Остановите войну!
for scientists:
default search action
Seppo Virtanen
- > Home > Persons > Seppo Virtanen
Publications
- 2021
- [c33]Ali Farooq, Alina Dubinina, Seppo Virtanen, Jouni Isoaho:
Understanding Dynamics of Initial Trust and its Antecedents in Password Managers Adoption Intention among Young Adults. ANT/EDI40 2021: 266-274 - 2020
- [c31]Ali Farooq, Antti Hakkala, Seppo Virtanen, Jouni Isoaho:
Cybersecurity Education and Skills: Exploring Students' Perceptions, Preferences and Performance in a Blended Learning Initiative. EDUCON 2020: 1361-1369 - 2019
- [c30]Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho:
SAMoC: Self-aware Access Monitoring and Controlling Framework for Android. ICT4DA 2019: 227-238 - [c29]Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho:
Conceptual Security System Design for Mobile Platforms Based on Human Nervous System. IMIS 2019: 437-446 - 2018
- [j15]Sanaz Rahimi Moosavi, Ethiopia Nigussie, Marco Levorato, Seppo Virtanen, Jouni Isoaho:
Low-Latency Approach for Secure ECG Feature Based Cryptographic Key Generation. IEEE Access 6: 428-442 (2018) - [j14]Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Antti Hakkala, Seppo Virtanen, Jouni Isoaho:
CoDRA: Context-based dynamically reconfigurable access control system for android. J. Netw. Comput. Appl. 101: 1-17 (2018) - [j13]Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho:
Hybrid Internal Anomaly Detection System for IoT: Reactive Nodes with Cross-Layer Operation. Secur. Commun. Networks 2018: 3672698:1-3672698:15 (2018) - [c27]Sanaz Rahimi Moosavi, Ethiopia Nigussie, Marco Levorato, Seppo Virtanen, Jouni Isoaho:
Performance Analysis of End-to-End Security Schemes in Healthcare IoT. ANT/SEIT 2018: 432-439 - [c26]Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho:
Towards Human Bio-Inspired Defence Mechanism for Cyber Security. IEEE Symposium on Security and Privacy Workshops 2018: 276-280 - 2017
- [c25]Sanaz Rahimi Moosavi, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho:
Cryptographic key generation using ECG signal. CCNC 2017: 1024-1031 - [c24]Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho:
Self-aware Access Control System for Android. IMIS 2017: 445-454 - [c23]Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho:
Towards Self-aware Approach for Mobile Devices Security. MMM-ACNS 2017: 171-182 - 2016
- [j12]Sanaz Rahimi Moosavi, Tuan Nguyen Gia, Ethiopia Nigussie, Amir-Mohammad Rahmani, Seppo Virtanen, Hannu Tenhunen, Jouni Isoaho:
End-to-end security scheme for mobility enabled healthcare Internet of Things. Future Gener. Comput. Syst. 64: 108-124 (2016) - [c22]Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Rajeev Kumar Kanth, Seppo Virtanen, Jouni Isoaho:
Distributed internal anomaly detection system for Internet-of-Things. CCNC 2016: 319-320 - [c21]Ali Farooq, Lalitha Balakrishnan, Muneeroh Phadung, Seppo Virtanen, Johanna Isoaho, Dhan Prasad Poudel, Jouni Isoaho:
Dimensions of Internet Use and Threat Sensitivity: An Exploratory Study among Students of Higher Education. CSE/EUC/DCABES 2016: 534-541 - 2015
- [j11]Ali Farooq, Johanna Isoaho, Seppo Virtanen, Jouni Isoaho:
Observations on Genderwise Differences among University Students in Information Security Awareness. Int. J. Inf. Secur. Priv. 9(2): 60-74 (2015) - [c18]Sanaz Rahimi Moosavi, Tuan Nguyen Gia, Ethiopia Nigussie, Amir-Mohammad Rahmani, Seppo Virtanen, Hannu Tenhunen, Jouni Isoaho:
Session Resumption-Based End-to-End Security for Healthcare Internet-of-Things. CIT/IUCC/DASC/PICom 2015: 581-588 - [c17]Sanaz Rahimi Moosavi, Tuan Nguyen Gia, Amir-Mohammad Rahmani, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho, Hannu Tenhunen:
SEA: A Secure and Efficient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways. ANT/SEIT 2015: 452-459 - [c16]Ali Farooq, Syed Rameez Ullah Kakakhel, Seppo Virtanen, Jouni Isoaho:
A taxonomy of perceived information security and privacy threats among IT security students. ICITST 2015: 280-286 - [c14]Ali Farooq, Johanna Isoaho, Seppo Virtanen, Jouni Isoaho:
Information Security Awareness in Educational Institution: An Analysis of Students' Individual Factors. TrustCom/BigDataSE/ISPA (1) 2015: 352-359 - 2014
- [c13]Sanaz Rahimi Moosavi, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho:
An Elliptic Curve-based Mutual Authentication Scheme for RFID Implant Systems. ANT/SEIT 2014: 198-206 - [c12]Ethiopia Nigussie, Antti Hakkala, Seppo Virtanen, Jouni Isoaho:
Energy-aware adaptive security management for wireless sensor networks. WoWMoM 2014: 1-4 - 2012
- [j6]Ethiopia Nigussie, Liang Guang, Alexey Boyko, Antti Hakkala, Petri Sainio, Seppo Virtanen, Jouni Isoaho:
Incubator Platform for Multidisciplinary Innovation in Research and Education. Int. J. Knowl. Soc. Res. 3(3): 29-44 (2012) - 2011
- [i1]Pekka Rantala, Seppo Virtanen, Jouni Isoaho:
Hybrid Trust Model for Internet Routing. CoRR abs/1105.5518 (2011) - 2010
- [j5]Jouni Isoaho, Seppo Virtanen, Juha Plosila:
Current Challenges in Embedded Communication Systems. Int. J. Embed. Real Time Commun. Syst. 1(1): 1-21 (2010) - 2008
- [j3]Muhammad Imran Anwar, Seppo Virtanen, Jouni Isoaho:
A software defined approach for common baseband processing. J. Syst. Archit. 54(8): 769-786 (2008) - 2005
- [c4]Seppo Virtanen, Dragos Truscan, Jani Paakkulainen, Jouni Isoaho, Johan Lilius:
Highly Automated FPGA Synthesis of Application-Specific Protocol Processors. FPL 2005: 269-274 - [c3]Jani Paakkulainen, Seppo Virtanen, Jouni Isoaho:
Tuning a Protocol Processor Architecture Towards DSP Operations. SAMOS 2005: 132-141
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-11-14 02:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint