Publication

Image of a publication paper

High-performance computing (HPC) is defined as the ability to process a massive amount of data and perform complex calculations at high speeds. Technologies such as DA and AI need the big amount of data and computing resources. Especially the deep learning (DL) and neural network development need lots of computational power which cannot be achieved HPC-Performance tests

Image of a publication paper

Cyber security MOOCs (Massive Open Online Courses) can enable lifelong learning and increase the cyber security competence of experts and citizens. This paper contributes with a review of existing cyber security MOOCs and MOOC quality assurance frameworks. It then presents quality criteria, which we elicited for evaluating whether cyber security MOOCs are worthy to be Quality Criteria for Cyber Security MOOCs

Image of a publication paper

The cyber domain and all the interdependencies between networked systems form an extremely complex ensemble. Incidents in the cyber domain may have an abundance effect on the physical domain. For example, a cyber attack or an intrusion against an electricity system may affect the performance of healthcare system as well. For organisation’s cyber resilience, know-how Comprehensive Cyber Arena; The Next Generation Cyber Range

Image of a publication paper

Modern digitalized cyber domains are extremely complex ensemble. Cyber attacks or incidents against system may affect capricious effects for another system or even for physical devices. For understanding and training to encounter those effects requires an effective and complex simulation capability. Cyber Security Exercises are an effective expedient for training and learning measures and operations Review of Pedagogical Principles of Cyber Security Exercises

Image of a publication paper

This study aims to find a list of methods to fool artificial neural networks used in medical imaging. We collected a short list of publications related to machine learning model fooling to see if these methods have been used in the medical imaging domain. Specifically, we focused our interest to pathological whole slide images used Model Fooling Attacks Against Medical Imaging: A Short Survey

Image of a publication paper

In the modern society almost all services are based on data-networks and networked systems. Especially through the growing digitalization an increasing number of services is connected to data-networks. One example of a highly digitalized domain is the healthcare sector, where a cyber-attack could cause extreme circumstances. Decision making requires knowledge about the current situation. Particularly, Model for Cyber Security Information Sharing in Healthcare Sector

Image of a publication paper

Training neural networks with captured real-world network data may fail to ascertain whether or not the network architecture is capable of learning the types of correlations expected to be present in real data. In this paper we outline a statistical model aimed at assessing the learning capability of neural network-based intrusion detection system. We explore Statistical Evaluation of Artificial Intelligence -Based Intrusion Detection System

Image of a publication paper

High-performance computing (HPC) is defined as the ability to process a massive amount of data and perform complex calculations at high speeds. Technologies such as DA and AI need the big amount of data and computing resources. Especially the deep learning (DL) and neural network development need lots of computational power which cannot be achieved JAMK High Performance Computing

Image of a publication paper

The need for skillful cyber security workforce has increased dramatically during the last ten years. The contents of the degree programmes have not been able to respond to this need adequately and the curriculum contents have not always met the industry’s knowledge needs. In this paper, we describe a model for designing a degree programme A Design Model for a Degree Programme in Cyber Security

Image of a publication paper

Increasing amount of attacks and intrusions against networked systems and data networks requires sensor capability. Data in modern networks, including the Internet, is often encrypted, making classical traffic analysis complicated. In this study, we detect anomalies from encrypted network traffic by developing an anomaly based network intrusion detection system applying neural networks based on the Network Anomaly Detection Based on WaveNet