0000000000116389
AUTHOR
Jari Hautamaki
Predictive pumping based on sensor data and weather forecast
In energy production, peat extraction has a significant role in Finland. However, protection of nature has become more and more important globally. How do we solve this conflict of interests respecting both views? In peat production, one important phase is to drain peat bog so that peat production becomes available. This means that we have control over how we can lead water away from peat bog to nature without water contamination with solid and other harmful substances. In this paper we describe a novel method how fouling of water bodies from peat bog can be controlled more efficiently by using weather forecast to predict rainfall and thus, minimize the effluents to nature. peerReviewed
Cyber security exercise : Literature review to pedagogical methodology
This paper is a literature review, where we try to find out pedagogical principles has used in different virtual or simulated industry learning environments. The purpose is to use these findings to create in the future a new model for teaching in cyber security exercises. Cyber security exercises are the major service at JYVSECTEC - Jyväskylä Security Technology, cyber security research, training and development center in Finland [1]. JYVSECTEC Cyber security exercises are executed in real life simulation environment, RGCE (Realistic Global Cyber Environment) [1]. It provides the same functionality as the real Internet, but it is isolated from the real Internet and fully controlled by JYVSE…
A model of Cyber Threat Information Sharing with the Novel Network Topology
The digitized environments are particularly vulnerable to various attacks. In such a situation of a security attack, detecting and responding to attacks require effective actions. One of the most significant ways to improve resilience to security attacks is to obtain accurate and timely situational aspect of the security awareness. The efficient production and utilization of situation information is achieved by sharing information with other actors in the information sharing network quickly and reliably without compromising the confidential information of one's own organization. At the same time, it should also be possible to avoid a flood of irrelevant information in the sharing network, w…