default search action
Raimo Kantola
Person information
- affiliation: Aalto University, Espoo, Finland
- affiliation: Helsinki University of Technology, Espoo, Finland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j18]Kangde Liu, Zheng Yan, Xueqin Liang, Raimo Kantola, Chuangyue Hu:
A survey on blockchain-enabled federated learning and its prospects with digital twin. Digit. Commun. Networks 10(2): 248-264 (2024) - 2022
- [j17]Xueqin Liang, Zheng Yan, Raimo Kantola:
GAIMMO: A Grade-Driven Auction-Based Incentive Mechanism With Multiple Objectives for Crowdsourcing Managed by Blockchain. IEEE Internet Things J. 9(18): 17488-17502 (2022) - [j16]Mehrnoosh Monshizadeh, Vikramajeet Khatri, Raimo Kantola, Zheng Yan:
A deep density based and self-determining clustering approach to label unknown traffic. J. Netw. Comput. Appl. 207: 103513 (2022) - 2021
- [j15]Mehrnoosh Monshizadeh, Vikramajeet Khatri, Marah Gamdou, Raimo Kantola, Zheng Yan:
Improving Data Generalization With Variational Autoencoders for Network Traffic Anomaly Detection. IEEE Access 9: 56893-56907 (2021) - 2020
- [j14]Yulong Fu, Hanlu Chen, Qinghua Zheng, Zheng Yan, Raimo Kantola, Xuyang Jing, Jin Cao, Hui Li:
An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks. J. Netw. Comput. Appl. 155: 102549 (2020) - 2019
- [j13]Mehrnoosh Monshizadeh, Vikramajeet Khatri, Buse Gul Atli, Raimo Kantola, Zheng Yan:
Performance Evaluation of a Combined Anomaly Detection Platform. IEEE Access 7: 100964-100978 (2019) - 2017
- [j12]Madhusanka Liyanage, Ijaz Ahmed, Jude Okwuibe, Mika Ylianttila, Hammad Kabir, Jesus Llorente Santos, Raimo Kantola, Oscar Lopez Perez, Mikel Uriarte Itzazelaia, Edgardo Montes de Oca:
Enhancing Security of Software Defined Mobile Networks. IEEE Access 5: 9422-9438 (2017) - [j11]Lifang Zhang, Zheng Yan, Raimo Kantola:
Privacy-preserving trust management for unwanted traffic control. Future Gener. Comput. Syst. 72: 305-318 (2017) - [j10]Raimo Kantola, Hammad Kabir, Patrick Loiseau:
Cooperation and end-to-end in the Internet. Int. J. Commun. Syst. 30(12) (2017) - 2016
- [j9]Raimo Kantola, Jesus Llorente Santos, Nicklas Beijar:
Policy-based communications for 5G mobile with customer edge switching. Secur. Commun. Networks 9(16): 3070-3082 (2016) - 2015
- [j8]Liang Chen, Zheng Yan, Weidong Zhang, Raimo Kantola:
TruSMS: A trustworthy SMS spam control system based on trust management. Future Gener. Comput. Syst. 49: 77-93 (2015) - [j7]Zheng Yan, Xueyun Li, Raimo Kantola:
Controlling Cloud Data Access Based on Reputation. Mob. Networks Appl. 20(6): 828-839 (2015) - 2014
- [j6]Yue Shen, Zheng Yan, Raimo Kantola:
Analysis on the acceptance of Global Trust Management for unwanted traffic control based on game theory. Comput. Secur. 47: 3-25 (2014) - [j5]Zheng Yan, Raimo Kantola, Yue Shen:
A generic solution for unwanted traffic control through trust management. New Rev. Hypermedia Multim. 20(1): 25-51 (2014) - 2004
- [j4]José Costa-Requena, Nicklas Beijar, Raimo Kantola:
Replication of Routing Tables for Mobility Management in Ad Hoc Networks. Wirel. Networks 10(4): 367-375 (2004) - 2003
- [j3]Gonzalo Camarillo, Raimo Kantola, Henning Schulzrinne:
Evaluation of transport protocols for the session initiation protocol. IEEE Netw. 17(5): 40-46 (2003) - 2001
- [j2]Raimo Kantola, José Costa-Requena, Nicklas Beijar:
Interoperable routing for IN and IP Telephony. Comput. Networks 35(5): 597-609 (2001) - 1998
- [j1]Mika Ilvesmäki, Marko Luoma, Raimo Kantola:
Flow classification schemes in traffic-based multilayer IP switching - comparison between conventional and neural approach. Comput. Commun. 21(13): 1184-1194 (1998)
Conference and Workshop Papers
- 2021
- [c55]Shushu Liu, Zheng Yan, Raimo Kantola:
Privacy-preserving D2D Cooperative Location Verification. GLOBECOM 2021: 1-6 - 2020
- [c54]Raimo Kantola:
Trust Networking for Beyond 5G and 6G. 6G SUMMIT 2020: 1-6 - [c53]Maria Riaz, Juha-Matti Tilli, Raimo Kantola:
Sec-ALG: An Open-source Application Layer Gateway for Secure Access to Private Networks. ICCCN 2020: 1-11 - [c52]Hammad Kabir, Muhammad Hassaan Bin Mohsin, Raimo Kantola:
Implementing a Security Policy Management for 5G Customer Edge Nodes. NOMS 2020: 1-8 - 2019
- [c51]Raimo Kantola:
6G Network Needs to Support Embedded Trust. ARES 2019: 104:1-104:5 - [c50]Seppo Borenius, José Costa-Requena, Matti Lehtonen, Raimo Kantola:
Providing Network Time Protocol Based Timing for Smart Grid Measurement and Control Devices in 5G Networks. SmartGridComm 2019: 1-6 - 2018
- [c49]Isha Singh, Silke Holtmanns, Raimo Kantola:
Roaming Interface Signaling Security for LTE Networks. SecITC 2018: 204-217 - [c48]Mehrnoosh Monshizadeh, Vikramajeet Khatri, Mohammadali Varfan, Raimo Kantola:
LiaaS: Lawful Interception as a Service. SoftCOM 2018: 1-6 - [c47]Mehrnoosh Monshizadeh, Vikramajeet Khatri, Buse Gul Atli, Raimo Kantola:
An Intelligent Defense and Filtration Platform for Network Traffic. WWIC 2018: 107-118 - 2017
- [c46]Huaqing Lin, Zheng Yan, Raimo Kantola:
CDController: A Cloud Data Access Control System Based on Reputation. CIT 2017: 223-230 - [c45]Juha-Matti Tilli, Raimo Kantola:
Data plane protocols and fragmentation for 5G. CSCN 2017: 207-213 - [c44]Mehrnoosh Monshizadeh, Vikramajeet Khatri, Raimo Kantola, Zheng Yan:
An Orchestrated Security Platform for Internet of Robots. GPC 2017: 298-312 - [c43]Mehrnoosh Monshizadeh, Vikramajeet Khatri, Raimo Kantola:
An adaptive detection and prevention architecture for unsafe traffic in SDN enabled mobile networks. IM 2017: 883-884 - 2016
- [c42]Lifang Zhang, Yan Zheng, Raimo Kantola:
A Review of Homomorphic Encryption and its Applications. MobiMedia 2016: 97-106 - [c41]Hammad Kabir, Jesus Llorente Santos, Raimo Kantola:
Securing the Private Realm Gateway. Networking 2016: 243-251 - [c40]K. C. Amir, Ana E. Goulart, Raimo Kantola:
Keyword-driven security test automation of Customer Edge Switching (CES) architecture. RNDM 2016: 216-223 - 2015
- [c39]Jesus Llorente Santos, Raimo Kantola:
Transition to IPv6 with Realm Gateway 64. ICC 2015: 5614-5620 - [c38]Madhusanka Liyanage, Ijaz Ahmed, Mika Ylianttila, Jesus Llorente Santos, Raimo Kantola, Oscar Lopez Perez, Mikel Uriarte Itzazelaia, Edgardo Montes de Oca, Asier Valtierra, Carlos Jimenez:
Security for Future Software Defined Mobile Networks. NGMAST 2015: 256-264 - 2014
- [c37]José Costa-Requena, Raimo Kantola, Aaron Yi Ding, Jukka Manner, Yanhe Liu, Sasu Tarkoma:
Software Defined 5G Mobile Backhaul. 5GU 2014: 258-263 - [c36]Hammad Kabir, Raimo Kantola, Jesus Llorente Santos:
Security Mechanisms for a Cooperative Firewall. HPCC/CSS/ICESS 2014: 814-818 - [c35]José Costa-Requena, Maël Kimmerlin, Jukka Manner, Raimo Kantola:
SDN optimized caching in LTE mobile networks. ICTC 2014: 128-132 - [c34]Zheng Yan, Xueyun Li, Raimo Kantola:
Personal Data Access Based on Trust Assessment in Mobile Social Networking. TrustCom 2014: 989-994 - 2013
- [c33]Zheng Yan, Mingjun Wang, Valtteri Niemi, Raimo Kantola:
Secure pervasive social networking based on multi-dimensional trust levels. CNS 2013: 100-108 - [c32]Liang Chen, Zheng Yan, Weidong Zhang, Raimo Kantola:
Implementation of an SMS Spam Control System Based on Trust Management. GreenCom/iThings/CPScom 2013: 887-894 - [c31]Yue Shen, Zheng Yan, Raimo Kantola:
Game Theoretical Analysis of the Acceptance of Global Trust Management for Unwanted Traffic Control. HPCC/EUC 2013: 935-942 - [c30]Petri Leppaaho, Nicklas Beijar, Raimo Kantola, Jesus Llorente Santos:
Traversal of the customer edge with NAT-unfriendly protocols. ICC 2013: 2933-2938 - [c29]Jesus Llorente Santos, Raimo Kantola, Nicklas Beijar, Petri Leppaaho:
Implementing NAT traversal with Private Realm Gateway. ICC 2013: 3581-3586 - [c28]Zheng Yan, Raimo Kantola, Gaowa Shi, Peng Zhang:
Unwanted Content Control via Trust Management in Pervasive Social Networking. TrustCom/ISPA/IUCC 2013: 202-209 - [c27]Zheng Yan, Peng Zhang, Valtteri Niemi, Raimo Kantola:
A Research Model for Trustworthy Pervasive Social Networking. TrustCom/ISPA/IUCC 2013: 1522-1527 - 2012
- [c26]Yue Shen, Zheng Yan, Raimo Kantola:
Implementation of an Evaluation Platform for Unwanted Traffic Control via Trust Management. GreenCom 2012: 79-86 - [c25]Zheng Yan, Raimo Kantola, Yue Shen:
Unwanted Traffic Control via Hybrid Trust Management. TrustCom 2012: 666-673 - 2011
- [c24]Zheng Yan, Raimo Kantola, Peng Zhang:
A Research Model for Human-Computer Trust Interaction. TrustCom 2011: 274-281 - [c23]Zheng Yan, Raimo Kantola, Yue Shen:
Unwanted Traffic Control via Global Trust Management. TrustCom 2011: 647-654 - [c22]Zheng Yan, Raimo Kantola, Peng Zhang:
Theoretical Issues in the Study of Trust in Human-Computer Interaction. TrustCom 2011: 853-856 - 2010
- [c21]Visa Holopainen, Raimo Kantola, Taneli Taira, Olli-Pekka Lamminen:
Automatic Link Numbering and Source Routed Multicast. AIMS 2010: 123-134 - [c20]Raimo Kantola:
Implementing Trust-to-Trust with Customer Edge Switching. AINA Workshops 2010: 1092-1099 - [c19]Marko Luoma, Raimo Kantola, Jukka Manner:
Future Internet Is by Ethernet. WCITD/NF 2010: 95-107 - 2009
- [c18]Visa Holopainen, Raimo Kantola:
Tackling the Delay-Cost and Time-Cost Trade-Offs in Computation of Node-Protected Multicast Tree Pairs. APNOMS 2009: 273-282 - 2007
- [c17]Visa Holopainen, Raimo Kantola:
End to End Principle in Access Point Selection. WOWMOM 2007: 1-6 - 2005
- [c16]Marcin Matuszewski, Raimo Kantola:
Aligning mobile P2P content sharing services with a customer process. Communications and Computer Networks 2005: 329-336 - [c15]Evgenia Daskalova, Mika Ilvesmäki, Raimo Kantola:
Analysis of Flow Inter-Arrival Time Distributions. EuroIMSA 2005: 59-64 - [c14]José Costa-Requena, Raimo Kantola, Nicklas Beijar:
Incentive Problem for Ad Hoc Networks Scalability. ICAS/ICNS 2005: 70 - [c13]Xiaole Bai, Marcin Matuszewski, Shuping Liu, Raimo Kantola:
A Novel Multi-path Routing Protocol. ICCNMC 2005: 732-741 - [c12]Yin Wang, Raimo Kantola, Shuping Liu:
Adding Multi-Class Routing into the DiffServ Architecture. Systems Communications 2005: 326-334 - [c11]Nicklas Beijar, Raimo Kantola, José Costa-Requena:
A Lightweight Clustering Algorithm Utilizing Capacity Heterogeneity. Med-Hoc-Net 2005: 255-264 - 2004
- [c10]José Costa-Requena, Jorge Nuevo, Raimo Kantola, Jean-Charles Grégoire:
Strategies for creating a service distribution backbone in ad hoc networks. Communications, Internet, and Information Technology 2004: 7-14 - [c9]José Costa-Requena, Juan Gutiérrez, Raimo Kantola, Jarrod Creado, Nicklas Beijar:
Network Architecture for Scalable Ad Hoc Networks. ICT 2004: 369-380 - [c8]Xiaole Bai, Shuping Liu, Peng Zhang, Raimo Kantola:
ICN: Interest-Based Clustering Network. Peer-to-Peer Computing 2004: 219-226 - 2003
- [c7]Mika Ilvesmäki, Raimo Kantola, Marko Luoma:
Traffic differentiability based on packet and flow per application-analysis. GLOBECOM 2003: 3170-3175 - [c6]Wenpeng Zhou, Peng Zhang, Xiaole Bai, Raimo Kantola:
A QoS Based Routing Algorithm for Multi-class Optimization in DiffServ Networks. HSNMC 2003: 136-145 - [c5]Juan Ventura Agustina, Peng Zhang, Raimo Kantola:
Performance Evaluation of GSM Handover Traffic in a GPRS/GSM Network. ISCC 2003: 137-142 - 2002
- [c4]José Costa-Requena, Ignacio Gonzalez Olias, Raimo Kantola, Nicklas Beijar:
Autoconfiguration Mechanism for IP Telephony. INTERWORKING 2002: 55-66 - 2000
- [c3]Peng Zhang, Raimo Kantola:
Building MPLS VPNs with QoS Routing Capabilty. INTERWORKING 2000: 292-301 - [c2]Peng Zhang, Raimo Kantola:
Mechanisms for Inter-domain QoS Routing in Differentiated Service Networks. QofIS 2000: 153-166 - 1999
- [c1]Harri Marjamäki, Raimo Kantola:
Performance Evaluation of an IP Voice Terminal. SMARTNET 1999: 349-362
Editorship
- 2017
- [e1]Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola:
Network and System Security - 11th International Conference, NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings. Lecture Notes in Computer Science 10394, Springer 2017, ISBN 978-3-319-64700-5 [contents]
Informal and Other Publications
- 2020
- [i1]Mika Ylianttila, Raimo Kantola, Andrei V. Gurtov, Lorenzo Mucchi, Ian J. Oppermann, Zheng Yan, Tri Hong Nguyen, Fei Liu, Tharaka Mawanane Hewa, Madhusanka Liyanage, Ijaz Ahmad, Juha Partala, Robert Abbas, Artur Hecker, Sara Jayousi, Alessio Martinelli, Stefano Caputo, Jonathan Bechtold, Ivan Morales, Razvan-Andrei Stoica, Giuseppe Abreu, Shahriar Shahabuddin, Erdal Panayirci, Harald Haas, Tanesh Kumar, Basak Ozan Ozparlak, Juha Röning:
6G White paper: Research challenges for Trust, Security and Privacy. CoRR abs/2004.11665 (2020)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint