default search action
Antti Hakkala
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Ismayil Hasanov, Seppo Virtanen, Antti Hakkala, Jouni Isoaho:
Application of Large Language Models in Cybersecurity: A Systematic Literature Review. IEEE Access 12: 176751-176778 (2024) - [j10]Jenny Heino, Christian Jalio, Antti Hakkala, Seppo Virtanen:
JAPPI: An unsupervised endpoint application identification methodology for improved Zero Trust models, risk score calculations and threat detection. Comput. Networks 250: 110606 (2024) - 2023
- [c11]Jenny Heino, Antti Hakkala, Seppo Virtanen:
Categorizing TLS traffic based on JA3 pre-hash values. ANT/EDI40 2023: 94-101 - [c10]Anne-Maarit Majanoja, Antti Hakkala:
Enhancing a cybersecurity curriculum development tool with a competence framework to meet industry needs for cybersecurity. CompSysTech 2023: 123-128 - 2022
- [j9]Jenny Heino, Christian Jalio, Antti Hakkala, Seppo Virtanen:
A Method for Endpoint Aware Inspection in a Network Security Solution. IEEE Access 10: 44517-44530 (2022) - [j8]Saku Lindroos, Antti Hakkala, Seppo Virtanen:
Battle of the Bands: A Long-Term Analysis of Frequency Band and Channel Distribution Development in WLANs. IEEE Access 10: 61463-61471 (2022) - [j7]Jenny Heino, Antti Hakkala, Seppo Virtanen:
Study of methods for endpoint aware inspection in a next generation firewall. Cybersecur. 5(1): 25 (2022) - [j6]Antti Hakkala, Jani Koskinen:
Personal data protection in the age of mass surveillance. J. Comput. Secur. 30(2): 265-289 (2022) - [c9]Saku Lindroos, Antti Hakkala, Seppo Virtanen:
The COVID-19 pandemic and remote working did not improve WLAN security. ANT/EDI40 2022: 158-165 - [c8]Jenny Heino, Ayush Gupta, Antti Hakkala, Seppo Virtanen:
On Usability of Hash Fingerprinting for Endpoint Application Identification. CSR 2022: 38-43 - 2021
- [j5]Saku Lindroos, Antti Hakkala, Seppo Virtanen:
A systematic methodology for continuous WLAN abundance and security analysis. Comput. Networks 197: 108359 (2021) - 2020
- [c7]Ali Farooq, Antti Hakkala, Seppo Virtanen, Jouni Isoaho:
Cybersecurity Education and Skills: Exploring Students' Perceptions, Preferences and Performance in a Blended Learning Initiative. EDUCON 2020: 1361-1369 - [c6]Samuli Laato, Henna Vilppu, Juho Heimonen, Antti Hakkala, Jari Björne, Ali Farooq, Tapio Salakoski, Antti Airola:
Propagating AI Knowledge Across University Disciplines- The Design of A Multidisciplinary AI Study Module. FIE 2020: 1-9 - [c5]Samuli Laato, Ali Farooq, Henri Tenhunen, Tinja Pitkamaki, Antti Hakkala, Antti Airola:
AI in Cybersecurity Education- A Systematic Literature Review of Studies on Cybersecurity MOOCs. ICALT 2020: 6-10 - [c4]Olli I. Heimo, Jenni Heimo, Antti Hakkala:
COVID-19: Crisis Management and Promethean Thinking in Digital Age. Tethics 2020: 55-69
2010 – 2019
- 2019
- [c3]Antti Hakkala, Olli I. Heimo:
Automobile Automation and Lifecycle: How Digitalisation and Security Issues Affect the Car as a Product and Service? IntelliSys (2) 2019: 121-137 - [c2]Olli I. Heimo, Kai K. Kimppa, Antti Hakkala:
Automated Automobiles in Society. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 348-353 - 2018
- [j4]Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Antti Hakkala, Seppo Virtanen, Jouni Isoaho:
CoDRA: Context-based dynamically reconfigurable access control system for android. J. Netw. Comput. Appl. 101: 1-17 (2018) - [j3]Antti Hakkala, Olli I. Heimo, Sami Hyrynsalmi, Kai K. Kimppa:
Security, privacy'); drop table users; - and forced trust in the information age?: when trusting an information system is not optional and why it matters. SIGCAS Comput. Soc. 47(4): 68-80 (2018) - 2014
- [c1]Ethiopia Nigussie, Antti Hakkala, Seppo Virtanen, Jouni Isoaho:
Energy-aware adaptive security management for wireless sensor networks. WoWMoM 2014: 1-4 - 2012
- [j2]Ethiopia Nigussie, Liang Guang, Alexey Boyko, Antti Hakkala, Petri Sainio, Seppo Virtanen, Jouni Isoaho:
Incubator Platform for Multidisciplinary Innovation in Research and Education. Int. J. Knowl. Soc. Res. 3(3): 29-44 (2012) - [j1]Olli I. Heimo, Antti Hakkala, Kai K. Kimppa:
How to abuse biometric passport systems. J. Inf. Commun. Ethics Soc. 10(2): 68-81 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 20:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint