Category Archives: Completed

Cyber security incident response processes and guidelines in healthcare environments

The project will develop cyber security incident response processes and guidelines for healthcare environments, to improve and ensure the continuity of socially critical healthcare also if cyber-attacks occur. In the midst of the COVID-19 crisis, the project is very topical and there is a great need for preparedness for cyber threats. Numerous cyber-attacks targeted to […]

Applying artificial intelligence for anomaly based network intrusion detection system, phase 2

The aim of the program is to apply open source Artificial Intelligence (AI) for the development of a Network Intrusion Detection System (IDS). Also visualization of IDS detection and AI analysis is studied for achieving better Situational Awareness (SA) supporting the decision making in a complex cyber domain. As a result, a pilot application applying […]

EDA Cyber Ranges

The first ever Cyber Defence Pooling & Sharing Project under the EU pooling & sharing agenda with support from EDA. The project focuses on increasing the availability of existing and emerging cyber range facilities at European level. Additionally the project not only aims at increasing the occupation rate and efficiency of cyber ranges and platforms […]

Information Secure R&D-environment for Data Analytics

The purpose of the project is to implement needed investments in order to plan, build and deploy an integrated, information secure data analytics development environment. It enables to improve data analytics know-how as well as develop and pilot concrete solutions of dark data utilizing data analytics solutions, which help companies to create new business opportunities […]

New Business Innovations from Data-analytics

The purpose of the project is to add to data analytics know-how as well as develop and pilot concrete solutions of dark data utilizing data analytics solutions, which help companies to create new business opportunities or increase the growth in their business and add to the amount of vacant jobs. Companies in energy sector or […]

Applying AI for anomaly based network intrusion detection system, phase 1

The aim of the program is to compare, investigate and apply open source AI framework for the development of a Network Intrusion Detection System. As a result, a pilot application applying AI for anomaly based Intrusion Detection System is generated and tested. Duration 1.1.2018-31.11.2018

Continuous Integration for the Collaborative Analysis of Incidents (CinCan)

The purpose of the CinCan project is to establish continuous analysis of incident data as a part of CERT or CIRT functionalities, using tools and interfaces to rapidly create, augment, correlate and share analysis and threat intelligence in collaboration. https://cincan.io/ Duration 01/2018 – 12/2019     

Cyber Competence 2020

The three-year Cyber Competence 2020 project started on 28th of February, 2017. The project’s main objective is to form specialization studies in cybercrime prevention at the Police University College of Finland by 2020. This objective will be achieved in close collaboration with the Institute of Information Technology of the Jyväskylä University of Applied Sciences (JAMK).

FINCSC PLUS project

The aim of the project is to create an assessment model named FINCSC PLUS that expands the basic-level assessment model FINCSC set up for assessing the level of cybersecurity in SMEs in particular. Duration 02/2017 – 08/2018 Funding programme Appropriation for launching regional innovations and experiments (AIKO) Implementing party JAMK University of Applied Sciences Ltd, Institute […]

Business Growth from IoT

Internet is changing towards the Internet of Things concept (IoT), where almost all devices are connected to the network. In addition, various services, which are still delivered through physical access points, move to the Internet. The same trend is also apparent in vehicles turning into service platforms, industrial equipment and plants. This requires sensors, embedded […]