Kimmo Hätönen

Affiliations:
  • University of Helsinki, Finland


According to our database1, Kimmo Hätönen authored at least 30 papers between 1996 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Access control for trusted data sharing.
EURASIP J. Inf. Secur., December, 2024

2022
Quality of Monitoring for Cellular Networks.
IEEE Trans. Netw. Serv. Manag., 2022

2020
6G Architecture to Connect the Worlds.
IEEE Access, 2020

2019
Stratification of 5G evolution and Beyond 5G.
Proceedings of the 2nd IEEE 5G World Forum, 5GWF 2019, Dresden, Germany, September 30, 2019

2017
Anomaly detection and classification using a metric for determining the significance of failures - Case study: mobile network management data from LTE network.
Neural Comput. Appl., 2017

2016
Distributed Computing of Management Data in a Telecommunications Network.
Proceedings of the Mobile Networks and Management - 8th International Conference, 2016

Diagnosis cloud: Sharing knowledge across cellular networks.
Proceedings of the 12th International Conference on Network and Service Management, 2016

2015
A Method for Deriving and Testing Malicious Behavior Detection Rules.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Alarm Prioritization and Diagnosis for Cellular Networks.
Proceedings of the Mobile Networks and Management - 7th International Conference, 2015

Architecture for High Confidence Cloud Security Monitoring.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

A Metric for Determining the Significance of Failures and Its Use in Anomaly Detection - Case Study: Mobile Network Management Data from LTE Network.
Proceedings of the Engineering Applications of Neural Networks, 2015

2014
Towards Trusted Environment in Cloud Monitoring.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014

2013
Analysing 3G radio network performance with fuzzy methods.
Neurocomputing, 2013

EANN 2012: exploratory analysis of mobile phone traffic patterns using 1-dimensional SOM, clustering and anomaly detection.
Evol. Syst., 2013

2012
Characterizing Mobile Network Daily Traffic Patterns by 1-Dimensional SOM and Clustering.
Proceedings of the Engineering Applications of Neural Networks, 2012

2011
Analyzing 3G Quality Distribution Data with Fuzzy Rules and Fuzzy Clustering.
Proceedings of the Engineering Applications of Neural Networks, 2011

Finding 3G Mobile Network Cells with Similar Radio Interface Quality Problems.
Proceedings of the Engineering Applications of Neural Networks, 2011

2010
Towards an abstraction layer for security assurance measurements: (invited paper).
Proceedings of the Software Architecture, 4th European Conference, 2010

Towards holistic security management through coherent measuring.
Proceedings of the Software Architecture, 4th European Conference, 2010

2009
Computer Log Anomaly Detection Using Frequent Episodes.
Proceedings of the Artificial Intelligence Applications and Innovations III, 2009

2008
Local anomaly detection for mobile network monitoring.
Inf. Sci., 2008

2004
Remarks on the Industrial Application of Inductive Database Technologies.
Proceedings of the Constraint-Based Mining and Inductive Databases, 2004

Domain Structures in Filtering Irrelevant Frequent Patterns.
Proceedings of the Database Support for Data Mining Applications: Discovering Knowledge with Inductive Queries, 2004

2003
What makes expert systems survive over 10 years - empirical evaluation of several engineering applications.
Expert Syst. Appl., 2003

Queryable Lossless Log Database Compression.
Proceedings of the Second International Workshop on Inductive Databases, 2003

Comprehensive Log Compression with Frequent Patterns.
Proceedings of the Data Warehousing and Knowledge Discovery, 5th International Conference, 2003

2002
Domain Structures in Filtering Irrelevant Frequent Patterns.
Proceedings of the First International Workshop on Inductive Databases, 2002

2000
A Computer Host-Based User Anomaly Detection System Using the Self-Organizing Map.
Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks, 2000

1996
TASA: Telecommunication Alarm Sequence Analyzer or how to enjoy faults in your network.
Proceedings of the 1996 Network Operations and Management Symposium, 1996

Knowledge Discovery from Telecommunication Network Alarm Databases.
Proceedings of the Twelfth International Conference on Data Engineering, February 26, 1996


  Loading...