Segui
Keijo Haataja
Keijo Haataja
Experienced Senior Manager Funded Projects
Email verificata su uef.fi
Titolo
Citata da
Citata da
Anno
Security threats in ZigBee-enabled systems: Vulnerability evaluation, practical experiments, countermeasures, and lessons learned
N Vidgren, K Haataja, JL Patino-Andres, JJ Ramirez-Sanchis, P Toivanen
2013 46th Hawaii International Conference on System Sciences, 5132-5138, 2013
1642013
Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures
K Haataja, P Toivanen
IEEE Transactions on Wireless communications 9 (1), 384-392, 2010
1362010
Three practical attacks against ZigBee security: Attack scenario definitions, practical experiments, countermeasures, and lessons learned
O Olawumi, K Haataja, M Asikainen, N Vidgren, P Toivanen
2014 14th international conference on hybrid intelligent systems, 199-206, 2014
1162014
Man-in-the-middle attacks on bluetooth: a comparative analysis, a novel attack, and countermeasures
KMJ Haataja, K Hypponen
2008 3rd International Symposium on Communications, Control and Signal …, 2008
1092008
An open, PKI-based mobile payment system
M Hassinen, K Hyppönen, K Haataja
International Conference on Emerging trends in information and communication …, 2006
1082006
“Nino” man-in-the-middle attack on bluetooth secure simple pairing
K Hypponen, KMJ Haataja
2007 3rd IEEE/IFIP International Conference in Central Asia on Internet, 1-5, 2007
772007
AI in healthcare: A narrative review
A Väänänen, K Haataja, K Vehviläinen-Julkunen, P Toivanen
F1000Research 10, 6, 2021
732021
Practical man-in-the-middle attacks against bluetooth secure simple pairing
K Haataja, P Toivanen
2008 4th International Conference on Wireless Communications, Networking and …, 2008
702008
Security threats and countermeasures in Bluetooth-enabled systems
K Haataja
University of Kuopio, 2009
562009
Novel hybrid encryption algorithm based on aes, RSA, and twofish for bluetooth encryption
MA Albahar, O Olawumi, K Haataja, P Toivanen
Scientific Research Publishing, Inc,, 2018
512018
Bluetooth security attacks: comparative analysis, attacks, and countermeasures
K Haataja, K Hyppönen, S Pasanen, P Toivanen
Springer Science & Business Media, 2013
422013
Security issues in smart homes and mobile health system: Threat analysis, possible countermeasures and lessons learned
O Olayemi, V Antti, H Keijo, T Pekka
Union of Scientists in Bulgaria, 2017
392017
Wireless indoor tracking of livestock for behavioral analysis
M Asikainen, K Haataja, P Toivanen
2013 9th International Wireless Communications and Mobile Computing …, 2013
352013
Computer-aided breast cancer histopathological diagnosis: Comparative analysis of three DTOCS-based features: SW-DTOCS, SW-WDTOCS and SW-3-4-DTOCS
I Pöllänen, B Braithwaite, T Ikonen, H Niska, K Haataja, P Toivanen, ...
2014 4th International Conference on Image Processing Theory, Tools and …, 2014
292014
Bluetooth MITM vulnerabilities: a literature review, novel attack scenarios, novel countermeasures, and lessons learned
MA Albahar, K Haataja, P Toivanen
International Journal on Information Technologies & Security 8 (4), 25-49, 2016
282016
New efficient intrusion detection and prevention system for Bluetooth networks
KMJ Haataja
1st International ICST Conference on Mobile Wireless Middleware, Operating …, 2010
282010
New efficient rf fingerprint-based security solution for bluetooth secure simple pairing
S Pasanen, K Haataja, N Paivinen, P Toivanen
2010 43rd Hawaii International Conference on System Sciences, 1-8, 2010
182010
Designing and implementing an intelligent Bluetooth-enabled robot car
H Rissanen, J Mahonen, K Haataja, M Johansson, J Mielikainen, ...
2009 IFIP International Conference on Wireless and Optical Communications …, 2009
182009
Survey to healthcare professionals on the practicality of AI services for healthcare
A Väänänen, K Haataja, P Toivanen
F1000Research 9, 760, 2020
152020
Security in Bluetooth, WLAN and IrDA: a comparison
KMJ Haataja
university of Kuopio, Dept. of computer science, Finland, 2006
152006
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20