Aineistot 1-5 / 2191

    • The Importance of Cybersecurity Governance Model in Operational Technology Environments 

      Simola, Jussi; Takala, Arttu; Lehkonen, Riku; Frantti, Tapio; Savola, Reijo (Academic Conferences International Ltd, 2024)
      There is a common will to unify regulation in the Western world regarding overall security, including cybersecurity. European cyber security regulations aim to create a foundation and guidelines for international standards ...
    • Cognitive Security in a Changing World : Citizen Perceptions During Finland's NATO Joining Process 

      Grahn, Hilkka; Häkkinen, Teemu; Taipalus, Toni (Academic Conferences International Ltd, 2024)
      Contemporary conflicts are multifaceted and no longer fit the traditional war-and-peace dichotomy due to digital dimensions and the role of the human mind. The concept of warfare has transformed significantly: it's no ...
    • Utilizing Vector Database Management Systems in Cyber Security 

      Taipalus Toni; Grahn Hilkka; Turtiainen Hannu; Costin Andrei (Academic Conferences International Ltd, 2024)
      The rising popularity of phenomena such as ubiquitous computing and IoT poses increasingly high demands for data management, and it is not uncommon that database management systems (DBMS) must be capable of reading and ...
    • Cyber Operations in Ukraine : Emerging Patterns in Cases 

      Takamaa, Markus; Lehto, Martti (Academic Conferences International Ltd, 2024)
      The Ukrainian state has been a target of cyber-related incidents since the annexation of Crimea in 2014. Cyberattacks have targeted Ukrainian critical infrastructure, government offices, and several public and private ...
    • Validation of Sensor Data Integrity in OT Environments Through Multisource Data Sensors 

      Simola, Jussi; Takala, Arttu; Lehkonen, Riku; Frantti, Tapio; Savola, Reijo (Academic Conferences International Ltd, 2024)
      This research paper focuses on detecting cyber threats from the OT environment by combining data from multiple sources. Monitoring cyber security or hybrid threats in an industrial OT environment is difficult due to different ...