Publication

Image of a publication paper

Cyber attacks against the food supply chain could have serious effects on our society. As more networked systems control all aspects of the food supply chain, understanding these threats has become more critical. This research aims to gain a better understanding of the threat landscape by reviewing the existing literature about the topic. Previous research Food Supply Chain Cyber Threats: A Scoping Review

Image of a publication paper

The Internet of Things, a network of interconnected devices that can form chains, is becoming increasingly more prevalent. Connecting devices together brings with it an inherent amount of additional cyber security related risk. Quantitative calculations of breach risks related to connecting devices to a server were made for a set of randomly generated networks. The Modelling Breach Risk in a Network of Interconnected Devices

Three persons from food chain infustries standing

Käsikirjojen tarkoitus on auttaa suomalaisia elintarvikeketjun toimijoita kehittämään kyberhäiriöiden hallinnan prosessejaan ja toimintaohjeitaan, jotta voidaan varmistaa yhteiskunnan kannalta kriittisen elintarvikeketjun toiminnan jatkuvuus myös kyberhyökkäysten tapahtuessa. Käsikirjojen kohderyhminä ovat kaikki alkutuotannon, elintarviketeollisuuden sekä kaupan ja jakelun parissa työskentelevät. Lukemalla omaa toimialaasi koskevan käsikirjan: Lataa käsikirjat Kyberturvallisuus alkutuotannossa -käsikirja kyberpoikkeamien hallintaan Kyberturvallisuus elintarviketeollisuudessa -käsikirja kyberpoikkeamien hallintaan Kyberturvallisuus Käsikirjat elintarvikeketjun kyberpoikkeamien hallintaan

Image of a publication paper

In hyperspectral imaging, spectral signatures of objects are recorded for each image pixel. The spectral signature of an object is the reflectance variation or function with respect to the wavelength. It is important for characterizing materials and their properties. In hyperspectral imaging, different types of noise appear due to environmental or instrumental influences. An approach Parameter Optimization for Low-Rank Matrix Recovery in Hyperspectral Imaging

Image of a publication paper

The purpose of our research was to conduct a preliminary assessment of the cybersecurity exercise participants to learn about their skills and expectations. Assessment was used for fine-tuning the exercise.

Image of a publication paper

The food supply chain is a critical part of modern societies. As with other facets of life, it is thoroughly digitalized, and uses network connections. Consequently, the cyber security of the supply chain becomes a major concern as new threats emerge. Cyber ranges can be used to prepare for such cyber security threats by creating Digital Twin of Food Supply Chain for Cyber Exercises

Image of a publication paper

This qualitative study includes nine semi-structured interviews with cybersecurity experts from different security-related organizations who are familiar with cybersecurity exercises. Its contribution to cybersecurity workforce development focuses on organizational learning rather than individual skills development and relevant competencies. It was found that the utilization of thematic analysis methods develop individual readiness and expertise. It also Learn to Train Like You Fight

Image of a publication paper

Cyber security is not merely about securing devices and focusing on software and hardware. Staff members with skills and know-how are among the most valuable assets in the context of cyber security. Globally, there is a lack of competent cyber security experts available and cyber security skills should be educated more widely. One of the Multi-National Cyber Security Exercise, Case Flagship 2

Image of a publication paper

This book discusses artificial intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of artificial intelligence when considering privacy, cyber-attacks and defence as well as applications from malware detection to radio signal intelligence.The chapters are contributed by an international team of renown researchers and Artificial Intelligence and Cybersecurity: Theory and Applications