On data mining applications in mobile networking and network security

Main Author
Format
Theses Doctoral thesis
Published
2014
Series
Subjects
ISBN
978-951-39-5676-9
Publisher
University of Jyväskylä
The permanent address of the publication
https://urn.fi/URN:ISBN:978-951-39-5676-9Use this for linking
ISSN
1456-5390
Language
English
Published in
Jyväskylä studies in computing
Contains publications
  • Article I: Mikhail Zolotukhin, Vesa Hytönen, Timo Hämäläinen and Andrey Garnaev. Optimal Relays Deployment for 802.16j Networks. Springer. Mobile Networks and Management. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 97, pp. 31–45, 2012. DOI: 10.1080/10.1007/978-3-642-30422-4_3 .
  • Article II: Mikhail Zolotukhin, Timo Hämäläinen and Andrey Garnaev. A Relay Deployment Mechanism for One Scenario of Cost-Effective Coverage Extension in IEEE 802.16j Networks. Proceedings of the 5th International Conference on New Technologies, Mobility and Security (NTMS) , pp. 1–6, 2012. DOI: 10.1109/NTMS.2012.6208709
  • Article III: Mikhail Zolotukhin, Timo Hämäläinen and Antti Juvonen. Online anomaly detection by using N-gram model and growing hierarchical selforganizing maps. Proceedings of the 8th International Wireless Communications and Mobile Computing Conference (IWCMC) , pp. 47–52, 2012. DOI: 10.1109/IWCMC.2012.6314176 .
  • Article IV: Mikhail Zolotukhin, Timo Hämäläinen and Antti Juvonen. Growing Hierarchical Self-organizing Maps and Statistical Distribution Models for Online Detection of Web Attacks. Springer. Web Information Systems and Technologies. Lecture Notes in Business Information Processing , Vol. 140, pp. 281–295, 2013. DOI: 10.1007/978-3-642-36608-6_18
  • Article V: Mikhail Zolotukhin, Elena Ivannikova and Timo Hämäläinen. Novel Method for the Prediction of Mobile Location Based on Temporal-Spatial Behavioral Patterns. Proceedings of the 3rd IEEE International Conference on Information Science and Technology (ICIST) , pp. 761–766, 2013. DOI: 10.1109/ICIST.2013.6747655 .
  • Article VI: Mikhail Zolotukhin and Timo Hämäläinen. Detection of Anomalous HTTP Requests Based on Advanced N-gram Model and Clustering Techniques. Springer. Internet of Things, Smart Spaces, and Next Generation Networking. Lecture Notes in Computer Science , Vol. 8121, pp. 371–382, 2013.DOI: 10.1007/978-3-642-40316-3_33 .
  • Article VII: Mikhail Zolotukhin and Timo Hämäläinen. Support Vector Machine Integrated with Game-Theoretic Approach and Genetic Algorithm for the Detection and Classification of Malware. Proceedings of Globecom 2013 Workshop - the 1st International Workshop on Security and Privacy in Big Data, pp. 211–216, 2013. DOI: 10.1109/GLOCOMW.2013.6824988 .
  • Article VIII: Mikhail Zolotukhin and Timo Hämäläinen. Detection of Zero-day Malware Based on the Analysis of Opcode Sequences. Proceedings of the 11th Annual IEEE Consumer Communications and Networking Conference (CCNC), pp. 386 - 391, 2014 DOI: 10.1109/CCNC.2014.6866599
License
In CopyrightOpen Access

Share