The NewReno modification to TCP's fast recovery algorithm S Floyd, T Henderson, A Gurtov | 2240 | 2004 |
Security in software defined networks: A survey I Ahmad, S Namal, M Ylianttila, A Gurtov IEEE Communications Surveys & Tutorials 17 (4), 2317-2346, 2015 | 613 | 2015 |
Rfc3782: The newreno modification to tcp's fast recovery algorithm S Floyd, T Henderson, A Gurtov RFC Editor, 2004 | 589* | 2004 |
Overview of 5G security challenges and solutions I Ahmad, T Kumar, M Liyanage, J Okwuibe, M Ylianttila, A Gurtov IEEE Communications Standards Magazine 2 (1), 36-43, 2018 | 467 | 2018 |
Security for 5G and beyond I Ahmad, S Shahabuddin, T Kumar, J Okwuibe, A Gurtov, M Ylianttila IEEE Communications Surveys & Tutorials 21 (4), 3682-3722, 2019 | 373 | 2019 |
Two-phase authentication protocol for wireless sensor networks in distributed IoT applications P Porambage, C Schmitt, P Kumar, A Gurtov, M Ylianttila 2014 IEEE Wireless Communications and Networking Conference (WCNC), 2728-2733, 2014 | 277 | 2014 |
The quest for privacy in the internet of things P Porambage, M Ylianttila, C Schmitt, P Kumar, A Gurtov, AV Vasilakos IEEE Cloud Computing 3 (2), 36-45, 2016 | 247 | 2016 |
The roadmap to 6G security and privacy P Porambage, G Gür, DPM Osorio, M Liyanage, A Gurtov, M Ylianttila IEEE Open Journal of the Communications Society 2, 1094-1122, 2021 | 239 | 2021 |
TCP over second (2.5 G) and third (3G) generation wireless networks H Inamura, G Montenegro, R Ludwig, A Gurtov, F Khafizov | 232 | 2003 |
Lightweight and secure session-key establishment scheme in smart home environments P Kumar, A Gurtov, J Iinatti, M Ylianttila, M Sain IEEE Sensors Journal 16 (1), 254-264, 2015 | 218 | 2015 |
5G security: Analysis of threats and solutions I Ahmad, T Kumar, M Liyanage, J Okwuibe, M Ylianttila, A Gurtov 2017 IEEE conference on standards for communications and networking (CSCN …, 2017 | 215 | 2017 |
Host identity protocol (HIP): Connectivity, mobility, multi-homing, security, and privacy over IPv4 and IPv6 networks P Nikander, A Gurtov, TR Henderson IEEE Communications Surveys & Tutorials 12 (2), 186-204, 2010 | 201 | 2010 |
PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications P Porambage, C Schmitt, P Kumar, A Gurtov, M Ylianttila International Journal of Distributed Sensor Networks 10 (7), 357430, 2014 | 180 | 2014 |
Modeling wireless links for transport protocols A Gurtov, S Floyd ACM SIGCOMM Computer Communication Review 34 (2), 85-96, 2004 | 178 | 2004 |
Anonymous secure framework in connected smart home environments P Kumar, A Braeken, A Gurtov, J Iinatti, PH Ha IEEE Transactions on Information Forensics and Security 12 (4), 968-979, 2017 | 158 | 2017 |
A comprehensive guide to 5G security M Liyanage, I Ahmad, AB Abro, A Gurtov, M Ylianttila John Wiley & Sons, 2018 | 155 | 2018 |
Host identity protocol (HIP): towards the secure mobile internet A Gurtov John Wiley & Sons, 2008 | 153 | 2008 |
Lightweight authentication and key agreement for smart metering in smart energy networks P Kumar, A Gurtov, M Sain, A Martin, PH Ha IEEE Transactions on Smart Grid 10 (4), 4349-4359, 2018 | 150 | 2018 |
Methodology and mobile application for driver behavior analysis and accident prevention A Kashevnik, I Lashkov, A Gurtov IEEE transactions on intelligent transportation systems 21 (6), 2427-2436, 2019 | 142 | 2019 |
Responding to spurious timeouts in TCP A Gurtov, R Ludwig IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003 | 141 | 2003 |