Denial-of-service attacks in OpenFlow SDN networks R Kandoi, M Antikainen 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 222 | 2015 |
IoT-KEEPER: Detecting malicious IoT network activity using online traffic analysis at the edge I Hafeez, M Antikainen, AY Ding, S Tarkoma IEEE Transactions on Network and Service Management 17 (1), 45-59, 2020 | 185 | 2020 |
Spook in your network: Attacking an sdn with a compromised openflow switch M Antikainen, T Aura, M Särelä Secure IT Systems: 19th Nordic Conference, NordSec 2014, Tromsø, Norway …, 2014 | 139 | 2014 |
Denial-of-service attacks in Bloom-filter-based forwarding M Antikainen, T Aura, M Sarela Networking, IEEE/ACM Transactions on 22 (5), 1463-1476, 2014 | 55 | 2014 |
Protecting IoT-environments against traffic analysis attacks with traffic morphing I Hafeez, M Antikainen, S Tarkoma 2019 IEEE international conference on pervasive computing and communications …, 2019 | 49 | 2019 |
Commitment-based device pairing with synchronized drawing M Sethi, M Antikainen, T Aura 2014 IEEE International Conference on Pervasive Computing and Communications …, 2014 | 42 | 2014 |
Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer T Bui, SP Rao, M Antikainen, VM Bojan, T Aura 27th USENIX Security Symposium (USENIX Security 18), 2018 | 36 | 2018 |
Client-side vulnerabilities in commercial vpns T Bui, S Rao, M Antikainen, T Aura Secure IT Systems: 24th Nordic Conference, NordSec 2019, Aalborg, Denmark …, 2019 | 23 | 2019 |
Pitfalls of open architecture: How friends can exploit your cryptocurrency wallet T Bui, SP Rao, M Antikainen, T Aura Proceedings of the 12th European Workshop on Systems Security, 1-6, 2019 | 20 | 2019 |
Domain Isolation in a Multi-Tenant Software-Defined Network A Ranjbar, M Antikainen, T Aura 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015 | 18 | 2015 |
Real-time IoT device activity detection in edge networks I Hafeez, AY Ding, M Antikainen, S Tarkoma International Conference on Network and System Security, 221-236, 2018 | 17 | 2018 |
IoT-KEEPER: Securing IoT communications in edge networks I Hafeez, M Antikainen, AY Ding, S Tarkoma arXiv preprint arXiv:1810.08415, 2018 | 14 | 2018 |
Toward secure edge networks taming device to device (D2D) communication in IoT I Hafeez, AY Ding, M Antikainen, S Tarkoma arXiv preprint arXiv:1712.05958, 2017 | 14 | 2017 |
Xss vulnerabilities in cloud-application add-ons T Bui, S Rao, M Antikainen, T Aura Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 12 | 2020 |
Analysis of topology poisoning attacks in software-defined networking T Bui, M Antikainen, T Aura Secure IT Systems: 24th Nordic Conference, NordSec 2019, Aalborg, Denmark …, 2019 | 10 | 2019 |
A large-scale analysis of download portals and freeware installers A Geniola, M Antikainen, T Aura Secure IT Systems: 22nd Nordic Conference, NordSec 2017, Tartu, Estonia …, 2017 | 9 | 2017 |
XBF: Scaling up bloom-filter-based source routing M Antikainen, L Wang, D Trossen, A Sathiaseelan arXiv preprint arXiv:1602.05853, 2016 | 7 | 2016 |
A scalable software update service for IoT devices in urban scenarios V Toro-Betancur, JV Zamora, M Antikainen, M Di Francesco Proceedings of the 9th International Conference on the Internet of Things, 1-8, 2019 | 4 | 2019 |
Canopy: publish/subscribe with upgraph combination S Tarkoma, M Antikainen 2010 INFOCOM IEEE Conference on Computer Communications Workshops, 1-6, 2010 | 4 | 2010 |
Commitment-based device-pairing protocol with synchronized drawings and comparison metrics M Antikainen, M Sethi, S Matetic, T Aura Pervasive and Mobile Computing 16, 205-219, 2015 | 3 | 2015 |