default search action
Jani Suomalainen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j16]Jani Suomalainen, Ijaz Ahmad, Annette Shajan, Tapio Savunen:
Cybersecurity for tactical 6G networks: Threats, architecture, and intelligence. Future Gener. Comput. Syst. 162: 107500 (2025) - 2024
- [j15]Ijaz Ahmad, Felipe Rodriguez, Tanesh Kumar, Jani Suomalainen, Senthil Kumar Jagatheesaperumal, Stefan Walter, Muhammad Zeeshan Asghar, Gaolei Li, Nikolaos Papakonstantinou, Mika Ylianttila, Jyrki Huusko, Thilo Sauter, Erkki Harjula:
Communications Security in Industry X: A Survey. IEEE Open J. Commun. Soc. 5: 982-1025 (2024) - [c15]Jani Suomalainen, Kimmo Ahola, Mirko Sailio, Gabor Kiss, Gabor Megyaszai, Rizwan Asif, Petri Jehkonen, Jonathan Rivalan:
Tactical Orchestration : Network, Security, and Drone Intelligence for Mission-Critical Operations. EuCNC/6G Summit 2024: 1061-1066 - 2023
- [c14]Ijaz Ahmad, Jere Malinen, Filippos Christou, Pawani Porambage, Andreas Kirstädter, Jani Suomalainen:
Security in Intent-Based Networking: Challenges and Solutions. CSCN 2023: 296-301 - 2022
- [j14]Ijaz Ahmad, Jani Suomalainen, Pawani Porambage, Andrei V. Gurtov, Jyrki Huusko, Marko Höyhtyä:
Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions. IEEE Access 10: 96038-96052 (2022) - [j13]Marjo Heikkilä, Pekka Koskela, Jani Suomalainen, Kalle Lähetkangas, Tero Kippola, Pentti Eteläaho, Juha Erkkilä, Ari Pouttu:
Field trial with tactical bubbles for mission critical communications. Trans. Emerg. Telecommun. Technol. 33(1) (2022) - [j12]Jani Suomalainen, Jukka Julku, Antti Heikkinen, Seppo J. Rantala, Anastasia Yastrebova:
Security-driven prioritization for tactical mobile networks. J. Inf. Secur. Appl. 67: 103198 (2022) - [j11]Marjo Heikkilä, Jani Suomalainen, Ossi Saukko, Tero Kippola, Kalle Lähetkangas, Pekka Koskela, Juha Kalliovaara, Hannu Haapala, Juho Pirttiniemi, Anastasia Yastrebova, Harri Posti:
Unmanned Agricultural Tractors in Private Mobile Networks. Network 2(1): 1-20 (2022) - 2021
- [j10]Ijaz Ahmad, Jarno Pinola, Ilkka Harjula, Jani Suomalainen, Erkki Harjula, Jyrki Huusko, Tanesh Kumar:
An Overview of the Security Landscape of Virtual Mobile Networks. IEEE Access 9: 169014-169030 (2021) - [j9]Jani Suomalainen, Jukka Julku, Mikko Vehkaperä, Harri Posti:
Securing Public Safety Communications on Commercial and Tactical 5G Networks: A Survey and Future Research Directions. IEEE Open J. Commun. Soc. 2: 1590-1615 (2021) - [c13]Jukka Julku, Jani Suomalainen, Markku Kylänpää:
Delegated Device Attestation for IoT. IOTSMS 2021: 1-8 - 2020
- [j8]Jani Suomalainen, Arto Juhola, Shahriar Shahabuddin, Aarne Mämmelä, Ijaz Ahmad:
Machine Learning Threatens 5G Security. IEEE Access 8: 190822-190842 (2020)
2010 – 2019
- 2018
- [j7]Ghada Arfaoui, Pascal Bisson, Rolf Blom, Ravishankar Borgaonkar, Håkan Englund, Edith Felix, Felix Klaedtke, Prajwol Kumar Nakarmi, Mats Näslund, Piers O'Hanlon, Juri Papay, Jani Suomalainen, Mike Surridge, Jean-Philippe Wary, Alexander Zahariev:
A Security Architecture for 5G Networks. IEEE Access 6: 22466-22479 (2018) - [j6]Marko Höyhtyä, Kalle Lähetkangas, Jani Suomalainen, Mika Hoppari, Kaisa Kujanpaa, Kien Trung Ngo, Tero Kippola, Marjo Heikkilä, Harri Posti, Jari Maki, Tapio Savunen, Ari Hulkkonen, Heikki Kokkinen:
Critical Communications Over Mobile Operators' Networks: 5G Use Cases Enabled by Licensed Spectrum Sharing, Network Slicing and QoS Control. IEEE Access 6: 73572-73582 (2018) - [j5]Jani Suomalainen, Adrian Kotelba, Jari Kreku, Sami Lehtonen:
Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT. Cryptogr. 2(1): 5 (2018) - [j4]Jani Suomalainen, Kimmo Ahola, Mikko Majanen, Olli Mämmelä, Pekka Ruuska:
Security Awareness in Software-Defined Multi-Domain 5G Networks. Future Internet 10(3): 27 (2018) - [c12]Olli Mämmelä, Jani Suomalainen, Kimmo Ahola, Pekka Ruuska, Mikko Majanen, Mikko Uitto:
Micro-Segmenting 5G. IoTBDS 2018: 17-28 - 2017
- [c11]Jari Kreku, Visa Antero Vallivaara, Kimmo Halunen, Jani Suomalainen:
Evaluating the Efficiency of Blockchains in IoT with Simulations. IoTBDS 2017: 216-223 - 2016
- [j3]Jani Suomalainen, Jukka Julku:
Enhancing Privacy of Information Brokering in Smart Districts by Adaptive Pseudonymization. IEEE Access 4: 914-927 (2016) - 2014
- [c10]Jani Suomalainen, Antti Evesti, Adrian Kotelba:
Security pairings using physical layer properties of wireless communications. PRISMS 2014: 1-8 - [c9]Jani Suomalainen:
Smartphone assisted security pairings for the Internet of Things. VITAE 2014: 1-5 - 2013
- [j2]Antti Evesti, Jani Suomalainen, Eila Ovaska:
Architecture and Knowledge-Driven Self-Adaptive Security in Smart Space. Comput. 2(1): 34-66 (2013) - [c8]Antti Evesti, Jani Suomalainen, Reijo Savola:
Security risks in the short-range communication of ubiquitous application. ICITST 2013: 612-617 - 2011
- [c7]Jani Suomalainen:
Flexible Security Deployment in Smart Spaces. GPC Workshops 2011: 34-43 - [c6]Jani Suomalainen, Pasi Hyttinen:
Security Solutions for Smart Spaces. SAINT 2011: 297-302 - 2010
- [c5]Jani Suomalainen, Pasi Hyttinen, Pentti Tarvainen:
Secure information sharing between heterogeneous embedded devices. ECSA Companion Volume 2010: 205-212
2000 – 2009
- 2009
- [j1]Jani Suomalainen, Jukka Valkonen, N. Asokan:
Standards for security associations in personal networks: a comparative analysis. Int. J. Secur. Networks 4(1/2): 87-100 (2009) - 2008
- [c4]Jani Suomalainen, Anssi Pehrsson, Jukka K. Nurminen:
A Security Analysis of a P2P Incentive Mechanisms for Mobile Devices. ICIW 2008: 397-402 - [c3]Jani Suomalainen, Seamus Moloney, Juha Koivisto, Kari Keinänen:
OpenHouse: A Secure Platform for Distributed Home Services. PST 2008: 15-23 - 2007
- [c2]Jani Suomalainen, Jukka Valkonen, N. Asokan:
Security Associations in Personal Networks: A Comparative Analysis. ESAS 2007: 43-57 - [c1]Jani Suomalainen:
Towards FineGrained Authorizations in Small Office and Home Networks. ICSNC 2007: 66
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 01:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint