fullrecord |
[{"key": "dc.contributor.advisor", "value": "Riekkinen, Janne", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Sepp\u00e4nen, Henrik", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-09-22T04:58:33Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-09-22T04:58:33Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/71833", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Teko\u00e4ly on noussut yhdeksi nykyp\u00e4iv\u00e4n puhutuimmista uusista teknologioista. Teko\u00e4lyyn kuuluva koneoppiminen on ollut jo kauan tutkimuksen kohteena. L\u00e4hivuosina teko\u00e4lyn noustessa pinnalle, on my\u00f6s koneoppimisteknologian hy\u00f6tyj\u00e4 ruvettu tutkimaan entist\u00e4 enemm\u00e4n eri aloilla. T\u00e4m\u00e4n kanditutkielman tarkoituksena on ollut perehty\u00e4 koneoppimiseen, kyberturvallisuuteen sek\u00e4 koneoppimisteknologian k\u00e4ytt\u00f6\u00f6n kyberturvallisuuden kontekstissa. Tutkielmassa esitell\u00e4\u00e4n tapoja, joilla erityisesti yritysten kyberturvallisuutta voidaan parantaa koneoppimisteknologiaa k\u00e4ytt\u00e4m\u00e4ll\u00e4. Tutkielmassa k\u00e4yd\u00e4\u00e4n l\u00e4pi koneoppimismenetelm\u00e4t, niiden yleisimm\u00e4t haasteet sek\u00e4 kyberturvallisuuden ja kyberhy\u00f6kk\u00e4yksen m\u00e4\u00e4ritelm\u00e4t. Suurimmat hy\u00f6dyt koneoppimisen k\u00e4yt\u00f6st\u00e4 kyberturvallisuuden kontekstissa ovat laajojen datam\u00e4\u00e4rien analysointi sek\u00e4 kyberturvallisuudessa ty\u00f6skentelevien ty\u00f6ntekij\u00f6iden ty\u00f6m\u00e4\u00e4r\u00e4n v\u00e4hent\u00e4minen. Haasteiksi koneoppimisen k\u00e4yt\u00f6st\u00e4 kyberturvallisuudessa l\u00f6ydettiin varsinkin laadukkaiden data-aineistojen saatavuus koneoppimismallien kouluttamiseen ja oikean koneoppimismenetelm\u00e4n valinta haluttuun k\u00e4ytt\u00f6tarkoitukseen. My\u00f6s kyberhy\u00f6kk\u00e4ystapojen jatkuva muutos sek\u00e4 hy\u00f6kk\u00e4ysten jatkuva kehittyminen aiheuttavat haasteita koneoppimisen k\u00e4yt\u00f6lle kyberhy\u00f6kk\u00e4ysten torjunnassa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Artificial intelligence has become one of the most talked about new technologies today in the field of Information Technology. Machine learning, which is part of artificial intelligence, has been for a long time a subject of research. In the last few years, when artificial intelligence has surfaced, the benefits of machine learning technology have also been explored in various fields. The purpose of this bachelor's thesis has been to get acquainted with machine learning, cyber security and the use of machine learning technology in the context of cyber security. The dissertation presents ways in which cyber security in particular in companies, can be improved by using machine learning technology. The dissertation reviews machine learning methods, their most common challenges, and the definitions of cybersecurity and cyber attack. The biggest benefits of using machine learning in the context of cybersecurity are the analysis of large amounts of data and the reduction of the workload of employees working in cybersecurity. The availability of high-quality data for training machine learning models and choosing the right machine learning method for the desired purpose were found to be challenges in the use of machine learning in cybersecurity. The constant change in cyber-attack methods and the constant development of attacks also pose challenges to the use of machine learning in the fight against cyber-attacks.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-09-22T04:58:33Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-09-22T04:58:33Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "29", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Koneoppimisen hy\u00f6dynt\u00e4minen kyberhy\u00f6kk\u00e4ysten havaitsemisessa ja torjunnassa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202009225915", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "koneoppiminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkohy\u00f6kk\u00e4ykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|