Haku
Viitteet 31-36 / 36
Artificial Intelligence Cyberattacks in Red Teaming: A Scoping Review
(Springer Nature, 2024)
Advances in artificial intelligence are creating possibilities to use these methods in red team activities, such as cyberattacks. These AI attacks can automate the process of penetrating a target or collecting
sensitive ...
Cyber Security Information Sharing During a Large Scale Real Life Cyber Security Exercise
(Springer Nature, 2024)
In the event of a cyber attack, the efficient production and utilisation of situational information is achieved by sharing information with other actors. In our research, we have discovered how information related to cyber ...
Food supply chain cyber threats: a scoping review
(Springer Nature, 2024)
Cyber attacks against the food supply chain could have serious effects on our society. As more networked systems control all aspects of the food supply chain, understanding these threats has become more critical. This ...
Digital Twin of Food Supply Chain for Cyber Exercises
(MDPI AG, 2023)
The food supply chain is a critical part of modern societies. As with other facets of life, it is thoroughly digitalized, and uses network connections. Consequently, the cyber security of the supply chain becomes a major ...
Distribution of Invalid Users on an SSH Server
(Springer, 2024)
The Secure Shell (SSH) server on a Unix-like system is a viable way for users to login and execute programs on the system remotely. Remote access is something that hackers also want to achieve, making SSH servers a target ...
Modelling breach risk in a network of interconnected devices
(IEEE Institute of Electrical and Electronic Engineers, 2023)





