Category Archives: Publication

Cyber Range: Preparing for Crisis or Something Just for Technical People?

This article attempts to reveal the secrets behind cyber ranges and their use focusing on suitable target environments, common functions, and use cases.

Color-Optimized One-Pixel Attack Against Digital Pathology Images

Modern artificial intelligence based medical imaging tools are vulnerable to model fooling attacks. Automated medical imaging methods are used for supporting the decision making by classifying samples as regular or as having characters of abnormality. One use of such technology is the analysis of whole-slide image tissue samples. Consequently, attacks against artificial intelligence based medical […]

One-Pixel Attacks Against Medical Imaging: A Conceptual Framework

This paper explores the applicability of one-pixel attacks against medical imaging. Successful attacks are threats that could cause mistrust towards artificial intelligence solutions and the healthcare system in general. Nowadays it is common to build artificial intelligence models to classify medical imaging modalities as either normal or as having indications of disease. One-pixel attack is […]

Assessing Cyber Security Education through NICE Cybersecurity Workforce Framework

This paper presents the results of research and assessment of cyber security education in higher education in Europe and the United States of America. The quantitative research data of the education curricula was gathered and mapped to NICE Cybersecurity Workforce Framework (NCWF) categories to provide a common background for data comparison and analysis. The research […]

Measuring Learning in a Cyber Security Exercise

In recent years, cyber security exercises have established themselves as an integral part of cyber security education. Cyber security professionals usually work as a part of a team that monitors and responds to incidents in the environment. A sufficiently realistic complex learning environment is necessary for collaborative learning at the expert level. Evaluating the learning […]

Modelling Medical Devices with Honeypots

Cyber security is one of the key priorities in the modern digitalised and complex network totality. One of the major domains of interest is the healthcare sector where a cyber incident may cause unprecedented circumstances. In the healthcare domain there are abundant networked systems, software and hardware, which may be vulnerable for a cyber intrusion […]

Kyberhäiriöiden hallinta – Käsikirja terveydenhuollon toimijoille

Käsikirjan tarkoitus on auttaa suomalaisia terveydenhuollon organisaatioita kehittämään kyberhäiriöiden hallinnan prosessejaan ja toimintaohjeitaan, jotta voidaan varmistaa yhteiskunnan kannalta kriittisen terveydenhuollon toiminnan jatkuvuus myös kyberhyökkäysten tapahtuessa. Käsikirja liittyy kiinteästi koronakriisin aiheuttamien haasteiden ratkaisemiseen kyberhäiriöiden hallinnassa. Käsikirjan sisältämät prosessit, ohjeet ja tarkistuslistat on esitetty helposti käytäntöön vietävässä muodossa. Tekniset asiasisällöt ja termit on selitetty lukijalle. Käsikirjan kohderyhmänä […]

HPC-Performance tests

High-performance computing (HPC) is defined as the ability to process a massive amount of data and perform complex calculations at high speeds. Technologies such as DA and AI need the big amount of data and computing resources. Especially the deep learning (DL) and neural network development need lots of computational power which cannot be achieved […]

Quality Criteria for Cyber Security MOOCs

Cyber security MOOCs (Massive Open Online Courses) can enable lifelong learning and increase the cyber security competence of experts and citizens. This paper contributes with a review of existing cyber security MOOCs and MOOC quality assurance frameworks. It then presents quality criteria, which we elicited for evaluating whether cyber security MOOCs are worthy to be […]

Comprehensive Cyber Arena; The Next Generation Cyber Range

The cyber domain and all the interdependencies between networked systems form an extremely complex ensemble. Incidents in the cyber domain may have an abundance effect on the physical domain. For example, a cyber attack or an intrusion against an electricity system may affect the performance of healthcare system as well. For organisation’s cyber resilience, know-how […]