Publication
Artificial Intelligence and Cybersecurity: Theory and Applications
This book discusses artificial intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of artificial intelligence when considering privacy, cyber-attacks and defence as well as applications from malware detection to radio signal intelligence.The chapters are contributed by an international team of renown researchers and […]
Publication
Cyber Range Technical Federation: Case Flagship 1 Exercise
Modern cyber domain is an extremely complex field to master. There are numerous capricious dependencies between networked systems and data. In cyber security, technology has a major role, but the knowledge and skills of the individuals combined with the incident response processes of the organisations are even more important assets. Those assets foster the cyber […]
Publication
Cybersecurity education in universities of applied sciences
The implementation of cybersecurity research, development, and training and education at different levels strengthens both national expertise and Finland as an information society. Several strategies have been published at the EU and national levels with the aim of improving cybersecurity expertise and facilitating research, education, and innovation in the field. The current research project promoted […]
Publication
Analysing Finnish Cybersecurity Thesis Topics Using Taxonomic Frameworks
This paper presents an analysis of Bachelor’s and Master’s cybersecurity theses in Jyväskylä, Finland. The theses were gathered from publicly available publishing platforms of Finnish universities and were analysed using the NICE Cybersecurity Workforce Framework (NCWF) categories and European Cyber Security Organization’s (ECSO) The European Cybersecurity Taxonomy. The aim of this research was to find […]
Active
Developing cyber security exercises for the critical actors of emergency supply
Nearly all essential functions in the society are dependent on various digital applications. By developing the preparedness for cyber threats, the resilience of the entire society is developed with the exercises playing a key role in this. The diverse fields of operations have their own specific features and protecting them against cyber threats requires specialized […]
Publication
Chromatic and Spatial Analysis of One-Pixel Attacks Against an Image Classifier
One-pixel attack is a curious way of deceiving neural network classifier by changing only one pixel in the input image. The full potential and boundaries of this attack method are not yet fully understood. In this research, the successful and unsuccessful attacks are studied in more detail to illustrate the working mechanisms of a one-pixel […]
News
Tero Kokkonen elected as the Director of the Institute of Information Technology
Tero Kokkonen, Ph.D., has been elected as the Director of Jamk’s Institute of Information Technology. He will start his new position on the 9th of August. Tero has had a long career in software development and system procurement in industry and government. Since 2013, he has worked in the field of cyber security at Jamk […]
Publication
Model Fooling Threats Against Medical Imaging
Automatic medical image diagnosis tools are vulnerable to modern model fooling technologies. Because medical imaging is a way of determining the health status of a person, the threats could have grave consequences. These threats are not only dangerous to the individual but also threaten the patients’ trust in modern diagnosis methods and in the healthcare […]
Publication
Development of Data-Driven Curriculum Courses in the Bachelor of Engineering Degree Program
he rapid technological development is typical for the IT industry, and it poses a challenge for the curricula to stay up to date. It can also be problematic to bring new technologies into the curriculum so that the contents and views of the technologies have sufficient maturity. The aim of this paper is to illustrate […]
Publication
Researching graduated cyber security students: Reflecting employment and job responsibilities through NICE framework
Most research and development on Cyber Security education is currently focusing on what should be taught, how much, and where within the degree programmes. Different Cyber Security frameworks are currently evolving to include Cyber Security education parallel to older paradigms of Computing Education, existing alongside with such as “Information Technology” and “Software Engineering”. Different Cyber […]