default search action
Markku Antikainen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j3]Ibbad Hafeez, Markku Antikainen, Aaron Yi Ding, Sasu Tarkoma:
IoT-KEEPER: Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the Edge. IEEE Trans. Netw. Serv. Manag. 17(1): 45-59 (2020) - [c14]Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Tuomas Aura:
XSS Vulnerabilities in Cloud-Application Add-Ons. AsiaCCS 2020: 610-621
2010 – 2019
- 2019
- [c13]Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Tuomas Aura:
Pitfalls of open architecture: How friends can exploit your cryptocurrency wallet. EuroSec@EuroSys 2019: 3:1-3:6 - [c12]Verónica Toro-Betancur, José Viquez Zamora, Markku Antikainen, Mario Di Francesco:
A Scalable Software Update Service for IoT Devices in Urban Scenarios. IOT 2019: 9:1-9:8 - [c11]Thanh Bui, Markku Antikainen, Tuomas Aura:
Analysis of Topology Poisoning Attacks in Software-Defined Networking. NordSec 2019: 87-102 - [c10]Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Tuomas Aura:
Client-Side Vulnerabilities in Commercial VPNs. NordSec 2019: 103-119 - [c9]Ibbad Hafeez, Markku Antikainen, Sasu Tarkoma:
Protecting IoT-environments against Traffic Analysis Attacks with Traffic Morphing. PerCom Workshops 2019: 196-201 - [i5]Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Tuomas Aura:
XSS Vulnerabilities in Cloud-Application Add-Ons. CoRR abs/1911.12332 (2019) - [i4]Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Tuomas Aura:
Client-side Vulnerabilities in Commercial VPNs. CoRR abs/1912.04669 (2019) - 2018
- [j2]Alberto Geniola, Markku Antikainen, Tuomas Aura:
Automated analysis of freeware installers promoted by download portals. Comput. Secur. 77: 209-225 (2018) - [c8]Ibbad Hafeez, Aaron Yi Ding, Markku Antikainen, Sasu Tarkoma:
Real-Time IoT Device Activity Detection in Edge Networks. NSS 2018: 221-236 - [c7]Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Viswanathan Manihatty Bojan, Tuomas Aura:
Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer. USENIX Security Symposium 2018: 1511-1525 - [i3]Ibbad Hafeez, Markku Antikainen, Aaron Yi Ding, Sasu Tarkoma:
IoT-KEEPER: Securing IoT Communications in Edge Networks. CoRR abs/1810.08415 (2018) - 2017
- [c6]Ibbad Hafeez, Aaron Yi Ding, Markku Antikainen, Sasu Tarkoma:
Poster: IoTURVA: Securing Device-to-Device Communications for IoT. MobiCom 2017: 552-554 - [c5]Alberto Geniola, Markku Antikainen, Tuomas Aura:
A Large-Scale Analysis of Download Portals and Freeware Installers. NordSec 2017: 209-225 - [i2]Ibbad Hafeez, Aaron Yi Ding, Markku Antikainen, Sasu Tarkoma:
Toward Secure Edge Networks: Taming Device-to-Device (D2D) Communication in IoT. CoRR abs/1712.05958 (2017) - 2016
- [i1]Markku Antikainen, Liang Wang, Dirk Trossen, Arjuna Sathiaseelan:
XBF: Scaling up Bloom-filter-based Source Routing. CoRR abs/1602.05853 (2016) - 2015
- [c4]Rajat Kandoi, Markku Antikainen:
Denial-of-service attacks in OpenFlow SDN networks. IM 2015: 1322-1326 - [c3]Alireza Ranjbar, Markku Antikainen, Tuomas Aura:
Domain Isolation in a Multi-tenant Software-Defined Network. UCC 2015: 16-25 - 2014
- [j1]Markku Antikainen, Tuomas Aura, Mikko Särelä:
Denial-of-Service Attacks in Bloom-Filter-Based Forwarding. IEEE/ACM Trans. Netw. 22(5): 1463-1476 (2014) - [c2]Markku Antikainen, Tuomas Aura, Mikko Särelä:
Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch. NordSec 2014: 229-244 - [c1]Mohit Sethi, Markku Antikainen, Tuomas Aura:
Commitment-based device pairing with synchronized drawing. PerCom 2014: 181-189
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint