Haku
Viitteet 1-10 / 17
Maidonkeräilykuljetusten suunnittelu : Arla Ingman Oy ab
(Jyväskylän ammattikorkeakoulu, 2012)
Kuljetuskustannukset ovat merkittävä osa teollisuuden kustannusrakennetta. Kehittämällä kuljetusjärjestelmää voidaan saavuttaa merkittäviä parannuksia yrityksen kannattavuuteen. Säästöpaineita kuljetuskustannuksille on ...
Network anomaly detection based on WaveNet
(Springer, 2019)
Increasing amount of attacks and intrusions against networked systems and data networks requires sensor capability. Data in modern networks, including the Internet, is often encrypted, making classical traffic analysis ...
Model for cyber security information sharing in healthcare sector
(Institute of Electrical and Electronics Engineers, 2020)
In the modern society almost all services are based on data-networks and networked systems. Especially through the growing digitalization an increasing number of services is connected to data-networks. One example of a ...
Measuring Learning in a Cyber Security Exercise
(Association for Computing Machinery, 2020)
In recent years, cyber security exercises have established themselves as an integral part of cyber security education. Cyber security professionals usually work as a part of a team that monitors and responds to incidents ...
Review of pedagogical principles of cyber security exercises
(2020)
Modern digitalized cyber domains are extremely complex ensemble. Cyber attacks or incidents against system may affect capricious effects for another system or even for physical devices. For understanding and training to ...
Comprehensive cyber arena; the next generation cyber range
(IEEE, 2020)
The cyber domain and all the interdependencies between networked systems form an extremely complex ensemble. Incidents in the cyber domain may have an abundance effect on the physical domain. For example, a cyber attack ...
Model fooling attacks against medical imaging: a short survey
(ProCon, 2020)
This study aims to find a list of methods to fool artificial neural networks used in medical imaging. We collected a short list of publications related to machine learning model fooling to see if these methods have been ...
Anomaly-Based Network Intrusion Detection Using Wavelets and Adversarial Autoencoders
(Springer, 2019)
The number of intrusions and attacks against data networks and networked systems increases constantly, while encryption has made it more difficult to inspect network traffic and classify it as malicious. In this paper, an ...
Modelling medical devices with honeypots
(Springer, 2020)
Cyber security is one of the key priorities in the modern digitalised and complex network totality. One of the major domains of interest is the healthcare sector where a cyber incident may cause unprecedented circumstances. ...
Requirements for training and evaluation dataset of network and host intrusion detection system
(Springer, 2019)
In the cyber domain, situational awareness of the critical assets is extremely important. For achieving comprehensive situational awareness, accurate sensor information is required. An important branch of sensors are ...