Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Pentikäinen, Heimo"'
Autor:
Pentikäinen, Heimo, Malm, Timo
Publikováno v:
Pentikäinen, H, Malm, T & Heikkilä, E (ed.) 2019, Cybersecurity in Autonomous Machine Systems Development . VTT Research Report, no. VTT-R-01087-19, VTT Technical Research Centre of Finland .
Autonomous machine systems (AMS) are typically software-intensive and highly connected systems. Thus, cybersecurity is one of the key aspects to be considered in their development. This report provides an overview of the cybersecurity related issues,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=355e65625b88::61ca6aa1e7bbaf0a546bde81d43ff389
https://cris.vtt.fi/ws/files/26679650/VTT_R_01087_19.pdf
https://cris.vtt.fi/ws/files/26679650/VTT_R_01087_19.pdf
Autor:
Karinsalo, Anni, Pentikäinen, Heimo
Publikováno v:
Karinsalo, A & Pentikäinen, H 2017, ' Impact of Cyber and Physical Incidents in Finnish Water Utilities ', International Journal of Industrial Control Systems Security IJICSS, vol. 2, no. 1, pp. 73-82 . https://doi.org/10.20533/ijicss.9781.9083.20346.2017.0008
Critical Infrastructure (CI) companies are facing more and more cyber and other incidents, either by direct attacks or by accident. The result can be unexpected. The cascading of these incidents can also be due to many reasons. In this paper, we stud
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=355e65625b88::06b21894946ab2cbcea421f2afd9d376
https://cris.vtt.fi/en/publications/e9d08a4d-54e7-411a-8194-bbfc8eafb491
https://cris.vtt.fi/en/publications/e9d08a4d-54e7-411a-8194-bbfc8eafb491
Publikováno v:
Mantere, M, Halunen, K & Pentikäinen, H 2013, Cyber security of critical infrastructures . in Research highlights in safety and security . VTT Technical Research Centre of Finland, Espoo, VTT Research Highlights, no. 10, pp. 58-59 . < https://publications.vtt.fi/pdf/researchhighlights/2013/R10.pdf#page=60 >
The cyber security of critical infrastructures (CI) has become a focal concern for a number of national and international actors, each with their own, specific interests [1, 2]. As CIs present a logical target for cyber warfare and cyber terrorism, c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=355e65625b88::b159a031b33b639a7e9d587a49a3d274
https://cris.vtt.fi/en/publications/80e439e8-18a0-4b83-ac8c-6c5bb697201e
https://cris.vtt.fi/en/publications/80e439e8-18a0-4b83-ac8c-6c5bb697201e
Autor:
Savola, Reijo, Kanstren, Teemu, Pentikäinen, Heimo, Jurmu, Petri, Myllyaho, Mauri, Hätönen, Kimmo
Publikováno v:
Savola, R, Kanstren, T, Pentikäinen, H, Jurmu, P, Myllyaho, M & Hätönen, K 2012, Utilizing a risk-driven operational security assurance methodology and measurement architecture : Experiences from a case study . in T Nguyen (ed.), Proceedings of the 8th International Conference on Networking and Services, ICNS 2012 . International Academy, Research, and Industry Association IARIA, pp. 134-142, Eighth International Conference on Networking and Services 2012, ICNS 2012, St. Maarten, Netherlands, 25/03/12 . < https://pdfs.semanticscholar.org/9a9e/7eba30b847b26c59a9c34a3412dc38b3146e.pdf >
Practical measurement of information security oftelecoms services is a remarkable challenge because of the lackof applicable generic tools and methods, the difficult-to-predictnature of security risks, the complexity of the systems, and thelow observ
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=355e65625b88::8bd8be40038dbade5accccc6cd6faa1e
https://cris.vtt.fi/en/publications/71cd710c-e14e-4898-aa3d-c10e893045f8
https://cris.vtt.fi/en/publications/71cd710c-e14e-4898-aa3d-c10e893045f8
Publikováno v:
Jormakka, H, Koponen, P, Pentikäinen, H & Bartoszewicz-Burczy, H 2010, ' On managing physical and cyber threats to energy systems identification and countermeasure requirements ', Eksploatacja i Niezawodność, vol. 47, no. 3, pp. 27-33 . < http://yadda.icm.edu.pl/baztech/element/bwmeta1.element.baztech-article-BAT1-0037-0035 >
Control centers of energy systems are subjects to different kind of threats such as natural disasters, hackers, or terrorist attacks, or finally unintentional personnel errors. The article introduces some protections methods against those threats. It
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=355e65625b88::1c6a1fde931beee93ea25398d96521a7
https://cris.vtt.fi/en/publications/dc3f5f57-4ac2-48e3-950d-aa50b3a6de0b
https://cris.vtt.fi/en/publications/dc3f5f57-4ac2-48e3-950d-aa50b3a6de0b
Publikováno v:
Jormakka, H, Koponen, P, Pentikäinen, H & Bartoszewicz-Burczy, H 2009, Security analysis of energy systems' control centers . in P Borowski & M Powalka (eds), Planowanie i zarzadzanie w energetyce . Wydawnictwo SGGW, Warszawa, pp. 71-82 . < http://wip.sggw.pl/download/publikacje_pracownikow/borowski-planowanie_i_zarzadzanie_w_energetyce.pdf >
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=355e65625b88::11a2f5dd546d6d1fb12084df58f4a0f8
https://cris.vtt.fi/en/publications/f151cb66-283d-4ac7-9fec-18add48675c2
https://cris.vtt.fi/en/publications/f151cb66-283d-4ac7-9fec-18add48675c2
Critical infrastructure protection - emerging security risks of complex systems - today and tomorrow
Publikováno v:
Uusitalo, T, Pentikäinen, H & Koivisto, R 2009, Critical infrastructure protection-emerging security risks of complex systems-today and tomorrow . in V Rouhiainen (ed.), Scientific activities in Safety & Security 2009 . VTT Technical Research Centre of Finland, pp. 18-19 . < http://www.vtt.fi/inf/julkaisut/muut/2009/SafetySecurityReview09.pdf >
Critical infrastructures (CIs) are highly interconnected and complex systems. The existing knowledge of the dependencies and interdependencies and related potential risk of cascading effects is still insuffi cient to provide immediate solutions. Ther
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=355e65625b88::3240ac71fad90035dbbc94ce84737f26
https://cris.vtt.fi/en/publications/e0b85f6d-6d3e-4864-a88e-fc598dd46666
https://cris.vtt.fi/en/publications/e0b85f6d-6d3e-4864-a88e-fc598dd46666
Publikováno v:
Jormakka, H, Koponen, P, Pentikäinen, H & Bartoszewicz-Burczy, H 2009, ' Control systems of critical infrastructures : Security analysis ', Energetyka, no. 4, pp. 229-236 . < http://elektroenergetyka.pl/upload/file/2009/4/elektroenergetyka_nr_09_04_3.pdf >
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=355e65625b88::e3efd2da62d57e347b3dcb6603d4e8bf
https://cris.vtt.fi/en/publications/7790fcf7-a356-4488-9654-e78449d3fba7
https://cris.vtt.fi/en/publications/7790fcf7-a356-4488-9654-e78449d3fba7
Autor:
Diu, Antonio, Hänninen, Seppo, Karppinen, Kaarina, Koivisto, Raija, Koponen, Pekka, Kunttu, Susanna, Pentikäinen, Heimo, Sademies, Anni, Sarsama, Janne, Schmitz, Walter, Uusitalo, Teuvo
Publikováno v:
Diu, A, Hänninen, S, Karppinen, K, Koivisto, R, Koponen, P, Kunttu, S, Pentikäinen, H, Sademies, A, Sarsama, J, Schmitz, W & Uusitalo, T 2006, IRRIIS, Integrated Risk Reduction of Information-based Infrastructure Systems : Deliverable D 1.2.1. Scenario analysis . < http://www.irriis.org/Filedb02.pdf?lang=2&oiid=8661&pid=572 >
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=355e65625b88::d6d95d5d7a3d0dd828c30aca1f279bbb
https://cris.vtt.fi/en/publications/e4ceb421-2a08-4820-850d-8888008d03be
https://cris.vtt.fi/en/publications/e4ceb421-2a08-4820-850d-8888008d03be
Autor:
Kanstrén, Teemu, Savola, Reijo, Evesti, Antti, Pentikäinen, Heimo, Hecker, Artur, Ouedraogo, Moussa, Hätönen, Kimmo, Halonen, Perttu, Blad, Christophe, López, Oscar, Ros, Saioa
Publikováno v:
ACM International Conference Proceeding Series; Aug2010, p189-196, 8p