SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways SR Moosavi, TN Gia, AM Rahmani, E Nigussie, S Virtanen, J Isoaho, ... Procedia Computer Science 52, 452-459, 2015 | 372 | 2015 |
End-to-end security scheme for mobility enabled healthcare Internet of Things SR Moosavi, TN Gia, E Nigussie, AM Rahmani, S Virtanen, H Tenhunen, ... Future Generation Computer Systems 64, 108-124, 2016 | 337 | 2016 |
Distributed internal anomaly detection system for Internet-of-Things NK Thanigaivelan, E Nigussie, RK Kanth, S Virtanen, J Isoaho 2016 13th IEEE annual consumer communications & networking conference (CCNC …, 2016 | 142 | 2016 |
Information security awareness in educational institution: An analysis of students' individual factors A Farooq, J Isoaho, S Virtanen, J Isoaho 2015 IEEE Trustcom/bigdataSE/ispa 1, 352-359, 2015 | 75 | 2015 |
Performance analysis of end-to-end security schemes in healthcare IoT SR Moosavi, E Nigussie, M Levorato, S Virtanen, J Isoaho Procedia computer science 130, 432-439, 2018 | 63 | 2018 |
An elliptic curve-based mutual authentication scheme for RFID implant systems SR Moosavi, E Nigussie, S Virtanen, J Isoaho Procedia Computer Science 32, 198-206, 2014 | 58 | 2014 |
Session resumption-based end-to-end security for healthcare internet-of-things SR Moosavi, TN Gia, E Nigussie, AM Rahmani, S Virtanen, H Tenhunen, ... 2015 IEEE International Conference on Computer and Information Technology …, 2015 | 53 | 2015 |
A semantic security framework and context-aware role-based access control ontology for smart spaces S Hosseinzadeh, S Virtanen, N Díaz-Rodríguez, J Lilius Proceedings of the International Workshop on Semantic Big Data, 1-6, 2016 | 51 | 2016 |
Cryptographic key generation using ECG signal SR Moosavi, E Nigussie, S Virtanen, J Isoaho 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2017 | 39 | 2017 |
Low-latency approach for secure ECG feature based cryptographic key generation SR Moosavi, E Nigussie, M Levorato, S Virtanen, J Isoaho IEEE Access 6, 428-442, 2017 | 37 | 2017 |
CoDRA: Context-based dynamically reconfigurable access control system for android NK Thanigaivelan, E Nigussie, A Hakkala, S Virtanen, J Isoaho Journal of Network and Computer Applications 101, 1-17, 2018 | 27 | 2018 |
Increasing the self-study effort of higher education engineering students with an online learning platform S Virtanen International Journal of Knowledge and Learning 4 (6), 527-538, 2008 | 26 | 2008 |
A taxonomy of perceived information security and privacy threats among IT security students A Farooq, SRU Kakakhel, S Virtanen, J Isoaho 2015 10th International Conference for Internet Technology and Secured …, 2015 | 22 | 2015 |
Understanding dynamics of initial trust and its antecedents in password managers adoption intention among young adults A Farooq, A Dubinina, S Virtanen, J Isoaho Procedia Computer Science 184, 266-274, 2021 | 20 | 2021 |
A processor architecture for the TACO protocol processor development framework S Virtanen, J Lilius, T Westerlund Proceedings of the 18th IEEE NORCHIP Conference, 204-211, 2000 | 20 | 2000 |
A systematic methodology for continuous WLAN abundance and security analysis S Lindroos, A Hakkala, S Virtanen Computer Networks 197, 108359, 2021 | 17 | 2021 |
Information security awareness in educational institution: an analysis of students' individual factors, 2015 IEEE Trustcom A Farooq, J Isoaho, S Virtanen, J Isoaho BigDataSE/ISPA, 2015 | 16 | 2015 |
Convergence of hardware and software in platforms for radio technologies J Bjorkqvist, S Virtanen IEEE Communications Magazine 44 (11), 52-57, 2006 | 15 | 2006 |
SystemC based object oriented system design S Virtanen, D Truscan, J Lilius 4th Int. Forum on Design Languages (FDL'01), 3-7, 2001 | 15 | 2001 |
Hybrid Internal Anomaly Detection System for IoT: Reactive Nodes with Cross‐Layer Operation NK Thanigaivelan, E Nigussie, S Virtanen, J Isoaho Security and Communication Networks 2018 (1), 3672698, 2018 | 14 | 2018 |