Aineistot 21-40 / 83247

    • Utilizing Vector Database Management Systems in Cyber Security 

      Taipalus Toni; Grahn Hilkka; Turtiainen Hannu; Costin Andrei (Academic Conferences International Ltd, 2024)
      The rising popularity of phenomena such as ubiquitous computing and IoT poses increasingly high demands for data management, and it is not uncommon that database management systems (DBMS) must be capable of reading and ...
    • Cyber Operations in Ukraine : Emerging Patterns in Cases 

      Takamaa, Markus; Lehto, Martti (Academic Conferences International Ltd, 2024)
      The Ukrainian state has been a target of cyber-related incidents since the annexation of Crimea in 2014. Cyberattacks have targeted Ukrainian critical infrastructure, government offices, and several public and private ...
    • Validation of Sensor Data Integrity in OT Environments Through Multisource Data Sensors 

      Simola, Jussi; Takala, Arttu; Lehkonen, Riku; Frantti, Tapio; Savola, Reijo (Academic Conferences International Ltd, 2024)
      This research paper focuses on detecting cyber threats from the OT environment by combining data from multiple sources. Monitoring cyber security or hybrid threats in an industrial OT environment is difficult due to different ...
    • Architecture Framework for Cyber Security Management 

      Pöyhönen, Jouni; Lehto, Martti (Academic Conferences International Ltd, 2024)
      The smooth operation of contemporary society relies on the collaborative functioning of multiple essential infrastructures, with their collective effectiveness increasingly hinging on a dependable national system of systems ...
    • Brain-Computer Interface Integration With Extended Reality (XR) : Future, Privacy And Security Outlook 

      Lahtinen, Tuomo; Costin, Andrei; Suarez-Tangil, Guillermo (Academic Conferences International Ltd, 2024)
      The Brain-Computer Interface (BCI) is a rapidly evolving technology set to revolutionize our perception of the Internet of Things (IoT). BCI facilitates direct communication between the brain and external devices, enabling ...
    • Backward-compatible Software Upgrades for ADS-B and AIS To Support ECDSA-Secured Protocols 

      Saleem, Ahsan; Turtiainen, Hannu; Costin, Andrei; Hämäläinen, Timo (Academic Conferences International Ltd, 2024)
      During the past few decades, the aviation, maritime, aerospace, and search-and-rescue domains have witnessed tremendous improvement thanks to technological, digitalization and Internet of Things (IoT) advances such as ...
    • Evaluating Zero-Shot Chatgpt Performance on Predicting CVE Data From Vulnerability Descriptions 

      Costin, Andrei; Turtiainen, Hannu; Yousefnezhad, Narges; Bogulean, Vadim; Hämäläinen, Timo (Academic Conferences International Ltd, 2024)
      Vulnerability management is a critical industry activity driven by compliance and regulations aiming to allocate best-fitted resources to address vulnerabilities efficiently. The increasing number of vulnerabilities reported ...
    • Exploring Shifting Patterns in Recent IoT Malware 

      Carrillo-Mondejar, Javier; Suarez-Tangil, Guillermo; Costin, Andrei; Rodríguez, Ricardo J. (Academic Conferences International Ltd, 2024)
      The rise of malware targeting interconnected infrastructures has surged in recent years, driven largely by the widespread presence of vulnerable legacy IoT devices and inadequately secured networks. Despite the strong ...
    • Placing Behavior in Context : Political Interpretations of Individual Behavior in Countering Information Warfare in Finland 

      Häkkinen, Teemu; Grahn, Hilkka (Academic Conferences International Ltd, 2024)
      Malign information influence often targets large segments of the population, with the intent to manipulate individual behavior for the benefit of the actors disseminating this harmful information. However, in a liberal ...
    • A Comprehensive Analysis of Narratives within NATO’s Doctrines 

      Saari, Dominic; Häkkinen, Teemu; Moilanen, Panu (Academic Conferences International Ltd, 2024)
      The 2022 Russian invasion of Ukraine reshaped global security norms, challenging the West with a strategy known as hybrid warfare. Rooted in Russia's military doctrine, this approach integrates both military and non-military ...
    • Wargaming in Information Warfare Training : A Study of Finnish Officials 

      Saari, Dominic; Grahn, Hilkka; Häkkinen, Teemu; Hautala, Miriam; Vesterinen, Oskari; Moilanen, Panu (Academic Conferences International Ltd, 2024)
      In the digital age, information warfare has become a significant global concern, with malicious actors exploiting various media to manipulate public opinion, destabilising governments, and sowing discord. Automated and ...
    • Using Wargaming to Model Cyber Defense Decision-Making : Observation-Based Research in Locked Shields 

      Sarjakivi, Pietari; Ihanus, Jouni; Moilanen, Panu (Academic Conferences International Ltd, 2024)
      Defensive Cyber Operations (DCO) in complex environments, such as cyber wargames, require in-depth cybersecurity knowledge and the ability to make quick decisions. In a typical DCO, execution rarely follows a pre-planned ...
    • Visions of the Future : What Could Happen to User Authentication? 

      Paananen, Hanna; Woods, Naomi (Academic Conferences International Ltd, 2024)
      The most prevalent information system security feature for the user is the authentication process. Passwords have been the primary authentication method for decades due to their simplicity for both the user and the system ...
    • Educating Cybersecurity Experts : Analysis of Cybersecurity Education in Finnish Universities 

      Perälä, Piia; Lehto, Martti (Academic Conferences International Ltd, 2024)
      Cybersecurity is no longer just a technical discipline but a strategic concept. Nowadays, cybersecurity has become an essential part of national security strategies. The European Union and European countries have established ...
    • What Culture is ChatGPT’s AI? 

      Rauhala, Juhani; Xin, Tong (Academic Conferences International Ltd, 2024)
      Artificial intelligence (AI) is increasingly used in many fields. It is widely perceived as an intelligent system that does not just follow algorithms but can demonstrate independent judgment. AI is especially important ...
    • Analysing Multidimensional Strategies for Cyber Threat Detection in Security Monitoring 

      Shelke, Palvi; Hämäläinen, Timo (Academic Conferences International Ltd, 2024)
      The escalating risk of cyber threats requires continuous advances in security monitoring techniques. This survey paper provides a comprehensive overview of recent research into novel methods for cyber threat detection, ...
    • The Impact of Operational Technology Requirements in Maritime Industries 

      Simola, Jussi; Paavola, Jarkko; Satopää, Piia; Vanharanta, Jani (Academic Conferences International Ltd, 2024)
      The maritime ecosystem and industry require more efficient and coordinated cybersecurity governance. No common cybersecurity mechanism in the maritime sector may steer the whole supply chain management, for example, in the ...
    • Improving Detection Capabilities in OT Environments Through Multisource Data Sensors 

      Simola, Jussi; Takala, Arttu; Lehkonen, Riku; Frantti, Tapio; Savola, Reijo (Academic Conferences International Ltd, 2024)
      This research focuses on implementing cyber threat detection in OT environments by combining data from IT and OT sensors and logs to enhance SOC's situational awareness. OT environment is challenging to monitor and includes ...
    • Heavy metal pollution exposure affects egg coloration but not male provisioning effort in the pied flycatcher Ficedula hypoleuca 

      Mari, Lisandrina; Šulc, Michal; Szala, Klaudia; Troscianko, Jolyon; Eeva, Tapio; Ruuskanen, Suvi (Wiley-Blackwell, 2024)
      Heavy metal pollution is known to negatively affect numerous traits in birds, including foraging, metabolism, immunity, and reproductive success. In this study, our primary aim was to assess the impact of metal pollution ...
    • Product managers in software startups : A grounded theory 

      Melegati, Jorge; Wiese, Igor; Guerra, Eduardo; Chanin, Rafael; Aldaeej, Abdullah; Mikkonen, Tommi; Prikladnicki, Rafael; Wang, Xiaofeng (Elsevier, 2024)
      Objective: This study aims to describe the role of product managers in the context of software startups. Method: We performed a Socio-Technical Grounded Theory study using data from blog posts and interviews. Results: The ...