Tero Kokkonen

Orcid: 0000-0001-9988-6259

According to our database1, Tero Kokkonen authored at least 29 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Food Supply Chain Cyber Threats: A Scoping Review.
Proceedings of the Information Systems and Technologies, 2023

Model Fooling Threats Against Medical Imaging.
Proceedings of the Artificial Intelligence and Cybersecurity: Theory and Applications, 2023

2022
Modelling Medical Devices with Honeypots: A Conceptual Framework.
Proceedings of the Information Systems and Technologies, 2022

Detecting One-Pixel Attacks Using Variational Autoencoders.
Proceedings of the Information Systems and Technologies, 2022

Chromatic and Spatial Analysis of One-Pixel Attacks Against an Image Classifier.
Proceedings of the Networked Systems - 10th International Conference, 2022

Multi-National Cyber Security Exercise, Case Flagship 2.
Proceedings of the 14th International Conference on Education Technology and Computers, 2022

Artificial Intelligence in the IoT Era: A Review of Edge AI Hardware and Software.
Proceedings of the 31st Conference of Open Innovations Association, 2022

2021
One-Pixel Attacks Against Medical Imaging: A Conceptual Framework.
Proceedings of the Trends and Applications in Information Systems and Technologies, 2021

One-Pixel Attack Deceives Computer-Assisted Diagnosis of Cancer.
Proceedings of the SPML 2021: 4th International Conference on Signal Processing and Machine Learning, Beijing, China, August 18, 2021

Color-Optimized One-Pixel Attack Against Digital Pathology Images.
Proceedings of the 29th Conference of Open Innovations Association, 2021

2020
One-Pixel Attack Deceives Automatic Detection of Breast Cancer.
CoRR, 2020

Statistical Evaluation of Artificial Intelligence -Based Intrusion Detection System.
Proceedings of the Trends and Innovations in Information Systems and Technologies, 2020

Modelling Medical Devices with Honeypots.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2020

Measuring Learning in a Cyber Security Exercise.
Proceedings of the ICETC'20: 12th International Conference on Education Technology and Computers, 2020

Comprehensive Cyber Arena; The Next Generation Cyber Range.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
Requirements for Training and Evaluation Dataset of Network and Host Intrusion Detection System.
Proceedings of the New Knowledge in Information Systems and Technologies, 2019

Network Anomaly Detection Based on WaveNet.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2019

A Design Model for a Degree Programme in Cyber Security.
Proceedings of the ICETC 2019, 2019

Pedagogical Aspects of Cyber Security Exercises.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

2018
Anomaly-Based Network Intrusion Detection Using Wavelets and Adversarial Autoencoders.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

Blue Team Communication and Reporting for Enhancing Situational Awareness from White Team Perspective in Cyber Security Exercises.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2018

2016
Weighted Fuzzy Clustering for Online Detection of Application DDoS Attacks in Encrypted Network Traffic.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2016

Architecture for the Cyber Security Situational Awareness System.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2016

Increasing web service availability by detecting application-layer DDoS attacks in encrypted traffic.
Proceedings of the 23rd International Conference on Telecommunications, 2016

Model for sharing the information of cyber security situation awareness between organizations.
Proceedings of the 23rd International Conference on Telecommunications, 2016

2015
Online detection of anomalous network flows with soft clustering.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2015

Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2015

2014
Analysis of HTTP Requests for Anomaly Detection of Web Attacks.
Proceedings of the IEEE 12th International Conference on Dependable, 2014


  Loading...