default search action
Seppo Virtanen
Person information
- affiliation: University of Turku, Finland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Lauri Halla-aho, Jouni Isoaho, Seppo Virtanen:
Defining and Modeling Forced Trust and Its Dependencies in Smart Environments. IEEE Access 12: 105865-105877 (2024) - [j22]Jenny Heino, Christian Jalio, Antti Hakkala, Seppo Virtanen:
JAPPI: An unsupervised endpoint application identification methodology for improved Zero Trust models, risk score calculations and threat detection. Comput. Networks 250: 110606 (2024) - 2023
- [j21]Berioska Contreras Vargas, Seppo Virtanen:
A cloud-based systematic cyber security teaching and learning framework for high school students. Int. J. Knowl. Learn. 16(3): 316-339 (2023) - [c36]Jenny Heino, Antti Hakkala, Seppo Virtanen:
Categorizing TLS traffic based on JA3 pre-hash values. ANT/EDI40 2023: 94-101 - 2022
- [j20]Jenny Heino, Christian Jalio, Antti Hakkala, Seppo Virtanen:
A Method for Endpoint Aware Inspection in a Network Security Solution. IEEE Access 10: 44517-44530 (2022) - [j19]Saku Lindroos, Antti Hakkala, Seppo Virtanen:
Battle of the Bands: A Long-Term Analysis of Frequency Band and Channel Distribution Development in WLANs. IEEE Access 10: 61463-61471 (2022) - [j18]Jenny Heino, Antti Hakkala, Seppo Virtanen:
Study of methods for endpoint aware inspection in a next generation firewall. Cybersecur. 5(1): 25 (2022) - [c35]Saku Lindroos, Antti Hakkala, Seppo Virtanen:
The COVID-19 pandemic and remote working did not improve WLAN security. ANT/EDI40 2022: 158-165 - [c34]Jenny Heino, Ayush Gupta, Antti Hakkala, Seppo Virtanen:
On Usability of Hash Fingerprinting for Endpoint Application Identification. CSR 2022: 38-43 - [i5]Haoran Dou, Seppo Virtanen, Nishant Ravikumar, Alejandro F. Frangi:
A Generative Shape Compositional Framework: Towards Representative Populations of Virtual Heart Chimaeras. CoRR abs/2210.01607 (2022) - 2021
- [j17]Farhoud Hosseinpour, Ahmad Naebi, Seppo Virtanen, Tapio Pahikkala, Hannu Tenhunen, Juha Plosila:
A Resource Management Model for Distributed Multi-Task Applications in Fog Computing Networks. IEEE Access 9: 152792-152802 (2021) - [j16]Saku Lindroos, Antti Hakkala, Seppo Virtanen:
A systematic methodology for continuous WLAN abundance and security analysis. Comput. Networks 197: 108359 (2021) - [c33]Ali Farooq, Alina Dubinina, Seppo Virtanen, Jouni Isoaho:
Understanding Dynamics of Initial Trust and its Antecedents in Password Managers Adoption Intention among Young Adults. ANT/EDI40 2021: 266-274 - 2020
- [c32]Seppo Virtanen, Mark Girolami:
Dynamic content based ranking. AISTATS 2020: 2315-2324 - [c31]Ali Farooq, Antti Hakkala, Seppo Virtanen, Jouni Isoaho:
Cybersecurity Education and Skills: Exploring Students' Perceptions, Preferences and Performance in a Blended Learning Initiative. EDUCON 2020: 1361-1369
2010 – 2019
- 2019
- [c30]Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho:
SAMoC: Self-aware Access Monitoring and Controlling Framework for Android. ICT4DA 2019: 227-238 - [c29]Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho:
Conceptual Security System Design for Mobile Platforms Based on Human Nervous System. IMIS 2019: 437-446 - [c28]Seppo Virtanen, Mark A. Girolami:
Precision-Recall Balanced Topic Modelling. NeurIPS 2019: 6747-6756 - 2018
- [j15]Sanaz Rahimi Moosavi, Ethiopia Nigussie, Marco Levorato, Seppo Virtanen, Jouni Isoaho:
Low-Latency Approach for Secure ECG Feature Based Cryptographic Key Generation. IEEE Access 6: 428-442 (2018) - [j14]Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Antti Hakkala, Seppo Virtanen, Jouni Isoaho:
CoDRA: Context-based dynamically reconfigurable access control system for android. J. Netw. Comput. Appl. 101: 1-17 (2018) - [j13]Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho:
Hybrid Internal Anomaly Detection System for IoT: Reactive Nodes with Cross-Layer Operation. Secur. Commun. Networks 2018: 3672698:1-3672698:15 (2018) - [c27]Sanaz Rahimi Moosavi, Ethiopia Nigussie, Marco Levorato, Seppo Virtanen, Jouni Isoaho:
Performance Analysis of End-to-End Security Schemes in Healthcare IoT. ANT/SEIT 2018: 432-439 - [c26]Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho:
Towards Human Bio-Inspired Defence Mechanism for Cyber Security. IEEE Symposium on Security and Privacy Workshops 2018: 276-280 - 2017
- [c25]Sanaz Rahimi Moosavi, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho:
Cryptographic key generation using ECG signal. CCNC 2017: 1024-1031 - [c24]Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho:
Self-aware Access Control System for Android. IMIS 2017: 445-454 - [c23]Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho:
Towards Self-aware Approach for Mobile Devices Security. MMM-ACNS 2017: 171-182 - 2016
- [j12]Sanaz Rahimi Moosavi, Tuan Nguyen Gia, Ethiopia Nigussie, Amir-Mohammad Rahmani, Seppo Virtanen, Hannu Tenhunen, Jouni Isoaho:
End-to-end security scheme for mobility enabled healthcare Internet of Things. Future Gener. Comput. Syst. 64: 108-124 (2016) - [c22]Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Rajeev Kumar Kanth, Seppo Virtanen, Jouni Isoaho:
Distributed internal anomaly detection system for Internet-of-Things. CCNC 2016: 319-320 - [c21]Ali Farooq, Lalitha Balakrishnan, Muneeroh Phadung, Seppo Virtanen, Johanna Isoaho, Dhan Prasad Poudel, Jouni Isoaho:
Dimensions of Internet Use and Threat Sensitivity: An Exploratory Study among Students of Higher Education. CSE/EUC/DCABES 2016: 534-541 - [c20]Seppo Virtanen, Homayun Afrabandpey, Samuel Kaski:
Visualizations relevant to the user by multi-view latent variable factorization. ICASSP 2016: 2464-2468 - [c19]Shohreh Hosseinzadeh, Seppo Virtanen, Natalia Díaz Rodríguez, Johan Lilius:
A semantic security framework and context-aware role-based access control ontology for smart spaces. SBD@SIGMOD 2016: 8 - 2015
- [j11]Ali Farooq, Johanna Isoaho, Seppo Virtanen, Jouni Isoaho:
Observations on Genderwise Differences among University Students in Information Security Awareness. Int. J. Inf. Secur. Priv. 9(2): 60-74 (2015) - [j10]Arto Klami, Seppo Virtanen, Eemeli Leppäaho, Samuel Kaski:
Group Factor Analysis. IEEE Trans. Neural Networks Learn. Syst. 26(9): 2136-2147 (2015) - [c18]Sanaz Rahimi Moosavi, Tuan Nguyen Gia, Ethiopia Nigussie, Amir-Mohammad Rahmani, Seppo Virtanen, Hannu Tenhunen, Jouni Isoaho:
Session Resumption-Based End-to-End Security for Healthcare Internet-of-Things. CIT/IUCC/DASC/PICom 2015: 581-588 - [c17]Sanaz Rahimi Moosavi, Tuan Nguyen Gia, Amir-Mohammad Rahmani, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho, Hannu Tenhunen:
SEA: A Secure and Efficient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways. ANT/SEIT 2015: 452-459 - [c16]Ali Farooq, Syed Rameez Ullah Kakakhel, Seppo Virtanen, Jouni Isoaho:
A taxonomy of perceived information security and privacy threats among IT security students. ICITST 2015: 280-286 - [c15]Seppo Virtanen, Mark A. Girolami:
Ordinal Mixed Membership Models. ICML 2015: 588-596 - [c14]Ali Farooq, Johanna Isoaho, Seppo Virtanen, Jouni Isoaho:
Information Security Awareness in Educational Institution: An Analysis of Students' Individual Factors. TrustCom/BigDataSE/ISPA (1) 2015: 352-359 - [i4]Seppo Virtanen, Homayun Afrabandpey, Samuel Kaski:
Visualizations Relevant to The User By Multi-View Latent Variable Factorization. CoRR abs/1512.07807 (2015) - 2014
- [j9]Suleiman A. Khan, Seppo Virtanen, Olli-P. Kallioniemi, Krister Wennerberg, Antti Poso, Samuel Kaski:
Identification of structural features in chemicals associated with cancer drug response: a systematic data-driven analysis. Bioinform. 30(17): 497-504 (2014) - [j8]Douzi Imran Khan, Seppo Virtanen, Pierre Bonnal, A. K. Verma:
Functional failure modes cause-consequence logic suited for mobile robots used at scientific facilities. Reliab. Eng. Syst. Saf. 129: 10-18 (2014) - [c13]Sanaz Rahimi Moosavi, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho:
An Elliptic Curve-based Mutual Authentication Scheme for RFID Implant Systems. ANT/SEIT 2014: 198-206 - [c12]Ethiopia Nigussie, Antti Hakkala, Seppo Virtanen, Jouni Isoaho:
Energy-aware adaptive security management for wireless sensor networks. WoWMoM 2014: 1-4 - 2013
- [j7]Arto Klami, Seppo Virtanen, Samuel Kaski:
Bayesian Canonical correlation analysis. J. Mach. Learn. Res. 14(1): 965-1003 (2013) - 2012
- [j6]Ethiopia Nigussie, Liang Guang, Alexey Boyko, Antti Hakkala, Petri Sainio, Seppo Virtanen, Jouni Isoaho:
Incubator Platform for Multidisciplinary Innovation in Research and Education. Int. J. Knowl. Soc. Res. 3(3): 29-44 (2012) - [c11]Seppo Virtanen, Yangqing Jia, Arto Klami, Trevor Darrell:
Factorized Multi-Modal Topic Model. UAI 2012: 843-851 - [c10]Seppo Virtanen, Arto Klami, Suleiman A. Khan, Samuel Kaski:
Bayesian Group Factor Analysis. AISTATS 2012: 1269-1277 - [i3]Arto Klami, Seppo Virtanen, Samuel Kaski:
Bayesian exponential family projections for coupled data sources. CoRR abs/1203.3489 (2012) - [i2]Seppo Virtanen, Yangqing Jia, Arto Klami, Trevor Darrell:
Factorized Multi-Modal Topic Model. CoRR abs/1210.4920 (2012) - 2011
- [c9]Seppo Virtanen, Arto Klami, Samuel Kaski:
Bayesian CCA via Group Sparsity. ICML 2011: 457-464 - [i1]Pekka Rantala, Seppo Virtanen, Jouni Isoaho:
Hybrid Trust Model for Internet Routing. CoRR abs/1105.5518 (2011) - 2010
- [j5]Jouni Isoaho, Seppo Virtanen, Juha Plosila:
Current Challenges in Embedded Communication Systems. Int. J. Embed. Real Time Commun. Syst. 1(1): 1-21 (2010) - [c8]Arto Klami, Seppo Virtanen, Samuel Kaski:
Bayesian exponential family projections for coupled data sources. UAI 2010: 286-293
2000 – 2009
- 2008
- [j4]Seppo Virtanen:
Increasing the self-study effort of higher education engineering students with an online learning platform. Int. J. Knowl. Learn. 4(6): 527-538 (2008) - [j3]Muhammad Imran Anwar, Seppo Virtanen, Jouni Isoaho:
A software defined approach for common baseband processing. J. Syst. Archit. 54(8): 769-786 (2008) - [c7]Tomi Metsälä, Tomi Westerlund, Seppo Virtanen, Juha Plosila:
Rigorous Communication Modelling at Transaction Level With Systemc. ICSOFT (SE/MUSE/GSDCA) 2008: 246-251 - [c6]Seppo Virtanen:
Improving the Learning Process of Engineering Students by Deployment of Activating ICTs. WSKS (2) 2008: 328-333 - 2006
- [j2]Jerker Björkqvist, Seppo Virtanen:
Convergence of Hardware and Software in Platforms for Radio Technologies. IEEE Commun. Mag. 44(11): 52-57 (2006) - 2005
- [j1]Seppo Virtanen, Tero Nurmi, Jani Paakkulainen, Johan Lilius:
A system-level framework for designing and evaluating protocol processor architectures. Int. J. Embed. Syst. 1(1/2): 78-90 (2005) - [c5]Seppo Virtanen, Jani Paakkulainen, Tero Nurmi:
Capturing Processor Architectures from Protocol Processing Applications: a Case Study. DSD 2005: 243-246 - [c4]Seppo Virtanen, Dragos Truscan, Jani Paakkulainen, Jouni Isoaho, Johan Lilius:
Highly Automated FPGA Synthesis of Application-Specific Protocol Processors. FPL 2005: 269-274 - [c3]Jani Paakkulainen, Seppo Virtanen, Jouni Isoaho:
Tuning a Protocol Processor Architecture Towards DSP Operations. SAMOS 2005: 132-141 - 2003
- [c2]Johan Lilius, Dragos Truscan, Seppo Virtanen:
Fast Evaluation of Protocol Processor Architectures for IPv6 Routing. DATE 2003: 20158-20163 - 2001
- [c1]Seppo Virtanen, Johan Lilius:
The TACO protocol processor simulation environment. CODES 2001: 201-206
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint