Theseus käyttökatko ma 22.4. klo 12 alkaen. Katko jatkuu 22.4. klo 15 asti ja on koko Theseuksen laajuinen. Lisäksi töiden käsittely ja syöttö on estetty ti 23.4. ainakin klo 12 asti. Theseus service break from Mon 22.4. at 12:00. The break will last until 15:00 on Mon 22.4. and is Theseus-wide. In addition, processing and uploading of work will be blocked until at least 12:00 on Tue 23.4.
Haku
Viitteet 1-10 / 35
A model of cyber threat information sharing with the novel network topology
(Association for computing machinery, 2021)
The digitized environments are particularly vulnerable to various attacks. In such a situation of a security attack, detecting and responding to attacks require effective actions. One of the most significant ways to improve ...
Model for cyber security information sharing in healthcare sector
(Institute of Electrical and Electronics Engineers, 2020)
In the modern society almost all services are based on data-networks and networked systems. Especially through the growing digitalization an increasing number of services is connected to data-networks. One example of a ...
The impact of capital structure on firm performance and risk in Finland
(Springer, 2020)
The decision pertaining to the capital structure is one of the most strategic, perpetual, and at the same time challenging corporate decisions. Having an optimum capital structure is an important aspect of the financing ...
Measuring Learning in a Cyber Security Exercise
(Association for Computing Machinery, 2020)
In recent years, cyber security exercises have established themselves as an integral part of cyber security education. Cyber security professionals usually work as a part of a team that monitors and responds to incidents ...
Understanding high-tech startup failures and their prevention
(European Institute for Advanced Studies in Management, 2021)
Comprehensive cyber arena; the next generation cyber range
(IEEE, 2020)
The cyber domain and all the interdependencies between networked systems form an extremely complex ensemble. Incidents in the cyber domain may have an abundance effect on the physical domain. For example, a cyber attack ...
Visibility estimation based on camera data and algorithm of snow recognition on traffic signs
(Liikenne- ja viestintävirasto Traficom, 2020)
Learning analytics for students: synthesis of two user needs studies in Finnish higher education
(Association for the Advancement of Computing in Education (AACE), 2020)
Recent research has suggested that in learning analytics research and development, students as the users of learning analytics have been left in the periphery. There is a need to engage students as the users of learning ...
Success factors for hybrid teaching
(International Association of Technology Education and Development, 2020)
Hybrid teaching and hybrid learning have often been considered disruptive innovations in the field of education. Hybrid teaching and hybrid learning offer a new definition for what is good teaching and what produces good ...
Robotic process automation as a change agent for business processes: experiences and expectations
(Academic conferences international, 2020)
Abstract: Robotic Process Automation (RPA) is a technology area that has quickly become part of business processes both in public administration as well as in corporations. The expectations for RPA lie in its potential to ...