Raimo Kantola

Affiliations:
  • Aalto University, Espoo, Finland
  • Helsinki University of Technology, Espoo, Finland


According to our database1, Raimo Kantola authored at least 73 papers between 1998 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
A deep density based and self-determining clustering approach to label unknown traffic.
J. Netw. Comput. Appl., 2022

GAIMMO: A Grade-Driven Auction-Based Incentive Mechanism With Multiple Objectives for Crowdsourcing Managed by Blockchain.
IEEE Internet Things J., 2022

2021
Improving Data Generalization With Variational Autoencoders for Network Traffic Anomaly Detection.
IEEE Access, 2021

Privacy-preserving D2D Cooperative Location Verification.
Proceedings of the IEEE Global Communications Conference, 2021

2020
An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks.
J. Netw. Comput. Appl., 2020

6G White paper: Research challenges for Trust, Security and Privacy.
CoRR, 2020

Implementing a Security Policy Management for 5G Customer Edge Nodes.
Proceedings of the NOMS 2020, 2020

Sec-ALG: An Open-source Application Layer Gateway for Secure Access to Private Networks.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

Trust Networking for Beyond 5G and 6G.
Proceedings of the 2nd 6G Wireless Summit, 2020

2019
Performance Evaluation of a Combined Anomaly Detection Platform.
IEEE Access, 2019

Providing Network Time Protocol Based Timing for Smart Grid Measurement and Control Devices in 5G Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

6G Network Needs to Support Embedded Trust.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
An Intelligent Defense and Filtration Platform for Network Traffic.
Proceedings of the Wired/Wireless Internet Communications, 2018

LiaaS: Lawful Interception as a Service.
Proceedings of the 26th International Conference on Software, 2018

Roaming Interface Signaling Security for LTE Networks.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

2017
Cooperation and end-to-end in the Internet.
Int. J. Commun. Syst., 2017

Privacy-preserving trust management for unwanted traffic control.
Future Gener. Comput. Syst., 2017

Enhancing Security of Software Defined Mobile Networks.
IEEE Access, 2017

An adaptive detection and prevention architecture for unsafe traffic in SDN enabled mobile networks.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

An Orchestrated Security Platform for Internet of Robots.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Data plane protocols and fragmentation for 5G.
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2017

CDController: A Cloud Data Access Control System Based on Reputation.
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017

2016
Policy-based communications for 5G mobile with customer edge switching.
Secur. Commun. Networks, 2016

Keyword-driven security test automation of Customer Edge Switching (CES) architecture.
Proceedings of the 2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM), 2016

Securing the Private Realm Gateway.
Proceedings of the 2016 IFIP Networking Conference, 2016

A Review of Homomorphic Encryption and its Applications.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

2015
Controlling Cloud Data Access Based on Reputation.
Mob. Networks Appl., 2015

TruSMS: A trustworthy SMS spam control system based on trust management.
Future Gener. Comput. Syst., 2015

Security for Future Software Defined Mobile Networks.
Proceedings of the 9th International Conference on Next Generation Mobile Applications, 2015

Transition to IPv6 with Realm Gateway 64.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
A generic solution for unwanted traffic control through trust management.
New Rev. Hypermedia Multim., 2014

Analysis on the acceptance of Global Trust Management for unwanted traffic control based on game theory.
Comput. Secur., 2014

Personal Data Access Based on Trust Assessment in Mobile Social Networking.
Proceedings of the 13th IEEE International Conference on Trust, 2014

SDN optimized caching in LTE mobile networks.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014

Security Mechanisms for a Cooperative Firewall.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

Software Defined 5G Mobile Backhaul.
Proceedings of the 1st International Conference on 5G for Ubiquitous Connectivity, 2014

2013
A Research Model for Trustworthy Pervasive Social Networking.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Unwanted Content Control via Trust Management in Pervasive Social Networking.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Implementing NAT traversal with Private Realm Gateway.
Proceedings of IEEE International Conference on Communications, 2013

Traversal of the customer edge with NAT-unfriendly protocols.
Proceedings of IEEE International Conference on Communications, 2013

Game Theoretical Analysis of the Acceptance of Global Trust Management for Unwanted Traffic Control.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Implementation of an SMS Spam Control System Based on Trust Management.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Secure pervasive social networking based on multi-dimensional trust levels.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Unwanted Traffic Control via Hybrid Trust Management.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Implementation of an Evaluation Platform for Unwanted Traffic Control via Trust Management.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

2011
Theoretical Issues in the Study of Trust in Human-Computer Interaction.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A Research Model for Human-Computer Trust Interaction.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Unwanted Traffic Control via Global Trust Management.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
Future Internet Is by Ethernet.
Proceedings of the Communications: Wireless in Developing Countries and Networks of the Future, 2010

Implementing Trust-to-Trust with Customer Edge Switching.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

Automatic Link Numbering and Source Routed Multicast.
Proceedings of the Mechanisms for Autonomous Management of Networks and Services, 2010

2009
Tackling the Delay-Cost and Time-Cost Trade-Offs in Computation of Node-Protected Multicast Tree Pairs.
Proceedings of the Management Enabling the Future Internet for Changing Business and New Computing Services, 2009

2007
End to End Principle in Access Point Selection.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

2005
A Lightweight Clustering Algorithm Utilizing Capacity Heterogeneity.
Proceedings of the Challenges in Ad Hoc Networking, 2005

Adding Multi-Class Routing into the DiffServ Architecture.
Proceedings of the Systems Communications 2005 (ICW / ICHSN / ICMCS / SENET 2005), 2005

A Novel Multi-path Routing Protocol.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Incentive Problem for Ad Hoc Networks Scalability.
Proceedings of the Joint International Conference on Autonomic and Autonomous Systems 2005 / International Conference on Networking and Services 2005, 2005

Analysis of Flow Inter-Arrival Time Distributions.
Proceedings of the Internet and Multimedia Systems and Applications, 2005

Aligning mobile P2P content sharing services with a customer process.
Proceedings of the Third IASTED International Conference on Communications and Computer Networks, 2005

2004
Replication of Routing Tables for Mobility Management in Ad Hoc Networks.
Wirel. Networks, 2004

ICN: Interest-Based Clustering Network.
Proceedings of the 4th International Conference on Peer-to-Peer Computing (P2P 2004), 2004

Network Architecture for Scalable Ad Hoc Networks.
Proceedings of the Telecommunications and Networking, 2004

Strategies for creating a service distribution backbone in ad hoc networks.
Proceedings of the IASTED International Conference on Communications, Internet, and Information Technology, November 22, 2004

2003
Evaluation of transport protocols for the session initiation protocol.
IEEE Netw., 2003

Performance Evaluation of GSM Handover Traffic in a GPRS/GSM Network.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

A QoS Based Routing Algorithm for Multi-class Optimization in DiffServ Networks.
Proceedings of the High Speed Networks and Multimedia Communications, 2003

Traffic differentiability based on packet and flow per application-analysis.
Proceedings of the Global Telecommunications Conference, 2003

2002
Autoconfiguration Mechanism for IP Telephony.
Proceedings of the Converged Networking: Data and Real-time Communications over IP, 2002

2001
Interoperable routing for IN and IP Telephony.
Comput. Networks, 2001

2000
Mechanisms for Inter-domain QoS Routing in Differentiated Service Networks.
Proceedings of the Quality of Future Internet Services, 2000

Building MPLS VPNs with QoS Routing Capabilty.
Proceedings of the Next Generation Networks, 2000

1999
Performance Evaluation of an IP Voice Terminal.
Proceedings of the Intelligence in Networks, 1999

1998
Flow classification schemes in traffic-based multilayer IP switching - comparison between conventional and neural approach.
Comput. Commun., 1998


  Loading...