6G white paper: Research challenges for trust, security and privacy M Ylianttila, R Kantola, A Gurtov, L Mucchi, I Oppermann, Z Yan, ... arXiv preprint arXiv:2004.11665, 2020 | 143 | 2020 |
Evaluation of transport protocols for the session initiation protocol G Camarillo, R Kantola, H Schulzrinne IEEE network 17 (5), 40-46, 2003 | 130 | 2003 |
Security for future software defined mobile networks M Liyanage, I Ahmed, M Ylianttila, JL Santos, R Kantola, OL Perez, ... 2015 9th international conference on next generation mobile applications …, 2015 | 58 | 2015 |
TruSMS: A trustworthy SMS spam control system based on trust management L Chen, Z Yan, W Zhang, R Kantola Future Generation Computer Systems 49, 77-93, 2015 | 57 | 2015 |
Enhancing security of software defined mobile networks M Liyanage, I Ahmed, J Okwuibe, M Ylianttila, H Kabir, JL Santos, ... IEEE Access 5, 9422-9438, 2017 | 50 | 2017 |
ICN: Interest-based clustering network X Bai, S Liu, P Zhang, R Kantola Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004 …, 2004 | 41 | 2004 |
Method of communication and connection control R Kantola US Patent 5,878,128, 1999 | 40 | 1999 |
A research model for human-computer trust interaction Z Yan, R Kantola, P Zhang 2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011 | 36 | 2011 |
Software defined 5G mobile backhaul J Costa-Requena, R Kantola, J Llorente, V Ferrer, J Manner, AY Ding, ... 1st International Conference on 5G for Ubiquitous Connectivity, 258-263, 2014 | 35 | 2014 |
Detection as a service: An SDN application M Monshizadeh, V Khatri, R Kantola 2017 19th International Conference on Advanced Communication Technology …, 2017 | 34 | 2017 |
Performance evaluation of a combined anomaly detection platform M Monshizadeh, V Khatri, BG Atli, R Kantola, Z Yan IEEE Access 7, 100964-100978, 2019 | 33 | 2019 |
Flow classification schemes in traffic-based multilayer IP switching—comparison between conventional and neural approach M Ilvesmäki, M Luoma, R Kantola Computer communications 21 (13), 1184-1194, 1998 | 33 | 1998 |
Controlling cloud data access based on reputation Z Yan, X Li, R Kantola Mobile Networks and Applications 20, 828-839, 2015 | 31 | 2015 |
Analysis on the acceptance of global trust management for unwanted traffic control based on game theory Y Shen, Z Yan, R Kantola Computers & security 47, 3-25, 2014 | 31 | 2014 |
Privacy-preserving trust management for unwanted traffic control L Zhang, Z Yan, R Kantola Future Generation Computer Systems 72, 305-318, 2017 | 28 | 2017 |
Policy‐based communications for 5G mobile with customer edge switching R Kantola, J Llorente Santos, N Beijar Security and Communication Networks 9 (16), 3070-3082, 2016 | 26 | 2016 |
Maintaining end-to-end synchronization on a telecommunications connection R Relander, R Kantola US Patent 7,369,662, 2008 | 26 | 2008 |
Performance Evaluation of GSM Handover Traffic in a GPRS/GSM Network. JV Agustina, P Zhang, R Kantola ISCC, 137-142, 2003 | 26 | 2003 |
SDN optimized caching in LTE mobile networks J Costa-Requena, M Kimmerlin, J Manner, R Kantola 2014 International Conference on Information and Communication Technology …, 2014 | 25 | 2014 |
Influence of link state updating on the performance and cost of qos routing in an intranet Z Ma, P Zhang, R Kantola 2001 IEEE Workshop on High Performance Switching and Routing (IEEE Cat. No …, 2001 | 25 | 2001 |