A Survey on M2M Service Networks J Latvakoski, A Iivari, P Vitic, B Jubeh, MB Alaya, T Monteil, Y Lopez, ... Computers 3 (4), 130-173, 2014 | 31 | 2014 |
Harnessing XMPP for Machine-to-Machine Communications & Pervasive Applications A Iivari, T Väisänen, MB Alaya, T Riipinen, T Monteil Journal of Communications Software and Systems (JCOMSS) 10 (3), 2014 | 13 | 2014 |
Anti-Forensic Study P Zdzichowski, M Sadlon, TU Väisänen, AB Munoz, K Filipczak NATO CCD COE, 2015 | 11 | 2015 |
EVE and ADAM: Situation Awareness Tools for NATO CCDCOE Cyber Exercises FJR Melón, TU Väisänen, M Pihelgas Systems Concepts and Integration (SCI) Panel SCI-300 Specialists Meeting on
, 2018 | 8 | 2018 |
Toward risk-driven security measurement for Android smartphone platforms RM Savola, T Väisänen, A Evesti, P Savolainen, J Kemppainen, ... Information Security for South Africa, 2013, 1-8, 2013 | 7 | 2013 |
Secure M2M service space in residential home J Latvakoski, T Hautakoski, T Väisänen, J Toivonen, A Lappalainen, ... Proceedings of the Fourth International ICST Conference on COMmunication
, 2009 | 7 | 2009 |
I accidentally malware - what should I do... is this dangerous? Overcoming inevitable risks of electronic communication T Väisänen, L Trinberg, N Pissanidis https://ccdcoe.org/sites/default/files/multimedia/pdf/I%20accidentally
, 2016 | 6 | 2016 |
Combining real-time risk visualization and anomaly detection T Väisänen, S Noponen, OM Latvala, J Kuusijärvi Proceedings of the 12th European Conference on Software Architecture
, 2018 | 5 | 2018 |
Counterfeiting and Defending the Digital Forensic Process Á Botas, RJ Rodríguez, T Väisänen, P Zdzichowski Computer and Information Technology; Ubiquitous Computing and Communications
, 2015 | 5 | 2015 |
Defending mobile devices for high level officials and decision-makers T Väisänen, A Farar, N Pissanidis, C Braccini, B Blumbergs, E Diez https://ccdcoe.org/sites/default/files/multimedia/pdf/Defending%20mobile
, 2015 | 5 | 2015 |
Categorization of cyber security deception events for measuring the severity level of advanced targeted breaches T Väisänen Proceedings of the 11th European Conference on Software Architecture
, 2017 | 3 | 2017 |
Vertical handover during a VoIP call in hybrid mobile ad hoc networks J Latvakoski, P Valitalo, T Väisänen Wireless Telecommunications Symposium, 2008. WTS 2008, 38-45, 2008 | 3 | 2008 |
Lohkoketjuteknologian mahdollisuudet ja hyödyt sosiaali- ja terveydenhuollossa J Salonen, K Halunen, H Korhonen, J Lähteenmäki, P Pussinen, ... Valtioneuvoston selvitys- ja tutkimustoiminta, 2018 | 2 | 2018 |
Security analysis and review of digital signature-based low-cost RFID tag authentication T Väisänen, M Ritamäki, J Scholliers, S Toivonen International Journal of RF Technologies 6 (1), 31-49, 2014 | 2 | 2014 |
A Simple M2M Overlay Entity Discovery Protocol T Väisänen ICCGI 2012, The Seventh International Multi-Conference on Computing in the
, 2012 | 2 | 2012 |
Secure Real-Time Traffic in Hybrid Mobile Ad Hoc Networks I Uusitalo, T Väisänen, J Latvakoski Advanced Information Networking and Applications Workshops, 2007, AINAW'07
, 2007 | 1 | 2007 |
Cyber deception - Defend your organisation from cyber attacks (webinar) P Ahonen, T Väisänen http://www.vtt.fi, 2018 | | 2018 |
Using cyber deception just for fun (poster) T Väisänen Decepticon 2017: International Conference on Deceptive Behavior, 2017 | | 2017 |
Battlefield Digital Forensics: Digital Intelligence and Evidence Collection in Special Operations T Väisänen, C Braccini, M Sadloň, H Bahşi, A Panico, K van der Meij NATO Cooperative Cyber Defence Centre of Excellence, 2016 | | 2016 |
Two-factor user authentication with a shared secret T Väisänen Newer versions can be found from GitHub: https://htmlpreview.github.io
, 2013 | | 2013 |