Research output
- 1 - 25 out of 270 results
Search results
-
CryptoVault-A Secure Hardware Wallet for Decentralized Key Management
Lehto, N., Halunen, K., Latvala, O. M., Karinsalo, A. & Salonen, J., 23 Aug 2021, 2021 IEEE International Conference on Omni-Layer Intelligent Systems, COINS 2021. IEEE Institute of Electrical and Electronic Engineers, 4 p.Research output: Chapter in Book/Report/Conference proceeding › Conference article in proceedings › Scientific › peer-review
8 Citations (Scopus) -
Cyber security of critical infrastructures
Mantere, M., Halunen, K. & Pentikäinen, H., 2013, Research highlights in safety and security. Espoo: VTT Technical Research Centre of Finland, p. 58-59 (VTT Research Highlights; No. 10).Research output: Chapter in Book/Report/Conference proceeding › Chapter or book article › Professional
Open Access8 Citations (Scopus) -
Consolidating cybersecurity in Europe: A case study on job profiles assessment
Budde, C. E., Karinsalo, A., Vidor, S., Salonen, J. & Massacci, F., Apr 2023, In: Computers and Security. 127, 103082.Research output: Contribution to journal › Article › Scientific › peer-review
Open Access6 Citations (Scopus) -
Cybersecurity of Cyber Ranges: Threats and Mitigations
Noponen, S., Pärssinen, J. & Salonen, J., 2022, In: International Journal for Information Security Research (IJISR). 12, 1, p. 1032-1040Research output: Contribution to journal › Article › Scientific › peer-review
Open Access -
Review on Cybersecurity Threats Related to Cyber Ranges
Noponen, S., Pärssinen, J. & Salonen, J., 2021, International Conference for Internet Technology and Secured Transactions (ICITST-2021). Infonomics Society, p. 34-39Research output: Chapter in Book/Report/Conference proceeding › Conference article in proceedings › Scientific › peer-review
-
CSEC+ framework assessment dataset: Expert evaluations of cybersecurity skills for job profiles in Europe
Budde, C. E., Karinsalo, A., Vidor, S., Salonen, J. & Massacci, F., Jun 2023, In: Data in Brief. 48, 109285.Research output: Contribution to journal › Article › Scientific › peer-review
Open Access -
Improving the Digital Security of Smart Energy Systems with Smart Contracts
Koskela, P., Salonen, J. & Pärssinen, J., 2022, Data Mining and Machine Learning: 3rd International Conference on Data Mining and Machine Learning (DMML 2022). Wyld, D. & Nagamalai, D. (eds.). 7 ed. AIRCC Publishing Corporation, Vol. 12. 10 p. 11Research output: Chapter in Book/Report/Conference proceeding › Conference article in proceedings › Scientific › peer-review
Open Access -
Enhancing Border Checks with Blockchain towards Self-Sovereign Identity
Koskela, P., Paananen, J., Karinsalo, A. & Salmela, L., 13 Dec 2022. 2 p.Research output: Contribution to conference › Conference Abstract › Scientific › peer-review
Open Access -
ARCS-R: Mission Critical Combined Reliability and Cybersecurity Systems Engineering Analysis
Van Bossuyt, D. L., Papakonstantinou, N., Hale, B., Arlitt, R. & Palatheerdham, S. R., 2024, RAMS 2024 - Annual Reliability and Maintainability Symposium: Proceedings. IEEE Institute of Electrical and Electronic Engineers, 8 p. (Proceedings - Annual Reliability and Maintainability Symposium).Research output: Chapter in Book/Report/Conference proceeding › Conference article in proceedings › Scientific › peer-review
1 Citation (Scopus) -
The Role of Machine Learning Algorithms in Smart Grid Cybersecurity
Diaba, S. Y., 2024, 2024 International Workshop on Artificial Intelligence and Machine Learning for Energy Transformation, AIE 2024. IEEE Institute of Electrical and Electronic Engineers, 7 p.Research output: Chapter in Book/Report/Conference proceeding › Conference article in proceedings › Scientific › peer-review
1 Citation (Scopus) -
Implementing Post-quantum Cryptography for Developers
Hekkala, J., Halunen, K. & Vallivaara, V., 2022, Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP. SciTePress, p. 73-83Research output: Chapter in Book/Report/Conference proceeding › Conference article in proceedings › Scientific › peer-review
Open Access -
Cybersecurity considerations for AI-based systems in border management
Salmela, L., Papakonstantinou, N., Aaltola, K., Siirtola, H. & Sailio, M., Dec 2021, In: Border Security Report. 21, p. 42-46Research output: Contribution to journal › Article › Professional
Open Access -
Post-Quantum Cryptography Overview and Digital Credentials
Hieta-aho, E., 16 Jul 2024.Research output: Contribution to conference › Other conference contribution › Scientific
-
Disruptive Technological Directions for 6G Security
Ahmad, I., Suomalainen, J., Shahabuddin, S., Porambage, P., Karinsalo, A., Osorio, D. P. M. & Höyhtyä, M., 27 Nov 2024, 2024 IEEE Conference on Standards for Communications and Networking (CSCN). IEEE Institute of Electrical and Electronic Engineers, p. 79-85 10849699Research output: Chapter in Book/Report/Conference proceeding › Conference article in proceedings › Scientific › peer-review
-
On the Similarities between Blockchains and Merkle-Damgård Hash Functions
Halunen, K., Vallivaara, V. & Karinsalo, A., 9 Aug 2018, Proceedings - 2018 IEEE 18th International Conference on Software Quality, Reliability, and Security Companion, QRS-C 2018. IEEE Institute of Electrical and Electronic Engineers, p. 129-134 6 p. 8431963Research output: Chapter in Book/Report/Conference proceeding › Conference article in proceedings › Scientific › peer-review
5 Citations (Scopus) -
Security of lattice-based cryptography
Hieta-aho, E., Rautell, M. & Lintulampi, A., 24 Jan 2025.Research output: Contribution to conference › Conference Poster › Scientific
Open AccessFile69 Downloads (Pure) -
Streamline Border Control with Blockchain Towards Self-Sovereign Identity
Koskela, P., Karinsalo, A., Paananen, J. & Salmela, L., 2022, 3rd International Conference on Software Engineering, Security and Blockchain (SESBC 2022). AIRCC Publishing Corporation, 19 p. (Computer Science & Information Technology (CS & IT)).Research output: Chapter in Book/Report/Conference proceeding › Conference article in proceedings › Scientific › peer-review
-
Using Post Quantum Cryptography for Self-Sovereign Identity Today
Hieta-aho, E. & Lipiäinen, V., 6 Nov 2024, p. 26.Research output: Contribution to conference › Other conference contribution › Scientific
Open AccessFile7 Downloads (Pure) -
Cybersecurity situational awareness taxonomy
Evesti, A., Kanstrén, T. & Frantti, T., 18 Oct 2017, 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, Cyber SA 2017. IEEE Institute of Electrical and Electronic Engineers, 8 p. 8073386Research output: Chapter in Book/Report/Conference proceeding › Conference article in proceedings › Scientific › peer-review
25 Citations (Scopus) -
Review of the use of human senses and capabilities in cryptography
Halunen, K. & Latvala, O.-M., 1 Feb 2021, In: Computer Science Review. 39, 100340.Research output: Contribution to journal › Review Article › peer-review
Open AccessFile16 Citations (Scopus)151 Downloads (Pure) -
Managing cyber and physical risk of water entities
Poussa, L., Pentikäinen, H., Molarius, R., Noponen, S. & Välisalo, T., 2017, SRA Nordic 2017 Abstracts.Research output: Chapter in Book/Report/Conference proceeding › Conference abstract in proceedings › Scientific
Open Access -
Impact of Cyber and Physical Incidents in Finnish Water Utilities
Karinsalo, A. & Pentikäinen, H., 2017, In: International Journal of Industrial Control Systems Security IJICSS. 2, 1, p. 73-82 9 p.Research output: Contribution to journal › Article › Professional
Open Access -
A Study on Impact Analysis of Incidents in Finnish Water Utilities
Karinsalo, A. & Pentikäinen, H., 2017. 6 p.Research output: Contribution to conference › Conference article › Scientific › peer-review
-
Identity-based cryptography in credit card payments
Halunen, K. & Sailio, M., 2014, Cryptography and Security Systems. Springer, p. 49-58 (Communications in Computer and Information Science, Vol. 448).Research output: Chapter in Book/Report/Conference proceeding › Conference article in proceedings › Scientific › peer-review
-
Participants Prefer Technical Hands-on Cyber Exercises Instead of Organisational and Societal Ones
Päijänen, J., Salonen, J., Karinsalo, A., Sipola, T. & Kokkonen, T., 19 Jun 2023, Proceedings of the 22nd European Conference on Cyber Warfare and Security. Andreatos, A. & Douligeris, C. (eds.). 1 ed. Curran Associates Inc., Vol. 22. p. 349-357 9 p. (European Conference on Information Warfare and Security, ECCWS, Vol. 2023-June).Research output: Chapter in Book/Report/Conference proceeding › Conference article in proceedings › Scientific › peer-review
Open Access