Göran Pulkkis

According to our database1, Göran Pulkkis authored at least 16 papers between 1982 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Smart Contract based Distributed IoT Security: A Protocol for Autonomous Device Management.
Proceedings of the 21st IEEE/ACM International Symposium on Cluster, 2021

2020
Rethinking IoT Security: A Protocol Based on Blockchain Smart Contracts for Secure and Automated IoT Deployments.
CoRR, 2020

2018
Secure Routing for MANET Connected Internet of Things Systems.
Proceedings of the 6th IEEE International Conference on Future Internet of Things and Cloud, 2018

2017
Secure and Reliable Internet of Things Systems for Healthcare.
Proceedings of the 5th IEEE International Conference on Future Internet of Things and Cloud, 2017

2016
A packet traversal time per hop based adaptive wormhole detection algorithm for MANETs.
Proceedings of the 24th International Conference on Software, 2016

2015
Designing a Modern IT Curriculum: Including Information Analytics as a Core Knowledge Area.
Proceedings of the 17th Australasian Computing Education Conference, 2015

2014
A Generalized Scalable Software Architecture for Analyzing Temporally Structured Big Data in the Cloud.
Proceedings of the New Perspectives in Information Systems and Technologies, 2014

Using extreme learning machine for intrusion detection in a big data environment.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014

2013
Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm.
Sensors, 2013

2011
A New MANET Wormhole Detection Algorithm Based on Traversal Time and Hop Count Analysis.
Sensors, 2011

Security and Trust of Public Key Cryptography for HIP and HIP Multicast.
Int. J. Dependable Trust. Inf. Syst., 2011

2010
Security and Trust of Public Key Cryptography Options for HIP.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Mobile Virtual Private Networking.
Proceedings of the Future Internet - FIS 2009, Second Future Internet Symposium, 2009

2005
Current Network Security Software.
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005

2004
Teaching Network Security in a Virtual Learning Environment.
J. Inf. Technol. Educ., 2004

1982
A Comparison of Some Mathematical Models of the Bus Traffic in a Single Bus Multimicroprocessor.
J. Inf. Process. Cybern., 1982


  Loading...