Timo Hämäläinen

Affiliations:
  • University of Jyväskylä, Finland


According to our database1, Timo Hämäläinen authored at least 163 papers between 1999 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
GDL90fuzz: Fuzzing - GDL-90 Data Interface Specification Within Aviation Software and Avionics Devices-A Cybersecurity Pentesting Perspective.
IEEE Access, 2022

On the (In)Security of 1090ES and UAT978 Mobile Cockpit Information Systems-An Attacker Perspective on the Availability of ADS-B Safety- and Mission-Critical Systems.
IEEE Access, 2022

Cybersecurity Attacks on Software Logic and Error Handling Within AIS Implementations: A Systematic Testing of Resilience.
IEEE Access, 2022

Modelling Medical Devices with Honeypots: A Conceptual Framework.
Proceedings of the Information Systems and Technologies, 2022

2021
Resource Allocation and Computation Offloading for Multi-Access Edge Computing With Fronthaul and Backhaul Constraints.
IEEE Trans. Veh. Technol., 2021

OSRM-CCTV: Open-source CCTV-aware routing and navigation system for privacy, anonymity and safety (Preprint).
CoRR, 2021

A Statistical Model of Spine Shape and Material for Population-Oriented Biomechanical Simulation.
IEEE Access, 2021

Multi-Antenna Covert Communication With Jamming in the Presence of a Mobile Warden.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021

Curious SDN for network attack mitigation.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Intelligent IDS Chaining for Network Attack Mitigation in SDN.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

LoRa-Based Sensor Node Energy Consumption with Data Compression.
Proceedings of the IEEE International Workshop on Metrology for Industry 4.0 & IoT, 2021

Resource Allocation for Multi-Access Edge Computing with Fronthaul and Backhaul Constraints.
Proceedings of the 17th International Symposium on Wireless Communication Systems, 2021

Energy Efficient Optimization for Solar-Powered UAV Communications System.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

A model of Cyber Threat Information Sharing with the Novel Network Topology.
Proceedings of the IAIT 2021: The 12th International Conference on Advances in Information Technology, Bangkok, Thailand, 29 June 2021, 2021

Alpha Band Dysconnectivity Networks in Major Depression during Resting State.
Proceedings of the 29th European Signal Processing Conference, 2021

Joint User Association and Dynamic Beam Operation for High Latitude Muti-beam LEO Satellites.
Proceedings of the 26th IEEE Asia-Pacific Conference on Communications, 2021

2020
Incentive Mechanism for Resource Allocation in Wireless Virtualized Networks with Multiple Infrastructure Providers.
IEEE Trans. Mob. Comput., 2020

Towards large-scale, automated, accurate detection of CCTV camera objects using computer vision. Applications and implications for privacy, safety, and cybersecurity. (Preprint).
CoRR, 2020

Factors affecting Nigerian teacher educators' technology integration: Considering characteristics, knowledge constructs, ICT practices and beliefs.
Comput. Educ., 2020

Sensor Data Stream on-line Compression with Linearity-based Methods.
Proceedings of the IEEE International Conference on Smart Computing, 2020

Reinforcement Learning for Attack Mitigation in SDN-enabled Networks.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

ISAdetect: Usable Automated Detection of CPU Architecture and Endianness for Executable Binary Files and Object Code.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

Linear Approximation Based Compression Algorithms Efficiency to Compress Environmental Data Sets.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

2019
Towards usable automated detection of CPU architecture and endianness for arbitrary binary files and object code sequences.
CoRR, 2019

Predictive pumping based on sensor data and weather forecast.
Proceedings of the IEEE Sensors Applications Symposium, 2019

Compression Methods for Microclimate Data Based on Linear Approximation of Sensor Data.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2019

Network Anomaly Detection in Wireless Sensor Networks: A Review.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2019

Deep in the Dark: A Novel Threat Detection System using Darknet Traffic.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Revealing community structures by ensemble clustering using group diffusion.
Inf. Fusion, 2018

On optimal deployment of low power nodes for high frequency next generation wireless systems.
Comput. Networks, 2018

On Artificial Intelligent Malware Tolerant Networking for IoT.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2018

Requirements for Energy Efficient Edge Computing: A Survey.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2018

State of the Art Literature Review on Network Anomaly Detection.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2018

State of the Art Literature Review on Network Anomaly Detection with Deep Learning.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2018

A contract-based resource allocation mechanism in wireless virtualized network.
Proceedings of the IEEE INFOCOM 2018, 2018

A Network-Based Framework for Mobile Threat Detection.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

MLSPD - Machine Learning Based Spam and Phishing Detection.
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018

A Novel Method for Detecting APT Attacks by Using OODA Loop and Black Swan Theory.
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018

Operator Revenue Analysis for Device-to-Device Communications Overlaying Cellular Network.
Proceedings of the 2018 IEEE Conference on Standards for Communications and Networking, 2018

2017
Double Auction Based Multi-Flow Transmission in Software-Defined and Virtualized Wireless Networks.
IEEE Trans. Wirel. Commun., 2017

Towards proactive context-aware self-healing for 5G networks.
Comput. Networks, 2017

Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks.
Proceedings of the Network and System Security - 11th International Conference, 2017

On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2017

DNS Tunneling Detection Techniques - Classification, and Theoretical Comparison in Case of a Real APT Campaign.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2017

Performance Evaluation of OpenFlow Enabled Commodity and Raspberry pi Wireless Routers.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2017

Anomaly detection approach to keystroke dynamics based user authentication.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Multi-hop relays for high frequency next generation wireless systems.
Proceedings of the 24th International Conference on Telecommunications, 2017

Evaluation of ensemble machine learning methods in mobile threat detection.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Cybersecurity Safeguards for the Automotive Emergency Response Vehicles.
Proceedings of the 9th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, 2017

Simulation and performance analysis of frame structures for multi-hop relay systems.
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2017

Security Assessment of a Distributed, Modbus-Based Building Automation System.
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017

A Novel Model for Cybersecurity Economics and Analysis.
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017

2016
Blind source separation based interference suppression schemes for OFDM and DS-CDMA.
Telecommun. Syst., 2016

Reverse Combinatorial Auction Based Resource Allocation in Heterogeneous Software Defined Network with Infrastructure Sharing.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

A double auction mechanism for virtual resource allocation in SDN-based cellular network.
Proceedings of the 27th IEEE Annual International Symposium on Personal, 2016

On optimal placement of low power nodes for improved performance in heterogeneous networks.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Weighted Fuzzy Clustering for Online Detection of Application DDoS Attacks in Encrypted Network Traffic.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2016

Survey: Intrusion Detection Systems in Encrypted Traffic.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2016

Probabilistic group dependence approach for discovering overlapping clusters.
Proceedings of the 26th IEEE International Workshop on Machine Learning for Signal Processing, 2016

On adaptive access and relay link resource allocation for in-band deployments.
Proceedings of the International Symposium on Wireless Communication Systems, 2016

Distributed GNSS-based Time Synchronization and applications.
Proceedings of the 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2016

Increasing web service availability by detecting application-layer DDoS attacks in encrypted traffic.
Proceedings of the 23rd International Conference on Telecommunications, 2016

Model for sharing the information of cyber security situation awareness between organizations.
Proceedings of the 23rd International Conference on Telecommunications, 2016

Machine learning classification model for Network based Intrusion Detection System.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

2015
Online anomaly detection using dimensionality reduction techniques for HTTP log analysis.
Comput. Networks, 2015

Performance comparison of retransmission mechanisms for multi-hop relay networks.
Proceedings of the 11th IEEE International Conference on Wireless and Mobile Computing, 2015

Online detection of anomalous network flows with soft clustering.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2015

Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2015

On the system level performance of cellular FBMC-based wideband PMR network.
Proceedings of the 2015 International Symposium on Wireless Communication Systems (ISWCS), 2015

Energy efficient resource allocation in heterogeneous software defined network: A reverse combinatorial auction approach.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

2014
Always Best Connected Heterogeneous Network Concept.
Wirel. Pers. Commun., 2014

An Efficient Network Log Anomaly Detection System Using Random Projection Dimensionality Reduction.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

On optimal relay placement for improved performance in non-coverage limited scenarios.
Proceedings of the 17th ACM International Conference on Modeling, 2014

Wind Turbine Sensor Data Analysis and Production Forecast.
Proceedings of the 2014 European Modelling Symposium, Pisa, Italy, October 21-23, 2014, 2014

Variable group selection based on regression trees: Paper machine case study.
Proceedings of the 2014 IEEE Conference on Evolving and Adaptive Intelligent Systems, 2014

Analysis of HTTP Requests for Anomaly Detection of Web Attacks.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

Detection of zero-day malware based on the analysis of opcode sequences.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2013
Blind Principles Based Interference and Noise Reduction Schemes for OFDM.
Wirel. Pers. Commun., 2013

An uncertain optimal control model with Hurwicz criterion.
Appl. Math. Comput., 2013

Detection of Anomalous HTTP Requests Based on Advanced N-gram Model and Clustering Techniques.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networking, 2013

Proxy Mobile IPv6-Based Seamless Handover.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networking, 2013

A real time unsupervised NIDS for detecting unknown and encrypted network attacks in high speed network.
Proceedings of the 2nd IEEE International Workshop on Measurements & Networking, 2013

Information-theoretic approach to variable selection in predictive models applied to paper machine data.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

Support vector machine integrated with game-theoretic approach and genetic algorithm for the detection and classification of malware.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013

Interference Cancellation Schemes for Spread Spectrum Systems with Blind Principles.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
Blind source separation for OFDM with filtering colored noise and jamming signal.
J. Commun. Networks, 2012

Signal detection for spread spectrum communication systems with gradient algorithm.
Proceedings of the 8th IEEE International Conference on Wireless and Mobile Computing, 2012

Computationally efficient modulation of well-localised signals for OFDM.
Proceedings of the 8th IEEE International Conference on Wireless and Mobile Computing, 2012

Growing Hierarchical Self-organising Maps for Online Anomaly Detection by using Network Logs.
Proceedings of the WEBIST 2012 - Proceedings of the 8th International Conference on Web Information Systems and Technologies, Porto, Portugal, 18, 2012

Growing Hierarchical Self-organizing Maps and Statistical Distribution Models for Online Detection of Web Attacks.
Proceedings of the Web Information Systems and Technologies - 8th International Conference, 2012

Context and location aware always-best-connected concept for heterogeneous network.
Proceedings of the IFIP Wireless Days Conference 2012, Ireland, November 21-23, 2012, 2012

A Relay Deployment Mechanism for One Scenario of Cost-Effective Coverage Extension in IEEE 802.16j Networks.
Proceedings of the 5th International Conference on New Technologies, 2012

Performance of OFDM with Blind Interference Suppression Schemes.
Proceedings of the 5th International Conference on New Technologies, 2012

Real-Life Performance Analysis of Always-Best-Connected Network.
Proceedings of the 5th International Conference on New Technologies, 2012

Power Consumption Analysis of the Always-Best-Connected User Equipment.
Proceedings of the 5th International Conference on New Technologies, 2012

VoiP performance analysis in IEEE802.16 networks.
Proceedings of the 10th ACM International Symposium on Mobility Management and Wireless Access, 2012

Online anomaly detection by using N-gram model and growing hierarchical self-organizing maps.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

Efficient Handovers for Machine-to-Machine Communications between IEEE 802.11 and 3GPP Evolved Packed Core Networks.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

2011
WINSE: WiMAX NS-2 extension.
Simul., 2011

Blind source separation for OFDM with filtering colored noise out.
Proceedings of the 2011 IEEE Swedish Communication Technologies Workshop, 2011

Better Performance of Mobile Devices in Time Frequency Dispersive Channels Using Well-Localized Bases.
Proceedings of the Smart Spaces and Next Generation Wired/Wireless Networking, 2011

Optimal Relays Deployment for 802.16j Networks.
Proceedings of the Mobile Networks and Management - Third International ICST Conference, 2011

User-centric approach to always-best-connected networks.
Proceedings of the 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2011

2010
Efficient WH-OFTDM signals processing.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2010

Registration performance comparison between IP Multimedia Subsystem and Session Initiation Protocol networks.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2010

2009
WINSE: WiMAX NS-2 extension.
Proceedings of the 2nd International Conference on Simulation Tools and Techniques for Communications, 2009

State of Host-Centric Multihoming in IP Networks.
Proceedings of the NTMS 2009, 2009

Multiple Interface Management of Multihomed Mobile Hosts in Heterogeneous Wireless Environments.
Proceedings of the Eighth International Conference on Networks, 2009

2008
Scheduling solution for the IEEE 802.16 base station.
Comput. Networks, 2008

Gradient scheduling algorithm for fair delay guarantee in logarithmic pricing scenario.
Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, 2008

On ARQ feedback intensity of the IEEE 802.16 ARQ mechanism.
Proceedings of the 2008 International Conference on Telecommunications, 2008

XML Based 3G/LTE Network and Service Management Concept.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

ARQ Aware Scheduling for the IEEE 802.16 Base Station.
Proceedings of IEEE International Conference on Communications, 2008

2007
Adaptive Contention Resolution for VoIP Services in the IEEE 802.16 Networks.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

Adaptive contention resolution parameters for the IEEE 802.16 networks.
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007

Performance Evaluation of the IEEE 802.16 ARQ Mechanism.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2007

On Contention Resolution Parameters for the IEEE 802.16 Base Station.
Proceedings of the Global Communications Conference, 2007

2006
Simulation Study on 3G and WLAN Inter-Working.
IEICE Trans. Commun., 2006

Flow-based fast handover for mobile IPv6 environment - implementation and analysis.
Comput. Commun., 2006

Comparison and analysis of the revenue-based adaptive queuing models.
Comput. Networks, 2006

Analysis and Simulation of the Signaling Protocols for the DiffServ Framework.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2006

Ensuring the QoS requirements in 802.16 scheduling.
Proceedings of the 9th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2006

Multicast access control concept for xDSL-customers.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

Adaptive Algorithm for Revenue Maximization in WFQ Scheduler.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Bandwidth allocation and pricing in multimode network.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Security Analysis of Flow-based Fast Handover Method for Mobile IPv6 Networks.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Network and System Performance Management for Next Generation Networks.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Providing QOS in 3G-WLAN environment with RSVP and DIFFSERV.
Proceedings of the e-Business and Telecommunication Networks, 2006

2005
Revenue-Based Adaptive Deficit Round Robin.
Proceedings of the Quality of Service in Multiservice IP Networks, 2005

Using link layer information for improving vertical handovers.
Proceedings of the IEEE 16th International Symposium on Personal, 2005

Bandwidth allocation, bit rate and pricing.
Proceedings of IEEE International Conference on Communications, 2005

Packet scheduling with revenue optimization and weighted delay minimization.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
QoS- and revenue aware adaptive scheduling algorithm.
J. Commun. Networks, 2004

Soft handover and routing mechanisms for mobile devices.
Proceedings of the IEEE 15th International Symposium on Personal, 2004

Revenue-Aware Resource Allocation in the Future Multi-Service IP Networks.
Proceedings of the Network Control and Engineering for QoS, Security and Mobility, III, 2004

Stochastic analysis of upper delay bound of GPS-based packetized fair queueing algorithms.
Proceedings of the 12th IEEE International Conference on Networks, 2004

Adaptive scheduling using the revenue-based weighted round robin.
Proceedings of the 12th IEEE International Conference on Networks, 2004

Extension of the QoS policy information model to support adaptive queuing techniques.
Proceedings of the 12th IEEE International Conference on Networks, 2004

Multicast admission control in DiffServ networks.
Proceedings of the 12th IEEE International Conference on Networks, 2004

Packet Scheduling for Maximizing Revenue in a Network Node.
Proceedings of the ICETE 2004, 2004

Providing QoS in 3G-WLAN Environment with RSVP and Diffserv.
Proceedings of the ICETE 2004, 2004

Packet Scheduling Algorithm with Weight Optimization.
Proceedings of the ICETE 2004, 2004

An Analysis of the Flow-Based Fast Handover Method for Mobile IPv6 Network.
Proceedings of the ICETE 2004, 2004

Mobility Support and Soft Handover Protocol for IP-Networks.
Proceedings of the ICETE 2004, 2004

2003
Providing QoS at the integrated WLAN and 3G environments.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

Providing QoS with wireless adaptive scheduling in linear pricing scenario.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

3G and WLAN Interworking QoS solution.
Proceedings of the Mobile and Wireless Communications Networks, 2003

An Adaptive Approach to WFQ with the Revenue Criterion.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

A Lightpath Allocation Scheme for WDM Networks with QoS.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Enhancing Revenue Maximization with Adaptive WRR.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Service management model for integrated 3/4G and wireless LANs.
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003

QoS- and revenue aware adaptive scheduling algorithm.
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003

Adaptive weighted fair scheduling method for channel allocation.
Proceedings of IEEE International Conference on Communications, 2003

2002
Optimal link allocation and revenue maximization.
J. Commun. Networks, 2002

Pricing model for 3G/4G networks.
Proceedings of the 13th IEEE International Symposium on Personal, 2002

Performance Simulations of a QoS Aware Caching Method.
Proceedings of the NETWORKING 2002, 2002

A New Mechanism for Supporting Differentiated Services in Cluster-Based Network Servers.
Proceedings of the 10th International Workshop on Modeling, 2002

Link allocation and revenue optimization for future networks.
Proceedings of the Global Telecommunications Conference, 2002

2001
Tuning of QoS Aware Load Balancing Algorithm (QoS-LB) for Highly Loaded Server Clusters.
Proceedings of the Networking, 2001

Method for improving cache hit-rates in QoS-aware load balancing algorithm (QoS-LB).
Proceedings of the Global Telecommunications Conference, 2001

QoS aware adaptive pricing for network services.
Proceedings of the Global Telecommunications Conference, 2001

1999
Delay Performance Measurements in Multimedia Switching.
Proceedings of the 25th EUROMICRO '99 Conference, 1999


  Loading...