
At the Forefront of New Knowledge
We provide new knowledge for everyone.
Research publications

Publication
16.07.2024
Quantum computing
Quantum computing trends
Machine learning applications of quantum computing: A review

Publication
16.07.2024
Post-quantum cryptography
PQC
Applications of post-quantum cryptography

Publication
16.07.2024
Cyber security
Quantum computing
Cyber protection applications of quantum computing: A review

Publication
08.07.2024
AI and data-analytics
Cyber security
Artificial Intelligence for Security – Enhancing Protection in a Changing World

Publication
17.05.2024
Cyber security
ZZPin: Increase your knowledge
Distribution of Invalid Users on an SSH Server

Publication
17.05.2024
Cyber security
Cyber situation awareness
Refining Cyber Situation Awareness with Honeypots in Case of a Ransomware Attack

Publication
17.05.2024
AI and data-analytics
Cyber security
Artificial Intelligence Cyberattacks in Red Teaming: A Scoping Review

Publication
17.05.2024
Cyber exercise
Cyber security information sharing
Cyber Security Information Sharing During a Large Scale Real Life Cyber Security Exercise

Publication
16.02.2024
Cyber security
Food supply chain
Food Supply Chain Cyber Threats: A Scoping Review

Publication
05.12.2023
Cloud computing
IoT
Modelling Breach Risk in a Network of Interconnected Devices

Publication
16.11.2023
Deep learning
ZZPin: AI and data analytics training
Improved difference images for change detection classifiers in SAR imagery using deep learning

Publication
30.08.2023
Käsikirjat elintarvikeketjun kyberpoikkeamien hallintaan

Publication
23.08.2023
Hyperspectral imaging
Low-rank matrix
Parameter Optimization for Low-Rank Matrix Recovery in Hyperspectral Imaging

Publication
11.08.2023
Capture the flag
Cyber range
Participants Prefer Technical Hands-on Cyber Exercises Instead of Organisational and Societal Ones

Publication
16.06.2023
Digital twin
Food supply chain
Digital Twin of Food Supply Chain for Cyber Exercises

Publication
02.05.2023
Cyber exercise
Cyber security
Learn to Train Like You Fight

Publication
15.02.2023
Cyber exercise
Cyber security
Multi-National Cyber Security Exercise, Case Flagship 2

Publication
09.01.2023
Artificial intelligence
Cyber security
Artificial Intelligence and Cybersecurity: Theory and Applications

Publication
02.01.2023
Cyber exercise
Cyber range
Cyber Range Technical Federation: Case Flagship 1 Exercise

Publication
31.12.2022
Cyber security
Education
Cybersecurity education in universities of applied sciences

Publication
13.12.2022
Cyber security
Education
Analysing Finnish Cybersecurity Thesis Topics Using Taxonomic Frameworks

Publication
03.10.2022
Classification
CyberSecurity
Chromatic and Spatial Analysis of One-Pixel Attacks Against an Image Classifier

Publication
01.08.2022
Cyber security
Healthcare
Model Fooling Threats Against Medical Imaging

Publication
16.06.2022
AI and data-analytics
Artificial intelligence
Development of Data-Driven Curriculum Courses in the Bachelor of Engineering Degree Program

Publication
08.06.2022
Researching graduated cyber security students: Reflecting employment and job responsibilities through NICE framework

Publication
08.06.2022
Pedagogical and self-reflecting approach to improving the learning within a cyber exercise

Publication
18.05.2022
Artificial Intelligence in the IoT Era: A Review of Edge AI Hardware and Software

Publication
18.05.2022
Detecting One-Pixel Attacks Using Variational Autoencoders

Publication
18.05.2022
Modelling Medical Devices with Honeypots: A Conceptual Framework

Publication
21.04.2022
Cyber exercise
Cyber security
Key Elements of On-Line Cyber Security Exercise and Survey of Learning During the On-Line Cyber Security Exercise

Publication
07.01.2022
CyberSecurity
MachineLearning
One-Pixel Attack Deceives Computer-Assisted Diagnosis of Cancer

Publication
01.09.2021
Cyber Range: Preparing for Crisis or Something Just for Technical People?

Publication
26.05.2021
CyberSecurity
Healthcare
Color-Optimized One-Pixel Attack Against Digital Pathology Images

Publication
23.04.2021
Cyber security
One-Pixel Attacks Against Medical Imaging: A Conceptual Framework

Publication
24.03.2021
Cyber security
publication
Assessing Cyber Security Education through NICE Cybersecurity Workforce Framework

Publication
16.03.2021
Cyber security
cyber security exercise
Measuring Learning in a Cyber Security Exercise

Publication
07.01.2021
Modelling Medical Devices with Honeypots

Publication
04.01.2021
digiturvallisuus
käsikirja
Kyberhäiriöiden hallinta – Käsikirja terveydenhuollon toimijoille

Publication
17.12.2020
AI
High-performanse computing
HPC-Performance tests

Publication
09.11.2020
Cyber security
MOOCs
Quality Criteria for Cyber Security MOOCs

Publication
27.10.2020
cyber arena
Cyber range
Comprehensive Cyber Arena; The Next Generation Cyber Range

Publication
09.10.2020
CyberSecurity
CyberSecurityExercise
Review of Pedagogical Principles of Cyber Security Exercises

Publication
07.10.2020
CyberSec4Europe
CyberSecurity
Model Fooling Attacks Against Medical Imaging: A Short Survey

Publication
28.08.2020
CyberSecurity
Healthcare
Model for Cyber Security Information Sharing in Healthcare Sector

Publication
08.06.2020
AnomalyDetection
AutoregressiveNeuralNetworks
Statistical Evaluation of Artificial Intelligence -Based Intrusion Detection System

Publication
30.04.2020
ArtificialIntelligence
DataAnalytics
JAMK High Performance Computing

Publication
27.10.2019
CyberSecurity
CyberSecurityDegreeProgramme
A Design Model for a Degree Programme in Cyber Security

Publication
12.09.2019
AnomalyDetection
ConvolutionalNeuralNetworks
Network Anomaly Detection Based on WaveNet

Publication
19.08.2019
CyberSecurityExercise
DataSecurity
Pedagogical Aspects of Cyber Security Exercises

Publication
03.04.2019
Requirements for Training and Evaluation Dataset of Network and Host Intrusion Detection System

Publication
14.02.2019
Anomaly-Based Network Intrusion Detection Using Wavelets and Adversarial Autoencoders

Publication
29.09.2018
Blue Team Communication and Reporting for Enhancing Situational Awareness from White Team Perspective in Cyber Security Exercises

Publication
29.12.2016
AnomalyDetection
CyberSecurity
On Application-Layer DDoS Attack Detection in High-Speed Encrypted Networks

Publication
20.09.2016
Weighted Fuzzy Clustering for Online Detection of Application DDoS Attacks in Encrypted Network Traffic

Publication
20.09.2016
Architecture for the Cyber Security Situational Awareness System

Publication
18.05.2016
Increasing Web Service Availability by Detecting Application-Layer DDoS Attacks in Encrypted Traffic

Publication
18.05.2016
Model for Sharing the Information of Cyber Security Situation Awareness between Organizations

Publication
13.08.2015
Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol

Publication
13.08.2015
Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise

Publication
29.07.2015
Online detection of anomalous network flows with soft clustering

Publication
18.05.2016
Increasing Web Service Availability by Detecting Application-Layer DDoS Attacks in Encrypted Traffic

Publication
18.05.2016
Model for Sharing the Information of Cyber Security Situation Awareness between Organizations

Publication
13.08.2015
Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol

Publication
13.08.2015
Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise

Publication
29.07.2015
Online detection of anomalous network flows with soft clustering

Publication
27.08.2014