6G white paper: Research challenges for trust, security and privacy M Ylianttila, R Kantola, A Gurtov, L Mucchi, I Oppermann, Z Yan, ... arXiv preprint arXiv:2004.11665, 2020 | 170 | 2020 |
Evaluation of transport protocols for the session initiation protocol G Camarillo, R Kantola, H Schulzrinne IEEE network 17 (5), 40-46, 2003 | 130 | 2003 |
TruSMS: A trustworthy SMS spam control system based on trust management L Chen, Z Yan, W Zhang, R Kantola Future Generation Computer Systems 49, 77-93, 2015 | 62 | 2015 |
Security for future software defined mobile networks M Liyanage, I Ahmed, M Ylianttila, JL Santos, R Kantola, OL Perez, ... 2015 9th international conference on next generation mobile applications …, 2015 | 58 | 2015 |
Enhancing security of software defined mobile networks M Liyanage, I Ahmed, J Okwuibe, M Ylianttila, H Kabir, JL Santos, ... IEEE Access 5, 9422-9438, 2017 | 53 | 2017 |
ICN: Interest-based clustering network X Bai, S Liu, P Zhang, R Kantola Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004 …, 2004 | 41 | 2004 |
Method of communication and connection control R Kantola US Patent 5,878,128, 1999 | 40 | 1999 |
A research model for human-computer trust interaction Z Yan, R Kantola, P Zhang 2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011 | 37 | 2011 |
Detection as a service: An SDN application M Monshizadeh, V Khatri, R Kantola 2017 19th International Conference on Advanced Communication Technology …, 2017 | 36 | 2017 |
Software defined 5G mobile backhaul J Costa-Requena, R Kantola, J Llorente, V Ferrer, J Manner, AY Ding, ... 1st International Conference on 5G for Ubiquitous Connectivity, 258-263, 2014 | 35 | 2014 |
Performance evaluation of a combined anomaly detection platform M Monshizadeh, V Khatri, BG Atli, R Kantola, Z Yan IEEE Access 7, 100964-100978, 2019 | 33 | 2019 |
Flow classification schemes in traffic-based multilayer IP switching—comparison between conventional and neural approach M Ilvesmäki, M Luoma, R Kantola Computer communications 21 (13), 1184-1194, 1998 | 33 | 1998 |
Controlling cloud data access based on reputation Z Yan, X Li, R Kantola Mobile Networks and Applications 20, 828-839, 2015 | 31 | 2015 |
Analysis on the acceptance of global trust management for unwanted traffic control based on game theory Y Shen, Z Yan, R Kantola Computers & security 47, 3-25, 2014 | 31 | 2014 |
Improving data generalization with variational autoencoders for network traffic anomaly detection M Monshizadeh, V Khatri, M Gamdou, R Kantola, Z Yan IEEE Access 9, 56893-56907, 2021 | 29 | 2021 |
Privacy-preserving trust management for unwanted traffic control L Zhang, Z Yan, R Kantola Future Generation Computer Systems 72, 305-318, 2017 | 28 | 2017 |
Performance Evaluation of GSM Handover Traffic in a GPRS/GSM Network. JV Agustina, P Zhang, R Kantola ISCC, 137-142, 2003 | 27 | 2003 |
Policy‐based communications for 5G mobile with customer edge switching R Kantola, J Llorente Santos, N Beijar Security and Communication Networks 9 (16), 3070-3082, 2016 | 26 | 2016 |
Maintaining end-to-end synchronization on a telecommunications connection R Relander, R Kantola US Patent 7,369,662, 2008 | 26 | 2008 |
A survey on blockchain-enabled federated learning and its prospects with digital twin K Liu, Z Yan, X Liang, R Kantola, C Hu Digital Communications and Networks 10 (2), 248-264, 2024 | 25 | 2024 |