Markku Antikainen

According to our database1, Markku Antikainen authored at least 20 papers between 2014 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
IoT-KEEPER: Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the Edge.
IEEE Trans. Netw. Serv. Manag., 2020

XSS Vulnerabilities in Cloud-Application Add-Ons.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Protecting IoT-environments against Traffic Analysis Attacks with Traffic Morphing.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

Client-Side Vulnerabilities in Commercial VPNs.
Proceedings of the Secure IT Systems, 2019

Analysis of Topology Poisoning Attacks in Software-Defined Networking.
Proceedings of the Secure IT Systems, 2019

A Scalable Software Update Service for IoT Devices in Urban Scenarios.
Proceedings of the 9th International Conference on the Internet of Things, 2019

Pitfalls of open architecture: How friends can exploit your cryptocurrency wallet.
Proceedings of the 12th European Workshop on Systems Security, 2019

2018
IoT-KEEPER: Securing IoT Communications in Edge Networks.
CoRR, 2018

Automated analysis of freeware installers promoted by download portals.
Comput. Secur., 2018

Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer.
Proceedings of the 27th USENIX Security Symposium, 2018

Real-Time IoT Device Activity Detection in Edge Networks.
Proceedings of the Network and System Security - 12th International Conference, 2018

2017
Toward Secure Edge Networks: Taming Device-to-Device (D2D) Communication in IoT.
CoRR, 2017

A Large-Scale Analysis of Download Portals and Freeware Installers.
Proceedings of the Secure IT Systems, 2017

Poster: IoTURVA: Securing Device-to-Device Communications for IoT.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

2016
XBF: Scaling up Bloom-filter-based Source Routing.
CoRR, 2016

2015
Domain Isolation in a Multi-tenant Software-Defined Network.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

Denial-of-service attacks in OpenFlow SDN networks.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

2014
Denial-of-Service Attacks in Bloom-Filter-Based Forwarding.
IEEE/ACM Trans. Netw., 2014

Commitment-based device pairing with synchronized drawing.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2014

Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch.
Proceedings of the Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, 2014


  Loading...