The NewReno modification to TCP's fast recovery algorithm S Floyd, T Henderson, A Gurtov | 2197 | 2004 |
Security in software defined networks: A survey I Ahmad, S Namal, M Ylianttila, A Gurtov IEEE Communications Surveys & Tutorials 17 (4), 2317-2346, 2015 | 550 | 2015 |
Rfc3782: The newreno modification to tcp's fast recovery algorithm S Floyd, T Henderson, A Gurtov RFC Editor, 2004 | 548* | 2004 |
Overview of 5G security challenges and solutions I Ahmad, T Kumar, M Liyanage, J Okwuibe, M Ylianttila, A Gurtov IEEE Communications Standards Magazine 2 (1), 36-43, 2018 | 389 | 2018 |
Security for 5G and beyond I Ahmad, S Shahabuddin, T Kumar, J Okwuibe, A Gurtov, M Ylianttila IEEE Communications Surveys & Tutorials 21 (4), 3682-3722, 2019 | 287 | 2019 |
Two-phase authentication protocol for wireless sensor networks in distributed IoT applications P Porambage, C Schmitt, P Kumar, A Gurtov, M Ylianttila 2014 IEEE Wireless Communications and Networking Conference (WCNC), 2728-2733, 2014 | 262 | 2014 |
TCP over second (2.5 G) and third (3G) generation wireless networks H Inamura, G Montenegro, R Ludwig, A Gurtov, F Khafizov | 230 | 2003 |
The quest for privacy in the internet of things P Porambage, M Ylianttila, C Schmitt, P Kumar, A Gurtov, AV Vasilakos IEEE Cloud Computing 3 (2), 36-45, 2016 | 220 | 2016 |
Lightweight and secure session-key establishment scheme in smart home environments P Kumar, A Gurtov, J Iinatti, M Ylianttila, M Sain IEEE Sensors Journal 16 (1), 254-264, 2015 | 193 | 2015 |
Host identity protocol (HIP): Connectivity, mobility, multi-homing, security, and privacy over IPv4 and IPv6 networks P Nikander, A Gurtov, TR Henderson IEEE Communications Surveys & Tutorials 12 (2), 186-204, 2010 | 189 | 2010 |
Modeling wireless links for transport protocols A Gurtov, S Floyd ACM SIGCOMM Computer Communication Review 34 (2), 85-96, 2004 | 177 | 2004 |
5G security: Analysis of threats and solutions I Ahmad, T Kumar, M Liyanage, J Okwuibe, M Ylianttila, A Gurtov 2017 IEEE Conference on Standards for Communications and Networking (CSCN …, 2017 | 172 | 2017 |
PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications P Porambage, C Schmitt, P Kumar, A Gurtov, M Ylianttila International Journal of Distributed Sensor Networks 10 (7), 357430, 2014 | 165 | 2014 |
Host identity protocol (HIP): towards the secure mobile internet A Gurtov John Wiley & Sons, 2008 | 155 | 2008 |
Anonymous secure framework in connected smart home environments P Kumar, A Braeken, A Gurtov, J Iinatti, PH Ha IEEE transactions on information forensics and security 12 (4), 968-979, 2017 | 147 | 2017 |
Responding to spurious timeouts in TCP A Gurtov, R Ludwig IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003 | 140 | 2003 |
A comprehensive guide to 5G security M Liyanage, I Ahmad, AB Abro, A Gurtov, M Ylianttila John Wiley & Sons, 2018 | 135 | 2018 |
The roadmap to 6G security and privacy P Porambage, G Gür, DPM Osorio, M Liyanage, A Gurtov, M Ylianttila IEEE Open Journal of the Communications Society 2, 1094-1122, 2021 | 133 | 2021 |
Deployment of Smart Spaces in Internet of Things: Overview of the design challenges DG Korzun, SI Balandin, AV Gurtov Conference on Internet of Things and Smart Spaces, 48-59, 2013 | 126 | 2013 |
Seawind: a Wireless Network Emulator. M Kojo, AV Gurtov, J Manner, P Sarolahti, TO Alanko, KEE Raatikainen MMB, 151-166, 2001 | 123 | 2001 |