dc.contributor.author | Zolotukhin, Mikhail | |
dc.date.accessioned | 2014-05-08T07:28:28Z | |
dc.date.available | 2014-05-08T07:28:28Z | |
dc.date.issued | 2014 | |
dc.identifier.isbn | 978-951-39-5676-9 | |
dc.identifier.other | oai:jykdok.linneanet.fi:1434259 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/43336 | |
dc.format.extent | 1 verkkoaineisto (72 sivua) | |
dc.language.iso | eng | |
dc.publisher | University of Jyväskylä | |
dc.relation.ispartofseries | Jyväskylä studies in computing | |
dc.relation.haspart | <b>Article I:</b> Mikhail Zolotukhin, Vesa Hytönen, Timo Hämäläinen and Andrey Garnaev. Optimal Relays Deployment for 802.16j Networks. Springer. <i>Mobile Networks and Management. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 97, pp. 31–45, 2012</i>. <a href=" http://dx.doi.org/10.1007/978-3-642-30422-4_3 ">DOI: 10.1080/10.1007/978-3-642-30422-4_3 </a>. | |
dc.relation.haspart | <b>Article II:</b> Mikhail Zolotukhin, Timo Hämäläinen and Andrey Garnaev. A Relay Deployment Mechanism for One Scenario of Cost-Effective Coverage Extension in IEEE 802.16j Networks. <i>Proceedings of the 5th International Conference on New Technologies, Mobility and Security (NTMS) , pp. 1–6, 2012</i>. <a href=" http://dx.doi.org/10.1109/NTMS.2012.6208709 ">DOI: 10.1109/NTMS.2012.6208709 </a> | |
dc.relation.haspart | <b>Article III:</b> Mikhail Zolotukhin, Timo Hämäläinen and Antti Juvonen. Online anomaly detection by using N-gram model and growing hierarchical selforganizing maps. <i>Proceedings of the 8th International Wireless Communications and Mobile Computing Conference (IWCMC) , pp. 47–52, 2012.</i> <a href=" http://dx.doi.org/10.1109/IWCMC.2012.6314176 ">DOI: 10.1109/IWCMC.2012.6314176 </a>. | |
dc.relation.haspart | <b>Article IV:</b> Mikhail Zolotukhin, Timo Hämäläinen and Antti Juvonen. Growing Hierarchical Self-organizing Maps and Statistical Distribution Models for Online Detection of Web Attacks. Springer. <i>Web Information Systems and Technologies. Lecture Notes in Business Information Processing , Vol. 140, pp. 281–295, 2013.</i> <a href=" http://dx.doi.org/10.1007/978-3-642-36608-6_18 ">DOI: 10.1007/978-3-642-36608-6_18 </a> | |
dc.relation.haspart | <b>Article V:</b> Mikhail Zolotukhin, Elena Ivannikova and Timo Hämäläinen. Novel Method for the Prediction of Mobile Location Based on Temporal-Spatial Behavioral Patterns. <i>Proceedings of the 3rd IEEE International Conference on Information Science and Technology (ICIST) , pp. 761–766, 2013.</i> <a href=" http://dx.doi.org/10.1109/ICIST.2013.6747655 ">DOI: 10.1109/ICIST.2013.6747655 </a>. | |
dc.relation.haspart | <b>Article VI:</b> Mikhail Zolotukhin and Timo Hämäläinen. Detection of Anomalous HTTP Requests Based on Advanced N-gram Model and Clustering Techniques. Springer. <i>Internet of Things, Smart Spaces, and Next Generation Networking. Lecture Notes in Computer Science , Vol. 8121, pp. 371–382, 2013.</i><a href=" http://dx.doi.org/10.1007/978-3-642-40316-3_33 ">DOI: 10.1007/978-3-642-40316-3_33 </a>. | |
dc.relation.haspart | <b>Article VII:</b> Mikhail Zolotukhin and Timo Hämäläinen. Support Vector Machine Integrated with Game-Theoretic Approach and Genetic Algorithm for the Detection and Classification of Malware. <i>Proceedings of Globecom 2013 Workshop - the 1st International Workshop on Security and Privacy in Big Data, pp. 211–216, 2013.</i> <a href=" http://dx.doi.org/ 10.1109/GLOCOMW.2013.6824988 ">DOI: 10.1109/GLOCOMW.2013.6824988 .</a> | |
dc.relation.haspart | <b>Article VIII:</b> Mikhail Zolotukhin and Timo Hämäläinen. Detection of Zero-day Malware Based on the Analysis of Opcode Sequences.<i> Proceedings of the 11th Annual IEEE Consumer Communications and Networking Conference (CCNC), pp. 386 - 391, 2014</i> <a href="http://dx.doi.org/10.1109/CCNC.2014.6866599 ">DOI: 10.1109/CCNC.2014.6866599 </a> | |
dc.rights | In Copyright | |
dc.subject.other | data mining | |
dc.subject.other | machine learning | |
dc.subject.other | classification | |
dc.subject.other | clustering | |
dc.subject.other | anomaly detection | |
dc.subject.other | relay station | |
dc.subject.other | mobile data | |
dc.subject.other | network security | |
dc.title | On data mining applications in mobile networking and network security | |
dc.type | Diss. | |
dc.identifier.urn | URN:ISBN:978-951-39-5676-9 | |
dc.type.dcmitype | Text | en |
dc.type.ontasot | Väitöskirja | fi |
dc.type.ontasot | Doctoral dissertation | en |
dc.contributor.tiedekunta | Faculty of Information Technology | en |
dc.contributor.tiedekunta | Informaatioteknologian tiedekunta | fi |
dc.contributor.yliopisto | University of Jyväskylä | en |
dc.contributor.yliopisto | Jyväskylän yliopisto | fi |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.relation.issn | 1456-5390 | |
dc.relation.numberinseries | 189 | |
dc.rights.accesslevel | openAccess | |
dc.subject.yso | tiedonlouhinta | |
dc.subject.yso | koneoppiminen | |
dc.subject.yso | algoritmit | |
dc.subject.yso | geneettiset algoritmit | |
dc.subject.yso | klusterianalyysi | |
dc.subject.yso | langattomat verkot | |
dc.subject.yso | matkaviestinverkot | |
dc.subject.yso | langaton tiedonsiirto | |
dc.subject.yso | tietoturva | |
dc.subject.yso | kyberturvallisuus | |
dc.rights.url | https://rightsstatements.org/page/InC/1.0/ | |