Now showing items 21-25 of 2198

    • Using Wargaming to Model Cyber Defense Decision-Making : Observation-Based Research in Locked Shields 

      Sarjakivi, Pietari; Ihanus, Jouni; Moilanen, Panu (Academic Conferences International Ltd, 2024)
      Defensive Cyber Operations (DCO) in complex environments, such as cyber wargames, require in-depth cybersecurity knowledge and the ability to make quick decisions. In a typical DCO, execution rarely follows a pre-planned ...
    • Visions of the Future : What Could Happen to User Authentication? 

      Paananen, Hanna; Woods, Naomi (Academic Conferences International Ltd, 2024)
      The most prevalent information system security feature for the user is the authentication process. Passwords have been the primary authentication method for decades due to their simplicity for both the user and the system ...
    • Educating Cybersecurity Experts : Analysis of Cybersecurity Education in Finnish Universities 

      Perälä, Piia; Lehto, Martti (Academic Conferences International Ltd, 2024)
      Cybersecurity is no longer just a technical discipline but a strategic concept. Nowadays, cybersecurity has become an essential part of national security strategies. The European Union and European countries have established ...
    • What Culture is ChatGPT’s AI? 

      Rauhala, Juhani; Xin, Tong (Academic Conferences International Ltd, 2024)
      Artificial intelligence (AI) is increasingly used in many fields. It is widely perceived as an intelligent system that does not just follow algorithms but can demonstrate independent judgment. AI is especially important ...
    • Analysing Multidimensional Strategies for Cyber Threat Detection in Security Monitoring 

      Shelke, Palvi; Hämäläinen, Timo (Academic Conferences International Ltd, 2024)
      The escalating risk of cyber threats requires continuous advances in security monitoring techniques. This survey paper provides a comprehensive overview of recent research into novel methods for cyber threat detection, ...