Näytä suppeat kuvailutiedot

dc.contributor.advisorLehto, Martti
dc.contributor.authorLindfors, Tomi
dc.date.accessioned2023-01-11T07:28:37Z
dc.date.available2023-01-11T07:28:37Z
dc.date.issued2022
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/84912
dc.description.abstractHybrid warfare has surfaced in recent years in media and scientific literature, as the western world has noticed its challenges and possibilities. Hybrid warfare and its operations are by nature constantly evolving and changing while attempting to cause the wished effect on the victim. This causes the complications behind the detection of hybrid warfare. Often the amount of data gathered for analysis can cause issues because of its size as the resources for detecting hybrid warfare are limited. Finding anomalies from such large data sets can be problematic even if the target of the analysis is well known to the analyst. This creates a need for research to improve the detection of hybrid warfare. The terms behind hybrid warfare are also used differently by different parties and could use unification. The unification of terminology also helps to clarify communications between organizations and can directly benefit operational efficiency. The goal of this research is to clarify the terms used in the discussion about detection of hybrid warfare and to find at least preliminary future research topics for it from cyber security research point of view.en
dc.format.extent57
dc.format.mimetypeapplication/pdf
dc.language.isoen
dc.subject.otherdetection
dc.subject.otherdetection of hybrid warfare
dc.titleEnhancing detection & identification of hybrid warfare from cyber security perspective
dc.identifier.urnURN:NBN:fi:jyu-202301111245
dc.type.ontasotPro gradu -tutkielmafi
dc.type.ontasotMaster’s thesisen
dc.contributor.tiedekuntaInformaatioteknologian tiedekuntafi
dc.contributor.tiedekuntaFaculty of Information Technologyen
dc.contributor.laitosInformaatioteknologiafi
dc.contributor.laitosInformation Technologyen
dc.contributor.yliopistoJyväskylän yliopistofi
dc.contributor.yliopistoUniversity of Jyväskyläen
dc.contributor.oppiaineKyberturvallisuusfi
dc.contributor.oppiaineKyberturvallisuusen
dc.rights.copyrightJulkaisu on tekijänoikeussäännösten alainen. Teosta voi lukea ja tulostaa henkilökohtaista käyttöä varten. Käyttö kaupallisiin tarkoituksiin on kielletty.fi
dc.rights.copyrightThis publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.en
dc.type.publicationmasterThesis
dc.contributor.oppiainekoodi601
dc.subject.ysohybridisota
dc.subject.ysokyberturvallisuus
dc.subject.ysoinformaatiosodankäynti
dc.subject.ysosodankäynti
dc.subject.ysohybridivaikuttaminen
dc.subject.ysokybersodankäynti
dc.subject.ysohybrid warfare
dc.subject.ysocyber security
dc.subject.ysoinformation warfare
dc.subject.ysowarfare
dc.subject.ysohybrid influencing
dc.subject.ysocyberwarfare
dc.format.contentfulltext
dc.type.okmG2


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot