Halunen, Kimmo
45  Ergebnisse:
Personensuche X
?
1

Comprehensive Artificial Intelligence Vulnerability Taxonom:

Pispa, Arttu ; Halunen, Kimmo
European Conference on Cyber Warfare and Security.  23 (2024)  1 - p. 379-387 , 2024
 
?
2

Options for Signalling Cyber Deterrence Using Cyber Capabil..:

Keinonen, Maria ; Halunen, Kimmo
International Conference on Cyber Warfare and Security.  19 (2024)  1 - p. 463-471 , 2024
 
?
3

NEWSROOM: Towards Automating Cyber Situational Awareness Pr..:

, In: Proceedings of the 19th International Conference on Availability, Reliability and Security,
 
?
5

Transparent Security Method for Automating IoT Security Ass..:

, In: Information Security Practice and Experience; Lecture Notes in Computer Science,
Kaksonen, Rauli ; Halunen, Kimmo ; Laakso, Marko. - p. 138-153 , 2023
 
?
6

Models-Based Analysis of Both User and Attacker Tasks: Appl..:

, In: Human-Centered Software Engineering; Lecture Notes in Computer Science,
 
?
7

Digi-HTA, assessment framework for digital healthcare servi..:

Jääskelä, Jari ; Haverinen, Jari ; Kaksonen, Rauli...
Finnish Journal of eHealth and eWelfare.  14 (2022)  1 - p. 19-30 , 2022
 
?
8

Quantum-Safe Signing of Notification Messages in Intelligen..:

, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Applied Cryptography in Computer and Communications,
 
?
9

Applying a cryptographic metric to post-quantum lattice-bas..:

, In: Proceedings of the 17th International Conference on Availability, Reliability and Security,
 
?
11

A Generic Multimodels-Based Approach for the Analysis of Us..:

, In: Human-Centered Software Engineering; Lecture Notes in Computer Science,
 
?
12

n-Auth : Mobile Authentication Done Right:

, In: Proceedings of the 33rd Annual Computer Security Applications Conference,
Peeters, Roel ; Hermans, Jens ; Maene, Pieter... - p. 1-15 , 2017
 
?
14

Measuring the value of privacy and the efficacy of PETs:

, In: Proceedings of the 11th European Conference on Software Architecture: Companion Proceedings,
Halunen, Kimmo ; Karinsalo, Anni - p. 132-135 , 2017
 
?
15

Detecting man-in-the-middle attacks on non-mobile systems:

, In: Proceedings of the 4th ACM conference on Data and application security and privacy,
 
1-15