Publication

Cybersecurity awareness and hygiene development in Finnish vocational education: staff perceptions, training gaps and diverse learning pathways This study aims to examine cybersecurity awareness and hygiene development among staff in Finnish vocational education institutions. It explores perceived skill levels, training methods, gaps between awareness and action and diverse learning pathways. It also investigates how organisational Cybersecurity awareness and hygiene development in Finnish vocational education

Recent technological advances in artificial intelligence (AI) have accelerated the adoption of AI in numerous applications to solve many problems. This study carries out a scoping review to understand the use of AI solutions to reduce CO2 emissions in the energy sector.

Image of a publication paper

At the intersection of quantum computing and machine learning, this review paper explores the transformative impact these technologies are having on the capabilities of data processing and analysis, far surpassing the bounds of traditional computational methods. Drawing upon an in-depth analysis of 32 seminal papers, this review delves into the interplay between quantum computing and Machine learning applications of quantum computing: A review

Image of a publication paper

With the constantly advancing capabilities of quantum computers, conventional cryptographic systems relying on complex math problems may encounter unforeseen vulnerabilities. Unlike regular computers, which are often deemed cost-ineffective in cryptographic attacks, quantum computers have a significant advantage in calculation speed. This distinction potentially makes currently used algorithms less secure or even completely vulnerable, compelling the Applications of post-quantum cryptography

Image of a publication paper

Quantum computing is a cutting-edge field of information technology that harnesses the principles of quantum mechanics to perform computations. It has major implications for the cyber security industry. Existing cyber protection applications are working well, but there are still challenges and vulnerabilities in computer networks. Sometimes data and privacy are also compromised. These complications lead Cyber protection applications of quantum computing: A review

Image of a publication paper

This book discusses the use of artificial intelligence (AI) for security purposes. It is divided into three parts: methodological fundamentals of AI, use of AI for critical infrastructure protection and anomaly detection. The first section describes the latest knowledge for creating safe AIs and using them to enhance protection. This book also presents various domains Artificial Intelligence for Security – Enhancing Protection in a Changing World

The Secure Shell (SSH) server on a Unix-like system is a viable way for users to login and execute programs on the system remotely. Remote access is something that hackers also want to achieve, making SSH servers a target for attack. A quantitative study was made of the distribution of usernames and IP addresses in Distribution of Invalid Users on an SSH Server

The cyber threat landscape is vast and unstable. One of the top threats in the present moment is ransomware, which is constantly spreading in prevalence. To protect organisations’ cyber operating environment, ability to perceive elements relating to this threat is crucial. At the same time, many security controls face challenges in terms of fidelity of Refining Cyber Situation Awareness with Honeypots in Case of a Ransomware Attack

Advances in artificial intelligence are creating possibilities to use these methods in red team activities, such as cyberattacks. These AI attacks can automate the process of penetrating a target or collecting sensitive data while accelerating the pace of carrying out the attacks. This survey explores how AI is employed in cybersecurity attacks and what kind Artificial Intelligence Cyberattacks in Red Teaming: A Scoping Review