Tampere University of Technology

TUTCRIS Research Portal

Intelligent dexterity for secure networked infrastructure and applications (IDSNIA)

Research unit: Research Community

  1. 2015
  2. Published

    Survey and evaluation of neural computation models for bio-integrated systems

    Christophe, F., Andalibi, V., Laukkarinen, T., Mikkonen, T. & Koskimies, K., Dec 2015, In : Nano Communication Networks. 6, 4, p. 155-165 10 p.

    Research output: Contribution to journalReview ArticleScientificpeer-review

  3. Published

    A non-repudiable negotiation protocol for security service level agreements

    Kannisto, J., Takahashi, T., Harju, J., Heikkinen, S., Helenius, M., Matsuo, S. & Silverajan, B., 1 Oct 2015, In : International Journal of Communication Systems. 28, 15, p. 2067-2081 15 p.

    Research output: Contribution to journalArticleScientificpeer-review

  4. Published

    Surveys of daily information security of citizens in Finland

    Koskinen, J. A., 20 Aug 2015, 2015 IEEE Trustcom/BigDataSE/ISPA. IEEE, Vol. 1. p. 326 - 333 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  5. Published

    Mashing Up Software Issue Management, Development, and Usage Data

    Mattila, A-L., Lehtonen, T., Terho, H., Mikkonen, T. & Systä, K., 24 Jul 2015, 2015 IEEE/ACM 2nd International Workshop on Rapid Continuous Software Engineering (RCoSE). The Institute of Electrical and Electronics Engineers, Inc., p. 26-29 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  6. Published

    E-learning of ethics, awareness, hacking and research by information security majors

    Koskinen, J. A., 29 Jun 2015, Proceedings of SEFI Annual Conferences. European Society for Engineering Education SEFI, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  7. Published

    Systematic search for design contradictions in systems' architecture: Toward a computer aided analysis

    Coatanéa, E., Nonsiri, S., Roca, R., Mokammel, F., Kruck, J. & Christophe, F., 6 Jun 2015, In : Journal of Integrated Design and Process Science. 19, 1, p. 25-46 22 p.

    Research output: Contribution to journalArticleScientificpeer-review

  8. Published

    Communication challenges in high-density deployments of wearable wireless devices

    Pyattaev, A., Johnsson, K., Andreev, S. & Koucheryavy, Y., 1 Feb 2015, In : IEEE Wireless Communications. 22, 1, p. 12-18 7 p.

    Research output: Contribution to journalArticleScientificpeer-review

  9. Published

    Applying finite state process algebra to formally specify a computational model of security requirements in the key2phone-mobile access solution

    Chaudhary, S., Li, L., Berki, E., Helenius, M., Kela, J. & Turunen, M., 2015, Lecture Notes in Computer Science. Springer Verlag, p. 128-145 18 p. (Lecture Notes in Computer Science; vol. 9128).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  10. Published

    Cache storage attacks

    Brumley, B. B., 2015, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, p. 22-34 13 p. (Lecture Notes in Computer Science; vol. 9048).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  11. Published

    Data Correction for Seven Activity Trackers based on Regression Models

    Andalibi, V., Honko, H., Christophe, F. & Viik, J., 2015, Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society. p. 1592 - 1595 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Previous 1 2 3 4 5 6 7 Next

ID: 9032719