Theseus käyttökatko ma 22.4. klo 12 alkaen. Katko jatkuu 22.4. klo 15 asti ja on koko Theseuksen laajuinen. Lisäksi töiden käsittely ja syöttö on estetty ti 23.4. ainakin klo 12 asti. Theseus service break from Mon 22.4. at 12:00. The break will last until 15:00 on Mon 22.4. and is Theseus-wide. In addition, processing and uploading of work will be blocked until at least 12:00 on Tue 23.4.
Haku
Viitteet 1-10 / 21
Network anomaly detection based on WaveNet
(Springer, 2019)
Increasing amount of attacks and intrusions against networked systems and data networks requires sensor capability. Data in modern networks, including the Internet, is often encrypted, making classical traffic analysis ...
Model for cyber security information sharing in healthcare sector
(Institute of Electrical and Electronics Engineers, 2020)
In the modern society almost all services are based on data-networks and networked systems. Especially through the growing digitalization an increasing number of services is connected to data-networks. One example of a ...
Measuring Learning in a Cyber Security Exercise
(Association for Computing Machinery, 2020)
In recent years, cyber security exercises have established themselves as an integral part of cyber security education. Cyber security professionals usually work as a part of a team that monitors and responds to incidents ...
Comprehensive cyber arena; the next generation cyber range
(IEEE, 2020)
The cyber domain and all the interdependencies between networked systems form an extremely complex ensemble. Incidents in the cyber domain may have an abundance effect on the physical domain. For example, a cyber attack ...
Detecting One-Pixel Attacks Using Variational Autoencoders
(Springer, 2022)
Cyber range: preparing for crisis or something just for technical people?
(Academic conferences international, 2021)
Digitalization has increased the significance of cybersecurity within the current highly interconnected society. The number and complexity of different cyber-attacks as well as other malicious activities has increased ...
Color-optimized one-pixel attack against digital pathology images
(Fruct oy, 2021)
Modern artificial intelligence based medical imaging tools are vulnerable to model fooling attacks. Automated medical imaging methods are used for supporting the decision making by classifying samples as regular or as ...
One-pixel attacks against medical imaging: a conceptual framework
(Springer, 2021)
This paper explores the applicability of one-pixel attacks against medical imaging. Successful attacks are threats that could cause mistrust towards artificial intelligence solutions and the healthcare system in general. ...
Modelling medical devices with honeypots
(Springer, 2020)
Cyber security is one of the key priorities in the modern digitalised and complex network totality. One of the major domains of interest is the healthcare sector where a cyber incident may cause unprecedented circumstances. ...
Requirements for training and evaluation dataset of network and host intrusion detection system
(Springer, 2019)
In the cyber domain, situational awareness of the critical assets is extremely important. For achieving comprehensive situational awareness, accurate sensor information is required. An important branch of sensors are ...