Näytä suppeat kuvailutiedot

dc.contributor.authorHummelholm, Aarne
dc.contributor.authorHämäläinen, Timo
dc.contributor.authorSavola, Reijo
dc.contributor.editorAndreatos, Antonios
dc.contributor.editorDouligeris, Christos
dc.date.accessioned2023-07-10T09:26:39Z
dc.date.available2023-07-10T09:26:39Z
dc.date.issued2023
dc.identifier.citationHummelholm, A., Hämäläinen, T., & Savola, R. (2023). AI-based quantum-safe cybersecurity automation and orchestration for edge intelligence in future networks. In A. Andreatos, & C. Douligeris (Eds.), <i>Proceedings of the 22nd European Conference on Cyber Warfare and Security</i> (22, pp. 696-702). Academic Conferences International. Proceedings of the European Conference on Cyber Warfare and Security. <a href="https://doi.org/10.34190/eccws.22.1.1211" target="_blank">https://doi.org/10.34190/eccws.22.1.1211</a>
dc.identifier.otherCONVID_183732061
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/88351
dc.description.abstractThe AIQUSEC (AI-based quantum secure cyber security automation and orchestration in the edge intelligence of future networks) brings measurable advances to the cyber security of access and edge networks and their services, as well as Operational Service Technologies (OT). The research aims for significant cybersecurity scalability, efficiency, and effectiveness of operations through improved and enhanced device and sensor securities, security assurance, quantum security, and Artificial Intelligence (AI) based automation solutions. The new application scenarios of near future, the multiple stakeholders within each scenario, and the higher data volumes raise the need for novel cybersecurity solutions. Recently, OT cybersecurity threat landscape has become wider, due to the increase digitalization of services, the increase in virtualization and slicing of networks, as well as the increase in advanced cyber-attacks. Because of recent advances in computing power, AI in cybersecurity analyzing and validations is now becoming a reality. A significant part of currently used encryption technologies which secures communications and infrastructures might become instantly penetrable when quantum computing becomes available. Enabling quantum-safety migration development is a clear goal to the project. The research develops a state-of-the-art information security verification and validation environment that supports the integration of cyber security systems as a reference model, focusing on architectural choices and network connection from different vertical use cases. With the help of the platform and the reference model, common cybersecurity capabilities and requirements can be built, tested, and validated, as well as their fulfillment. In addition to the environment mentioned above, the results of the research are demonstrated and utilized in critical communication systems, water utilities, industrial environments, in physical access solutions and remote work. The developed platform can also be used for auditing devices, systems, and software’s in the future. The research integrates new quantum-safe artificial intelligence-based, hardware-hardened, and scalable cybersecurity solutions that have been validated in a standardized way. In this research, we also deal with the requirements of the EU sustainable growth program - issues related to the green transition.en
dc.format.extent724
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherAcademic Conferences International
dc.relation.ispartofProceedings of the 22nd European Conference on Cyber Warfare and Security
dc.relation.ispartofseriesProceedings of the European Conference on Cyber Warfare and Security
dc.rightsCC BY-NC-ND 4.0
dc.subject.otheredge-intelligence systems
dc.subject.othercyber threat
dc.subject.othercyber-attacks
dc.subject.otherAI-based analysing
dc.subject.otherquantum encryption
dc.titleAI-based quantum-safe cybersecurity automation and orchestration for edge intelligence in future networks
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202307104478
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietotekniikkafi
dc.contributor.oppiaineSecure Communications Engineering and Signal Processingfi
dc.contributor.oppiaineTekniikkafi
dc.contributor.oppiaineMathematical Information Technologyen
dc.contributor.oppiaineSecure Communications Engineering and Signal Processingen
dc.contributor.oppiaineEngineeringen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn978-1-914587-69-6
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange696-702
dc.relation.issn2048-8602
dc.relation.numberinseries1
dc.relation.volume22
dc.type.versionpublishedVersion
dc.rights.copyright© 2023 European Conference on Cyber Warfare and Security
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceEuropean Conference on Cyber Warfare and Security
dc.subject.ysokyberturvallisuus
dc.subject.ysotekoäly
dc.subject.ysoverkkohyökkäykset
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p2616
jyx.subject.urihttp://www.yso.fi/onto/yso/p27466
dc.rights.urlhttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.relation.doi10.34190/eccws.22.1.1211
dc.type.okmA4


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

CC BY-NC-ND 4.0
Ellei muuten mainita, aineiston lisenssi on CC BY-NC-ND 4.0