Finnish Defence Forces

Riihimaki, Finland

Finnish Defence Forces

Riihimaki, Finland
Time filter
Source Type

Drislane L.E.,Florida State University | Patrick C.J.,Florida State University | Sourander A.,University of Turku | Sillanmaki L.,University of Turku | And 5 more authors.
Personality Disorders: Theory, Research, and Treatment | Year: 2014

This study used model-based cluster analysis to identify subtypes of men who scored high in overall psychopathy (i.e., ≥ 95th percentile on the Triarchic Psychopathy Measure; n = 193) from a larger sample evaluated for service in the Finnish military (N = 4043). Cluster variates consisted of scores on distinct facets of psychopathy together with a measure of negative affectivity. The best-fitting model specified 2 clusters, representing “primary†(n = 110) and “ secondary†psychopathy (n = 83) groups. Compared to a low-psychopathy comparison group (n = 1878), both psychopathy subgroups showed markedly elevated levels of externalizing symptoms and criminal behavior. Secondary psychopathic participants also reported high levels of internalizing problems including anxiousness, depression, and somatization, and scored higher on the disinhibition facet of psychopathy relative to the primary group. By contrast, primary psychopathic individuals reported fewer internalizing problems than either the secondary psychopathy or comparison groups and scored higher on the boldness facet of psychopathy. Primary psychopathic participants also had higher rates of violent crimes than the secondary psychopaths. Implications for conceptualizing and studying psychopathy in nonforensic populations are discussed. © 2013 American Psychological Association.

Timonen J.,Finnish Defence Forces
2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA 2015 | Year: 2015

This paper focuses on discovering the key areas of Situational Awareness (SA) and Common Operational Picture (COP) in two different environments: the monitoring room and dismounted forces operations in urban areas. The research is based on scientific publications and on two implemented environments. In urban area warfare, the Mobile Urban Area Situational Awareness System is used to evaluate the requirements and usage of dismounted troops. The monitoring room is studied using the Situational Awareness of Critical Infrastructure and Networks System. These empirical environments were implemented during research projects at the Finnish National Defence University. The paper presents a model combining the joint model of laboratories, Endsley's model of SA and the results of goal-driven task analysis for creating a service-based architecture for defining and sharing COP. The main SA model used is Endsley's level model. It has been supplemented with cyber-related perspectives and fits the selected environments well, allowing techniques that can be used to measure the SA level and define the actor's most important goals. © 2015 Centre for Multidisciplinary Research, Innovation and Collaboration (C-MRiC.ORG).

Haapaniemi E.,University of Oulu | Mesilaakso M.,Finnish Defence Forces
Magnetic Resonance in Chemistry | Year: 2012

The 1H and 13C{ 1H} chemical shifts and 1H spin-spin couplings of sulfur mustards, nitrogen mustards, and lewisites scheduled in the Chemical Weapons Convention, and those of bis(2-chloromethyl)disulfide, were determined in CDCl 3, CD 2Cl 2, and (CD 3) 2CO. Accurate parameters of this kind of series can be used for evaluating the current molecular modeling programs and the chemical shift and coupling constant prediction possibilities of the programs. Several prediction tests were made with commercial programs, and the results are reported here. Copyright © 2012 John Wiley & Sons, Ltd.

Kiviharju M.,Finnish Defence Forces
2012 Military Communications and Information Systems Conference, MCC 2012 | Year: 2012

Multi-Level Security, MLS, refers to handling information from different levels of security classification securely by people from different levels of clearance. We propose a structured document format to host data from different classification levels (e.g. RESTRICTED and SECRET) in the same, modifiable document. The document access control is enforced cryptographically - content and access control information is encrypted and digitally signed, but the document structure itself is independent of the adjoining key management architecture. We detail the different security-related metadata and sanitization procedures needed for passing data from a common storage to a user with lower clearance. © 2012 Military Univ of Tech.

Kiviharju M.,Finnish Defence Forces
SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography | Year: 2012

Access control lies at the heart of any technical information security and information assurance system. Access control is traditionally enforced by reference monitors, which are assumed to be able to reliably monitor and mediate all traffic from users to objects. An alternative view to enforcement is cryptography, referred to as cryptographic access control (CAC). CAC has gained popularity with the emergence of distributed computing, especially cloud computing and "everything as a service". CAC is not a formal model, but an enforcement paradigm. In this paper we propose an extension to the current CAC framework and discuss the limits, where it is in general feasible to extend CAC as a paradigm over reference monitors.

Kovalenko K.,Latvia University of Agriculture | Roasto M.,Estonian University of Life Sciences | Liepins E.,Latvia University of Agriculture | Maesaar M.,Estonian University of Life Sciences | And 2 more authors.
Food Control | Year: 2013

Campylobacteriosis in humans is caused by thermotolerant Campylobacter spp., most commonly by C. jejuni and C. coli. However, no official data for human campylobacteriosis in Latvia is available or cases are heavily under-reported. In accordance with Commission Decision 2007/516/EC the Campylobacter spp. baseline study was performed in 2008 in Latvia but there was no continuous monitoring for the Campylobacter at broiler chicken production level in 2009. The aim of the present study was to determine the occurrence of Campylobacter spp. in broiler chicken production at slaughterhouse and retail level in Latvia. Poultry samples originated from the two biggest Latvian broiler slaughterhouses. Altogether, 240 fresh broiler chicken neck skins, 2400 intact broiler chicken intestines and 240 fresh broiler chicken carcasses were collected during the year 2010. A total of 92.5% of the pooled intestine samples; 60.8% of the neck skin samples and 56.3% of carcasses were positive for Campylobacter spp. There was seasonal variation in proportions of Campylobacter positive samples with seasonal peak on summer months. © 2012 Elsevier Ltd.

Ostergard P.R.J.,Aalto University | Pottonen O.,Aalto University | Pottonen O.,Finnish Defence Forces
Designs, Codes, and Cryptography | Year: 2011

The optimal one-error-correcting codes of length 13 that are doubly shortened perfect codes are classified utilizing the results of [Östergård, P.R.J., Pottonen, O.: The perfect binary one-error-correcting codes of length 15: Part I-Classification. IEEE Trans. Inform. Theory 55, 4657-4660 (2009)]; there are 117821 such (13,512,3) codes. By applying a switching operation to those codes, two more (13,512,3) codes are obtained, which are then not doubly shortened perfect codes. © 2010 Springer Science+Business Media, LLC.

Kiviharju M.,Finnish Defence Forces
Proceedings - IEEE Military Communications Conference MILCOM | Year: 2013

Role-based access control (RBAC) is the de facto access control model used in current information systems, also in military environments. This is because RBAC can be used to describe multi-level secure access control (AC) policies so common in military environments handling information from multiple levels of classification. Cryptographic access control (CAC), on the other hand, is an implementation paradigm intended to enforce AC policies cryptographically. CAC-methods are also attractive in military cloud and tactical environments due to their distributed and offline nature of operation. Combining the capabilities of both RBAC and CAC fully seems elusive, though. This paper studies the feasibility of implementing RBAC with respect to read-rights using a recent type of cryptographic schemes called attribute-based encryption (ABE). We present an implementation model based on the Extensible Access Control Markup Language (XACML) reference architecture and evaluate how the current state ABE can realize the different RBAC standard model components. We will show that it is feasible to implement at least the Core RBAC with standard XACML architecture and ABE models, and that the expressiveness of the ABE-schemes can reach nearly all the way in terms of symmetric RBAC commands and functions, such as Dynamic Separation of Duty. © 2013 IEEE.

Turunen V.,Aalto University | Kosunen M.,Aalto University | Vaarakangas M.,Finnish Defence Forces | Ryynanen J.,Aalto University
IEEE Transactions on Vehicular Technology | Year: 2012

Spectrum sensing is an essential part of future cognitive radios, as the spectrum sensor provides information about the utilization of the surrounding radio spectrum. Several approaches to implementing spectrum sensing have been proposed in the literature, one of them being the class of feature detectors. Cyclostationary feature detectors are, in general, considered to be superior in performance but suffer from high implementation complexity. Therefore, most studies still utilize energy detectors, which may not reach the performance requirements set for practical implementations. This paper presents angular domain feature detection algorithms that are based on cyclostationary properties. Angular domain signal processing is shown to simplify the implementation considerably while preserving comparable performance. Moreover, a new detection algorithm that leads to multiplier-free implementation and reduces the memory requirements, compared with any previous approaches, is proposed. © 2006 IEEE.

Ostergard P.R.J.,Aalto University | Pottonen O.,Aalto University | Pottonen O.,Finnish Defence Forces | Phelps K.T.,Auburn University
IEEE Transactions on Information Theory | Year: 2010

A complete classification of the perfect binary one-error-correcting codes of length 15, as well as their extensions of length 16, was recently carried out in [P. R. J. Östergård and O. Pottonen, "The perfect binary one-error-correcting codes of length 15: Part I-Classification," IEEE Trans. Inf. Theory vol. 55, pp. 4657-4660, 2009]. In the current accompanying work, the classified codes are studied in great detail, and their main properties are tabulated. The results include the fact that 33 of the 80 Steiner triple systems of order 15 occur in such codes. Further understanding is gained on full-rank codes via switching, as it turns out that all but two full-rank codes can be obtained through a series of such transformations from the Hamming code. Other topics studied include (non)systematic codes, embedded one-error-correcting codes, and defining sets of codes. A classification of certain mixed perfect codes is also obtained. © 2010 IEEE.

Loading Finnish Defence Forces collaborators
Loading Finnish Defence Forces collaborators