Security threats in ZigBee-enabled systems: Vulnerability evaluation, practical experiments, countermeasures, and lessons learned N Vidgren, K Haataja, JL Patino-Andres, JJ Ramirez-Sanchis, P Toivanen 2013 46th Hawaii International Conference on System Sciences, 5132-5138, 2013 | 164 | 2013 |
Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures K Haataja, P Toivanen IEEE Transactions on Wireless communications 9 (1), 384-392, 2010 | 136 | 2010 |
Three practical attacks against ZigBee security: Attack scenario definitions, practical experiments, countermeasures, and lessons learned O Olawumi, K Haataja, M Asikainen, N Vidgren, P Toivanen 2014 14th international conference on hybrid intelligent systems, 199-206, 2014 | 116 | 2014 |
Man-in-the-middle attacks on bluetooth: a comparative analysis, a novel attack, and countermeasures KMJ Haataja, K Hypponen 2008 3rd International Symposium on Communications, Control and Signal …, 2008 | 109 | 2008 |
An open, PKI-based mobile payment system M Hassinen, K Hyppönen, K Haataja International Conference on Emerging trends in information and communication …, 2006 | 108 | 2006 |
“Nino” man-in-the-middle attack on bluetooth secure simple pairing K Hypponen, KMJ Haataja 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet, 1-5, 2007 | 77 | 2007 |
AI in healthcare: A narrative review A Väänänen, K Haataja, K Vehviläinen-Julkunen, P Toivanen F1000Research 10, 6, 2021 | 73 | 2021 |
Practical man-in-the-middle attacks against bluetooth secure simple pairing K Haataja, P Toivanen 2008 4th International Conference on Wireless Communications, Networking and …, 2008 | 70 | 2008 |
Security threats and countermeasures in Bluetooth-enabled systems K Haataja University of Kuopio, 2009 | 56 | 2009 |
Novel hybrid encryption algorithm based on aes, RSA, and twofish for bluetooth encryption MA Albahar, O Olawumi, K Haataja, P Toivanen Scientific Research Publishing, Inc,, 2018 | 51 | 2018 |
Bluetooth security attacks: comparative analysis, attacks, and countermeasures K Haataja, K Hyppönen, S Pasanen, P Toivanen Springer Science & Business Media, 2013 | 42 | 2013 |
Security issues in smart homes and mobile health system: Threat analysis, possible countermeasures and lessons learned O Olayemi, V Antti, H Keijo, T Pekka Union of Scientists in Bulgaria, 2017 | 39 | 2017 |
Wireless indoor tracking of livestock for behavioral analysis M Asikainen, K Haataja, P Toivanen 2013 9th International Wireless Communications and Mobile Computing …, 2013 | 35 | 2013 |
Computer-aided breast cancer histopathological diagnosis: Comparative analysis of three DTOCS-based features: SW-DTOCS, SW-WDTOCS and SW-3-4-DTOCS I Pöllänen, B Braithwaite, T Ikonen, H Niska, K Haataja, P Toivanen, ... 2014 4th International Conference on Image Processing Theory, Tools and …, 2014 | 29 | 2014 |
Bluetooth MITM vulnerabilities: a literature review, novel attack scenarios, novel countermeasures, and lessons learned MA Albahar, K Haataja, P Toivanen International Journal on Information Technologies & Security 8 (4), 25-49, 2016 | 28 | 2016 |
New efficient intrusion detection and prevention system for Bluetooth networks KMJ Haataja 1st International ICST Conference on Mobile Wireless Middleware, Operating …, 2010 | 28 | 2010 |
New efficient rf fingerprint-based security solution for bluetooth secure simple pairing S Pasanen, K Haataja, N Paivinen, P Toivanen 2010 43rd Hawaii International Conference on System Sciences, 1-8, 2010 | 18 | 2010 |
Designing and implementing an intelligent Bluetooth-enabled robot car H Rissanen, J Mahonen, K Haataja, M Johansson, J Mielikainen, ... 2009 IFIP International Conference on Wireless and Optical Communications …, 2009 | 18 | 2009 |
Survey to healthcare professionals on the practicality of AI services for healthcare A Väänänen, K Haataja, P Toivanen F1000Research 9, 760, 2020 | 15 | 2020 |
Security in Bluetooth, WLAN and IrDA: a comparison KMJ Haataja university of Kuopio, Dept. of computer science, Finland, 2006 | 15 | 2006 |