يعرض 1 - 20 نتائج من 224 نتيجة بحث عن '"verkkohyökkäykset"', وقت الاستعلام: 0.55s تنقيح النتائج
  1. 1
    Academic Journal
  2. 2
    Conference

    المؤلفون: Takamaa, Markus, Lehto, Martti

    المساهمون: Lehto, Martti, Karjalainen, Mika

    وصف الملف: application/pdf; 788-794; fulltext

    Relation: Proceedings of the 23rd European Conference on Cyber Warfare and Security; Proceedings of the European Conference on Cyber Warfare and Security; 23; European Conference on Cyber Warfare and Security; KSL/115/04.03.04.00/2022; Regional Council of Central Finland; Keski-Suomen liitto; CONVID_220829367

  3. 3
    Book

    المساهمون: Sipola, Tuomo, Kokkonen, Tero, Karjalainen, Mika

    وصف الملف: application/pdf; 125-145; fulltext

    Relation: Artificial Intelligence and Cybersecurity : Theory and Applications; CONVID_164482646

  4. 4
    Book

    المساهمون: Sipola, Tuomo, Kokkonen, Tero, Karjalainen, Mika

    وصف الملف: application/pdf; 147-163; fulltext

    Relation: Artificial Intelligence and Cybersecurity : Theory and Applications; CONVID_164483875

  5. 5
    Academic Journal

    المساهمون: Suni, Elina, fi=Jyväskylän ammattikorkeakoulu|sv=Jyväskylän ammattikorkeakoulu|en=JAMK University of Applied Sciences

    Relation: http://www.theseus.fi/handle/10024/788854; URN:ISBN:978-951-830-679-8

  6. 6
    Academic Journal

    المساهمون: Suni, Elina, fi=Jyväskylän ammattikorkeakoulu|sv=Jyväskylän ammattikorkeakoulu|en=JAMK University of Applied Sciences

    Relation: http://www.theseus.fi/handle/10024/788853; URN:ISBN:978-951-830-677-4

  7. 7
    Academic Journal
  8. 8
    Academic Journal
  9. 9
    Academic Journal

    المؤلفون: Pöyhönen, Jouni, Lehto, Martti

    وصف الملف: application/pdf; fulltext

    Relation: Frontiers in Computer Science; Pöyhönen, J., & Lehto, M. (2023). Comprehensive cyber security for port and harbor ecosystems. Frontiers in Computer Science , 5 , Article 1154069. https://doi.org/10.3389/fcomp.2023.1154069; CONVID_194361681

  10. 10
    Academic Journal

    وصف الملف: application/pdf; fulltext

    Relation: Engineering Applications of Artificial Intelligence; 120; Shukla, A., Srivastav, S., Kumar, S., & Muhuri, P. (2023). UInDeSI4.0 : An efficient Unsupervised Intrusion Detection System for network traffic flow in Industry 4.0 ecosystem. Engineering Applications of Artificial Intelligence , 120 , Article 105848. https://doi.org/10.1016/j.engappai.2023.105848; CONVID_176577639

  11. 11
    Book

    المساهمون: Lehto, Martti, Neittaanmäki, Pekka

    وصف الملف: application/pdf; 403-417; fulltext

    Relation: Cyber Security : Critical Infrastructure Protection; Computational Methods in Applied Sciences; CONVID_117608196

  12. 12
    Book

    المؤلفون: Lehto, Martti

    المساهمون: Lehto, Martti, Neittaanmäki, Pekka

    وصف الملف: application/pdf; 3-42; fulltext

    Relation: Cyber Security : Critical Infrastructure Protection; Computational Methods in Applied Sciences; CONVID_117611414

  13. 13
    Book

    المساهمون: Lehto, Martti, Neittaanmäki, Pekka

    وصف الملف: application/pdf; 255-292; fulltext

    Relation: Cyber Security : Critical Infrastructure Protection; Computational Methods in Applied Sciences; CONVID_117606286

  14. 14
    Conference

    المساهمون: Andreatos, Antonios, Douligeris, Christos

    وصف الملف: application/pdf; 439-449; fulltext

    Relation: Proceedings of the 22nd European Conference on Cyber Warfare and Security; Proceedings of the European Conference on Cyber Warfare and Security; European Conference on Cyber Warfare and Security; CONVID_183733020

  15. 15
    Conference

    المساهمون: Andreatos, Antonios, Douligeris, Christos

    وصف الملف: application/pdf; 696-702; fulltext

    Relation: Proceedings of the 22nd European Conference on Cyber Warfare and Security; Proceedings of the European Conference on Cyber Warfare and Security; 22; European Conference on Cyber Warfare and Security; CONVID_183732061

  16. 16
    Academic Journal
  17. 17
    Academic Journal
  18. 18
    Academic Journal
  19. 19
    Academic Journal

    وصف الملف: application/pdf; 259-269; fulltext

    Relation: Journal of Computer Virology and Hacking Techniques; 18; CONVID_103952880

  20. 20
    Academic Journal