Aineistot 6-10 / 2191

    • Architecture Framework for Cyber Security Management 

      Pöyhönen, Jouni; Lehto, Martti (Academic Conferences International Ltd, 2024)
      The smooth operation of contemporary society relies on the collaborative functioning of multiple essential infrastructures, with their collective effectiveness increasingly hinging on a dependable national system of systems ...
    • Brain-Computer Interface Integration With Extended Reality (XR) : Future, Privacy And Security Outlook 

      Lahtinen, Tuomo; Costin, Andrei; Suarez-Tangil, Guillermo (Academic Conferences International Ltd, 2024)
      The Brain-Computer Interface (BCI) is a rapidly evolving technology set to revolutionize our perception of the Internet of Things (IoT). BCI facilitates direct communication between the brain and external devices, enabling ...
    • Backward-compatible Software Upgrades for ADS-B and AIS To Support ECDSA-Secured Protocols 

      Saleem, Ahsan; Turtiainen, Hannu; Costin, Andrei; Hämäläinen, Timo (Academic Conferences International Ltd, 2024)
      During the past few decades, the aviation, maritime, aerospace, and search-and-rescue domains have witnessed tremendous improvement thanks to technological, digitalization and Internet of Things (IoT) advances such as ...
    • Evaluating Zero-Shot Chatgpt Performance on Predicting CVE Data From Vulnerability Descriptions 

      Costin, Andrei; Turtiainen, Hannu; Yousefnezhad, Narges; Bogulean, Vadim; Hämäläinen, Timo (Academic Conferences International Ltd, 2024)
      Vulnerability management is a critical industry activity driven by compliance and regulations aiming to allocate best-fitted resources to address vulnerabilities efficiently. The increasing number of vulnerabilities reported ...
    • Exploring Shifting Patterns in Recent IoT Malware 

      Carrillo-Mondejar, Javier; Suarez-Tangil, Guillermo; Costin, Andrei; Rodríguez, Ricardo J. (Academic Conferences International Ltd, 2024)
      The rise of malware targeting interconnected infrastructures has surged in recent years, driven largely by the widespread presence of vulnerable legacy IoT devices and inadequately secured networks. Despite the strong ...