Stebėti
Teemu Väisänen
Teemu Väisänen
Patvirtintas el. paštas vtt.fi - Pagrindinis puslapis
Pavadinimas
Cituota
Cituota
Metai
A Survey on M2M Service Networks
J Latvakoski, A Iivari, P Vitic, B Jubeh, MB Alaya, T Monteil, Y Lopez, ...
Computers 3 (4), 130-173, 2014
312014
Harnessing XMPP for Machine-to-Machine Communications & Pervasive Applications
A Iivari, T Väisänen, MB Alaya, T Riipinen, T Monteil
Journal of Communications Software and Systems (JCOMSS) 10 (3), 2014
132014
Anti-Forensic Study
P Zdzichowski, M Sadlon, TU Väisänen, AB Munoz, K Filipczak
NATO CCD COE, 2015
112015
EVE and ADAM: Situation Awareness Tools for NATO CCDCOE Cyber Exercises
FJR Melón, TU Väisänen, M Pihelgas
Systems Concepts and Integration (SCI) Panel SCI-300 Specialists’ Meeting on …, 2018
82018
Toward risk-driven security measurement for Android smartphone platforms
RM Savola, T Väisänen, A Evesti, P Savolainen, J Kemppainen, ...
Information Security for South Africa, 2013, 1-8, 2013
72013
Secure M2M service space in residential home
J Latvakoski, T Hautakoski, T Väisänen, J Toivonen, A Lappalainen, ...
Proceedings of the Fourth International ICST Conference on COMmunication …, 2009
72009
I accidentally malware - what should I do... is this dangerous? Overcoming inevitable risks of electronic communication
T Väisänen, L Trinberg, N Pissanidis
https://ccdcoe.org/sites/default/files/multimedia/pdf/I%20accidentally …, 2016
62016
Combining real-time risk visualization and anomaly detection
T Väisänen, S Noponen, OM Latvala, J Kuusijärvi
Proceedings of the 12th European Conference on Software Architecture …, 2018
52018
Counterfeiting and Defending the Digital Forensic Process
Á Botas, RJ Rodríguez, T Väisänen, P Zdzichowski
Computer and Information Technology; Ubiquitous Computing and Communications …, 2015
52015
Defending mobile devices for high level officials and decision-makers
T Väisänen, A Farar, N Pissanidis, C Braccini, B Blumbergs, E Diez
https://ccdcoe.org/sites/default/files/multimedia/pdf/Defending%20mobile …, 2015
52015
Categorization of cyber security deception events for measuring the severity level of advanced targeted breaches
T Väisänen
Proceedings of the 11th European Conference on Software Architecture …, 2017
32017
Vertical handover during a VoIP call in hybrid mobile ad hoc networks
J Latvakoski, P Valitalo, T Väisänen
Wireless Telecommunications Symposium, 2008. WTS 2008, 38-45, 2008
32008
Lohkoketjuteknologian mahdollisuudet ja hyödyt sosiaali- ja terveydenhuollossa
J Salonen, K Halunen, H Korhonen, J Lähteenmäki, P Pussinen, ...
Valtioneuvoston selvitys- ja tutkimustoiminta, 2018
22018
Security analysis and review of digital signature-based low-cost RFID tag authentication
T Väisänen, M Ritamäki, J Scholliers, S Toivonen
International Journal of RF Technologies 6 (1), 31-49, 2014
22014
A Simple M2M Overlay Entity Discovery Protocol
T Väisänen
ICCGI 2012, The Seventh International Multi-Conference on Computing in the …, 2012
22012
Secure Real-Time Traffic in Hybrid Mobile Ad Hoc Networks
I Uusitalo, T Väisänen, J Latvakoski
Advanced Information Networking and Applications Workshops, 2007, AINAW'07 …, 2007
12007
Cyber deception - Defend your organisation from cyber attacks (webinar)
P Ahonen, T Väisänen
http://www.vtt.fi, 2018
2018
Using cyber deception just for fun (poster)
T Väisänen
Decepticon 2017: International Conference on Deceptive Behavior, 2017
2017
Battlefield Digital Forensics: Digital Intelligence and Evidence Collection in Special Operations
T Väisänen, C Braccini, M Sadloň, H Bahşi, A Panico, K van der Meij
NATO Cooperative Cyber Defence Centre of Excellence, 2016
2016
Two-factor user authentication with a shared secret
T Väisänen
Newer versions can be found from GitHub: https://htmlpreview.github.io …, 2013
2013
Sistema negali atlikti operacijos. Bandykite vėliau dar kartą.
Straipsniai 1–20