Publication

Image of a publication paper

Cyber security plays an important role in the modern smart hospital environment. In these environments, one of the key assets brought to attention are the medical devices. Cyber threats relating to medical devices may affect patient safety, privacy, and hospital operations. As these devices are relatively closed on the technical level, possibilities to collect log Modelling Medical Devices with Honeypots: A Conceptual Framework

Image of a publication paper

In the domain of cyber security, the most valuable assets are skills and know-how, so the basic ambition for conducting the cyber security exercises for individuals and for organisations is the learning. In this research, the learning experience during the state-of-the-art on-line remote cyber security exercise is studied.

Image of a publication paper

Computer vision and machine learning can be used to automate various tasks in cancer diagnostic and detection. If an attacker can manipulate the automated processing, the results can be devastating and in the worst case lead to wrong diagnosis and treatment. In this research, the goal is to demonstrate the use of one-pixel attacks in One-Pixel Attack Deceives Computer-Assisted Diagnosis of Cancer

Image of a publication paper

This article attempts to reveal the secrets behind cyber ranges and their use focusing on suitable target environments, common functions, and use cases.

Image of a publication paper

Modern artificial intelligence based medical imaging tools are vulnerable to model fooling attacks. Automated medical imaging methods are used for supporting the decision making by classifying samples as regular or as having characters of abnormality. One use of such technology is the analysis of whole-slide image tissue samples. Consequently, attacks against artificial intelligence based medical Color-Optimized One-Pixel Attack Against Digital Pathology Images

Image of a publication paper

This paper explores the applicability of one-pixel attacks against medical imaging. Successful attacks are threats that could cause mistrust towards artificial intelligence solutions and the healthcare system in general. Nowadays it is common to build artificial intelligence models to classify medical imaging modalities as either normal or as having indications of disease. One-pixel attack is One-Pixel Attacks Against Medical Imaging: A Conceptual Framework

Image of a publication paper

This paper presents the results of research and assessment of cyber security education in higher education in Europe and the United States of America. The quantitative research data of the education curricula was gathered and mapped to NICE Cybersecurity Workforce Framework (NCWF) categories to provide a common background for data comparison and analysis. The research Assessing Cyber Security Education through NICE Cybersecurity Workforce Framework

Image of a publication paper

In recent years, cyber security exercises have established themselves as an integral part of cyber security education. Cyber security professionals usually work as a part of a team that monitors and responds to incidents in the environment. A sufficiently realistic complex learning environment is necessary for collaborative learning at the expert level. Evaluating the learning Measuring Learning in a Cyber Security Exercise

Image of a publication paper

Cyber security is one of the key priorities in the modern digitalised and complex network totality. One of the major domains of interest is the healthcare sector where a cyber incident may cause unprecedented circumstances. In the healthcare domain there are abundant networked systems, software and hardware, which may be vulnerable for a cyber intrusion Modelling Medical Devices with Honeypots

Käsikirjan tarkoitus on auttaa suomalaisia terveydenhuollon organisaatioita kehittämään kyberhäiriöiden hallinnan prosessejaan ja toimintaohjeitaan, jotta voidaan varmistaa yhteiskunnan kannalta kriittisen terveydenhuollon toiminnan jatkuvuus myös kyberhyökkäysten tapahtuessa. Käsikirja liittyy kiinteästi koronakriisin aiheuttamien haasteiden ratkaisemiseen kyberhäiriöiden hallinnassa. Käsikirjan sisältämät prosessit, ohjeet ja tarkistuslistat on esitetty helposti käytäntöön vietävässä muodossa. Tekniset asiasisällöt ja termit on selitetty lukijalle. Käsikirjan kohderyhmänä Kyberhäiriöiden hallinta – Käsikirja terveydenhuollon toimijoille