default search action
Kimmo Hätönen
Person information
- affiliation: University of Helsinki, Finland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Maria Zubair, Maryam Sabzevari, Vikramajeet Khatri, Sasu Tarkoma, Kimmo Hätönen:
Access control for trusted data sharing. EURASIP J. Inf. Secur. 2024(1): 30 (2024) - 2022
- [j7]Naser Hossein Motlagh, Shubham Kapoor, Rola Alhalaseh, Sasu Tarkoma, Kimmo Hätönen:
Quality of Monitoring for Cellular Networks. IEEE Trans. Netw. Serv. Manag. 19(1): 381-391 (2022) - 2020
- [j6]Volker Ziegler, Harish Viswanathan, Hannu Flinck, Marco Hoffmann, Vilho Räisänen, Kimmo Hätönen:
6G Architecture to Connect the Worlds. IEEE Access 8: 173508-173520 (2020)
2010 – 2019
- 2019
- [c21]Volker Ziegler, Thorsten Wild, Mikko A. Uusitalo, Hannu Flinck, Vilho Räisänen, Kimmo Hätönen:
Stratification of 5G evolution and Beyond 5G. 5G World Forum 2019: 329-334 - 2017
- [j5]Robin Babujee Jerome, Kimmo Hätönen:
Anomaly detection and classification using a metric for determining the significance of failures - Case study: mobile network management data from LTE network. Neural Comput. Appl. 28(6): 1265-1275 (2017) - 2016
- [c20]Gabriela F. Ciocarlie, Cherita Corbett, Eric Yeh, Christopher Connolly, Henning Sanneck, Muhammad Naseer ul Islam, Borislava Gajic, Szabolcs Nováczki, Kimmo Hätönen:
Diagnosis cloud: Sharing knowledge across cellular networks. CNSM 2016: 228-232 - [c19]Ville Kojola, Shubham Kapoor, Kimmo Hätönen:
Distributed Computing of Management Data in a Telecommunications Network. MONAMI 2016: 146-159 - 2015
- [c18]Robin Babujee Jerome, Kimmo Hätönen:
A Metric for Determining the Significance of Failures and Its Use in Anomaly Detection - Case Study: Mobile Network Management Data from LTE Network. EANN 2015: 171-180 - [c17]Teemu Kanstrén, Sami Lehtonen, Reijo Savola, Hilkka Kukkohovi, Kimmo Hätönen:
Architecture for High Confidence Cloud Security Monitoring. IC2E 2015: 195-200 - [c16]Gabriela F. Ciocarlie, Eric Yeh, Christopher Connolly, Cherita Corbett, Ulf Lindqvist, Henning Sanneck, Kimmo Hätönen, Szabolcs Nováczki, Muhammad Naseer ul Islam, Borislava Gajic:
Alarm Prioritization and Diagnosis for Cellular Networks. MONAMI 2015: 28-42 - [c15]Raimo Hilden, Kimmo Hätönen:
A Method for Deriving and Testing Malicious Behavior Detection Rules. TrustCom/BigDataSE/ISPA (1) 2015: 1337-1342 - 2014
- [c14]Tuomas Kekkonen, Teemu Kanstrén, Kimmo Hätönen:
Towards Trusted Environment in Cloud Monitoring. ITNG 2014: 180-185 - 2013
- [j4]Pekka Kumpulainen, Kimmo Hätönen:
EANN 2012: exploratory analysis of mobile phone traffic patterns using 1-dimensional SOM, clustering and anomaly detection. Evol. Syst. 4(4): 251-265 (2013) - [j3]Pekka Kumpulainen, Mika Särkioja, Mikko Kylväjä, Kimmo Hätönen:
Analysing 3G radio network performance with fuzzy methods. Neurocomputing 107: 49-58 (2013) - 2012
- [c13]Pekka Kumpulainen, Kimmo Hätönen:
Characterizing Mobile Network Daily Traffic Patterns by 1-Dimensional SOM and Clustering. EANN 2012: 325-333 - 2011
- [c12]Pekka Kumpulainen, Mika Särkioja, Mikko Kylväjä, Kimmo Hätönen:
Finding 3G Mobile Network Cells with Similar Radio Interface Quality Problems. EANN/AIAI (1) 2011: 392-401 - [c11]Pekka Kumpulainen, Mika Särkioja, Mikko Kylväjä, Kimmo Hätönen:
Analyzing 3G Quality Distribution Data with Fuzzy Rules and Fuzzy Clustering. EANN/AIAI (1) 2011: 402-411 - 2010
- [c10]Perttu Halonen, Kimmo Hätönen:
Towards holistic security management through coherent measuring. ECSA Companion Volume 2010: 155-161 - [c9]Teemu Kanstrén, Reijo Savola, Antti Evesti, Heimo Pentikäinen, Artur Hecker, Moussa Ouedraogo, Kimmo Hätönen, Perttu Halonen, Christophe Blad, Óscar López, Saioa Ros:
Towards an abstraction layer for security assurance measurements: (invited paper). ECSA Companion Volume 2010: 189-196
2000 – 2009
- 2009
- [c8]Perttu Halonen, Markus Miettinen, Kimmo Hätönen:
Computer Log Anomaly Detection Using Frequent Episodes. AIAI 2009: 417-422 - 2008
- [j2]Pekka Kumpulainen, Kimmo Hätönen:
Local anomaly detection for mobile network monitoring. Inf. Sci. 178(20): 3840-3859 (2008) - 2004
- [c7]Kimmo Hätönen, Mika Klemettinen, Markus Miettinen:
Remarks on the Industrial Application of Inductive Database Technologies. Constraint-Based Mining and Inductive Databases 2004: 196-215 - [p1]Kimmo Hätönen, Mika Klemettinen:
Domain Structures in Filtering Irrelevant Frequent Patterns. Database Support for Data Mining Applications 2004: 289-305 - 2003
- [j1]Jukka K. Nurminen, Olli Karonen, Kimmo Hätönen:
What makes expert systems survive over 10 years - empirical evaluation of several engineering applications. Expert Syst. Appl. 24(2): 199-211 (2003) - [c6]Kimmo Hätönen, Jean-François Boulicaut, Mika Klemettinen, Markus Miettinen, Cyrille Masson:
Comprehensive Log Compression with Frequent Patterns. DaWaK 2003: 360-370 - [c5]Kimmo Hätönen, Perttu Halonen, Mika Klemettinen, Markus Miettinen:
Queryable Lossless Log Database Compression. KDID 2003: 70-79 - 2002
- [c4]Kimmo Hätönen, Mika Klemettinen:
Domain Structures in Filtering Irrelevant Frequent Patterns. KDID 2002: 50-60 - 2000
- [c3]Albert J. Höglund, Kimmo Hätönen, Antti S. Sorvari:
A Computer Host-Based User Anomaly Detection System Using the Self-Organizing Map. IJCNN (5) 2000: 411-416
1990 – 1999
- 1996
- [c2]Kimmo Hätönen, Mika Klemettinen, Heikki Mannila, Pirjo Ronkainen, Hannu Toivonen:
Knowledge Discovery from Telecommunication Network Alarm Databases. ICDE 1996: 115-122 - [c1]Kimmo Hätönen, Mika Klemettinen, Heikki Mannila, Pirjo Ronkainen, Hannu Toivonen:
TASA: Telecommunication Alarm Sequence Analyzer or how to enjoy faults in your network. NOMS 1996: 520-529
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-19 00:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint