Author Archives: Heli Sutinen

Artificial Intelligence and Cybersecurity: Theory and Applications

This book discusses artificial intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of artificial intelligence when considering privacy, cyber-attacks and defence as well as applications from malware detection to radio signal intelligence.The chapters are contributed by an international team of renown researchers and […]

Cyber Range Technical Federation: Case Flagship 1 Exercise

Modern cyber domain is an extremely complex field to master. There are numerous capricious dependencies between networked systems and data. In cyber security, technology has a major role, but the knowledge and skills of the individuals combined with the incident response processes of the organisations are even more important assets. Those assets foster the cyber […]

Cybersecurity education in universities of applied sciences

The implementation of cybersecurity research, development, and training and education at different levels strengthens both national expertise and Finland as an information society. Several strategies have been published at the EU and national levels with the aim of improving cybersecurity expertise and facilitating research, education, and innovation in the field. The current research project promoted […]

Analysing Finnish Cybersecurity Thesis Topics Using Taxonomic Frameworks

This paper presents an analysis of Bachelor’s and Master’s cybersecurity theses in Jyväskylä, Finland. The theses were gathered from publicly available publishing platforms of Finnish universities and were analysed using the NICE Cybersecurity Workforce Framework (NCWF) categories and European Cyber Security Organization’s (ECSO) The European Cybersecurity Taxonomy. The aim of this research was to find […]

Developing cyber security exercises for the critical actors of emergency supply

Nearly all essential functions in the society are dependent on various digital applications. By developing the preparedness for cyber threats, the resilience of the entire society is developed with the exercises playing a key role in this. The diverse fields of operations have their own specific features and protecting them against cyber threats requires specialized […]

Chromatic and Spatial Analysis of One-Pixel Attacks Against an Image Classifier

One-pixel attack is a curious way of deceiving neural network classifier by changing only one pixel in the input image. The full potential and boundaries of this attack method are not yet fully understood. In this research, the successful and unsuccessful attacks are studied in more detail to illustrate the working mechanisms of a one-pixel […]

Tero Kokkonen elected as the Director of the Institute of Information Technology

Tero Kokkonen, Ph.D., has been elected as the Director of Jamk’s Institute of Information Technology. He will start his new position on the 9th of August. Tero has had a long career in software development and system procurement in industry and government. Since 2013, he has worked in the field of cyber security at Jamk […]

Model Fooling Threats Against Medical Imaging

Automatic medical image diagnosis tools are vulnerable to modern model fooling technologies. Because medical imaging is a way of determining the health status of a person, the threats could have grave consequences. These threats are not only dangerous to the individual but also threaten the patients’ trust in modern diagnosis methods and in the healthcare […]

Development of Data-Driven Curriculum Courses in the Bachelor of Engineering Degree Program

he rapid technological development is typical for the IT industry, and it poses a challenge for the curricula to stay up to date. It can also be problematic to bring new technologies into the curriculum so that the contents and views of the technologies have sufficient maturity. The aim of this paper is to illustrate […]

Researching graduated cyber security students: Reflecting employment and job responsibilities through NICE framework

Most research and development on Cyber Security education is currently focusing on what should be taught, how much, and where within the degree programmes. Different Cyber Security frameworks are currently evolving to include Cyber Security education parallel to older paradigms of Computing Education, existing alongside with such as “Information Technology” and “Software Engineering”. Different Cyber […]