is the healthcare sector where a cyber incident may cause unprecedented circumstances. ...
Requirements for training and evaluation dataset of network and host intrusion detection system
(Springer, 2019)
In the cyber domain, situational awareness of the critical assets is extremely important. For achieving comprehensive situational awareness, accurate sensor information is required. An important branch of sensors are ...
Blue team communication and reporting for enhancing situational awareness from white team perspective in cyber security exercises
(Springer, 2018)
Cyber security exercises allow individuals and organisations to train and test their skills in complex cyber attack situations. In order to effectively organise and conduct such exercise, the exercise control team must ...
Modelling breach risk in a network of interconnected devices
(IEEE Institute of Electrical and Electronic Engineers, 2023)
One-Pixel Attack Deceives Computer-Assisted Diagnosis of Cancer
(Association for computing machinery, 2021)
Computer vision and machine learning can be used to automate various tasks in cancer diagnostic and detection. If an attacker can manipulate the automated processing, the results can be devastating and in the worst case ...
Artificial Intelligence in the IoT Era: A Review of Edge AI Hardware and Software
(FRUCT, 2022)
The modern trend of moving artificial intelligence computation near to the origin of data sources has increased the demand for new hardware and software suitable for such environments. We carried out a scoping study to ...
Chromatic and Spatial Analysis of One-Pixel Attacks Against an Image Classifier
(Springer International Publishing, 2022)