咨询与建议

限定检索结果

文献类型

  • 9 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 6 篇 计算机科学与技术...
    • 5 篇 软件工程
    • 1 篇 电气工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 测绘科学与技术
    • 1 篇 农业工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 城乡规划学
    • 1 篇 网络空间安全
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 理学
    • 2 篇 数学
  • 1 篇 农学
    • 1 篇 作物学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 药学(可授医学、理...
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 2 篇 data visualizati...
  • 1 篇 complex networks
  • 1 篇 probes
  • 1 篇 instruments
  • 1 篇 reliability engi...
  • 1 篇 proposals
  • 1 篇 communication sy...
  • 1 篇 electroencephalo...
  • 1 篇 security of data
  • 1 篇 logic gates
  • 1 篇 interviews
  • 1 篇 data mining
  • 1 篇 software prototy...
  • 1 篇 risk management
  • 1 篇 digital signatur...
  • 1 篇 cybersecurity
  • 1 篇 visualization
  • 1 篇 semantics
  • 1 篇 hash functions
  • 1 篇 information secu...

机构

  • 2 篇 cerenion oy oulu
  • 2 篇 oulu university ...
  • 1 篇 university of ou...
  • 1 篇 oulu secure prog...
  • 1 篇 economic sociolo...
  • 1 篇 unit of sociolog...
  • 1 篇 oulu university ...
  • 1 篇 department of el...
  • 1 篇 physiological si...
  • 1 篇 oulu university ...
  • 1 篇 university of ou...
  • 1 篇 department of el...
  • 1 篇 oulu university ...
  • 1 篇 oulu university ...
  • 1 篇 secure programmi...
  • 1 篇 finnish communic...
  • 1 篇 mathematics divi...
  • 1 篇 finnish communic...
  • 1 篇 department of in...

作者

  • 3 篇 halunen kimmo
  • 2 篇 juha röning
  • 2 篇 vuorinen jukka
  • 2 篇 eronen juhani
  • 2 篇 röning juha
  • 2 篇 tetri pekka
  • 1 篇 miikka salminen
  • 1 篇 kortelainen tuom...
  • 1 篇 partala juha
  • 1 篇 jukka kortelaine...
  • 1 篇 kortelainen jukk...
  • 1 篇 laakso marko
  • 1 篇 pekka pietikaine...
  • 1 篇 pauli rikula
  • 1 篇 juhani eronen
  • 1 篇 juha roning
  • 1 篇 askola kreetta
  • 1 篇 juha partala
  • 1 篇 eero väyrynen
  • 1 篇 pekka pietikäine...

语言

  • 11 篇 英文
检索条件"机构=Secure Programming Group"
11 条 记 录,以下是1-10 订阅
排序:
Paradoxes in information security
收藏 引用
IEEE Potentials 2016年 第5期35卷 36-39页
作者: Vuorinen, Jukka Tetri, Pekka Unit of Sociology University of Turku Turku Finland Oulu Secure Programming Group University of Oulu Oulu Finland
In this article, we approach information security from a novel perspective as we examine its unintended ramifications and its paradoxes. Information security and cybersecurity are necessities of modern societies. Simp... 详细信息
来源: 评论
Graphingwiki - A semantic wiki extension for visualising and inferring protocol dependency
Graphingwiki - A semantic wiki extension for visualising and...
收藏 引用
1st Workshop on Semantic Wikis - From Wiki to Semantics, SemWiki 2006 - Co-located with the ESWC 2006
作者: Eronen, Juhani Röning, Juha Secure Programming Group Computer Engineering Laboratory University of Oulu FIN-90014 Oulu Finland
This paper introduces the Graphingwiki extension toMoinMoin Wiki. Graphingwiki enables the deepened analysis of the Wiki data by augmenting it with semantic data in a simple, practical and easy-to-use manner. Visualis... 详细信息
来源: 评论
The social in technical attacks - Questioning the bifurcation in the field of information security  10
The social in technical attacks - Questioning the bifurcatio...
收藏 引用
10th International Conference on ICT, Society and Human Beings
作者: Vuorinen, Jukka Tetri, Pekka Economic Sociology Department of Social Research University of Turku Finland Oulu University Secure Programming Group University of Oulu Finland
This paper examines the social in information security. We argue that there is always a social aspect in technical information security attacks. By using Erving Goffman's sociological concept of "frame",... 详细信息
来源: 评论
Multicollisions and graph-based hash functions
Multicollisions and graph-based hash functions
收藏 引用
3rd International Conference on Trusted Systems, INTRUST 2011
作者: Halunen, Kimmo Oulu University Secure Programming Group Department of Computer Science and Engineering University of Oulu P.O. Box 4500 90014 Oulu Finland
In this paper, we present some generalisations of previous multicollision finding methods and apply these against a new type of tree-based hash functions. We also show that the very general class of hash functions fir... 详细信息
来源: 评论
Exploiting causality and communication patterns in network data analysis
Exploiting causality and communication patterns in network d...
收藏 引用
IEEE Workshop on Local and Metropolitan Area Networks (LANMAN)
作者: Pekka Pietikainen Joachim Viide Juha Roning Oulu University Secure Programming Group University of Oulu Oulu Finland
Detecting the root-cause of failures in modern, complex networks is tedious. Understanding the problem fully requires good instrumentation and thorough understanding of the information flows in the network. In this pa... 详细信息
来源: 评论
Computationally Efficient Early Prognosis of the Outcome of Comatose Cardiac Arrest Survivors Using Slow-Wave Activity Features in EEG  50
Computationally Efficient Early Prognosis of the Outcome of ...
收藏 引用
50th Computing in Cardiology, CinC 2023
作者: Salminen, Miikka Partala, Juha Vayrynen, Eero Kortelainen, Jukka Cerenion Oy Oulu Finland University of Oulu Oulu University Secure Programming Group Biomimetics and Intelligent Systems Group Oulu Finland University of Oulu Physiological Signal Analysis Team Center for Machine Vision and Signal Analysis Mrc Oulu Oulu Finland
This study, part of 'Predicting Neurological Recovery from Coma After Cardiac Arrest: The George B. Moody PhysioNet Challenge 2023', evaluated a computationally efficient method in predicting cardiac arrest (C... 详细信息
来源: 评论
On the Security of VSH in Password Schemes
On the Security of VSH in Password Schemes
收藏 引用
International Conference on Availability, Reliability and Security, ARES
作者: Kimmo Halunen Pauli Rikula Juha Röning Department of Electrical and Information Engineering Oulu University Secure Programming Group Oulu Finland
In this paper we improve Saarinen's method for finding preimages of very smooth hash (VSH) hash values and generalise it to some of the variants of VSH proposed by Contini et al. VSH is a new hash function that ha... 详细信息
来源: 评论
Vulnerability dependencies in antivirus software
Vulnerability dependencies in antivirus software
收藏 引用
2nd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008
作者: Askola, Kreetta Puuperä, Rauli Pietikäinen, Pekka Eronen, Juhani Laakso, Marko Halunen, Kimmo Röning, Juha Department of Electrical and Information Engineering Secure Programming Group Oulu University P.O. Box 4500 90014 Oulu Finland Finnish Communications Regulatory Authority FICORA Itämerenkatu 3a 00181 Helsinki Finland
In this paper we present an application of the MATINE method for investigating dependencies in antivirus (AV) software and some vulnerabilities arising from these dependencies. Previously, this method has been effecti... 详细信息
来源: 评论
Socio-technical Security Assessment of a VoIP System
Socio-technical Security Assessment of a VoIP System
收藏 引用
International Conference on Emerging Security Information, Systems, and Technologies (secureWare)
作者: Pekka Pietikäinen Kati Karjalainen Juha Röning Juhani Eronen Oulu University Secure Programming Group (OUSPG) University of Oulu Oulu Finland Finnish Communications Regulatory Authority (FICORA) Helsinki Finland
In this paper, we introduce a method and a tool for systematically assessing the security of complex systems. We gather data from interviews, network documentation as well as active and passive network measurements an... 详细信息
来源: 评论
Combinatorial multicollision attacks on generalized iterated hash functions
Conferences in Research and Practice in Information Technolo...
收藏 引用
Conferences in Research and Practice in Information Technology Series 2010年 105卷 86-93页
作者: Halunen, Kimmo Kortelainen, Juha Kortelainen, Tuomas Oulu University Secure Programming Group Department of Electrical and Information Engineering University of Oulu Finland Department of Information Processing Science University of Oulu Finland Mathematics Division Department of Electrical and Information Engineering University of Oulu Finland
We develop a word combinatorial approach to multi-collisions in generalized iterated hash functions. The work rests on the notable discoveries of A. Joux and on generalizations provided by M. Nandi and D. Stin-son as ... 详细信息
来源: 评论