cyber security
http://www.yso.fi/onto/yso/p26189
Related people
Related publications and other outputs
- Defensive Machine Learning Methods and the Cyber Defence Chain (2023) Turtiainen, Hannu; et al.; A3; 978-3-031-15030-2
- Information Security Risk Assessments following Cybersecurity Breaches : The Mediating Role of Top Management Attention to Cybersecurity (2023) Shaikh, Faheem Ahmed; et al.; A1; OA
- Offensive Machine Learning Methods and the Cyber Kill Chain (2023) Turtiainen, Hannu; et al.; A3; 978-3-031-15030-2
- On Attacking Future 5G Networks with Adversarial Examples : Survey (2023) Zolotukhin, Mikhail; et al.; A1; OA
- Seeking Rhetorical Validity in Fear Appeal Research : An Application of Rhetorical Theory (2023) Johnston, Allen; et al.; A1
- Use of Artificial Intelligence in a Cybersecurity Environment (2023) Vähäkainu, Petri; et al.; A3; 978-3-031-15030-2
- APT Cyber-attack Modelling : Building a General Model (2022) Lehto, Martti; A4; OA
- Assessment of Cybersecurity Risks: Maritime Automated Piloting Process (2022) Pöyhönen, Jouni; et al.; A4; OA
- Citizens' Cybersecurity Behavior : Some Major Challenges (2022) Li, Ying; et al.; A1; OA
- Cyber-Attacks Against Critical Infrastructure (2022) Lehto, Martti; A3; OA; 978-3-030-91293-2