Header

At the Forefront of New Knowledge

We provide new knowledge for everyone.

Slide

Research publications

Publications and perspectives

Publication

16.07.2024

Quantum computing

Quantum computing trends

Machine learning applications of quantum computing: A review

Publication

16.07.2024

Post-quantum cryptography

PQC

Applications of post-quantum cryptography

Publication

16.07.2024

Cyber security

Quantum computing

Cyber protection applications of quantum computing: A review

Publication

08.07.2024

AI and data-analytics

Cyber security

Artificial Intelligence for Security – Enhancing Protection in a Changing World

Publication

17.05.2024

Cyber security

ZZPin: Increase your knowledge

Distribution of Invalid Users on an SSH Server

Publication

17.05.2024

Cyber security

Cyber situation awareness

Refining Cyber Situation Awareness with Honeypots in Case of a Ransomware Attack

Publications and perspectives

Publication

17.05.2024

AI and data-analytics

Cyber security

Artificial Intelligence Cyberattacks in Red Teaming: A Scoping Review

Publication

17.05.2024

Cyber exercise

Cyber security information sharing

Cyber Security Information Sharing During a Large Scale Real Life Cyber Security Exercise

Publication

16.02.2024

Cyber security

Food supply chain

Food Supply Chain Cyber Threats: A Scoping Review

Publication

05.12.2023

Cloud computing

IoT

Modelling Breach Risk in a Network of Interconnected Devices

Publication

16.11.2023

Deep learning

ZZPin: AI and data analytics training

Improved difference images for change detection classifiers in SAR imagery using deep learning

Publication

30.08.2023

Käsikirjat elintarvikeketjun kyberpoikkeamien hallintaan

Publications and perspectives

Publication

23.08.2023

Hyperspectral imaging

Low-rank matrix

Parameter Optimization for Low-Rank Matrix Recovery in Hyperspectral Imaging

Publication

11.08.2023

Capture the flag

Cyber range

Participants Prefer Technical Hands-on Cyber Exercises Instead of Organisational and Societal Ones

Publication

16.06.2023

Digital twin

Food supply chain

Digital Twin of Food Supply Chain for Cyber Exercises

Publication

02.05.2023

Cyber exercise

Cyber security

Learn to Train Like You Fight

Publication

15.02.2023

Cyber exercise

Cyber security

Multi-National Cyber Security Exercise, Case Flagship 2

Publication

09.01.2023

Artificial intelligence

Cyber security

Artificial Intelligence and Cybersecurity: Theory and Applications

Publications and perspectives

Publication

02.01.2023

Cyber exercise

Cyber range

Cyber Range Technical Federation: Case Flagship 1 Exercise

Publication

31.12.2022

Cyber security

Education

Cybersecurity education in universities of applied sciences

Publication

13.12.2022

Cyber security

Education

Analysing Finnish Cybersecurity Thesis Topics Using Taxonomic Frameworks

Publication

03.10.2022

Classification

CyberSecurity

Chromatic and Spatial Analysis of One-Pixel Attacks Against an Image Classifier

Publication

01.08.2022

Cyber security

Healthcare

Model Fooling Threats Against Medical Imaging

Publication

16.06.2022

AI and data-analytics

Artificial intelligence

Development of Data-Driven Curriculum Courses in the Bachelor of Engineering Degree Program

Publications and perspectives

Publication

08.06.2022

Researching graduated cyber security students: Reflecting employment and job responsibilities through NICE framework

Publication

08.06.2022

Pedagogical and self-reflecting approach to improving the learning within a cyber exercise

Publication

18.05.2022

Artificial Intelligence in the IoT Era: A Review of Edge AI Hardware and Software

Publication

18.05.2022

Detecting One-Pixel Attacks Using Variational Autoencoders

Publication

18.05.2022

Modelling Medical Devices with Honeypots: A Conceptual Framework

Publication

21.04.2022

Cyber exercise

Cyber security

Key Elements of On-Line Cyber Security Exercise and Survey of Learning During the On-Line Cyber Security Exercise

Publications and perspectives

Publication

07.01.2022

CyberSecurity

MachineLearning

One-Pixel Attack Deceives Computer-Assisted Diagnosis of Cancer

Publication

01.09.2021

Cyber Range: Preparing for Crisis or Something Just for Technical People?

Publication

26.05.2021

CyberSecurity

Healthcare

Color-Optimized One-Pixel Attack Against Digital Pathology Images

Publication

23.04.2021

Cyber security

One-Pixel Attacks Against Medical Imaging: A Conceptual Framework

Publication

24.03.2021

Cyber security

publication

Assessing Cyber Security Education through NICE Cybersecurity Workforce Framework

Publication

16.03.2021

Cyber security

cyber security exercise

Measuring Learning in a Cyber Security Exercise

Publications and perspectives

Publication

07.01.2021

Modelling Medical Devices with Honeypots

Publication

04.01.2021

digiturvallisuus

käsikirja

Kyberhäiriöiden hallinta – Käsikirja terveydenhuollon toimijoille

Publication

17.12.2020

AI

High-performanse computing

HPC-Performance tests

Publication

09.11.2020

Cyber security

MOOCs

Quality Criteria for Cyber Security MOOCs

Publication

27.10.2020

cyber arena

Cyber range

Comprehensive Cyber Arena; The Next Generation Cyber Range

Publication

09.10.2020

CyberSecurity

CyberSecurityExercise

Review of Pedagogical Principles of Cyber Security Exercises

Publications and perspectives

Publication

07.10.2020

CyberSec4Europe

CyberSecurity

Model Fooling Attacks Against Medical Imaging: A Short Survey

Publication

28.08.2020

CyberSecurity

Healthcare

Model for Cyber Security Information Sharing in Healthcare Sector

Publication

08.06.2020

AnomalyDetection

AutoregressiveNeuralNetworks

Statistical Evaluation of Artificial Intelligence -Based Intrusion Detection System

Publication

30.04.2020

ArtificialIntelligence

DataAnalytics

JAMK High Performance Computing

Publication

27.10.2019

CyberSecurity

CyberSecurityDegreeProgramme

A Design Model for a Degree Programme in Cyber Security

Publication

12.09.2019

AnomalyDetection

ConvolutionalNeuralNetworks

Network Anomaly Detection Based on WaveNet

Publications and perspectives

Publication

19.08.2019

CyberSecurityExercise

DataSecurity

Pedagogical Aspects of Cyber Security Exercises

Publication

03.04.2019

Requirements for Training and Evaluation Dataset of Network and Host Intrusion Detection System

Publication

14.02.2019

Anomaly-Based Network Intrusion Detection Using Wavelets and Adversarial Autoencoders

Publication

29.09.2018

Blue Team Communication and Reporting for Enhancing Situational Awareness from White Team Perspective in Cyber Security Exercises

Publication

29.12.2016

AnomalyDetection

CyberSecurity

On Application-Layer DDoS Attack Detection in High-Speed Encrypted Networks

Publication

20.09.2016

Weighted Fuzzy Clustering for Online Detection of Application DDoS Attacks in Encrypted Network Traffic

Publications and perspectives

Publication

20.09.2016

Architecture for the Cyber Security Situational Awareness System

Publication

18.05.2016

Increasing Web Service Availability by Detecting Application-Layer DDoS Attacks in Encrypted Traffic

Publication

18.05.2016

Model for Sharing the Information of Cyber Security Situation Awareness between Organizations

Publication

13.08.2015

Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol

Publication

13.08.2015

Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise

Publication

29.07.2015

Online detection of anomalous network flows with soft clustering

Publications and perspectives

Publication

18.05.2016

Increasing Web Service Availability by Detecting Application-Layer DDoS Attacks in Encrypted Traffic

Publication

18.05.2016

Model for Sharing the Information of Cyber Security Situation Awareness between Organizations

Publication

13.08.2015

Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol

Publication

13.08.2015

Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise

Publication

29.07.2015

Online detection of anomalous network flows with soft clustering

Publication

27.08.2014

Analysis of HTTP Requests for Anomaly Detection of Web Attacks

Slide