Show simple item record

dc.contributor.authorZolotukhin, Mikhail
dc.date.accessioned2014-05-08T07:28:28Z
dc.date.available2014-05-08T07:28:28Z
dc.date.issued2014
dc.identifier.isbn978-951-39-5676-9
dc.identifier.otheroai:jykdok.linneanet.fi:1434259
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/43336
dc.format.extent1 verkkoaineisto (72 sivua)
dc.language.isoeng
dc.publisherUniversity of Jyväskylä
dc.relation.ispartofseriesJyväskylä studies in computing
dc.relation.haspart<b>Article I:</b> Mikhail Zolotukhin, Vesa Hytönen, Timo Hämäläinen and Andrey Garnaev. Optimal Relays Deployment for 802.16j Networks. Springer. <i>Mobile Networks and Management. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 97, pp. 31–45, 2012</i>. <a href=" http://dx.doi.org/10.1007/978-3-642-30422-4_3 ">DOI: 10.1080/10.1007/978-3-642-30422-4_3 </a>.
dc.relation.haspart<b>Article II:</b> Mikhail Zolotukhin, Timo Hämäläinen and Andrey Garnaev. A Relay Deployment Mechanism for One Scenario of Cost-Effective Coverage Extension in IEEE 802.16j Networks. <i>Proceedings of the 5th International Conference on New Technologies, Mobility and Security (NTMS) , pp. 1–6, 2012</i>. <a href=" http://dx.doi.org/10.1109/NTMS.2012.6208709 ">DOI: 10.1109/NTMS.2012.6208709 </a>
dc.relation.haspart<b>Article III:</b> Mikhail Zolotukhin, Timo Hämäläinen and Antti Juvonen. Online anomaly detection by using N-gram model and growing hierarchical selforganizing maps. <i>Proceedings of the 8th International Wireless Communications and Mobile Computing Conference (IWCMC) , pp. 47–52, 2012.</i> <a href=" http://dx.doi.org/10.1109/IWCMC.2012.6314176 ">DOI: 10.1109/IWCMC.2012.6314176 </a>.
dc.relation.haspart<b>Article IV:</b> Mikhail Zolotukhin, Timo Hämäläinen and Antti Juvonen. Growing Hierarchical Self-organizing Maps and Statistical Distribution Models for Online Detection of Web Attacks. Springer. <i>Web Information Systems and Technologies. Lecture Notes in Business Information Processing , Vol. 140, pp. 281–295, 2013.</i> <a href=" http://dx.doi.org/10.1007/978-3-642-36608-6_18 ">DOI: 10.1007/978-3-642-36608-6_18 </a>
dc.relation.haspart<b>Article V:</b> Mikhail Zolotukhin, Elena Ivannikova and Timo Hämäläinen. Novel Method for the Prediction of Mobile Location Based on Temporal-Spatial Behavioral Patterns. <i>Proceedings of the 3rd IEEE International Conference on Information Science and Technology (ICIST) , pp. 761–766, 2013.</i> <a href=" http://dx.doi.org/10.1109/ICIST.2013.6747655 ">DOI: 10.1109/ICIST.2013.6747655 </a>.
dc.relation.haspart<b>Article VI:</b> Mikhail Zolotukhin and Timo Hämäläinen. Detection of Anomalous HTTP Requests Based on Advanced N-gram Model and Clustering Techniques. Springer. <i>Internet of Things, Smart Spaces, and Next Generation Networking. Lecture Notes in Computer Science , Vol. 8121, pp. 371–382, 2013.</i><a href=" http://dx.doi.org/10.1007/978-3-642-40316-3_33 ">DOI: 10.1007/978-3-642-40316-3_33 </a>.
dc.relation.haspart<b>Article VII:</b> Mikhail Zolotukhin and Timo Hämäläinen. Support Vector Machine Integrated with Game-Theoretic Approach and Genetic Algorithm for the Detection and Classification of Malware. <i>Proceedings of Globecom 2013 Workshop - the 1st International Workshop on Security and Privacy in Big Data, pp. 211–216, 2013.</i> <a href=" http://dx.doi.org/ 10.1109/GLOCOMW.2013.6824988 ">DOI: 10.1109/GLOCOMW.2013.6824988 .</a>
dc.relation.haspart<b>Article VIII:</b> Mikhail Zolotukhin and Timo Hämäläinen. Detection of Zero-day Malware Based on the Analysis of Opcode Sequences.<i> Proceedings of the 11th Annual IEEE Consumer Communications and Networking Conference (CCNC), pp. 386 - 391, 2014</i> <a href="http://dx.doi.org/10.1109/CCNC.2014.6866599 ">DOI: 10.1109/CCNC.2014.6866599 </a>
dc.subject.otherdata mining
dc.subject.othermachine learning
dc.subject.otherclassification
dc.subject.otherclustering
dc.subject.otheranomaly detection
dc.subject.otherrelay station
dc.subject.othermobile data
dc.subject.othernetwork security
dc.titleOn data mining applications in mobile networking and network security
dc.typeDiss.
dc.identifier.urnURN:ISBN:978-951-39-5676-9
dc.type.dcmitypeTexten
dc.type.ontasotVäitöskirjafi
dc.type.ontasotDoctoral dissertationen
dc.contributor.tiedekuntaInformaatioteknologian tiedekuntafi
dc.contributor.yliopistoUniversity of Jyväskyläen
dc.contributor.yliopistoJyväskylän yliopistofi
dc.contributor.oppiaineTietotekniikkafi
dc.relation.issn1456-5390
dc.relation.numberinseries189
dc.rights.accesslevelopenAccessfi
dc.subject.ysotiedonlouhinta
dc.subject.ysokoneoppiminen
dc.subject.ysoalgoritmit
dc.subject.ysogeneettiset algoritmit
dc.subject.ysoklusterianalyysi
dc.subject.ysolangattomat verkot
dc.subject.ysomatkaviestinverkot
dc.subject.ysolangaton tiedonsiirto
dc.subject.ysotietoturva
dc.subject.ysokyberturvallisuus


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record