Haku
Viitteet 1-10 / 10
Maidonkeräilykuljetusten suunnittelu : Arla Ingman Oy ab
(Jyväskylän ammattikorkeakoulu, 2012)
Kuljetuskustannukset ovat merkittävä osa teollisuuden kustannusrakennetta. Kehittämällä kuljetusjärjestelmää voidaan saavuttaa merkittäviä parannuksia yrityksen kannattavuuteen. Säästöpaineita kuljetuskustannuksille on ...
Network anomaly detection based on WaveNet
(Springer, 2019)
Increasing amount of attacks and intrusions against networked systems and data networks requires sensor capability. Data in modern networks, including the Internet, is often encrypted, making classical traffic analysis ...
Anomaly-Based Network Intrusion Detection Using Wavelets and Adversarial Autoencoders
(Springer, 2019)
The number of intrusions and attacks against data networks and networked systems increases constantly, while encryption has made it more difficult to inspect network traffic and classify it as malicious. In this paper, an ...
Requirements for training and evaluation dataset of network and host intrusion detection system
(Springer, 2019)
In the cyber domain, situational awareness of the critical assets is extremely important. For achieving comprehensive situational awareness, accurate sensor information is required. An important branch of sensors are ...
Architecture for the Cyber Security Situational Awareness System
(Springer, 2016)
Abstract. Networked software systems have a remarkable and critical role in the modern society. There are critical software systems in every business area. At the same time, the amount of cyber-attacks against those critical ...
Analysis of approaches to Internet traffic generation for cyber security research and excercise
(Springer, 2015)
Because of the severe global security threat of malwares, vulnerabilities and attacks against networked systems cyber-security research, training and exercises are required for achieving cyber resilience of organizations. ...
A design model for a degree programme in cyber security
(Association for Computing Machinery, 2019)
The need for skillful cyber security workforce has increased dramatically during the last ten years. The contents of the degree programmmes have not been able to respond to this need adequately and the curriculum contents ...
Pedagogical aspects of cyber security exercises
(Institute of Electrical and Electronics Engineers IEEE, 2019)
Cyber security exercises (CSE) are complex learning experiences aimed at developing expert knowledge and competence through simulation. In this paper we examine pedagogical issues relating to CES, from exercise design to ...
Blue team communication and reporting for enhancing situational awareness from white team perspective in cyber security exercises
(Springer, 2018)
Cyber security exercises allow individuals and organisations to train and test their skills in complex cyber attack situations. In order to effectively organise and conduct such exercise, the exercise control team must ...
On Application Layer DDoS Attack Detection in High-Speed Encrypted Networks
(Advanced Institute of Convergence IT, 2016)
Application-layer denial-of-service attacks have become a serious threat to modern high-speed computer networks and systems. Unlike network-layer attacks, application-layer attacks can be performed by using legitimate ...