Näytä suppeat kuvailutiedot

dc.contributor.authorZolotukhin, Mikhail
dc.date.accessioned2014-05-08T07:28:28Z
dc.date.available2014-05-08T07:28:28Z
dc.date.issued2014
dc.identifier.isbn978-951-39-5676-9
dc.identifier.otheroai:jykdok.linneanet.fi:1434259
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/43336
dc.format.extent1 verkkoaineisto (72 sivua)
dc.language.isoeng
dc.publisherUniversity of Jyväskylä
dc.relation.ispartofseriesJyväskylä studies in computing
dc.relation.haspart<b>Article I:</b> Mikhail Zolotukhin, Vesa Hytönen, Timo Hämäläinen and Andrey Garnaev. Optimal Relays Deployment for 802.16j Networks. Springer. <i>Mobile Networks and Management. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 97, pp. 31–45, 2012</i>. <a href=" http://dx.doi.org/10.1007/978-3-642-30422-4_3 ">DOI: 10.1080/10.1007/978-3-642-30422-4_3 </a>.
dc.relation.haspart<b>Article II:</b> Mikhail Zolotukhin, Timo Hämäläinen and Andrey Garnaev. A Relay Deployment Mechanism for One Scenario of Cost-Effective Coverage Extension in IEEE 802.16j Networks. <i>Proceedings of the 5th International Conference on New Technologies, Mobility and Security (NTMS) , pp. 1–6, 2012</i>. <a href=" http://dx.doi.org/10.1109/NTMS.2012.6208709 ">DOI: 10.1109/NTMS.2012.6208709 </a>
dc.relation.haspart<b>Article III:</b> Mikhail Zolotukhin, Timo Hämäläinen and Antti Juvonen. Online anomaly detection by using N-gram model and growing hierarchical selforganizing maps. <i>Proceedings of the 8th International Wireless Communications and Mobile Computing Conference (IWCMC) , pp. 47–52, 2012.</i> <a href=" http://dx.doi.org/10.1109/IWCMC.2012.6314176 ">DOI: 10.1109/IWCMC.2012.6314176 </a>.
dc.relation.haspart<b>Article IV:</b> Mikhail Zolotukhin, Timo Hämäläinen and Antti Juvonen. Growing Hierarchical Self-organizing Maps and Statistical Distribution Models for Online Detection of Web Attacks. Springer. <i>Web Information Systems and Technologies. Lecture Notes in Business Information Processing , Vol. 140, pp. 281–295, 2013.</i> <a href=" http://dx.doi.org/10.1007/978-3-642-36608-6_18 ">DOI: 10.1007/978-3-642-36608-6_18 </a>
dc.relation.haspart<b>Article V:</b> Mikhail Zolotukhin, Elena Ivannikova and Timo Hämäläinen. Novel Method for the Prediction of Mobile Location Based on Temporal-Spatial Behavioral Patterns. <i>Proceedings of the 3rd IEEE International Conference on Information Science and Technology (ICIST) , pp. 761–766, 2013.</i> <a href=" http://dx.doi.org/10.1109/ICIST.2013.6747655 ">DOI: 10.1109/ICIST.2013.6747655 </a>.
dc.relation.haspart<b>Article VI:</b> Mikhail Zolotukhin and Timo Hämäläinen. Detection of Anomalous HTTP Requests Based on Advanced N-gram Model and Clustering Techniques. Springer. <i>Internet of Things, Smart Spaces, and Next Generation Networking. Lecture Notes in Computer Science , Vol. 8121, pp. 371–382, 2013.</i><a href=" http://dx.doi.org/10.1007/978-3-642-40316-3_33 ">DOI: 10.1007/978-3-642-40316-3_33 </a>.
dc.relation.haspart<b>Article VII:</b> Mikhail Zolotukhin and Timo Hämäläinen. Support Vector Machine Integrated with Game-Theoretic Approach and Genetic Algorithm for the Detection and Classification of Malware. <i>Proceedings of Globecom 2013 Workshop - the 1st International Workshop on Security and Privacy in Big Data, pp. 211–216, 2013.</i> <a href=" http://dx.doi.org/ 10.1109/GLOCOMW.2013.6824988 ">DOI: 10.1109/GLOCOMW.2013.6824988 .</a>
dc.relation.haspart<b>Article VIII:</b> Mikhail Zolotukhin and Timo Hämäläinen. Detection of Zero-day Malware Based on the Analysis of Opcode Sequences.<i> Proceedings of the 11th Annual IEEE Consumer Communications and Networking Conference (CCNC), pp. 386 - 391, 2014</i> <a href="http://dx.doi.org/10.1109/CCNC.2014.6866599 ">DOI: 10.1109/CCNC.2014.6866599 </a>
dc.subject.otherdata mining
dc.subject.othermachine learning
dc.subject.otherclassification
dc.subject.otherclustering
dc.subject.otheranomaly detection
dc.subject.otherrelay station
dc.subject.othermobile data
dc.subject.othernetwork security
dc.titleOn data mining applications in mobile networking and network security
dc.typeDiss.
dc.identifier.urnURN:ISBN:978-951-39-5676-9
dc.type.dcmitypeTexten
dc.type.ontasotVäitöskirjafi
dc.type.ontasotDoctoral dissertationen
dc.contributor.tiedekuntaInformaatioteknologian tiedekuntafi
dc.contributor.yliopistoUniversity of Jyväskyläen
dc.contributor.yliopistoJyväskylän yliopistofi
dc.contributor.oppiaineTietotekniikkafi
dc.relation.issn1456-5390
dc.relation.numberinseries189
dc.rights.accesslevelopenAccessfi
dc.subject.ysotiedonlouhinta
dc.subject.ysokoneoppiminen
dc.subject.ysoalgoritmit
dc.subject.ysogeneettiset algoritmit
dc.subject.ysoklusterianalyysi
dc.subject.ysolangattomat verkot
dc.subject.ysomatkaviestinverkot
dc.subject.ysolangaton tiedonsiirto
dc.subject.ysotietoturva
dc.subject.ysokyberturvallisuus


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot