Mikko Särelä

According to our database1, Mikko Särelä authored at least 21 papers between 2006 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Evaluating intrusion prevention systems with evasions.
Int. J. Commun. Syst., 2017

2016
A White Hat Study of a Nation's Publicly Accessible Critical Digital Infrastructure and a Way Forward.
Int. J. Cyber Warf. Terror., 2016

2015
Chain reduction of authorisation certificates.
Int. J. Secur. Networks, 2015

2014
Denial-of-Service Attacks in Bloom-Filter-Based Forwarding.
IEEE/ACM Trans. Netw., 2014

Survey of certificate usage in distributed access control.
Comput. Secur., 2014

Towards understanding interruption and reordering in HSPA/HSPA+ networks.
Proceedings of the IEEE 10th International Conference on Wireless and Mobile Computing, 2014

Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch.
Proceedings of the Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, 2014

Performance analysis of a short flow favoring TCP.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

A Framework for Privacy Analysis of ICN Architectures.
Proceedings of the Privacy Technologies and Policy - Second Annual Privacy Forum, 2014

2013
Handling mobility in future publish-subscribe information-centric networks.
Telecommun. Syst., 2013

A Survey of Ethernet LAN Security.
IEEE Commun. Surv. Tutorials, 2013

DBridges: Flexible floodless frame forwarding.
Comput. Networks, 2013

Weapons against Cyber-Physical Targets.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

2012
Favoring the short.
Proceedings of the 2012 Proceedings IEEE INFOCOM Workshops, 2012

2011
On name-based inter-domain routing.
Comput. Networks, 2011

Forwarding anomalies in Bloom filter-based multicast.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
Arguments for an information-centric internetworking architecture.
Comput. Commun. Rev., 2010

BloomCasting: Security in Bloom Filter Based Multicast.
Proceedings of the Information Security Technology for Applications, 2010

Risk analysis of host identity protocol: using risk Identification Method based on Value Chain Dynamics Toolkit.
Proceedings of the Software Architecture, 4th European Conference, 2010

2008
Incentive-compatible caching and peering in data-oriented networks.
Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, 2008

2006
Resilient Connections for SSH and TLS.
Proceedings of the 2006 USENIX Annual Technical Conference, Boston, MA, USA, May 30, 2006


  Loading...