default search action
Andrei V. Gurtov
Person information
- affiliation: Linköping University, Department of Computer and Information Science (IDA), Sweden
- affiliation: Aalto University, Helsinki Institute for Information Technology, Espoo, Finland
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j72]Abdelhadi Zineddine, Oumaima Chakir, Yassine Sadqi, Yassine Maleh, Gurjot Singh Gaba, Andrei V. Gurtov, Kapal Dev:
A systematic review of cybersecurity assessment methods for HTTPS. Comput. Electr. Eng. 115: 109137 (2024) - [j71]Abdeslam Rehaimi, Yassine Sadqi, Yassine Maleh, Gurjot Singh Gaba, Andrei V. Gurtov:
Towards a federated and hybrid cloud computing environment for sustainable and effective provisioning of cyber security virtual laboratories. Expert Syst. Appl. 252: 124267 (2024) - [j70]Mohammad Borhani, Gurjot Singh Gaba, Juan Basaez, Ioannis Avgouleas, Andrei V. Gurtov:
A critical analysis of the industrial device scanners' potentials, risks, and preventives. J. Ind. Inf. Integr. 41: 100623 (2024) - [j69]Suleman Khan, Gurjot Singh Gaba, Andrei V. Gurtov, Leonardus J. A. Jansen, Nils Mäurer, Corinna Schmitt:
Post-Quantum Secure Handover Mechanism for Next-Generation Aviation Communication Networks. IEEE Trans. Green Commun. Netw. 8(3): 939-955 (2024) - [c98]Emil Carlsson, Rebecka Lindkvist, Andrei V. Gurtov:
Detecting Ship Satellite Communication Systems on the Open Internet. BlackSeaCom 2024: 280-283 - 2023
- [j68]Suleman Khan, Gurjot Singh Gaba, An Braeken, Pardeep Kumar, Andrei V. Gurtov:
AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications. Int. J. Crit. Infrastructure Prot. 42: 100619 (2023) - [j67]Oumaima Chakir, Abdeslam Rehaimi, Yassine Sadqi, El Arbi Abdellaoui Alaoui, Moez Krichen, Gurjot Singh Gaba, Andrei V. Gurtov:
An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0. J. King Saud Univ. Comput. Inf. Sci. 35(3): 103-119 (2023) - [j66]Mohammad Borhani, Ioannis Avgouleas, Madhusanka Liyanage, Andrei V. Gurtov:
KDC Placement Problem in Secure VPLS Networks. IEEE Trans. Inf. Forensics Secur. 18: 1951-1962 (2023) - [j65]Parminder Singh, Gurjot Singh Gaba, Avinash Kaur, Mustapha Hedabou, Andrei V. Gurtov:
Dew-Cloud-Based Hierarchical Federated Learning for Intrusion Detection in IoMT. IEEE J. Biomed. Health Informatics 27(2): 722-731 (2023) - [i16]Robert G. Moskowitz, Stuart W. Card, Adam Wiethuechter, Andrei V. Gurtov:
DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID). RFC 9374: 1-34 (2023) - [i15]Stuart W. Card, Adam Wiethuechter, Robert G. Moskowitz, Shuai Zhao, Andrei V. Gurtov:
Drone Remote Identification Protocol (DRIP) Architecture. RFC 9434: 1-28 (2023) - 2022
- [j64]Ijaz Ahmad, Jani Suomalainen, Pawani Porambage, Andrei V. Gurtov, Jyrki Huusko, Marko Höyhtyä:
Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions. IEEE Access 10: 96038-96052 (2022) - [j63]David Hasselquist, Christoffer Lindström, Nikita Korzhitskii, Niklas Carlsson, Andrei V. Gurtov:
QUIC Throughput and Fairness over Dual Connectivity. Comput. Networks 219: 109431 (2022) - [j62]Mehedi Masud, Gurjot Singh Gaba, Pardeep Kumar, Andrei V. Gurtov:
A user-centric privacy-preserving authentication protocol for IoT-AmI environments. Comput. Commun. 196: 45-54 (2022) - [j61]Diana Pamela Moya Osorio, Ijaz Ahmad, José David Vega Sánchez, Andrei V. Gurtov, Johan Scholliers, Matti Kutila, Pawani Porambage:
Towards 6G-Enabled Internet of Vehicles: Security and Privacy. IEEE Open J. Commun. Soc. 3: 82-105 (2022) - [c97]Mohammad Borhani, Ioannis Avgouleas, Andrei V. Gurtov:
Optimization of relay placement for scalable virtual private LAN services. FIRA@SIGCOMM 2022: 43-49 - [i14]Stuart W. Card, Adam Wiethuechter, Robert G. Moskowitz, Andrei V. Gurtov:
Drone Remote Identification Protocol (DRIP) Requirements and Terminology. RFC 9153: 1-41 (2022) - 2021
- [j60]Kuntal Gaur, Anshuman Kalla, Jyoti Grover, Mohammad Borhani, Andrei V. Gurtov, Madhusanka Liyanage:
A Survey of Virtual Private LAN Services (VPLS): Past, Present and Future. Comput. Networks 196: 108245 (2021) - [j59]Suleman Khan, Kashif Kifayat, Ali Kashif Bashir, Andrei V. Gurtov, Mehdi Hassan:
Intelligent intrusion detection system in smart grid using computational intelligence and machine learning. Trans. Emerg. Telecommun. Technol. 32(6) (2021) - [j58]Ali Hassan Sodhro, Andrei V. Gurtov, Noman Zahid, Sandeep Pirbhulal, Lei Wang, Muhammad Mahboob Ur Rahman, Muhammad Ali Imran, Qammer H. Abbasi:
Toward Convergence of AI and IoT for Energy-Efficient Communication in Smart Homes. IEEE Internet Things J. 8(12): 9664-9671 (2021) - [j57]Pawani Porambage, Gürkan Gür, Diana Pamela Moya Osorio, Madhusanka Liyanage, Andrei V. Gurtov, Mika Ylianttila:
The Roadmap to 6G Security and Privacy. IEEE Open J. Commun. Soc. 2: 1094-1122 (2021) - [j56]Abhimanyu Rawat, Mohammad Khodari, Mikael Asplund, Andrei V. Gurtov:
Decentralized Firmware Attestation for In-Vehicle Networks. ACM Trans. Cyber Phys. Syst. 5(1): 7:1-7:23 (2021) - [j55]Ali Hassan Sodhro, Sandeep Pirbhulal, Gul Hassan Sodhro, Muhammad Muzammal, Zongwei Luo, Andrei V. Gurtov, Antônio Roberto L. de Macêdo, Lei Wang, Nuno M. Garcia, Victor Hugo C. de Albuquerque:
Towards 5G-Enabled Self Adaptive Green and Reliable Communication in Intelligent Transportation System. IEEE Trans. Intell. Transp. Syst. 22(8): 5223-5231 (2021) - [j54]Adel Fuchs, Ariel Stulman, Andrei V. Gurtov:
IoT and HIP's Opportunistic Mode. IEEE Trans. Mob. Comput. 20(4): 1434-1448 (2021) - [c96]Suleman Khan, Pardeep Kumar, An Braeken, Andrei V. Gurtov:
Detection of evil flies: securing air-ground aviation communication. MobiCom 2021: 852-854 - [c95]Yousef Hashem, Elmedin Zildzic, Andrei V. Gurtov:
Secure Drone Identification with Hyperledger Iroha. DIVANet 2021: 11-18 - [i13]David Hasselquist, Christoffer Lindström, Nikita Korzhitskii, Niklas Carlsson, Andrei V. Gurtov:
QUIC Throughput and Fairness over Dual Connectivity (extended). CoRR abs/2112.14328 (2021) - 2020
- [j53]Ijaz Ahmad, Shahriar Shahabuddin, Hassan Malik, Erkki Harjula, Teemu Leppänen, Lauri Lovén, Antti Anttonen, Ali Hassan Sodhro, Muhammad Mahtab Alam, Markku J. Juntti, Antti Ylä-Jääski, Thilo Sauter, Andrei V. Gurtov, Mika Ylianttila, Jukka Riekki:
Machine Learning Meets Communication Networks: Current Trends and Future Challenges. IEEE Access 8: 223418-223460 (2020) - [j52]Carl Nykvist, Martin Larsson, Ali Hassan Sodhro, Andrei V. Gurtov:
A lightweight portable intrusion detection communication system for auditing applications. Int. J. Commun. Syst. 33(7) (2020) - [j51]Alexey M. Kashevnik, Igor Lashkov, Andrei V. Gurtov:
Methodology and Mobile Application for Driver Behavior Analysis and Accident Prevention. IEEE Trans. Intell. Transp. Syst. 21(6): 2427-2436 (2020) - [c94]Ali Hassan Sodhro, Mohammad S. Obaidat, Andrei V. Gurtov, Noman Zahid, Sandeep Pirbhulal, Lei Wang, Kuei-Fang Hsiao:
Towards Wearable Sensing Enabled Healthcare Framework for Elderly Patients. ICC 2020: 1-6 - [c93]David Hasselquist, Christoffer Lindström, Nikita Korzhitskii, Niklas Carlsson, Andrei V. Gurtov:
QUIC Throughput and Fairness over Dual Connectivity. MASCOTS (Revised Selected Papers) 2020: 175-190 - [p2]Mohammad Borhani, Madhusanka Liyanage, Ali Hassan Sodhro, Pardeep Kumar, Anca Delia Jurcut, Andrei V. Gurtov:
Secure and Resilient Communications in the Industrial Internet. Guide to Disaster-Resilient Communication Networks 2020: 219-242 - [p1]Carmen Mas Machuca, Francesco Musumeci, Petra Vizarreta, Dimitrios Pezaros, Simon Jouët, Massimo Tornatore, Ali Hmaity, Madhusanka Liyanage, Andrei V. Gurtov, An Braeken:
Reliable Control and Data Planes for Softwarized Networks. Guide to Disaster-Resilient Communication Networks 2020: 243-270 - [i12]Mika Ylianttila, Raimo Kantola, Andrei V. Gurtov, Lorenzo Mucchi, Ian J. Oppermann, Zheng Yan, Tri Hong Nguyen, Fei Liu, Tharaka Mawanane Hewa, Madhusanka Liyanage, Ijaz Ahmad, Juha Partala, Robert Abbas, Artur Hecker, Sara Jayousi, Alessio Martinelli, Stefano Caputo, Jonathan Bechtold, Ivan Morales, Razvan-Andrei Stoica, Giuseppe Abreu, Shahriar Shahabuddin, Erdal Panayirci, Harald Haas, Tanesh Kumar, Basak Ozan Ozparlak, Juha Röning:
6G White paper: Research challenges for Trust, Security and Privacy. CoRR abs/2004.11665 (2020)
2010 – 2019
- 2019
- [j50]David Hasselquist, Abhimanyu Rawat, Andrei V. Gurtov:
Trends and Detection Avoidance of Internet-Connected Industrial Control Systems. IEEE Access 7: 155504-155512 (2019) - [j49]Ijaz Ahmad, Shahriar Shahabuddin, Tanesh Kumar, Jude Okwuibe, Andrei V. Gurtov, Mika Ylianttila:
Security for 5G and Beyond. IEEE Commun. Surv. Tutorials 21(4): 3682-3722 (2019) - [j48]Vladimir V. Mazalov, Andrey Lukyanenko, Andrei V. Gurtov:
Location-Price Competition in Mobile Operator Market. IGTR 21(3): 1850015:1-1850015:15 (2019) - [j47]Hasan Mahmood Aminul Islam, Dmitrij Lagutin, Antti Ylä-Jääski, Nikos Fotiou, Andrei V. Gurtov:
Transparent CoAP Services to IoT Endpoints through ICN Operator Networks. Sensors 19(6): 1339 (2019) - [j46]Pardeep Kumar, Andrei V. Gurtov, Mangal Sain, Andrew P. Martin, Phuong Hoai Ha:
Lightweight Authentication and Key Agreement for Smart Metering in Smart Energy Networks. IEEE Trans. Smart Grid 10(4): 4349-4359 (2019) - [c92]Pawani Porambage, Ahsan Manzoor, Madhusanka Liyanage, Andrei V. Gurtov, Mika Ylianttila:
Managing Mobile Relays for Secure E2E Connectivity of Low-Power IoT Devices. CCNC 2019: 1-7 - [c91]Mohammad Khodari, Abhimanyu Rawat, Mikael Asplund, Andrei V. Gurtov:
Decentralized Firmware Attestation for In-Vehicle Networks. CPSS@AsiaCCS 2019: 47-56 - [c90]Debopam Bhattacherjee, Andrei V. Gurtov, Tuomas Aura:
Watch Your Step! Detecting Stepping Stones in Programmable Networks. ICC 2019: 1-7 - [c89]Archana Rajakaruna, Ahsan Manzoor, Pawani Porambage, Madhusanka Liyanage, Mika Ylianttila, Andrei V. Gurtov:
Enabling End-to-End Secure Connectivity for Low-Power IoT Devices with UAVs. WCNC Workshops 2019: 1-6 - 2018
- [j45]Ijaz Ahmad, Tanesh Kumar, Madhusanka Liyanage, Jude Okwuibe, Mika Ylianttila, Andrei V. Gurtov:
Overview of 5G Security Challenges and Solutions. IEEE Commun. Stand. Mag. 2(1): 36-43 (2018) - [j44]Andrei V. Gurtov, Joakim Koskela, Dmitry G. Korzun:
Cyclic ranking in single-resource peer-to-peer exchange. Peer-to-Peer Netw. Appl. 11(3): 632-643 (2018) - [j43]Andrei V. Gurtov, Tatiana Polishchuk, Max Wernberg:
Controller-Pilot Data Link Communication Security. Sensors 18(5): 1636 (2018) - [c88]Ahsan Manzoor, Pawani Porambage, Madhusanka Liyanage, Mika Ylianttila, Andrei V. Gurtov:
DEMO: Mobile Relay Architecture for Low-Power IoT Devices. WOWMOM 2018: 14-16 - [i11]Hasan M. A. Islam, Dmitrij Lagutin, Andrey Lukyanenko, Andrei V. Gurtov, Antti Ylä-Jääski:
CIDOR: Content Distribution and Retrieval in Disaster Networks for Public Protection. CoRR abs/1803.00275 (2018) - [i10]Archana Rajakaruna, Ahsan Manzoor, Pawani Porambage, Madhusanka Liyanage, Mika Ylianttila, Andrei V. Gurtov:
Lightweight Dew Computing Paradigm to Manage Heterogeneous Wireless Sensor Networks with UAVs. CoRR abs/1811.04283 (2018) - 2017
- [j42]Madhusanka Liyanage, An Braeken, Anca Delia Jurcut, Mika Ylianttila, Andrei V. Gurtov:
Secure communication channel architecture for Software Defined Mobile Networks. Comput. Networks 114: 32-50 (2017) - [j41]Ilya Nikolaevskiy, Andrey Lukyanenko, Andrei V. Gurtov:
Nash Bargaining Solution Allocation is Not Suitable for Datacenter Jobs. IGTR 19(1): 1750001:1-1750001:22 (2017) - [j40]Dmitry G. Korzun, Sergey I. Balandin, Alexey M. Kashevnik, Alexander V. Smirnov, Andrei V. Gurtov:
Smart Spaces-Based Application Development: M3 Architecture, Design Principles, Use Cases, and Evaluation. Int. J. Embed. Real Time Commun. Syst. 8(2): 66-100 (2017) - [j39]Pardeep Kumar, An Braeken, Andrei V. Gurtov, Jari H. Iinatti, Phuong Hoai Ha:
Anonymous Secure Framework in Connected Smart Home Environments. IEEE Trans. Inf. Forensics Secur. 12(4): 968-979 (2017) - [j38]Marco Chiesa, Ilya Nikolaevskiy, Slobodan Mitrovic, Andrei V. Gurtov, Aleksander Madry, Michael Schapira, Scott Shenker:
On the Resiliency of Static Forwarding Tables. IEEE/ACM Trans. Netw. 25(2): 1133-1146 (2017) - [j37]Pawani Porambage, An Braeken, Pardeep Kumar, Andrei V. Gurtov, Mika Ylianttila:
CHIP: Collaborative Host Identity Protocol with Efficient Key Establishment for Constrained Devices in Internet of Things. Wirel. Pers. Commun. 96(1): 421-440 (2017) - [c87]Madhusanka Liyanage, Mika Ylianttila, Andrei V. Gurtov:
Fast Transmission Mechanism for Secure VPLS Architectures. CIT 2017: 192-196 - [c86]Madhusanka Liyanage, Mika Ylianttila, Andrei V. Gurtov:
Enhancing Security, Scalability and Flexibility of Virtual Private LAN Services. CIT 2017: 286-291 - [c85]Ijaz Ahmad, Tanesh Kumar, Madhusanka Liyanage, Jude Okwuibe, Mika Ylianttila, Andrei V. Gurtov:
5G security: Analysis of threats and solutions. CSCN 2017: 193-199 - [c84]Ijaz Ahmad, Madhusanka Liyanage, Mika Ylianttila, Andrei V. Gurtov:
Analysis of deployment challenges of Host Identity Protocol. EuCNC 2017: 1-6 - [c83]Ilya Lebedev, Nurzhan Bazhayev, Mikhail E. Sukhoparov, Vadim Petrov, Andrei V. Gurtov:
Analysis of the state of information security on the basis of surious emission electronic components. FRUCT 2017: 216-221 - [c82]Adel Fuchs, Ariel Stulman, Andrei V. Gurtov:
Hardening Opportunistic HIP. MSWiM 2017: 123-127 - [c81]Madhusanka Liyanage, Mika Ylianttila, Andrei V. Gurtov:
Software defined VPLS architectures: Opportunities and challenges. PIMRC 2017: 1-7 - [c80]Hasan M. A. Islam, Dmitrij Lagutin, Andrey Lukyanenko, Andrei V. Gurtov, Antti Ylä-Jääski:
CIDOR: Content distribution and retrieval in disaster networks for public protection. WiMob 2017: 324-333 - 2016
- [j36]Andrei V. Gurtov, Madhusanka Liyanage, Dmitry G. Korzun:
Secure Communication and Data Processing Challenges in the Industrial Internet. Balt. J. Mod. Comput. 4(4) (2016) - [j35]Pawani Porambage, Mika Ylianttila, Corinna Schmitt, Pardeep Kumar, Andrei V. Gurtov, Athanasios V. Vasilakos:
The Quest for Privacy in the Internet of Things. IEEE Cloud Comput. 3(2): 36-45 (2016) - [j34]Madhusanka Liyanage, Ahmed Bux Abro, Mika Ylianttila, Andrei V. Gurtov:
Opportunities and Challenges of Software-Defined Mobile Networks in Network Security. IEEE Secur. Priv. 14(4): 34-44 (2016) - [j33]Madhusanka Liyanage, Pardeep Kumar, Mika Ylianttila, Andrei V. Gurtov:
Novel secure VPN architectures for LTE backhaul networks. Secur. Commun. Networks 9(10): 1198-1215 (2016) - [j32]An Braeken, Pawani Porambage, Andrei V. Gurtov, Mika Ylianttila:
Secure and Efficient Reactive Video Surveillance for Patient Monitoring. Sensors 16(1): 32 (2016) - [j31]Erkki Harjula, Andrei V. Gurtov, Timo Koskela, Timo Ojala, Mika Ylianttila:
Energy-aware load monitoring for improving battery life of mobile peer-to-peer nodes. Sustain. Comput. Informatics Syst. 12: 43-54 (2016) - [j30]Suneth Namal, Ijaz Ahmad, Muhammad Saad Saud, Markku Jokinen, Andrei V. Gurtov:
Implementation of OpenFlow based cognitive radio network architecture: SDN&R. Wirel. Networks 22(2): 663-677 (2016) - [c79]Madhusanka Liyanage, Mika Ylianttila, Andrei V. Gurtov:
Improving the tunnel management performance of secure VPLS architectures with SDN. CCNC 2016: 530-536 - [c78]Marco Chiesa, Andrei V. Gurtov, Aleksander Madry, Slobodan Mitrovic, Ilya Nikolaevskiy, Michael Schapira, Scott Shenker:
On the Resiliency of Randomized Routing Against Multiple Edge Failures. ICALP 2016: 134:1-134:15 - [c77]Madhusanka Liyanage, Pardeep Kumar, Simone Soderi, Mika Ylianttila, Andrei V. Gurtov:
Performance and security evaluation of intra-vehicular communication architecture. ICC Workshops 2016: 302-308 - [c76]Marco Chiesa, Ilya Nikolaevskiy, Slobodan Mitrovic, Aurojit Panda, Andrei V. Gurtov, Aleksander Madry, Michael Schapira, Scott Shenker:
The quest for resilient (static) forwarding tables. INFOCOM 2016: 1-9 - [c75]Pardeep Kumar, Andrei V. Gurtov, Phuong Hoai Ha:
Poster Abstract: An Efficient Authentication Model in Smart Grid Networks. IPSN 2016: 65:1-65:2 - [c74]Konstantin Borisenko, Andrey Rukavitsyn, Andrei V. Gurtov, Andrey Shorov:
Detecting the Origin of DDoS Attacks in OpenStack Cloud Platform Using Data Mining Techniques. NEW2AN 2016: 303-315 - [c73]Mehrnoosh Monshizadeh, Vikramajeet Khatri, Andrei V. Gurtov:
NFV security considerations for cloud-based mobile virtual network operators. SoftCOM 2016: 1-5 - [c72]Ijaz Ahmad, Madhusanka Liyanage, Suneth Namal, Mika Ylianttila, Andrei V. Gurtov, Marcus Eckert, Thomas Bauschert, Zoltán Faigl, László Bokor, Ece Saygun, Hasan Anil Akyildiz, Oscar Lopez Perez, Mikel Uriarte Itzazelaia, Berna Özbek, Aydin Ulas:
New concepts for traffic, resource and mobility management in software-defined mobile networks. WONS 2016: 41-48 - 2015
- [j29]Madhusanka Liyanage, Mika Ylianttila, Andrei V. Gurtov:
Secure Hierarchical VPLS Architecture for Provider Provisioned Networks. IEEE Access 3: 967-984 (2015) - [j28]Pawani Porambage, An Braeken, Corinna Schmitt, Andrei V. Gurtov, Mika Ylianttila, Burkhard Stiller:
Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications. IEEE Access 3: 1503-1511 (2015) - [j27]Ilya Nikolaevskiy, Andrey Lukyanenko, Tatiana Polishchuk, Valentin Polishchuk, Andrei V. Gurtov:
isBF: Scalable in-packet bloom filter based multicast. Comput. Commun. 70: 79-85 (2015) - [j26]Ijaz Ahmad, Suneth Namal, Mika Ylianttila, Andrei V. Gurtov:
Security in Software Defined Networks: A Survey. IEEE Commun. Surv. Tutorials 17(4): 2317-2346 (2015) - [j25]Dmitry G. Korzun, Ilya Nikolaevskiy, Andrei V. Gurtov:
Service Intelligence and Communication Security for Ambient Assisted Living. Int. J. Embed. Real Time Commun. Syst. 6(1): 76-100 (2015) - [c71]Dmitry G. Korzun, Dmitriy Kuptsov, Andrei V. Gurtov:
A Simulation Study of the Stochastic Compensation Effect for Packet Reordering in Multipath Data Streaming. EMS 2015: 409-414 - [c70]Pawani Porambage, An Braeken, Pardeep Kumar, Andrei V. Gurtov, Mika Ylianttila:
Efficient Key Establishment for Constrained IoT Devices with Collaborative HIP-Based Approach. GLOBECOM 2015: 1-6 - [c69]Madhusanka Liyanage, Jude Okwuibe, Mika Ylianttila, Andrei V. Gurtov:
Secure Virtual Private LAN Services: An overview with performance evaluation. ICC Workshops 2015: 2231-2237 - [c68]Pawani Porambage, An Braeken, Pardeep Kumar, Andrei V. Gurtov, Mika Ylianttila:
Proxy-based end-to-end key establishment protocol for the Internet of Things. ICC Workshops 2015: 2677-2682 - [c67]Madhusanka Liyanage, Ijaz Ahmad, Mika Ylianttila, Andrei V. Gurtov, Ahmed Bux Abro, Edgardo Montes de Oca:
Leveraging LTE security with SDN and NFV. ICIIS 2015: 220-225 - [c66]Pawani Porambage, An Braeken, Matthias Carlier, Pardeep Kumar, Andrei V. Gurtov, Mika Ylianttila:
Secure and Efficient Automatic Ruling in Three-Level Network Architecture. ICT Innovations 2015: 185-194 - [c65]Ilya Nikolaevskiy, Andrey Lukyanenko, Andrei V. Gurtov:
STEM+: Allocating bandwidth fairly to tasks. INFOCOM Workshops 2015: 67-68 - [c64]Pawani Porambage, An Braeken, Corinna Schmitt, Andrei V. Gurtov, Mika Ylianttila, Burkhard Stiller:
Group key establishment for secure multicasting in IoT-enabled Wireless Sensor Networks. LCN 2015: 482-485 - [c63]Dmitry G. Korzun, Ilya Nikolaevskiy, Andrei V. Gurtov:
Service Intelligence Support for Medical Sensor Networks in Personalized Mobile Health Systems. NEW2AN 2015: 116-127 - [c62]Ijaz Ahmad, Suneth Namal, Mika Ylianttila, Andrei V. Gurtov:
Towards software defined cognitive networking. NTMS 2015: 1-5 - [c61]Pawani Porambage, An Braeken, Andrei V. Gurtov, Mika Ylianttila, Susanna Spinsante:
Secure end-to-end communication for constrained devices in IoT-enabled Ambient Assisted Living systems. WF-IoT 2015: 711-714 - 2014
- [j24]Zoltán Faigl, Jani Pellikka, László Bokor, Andrei V. Gurtov:
Performance evaluation of current and emerging authentication schemes for future 3GPP network architectures. Comput. Networks 60: 60-74 (2014) - [j23]Dmitriy Kuptsov, Boris Nechaev, Andrey Lukyanenko, Andrei V. Gurtov:
How penalty leads to improvement: A measurement study of wireless backoff in IEEE 802.11 networks. Comput. Networks 75: 37-57 (2014) - [j22]Pawani Porambage, Corinna Schmitt, Pardeep Kumar, Andrei V. Gurtov, Mika Ylianttila:
PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications. Int. J. Distributed Sens. Networks 10 (2014) - [j21]Dmitry G. Korzun, Andrei V. Gurtov:
Hierarchical architectures in structured peer-to-peer overlay networks. Peer-to-Peer Netw. Appl. 7(4): 359-395 (2014) - [j20]Madhusanka Liyanage, Andrei V. Gurtov:
Securing virtual private LAN service by efficient key management. Secur. Commun. Networks 7(1): 1-13 (2014) - [j19]Pardeep Kumar, Mika Ylianttila, Andrei V. Gurtov, Sanggon Lee, Hoon-Jae Lee:
An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications. Sensors 14(2): 2732-2755 (2014) - [j18]Pardeep Kumar, Andrei V. Gurtov, Jari H. Iinatti, Sanggon Lee:
Delegation-based robust authentication model for wireless roaming using portable communication devices. IEEE Trans. Consumer Electron. 60(4): 668-674 (2014) - [c60]Andrei V. Gurtov, Pawani Porambage, Ilya Nikolaevskiy:
Secure lightweight protocols for medical device monitoring. FRUCT 2014: 46-51 - [c59]Madhusanka Liyanage, Mika Ylianttila, Andrei V. Gurtov:
A novel distributed spanning tree protocol for provider provisioned VPLS networks. ICC 2014: 2982-2988 - [c58]Pardeep Kumar, Mika Ylianttila, Andrei V. Gurtov, Mangal Sain:
An efficient and simple key distribution scheme for smart environments. ICCE 2014: 468-469 - [c57]Igor A. Zikratov, Ilya S. Lebedev, Andrei V. Gurtov:
Trust and Reputation Mechanisms for Multi-agent Robotic Systems. NEW2AN 2014: 106-120 - [c56]Suneth Namal, Ijaz Ahmad, Markku Jokinen, Andrei V. Gurtov, Mika Ylianttila:
SDN Core for Mobility between Cognitive Radio and 802.11 Networks. NGMAST 2014: 272-281 - [c55]Pawani Porambage, Corinna Schmitt, Pardeep Kumar, Andrei V. Gurtov, Mika Ylianttila:
Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. WCNC 2014: 2728-2733 - [c54]Madhusanka Liyanage, Julia Chirkova, Andrei V. Gurtov:
Access Point selection game for mobile wireless users. WoWMoM 2014: 1-6 - [c53]Madhusanka Liyanage, Mika Ylianttila, Andrei V. Gurtov:
Securing the control channel of software-defined mobile networks. WoWMoM 2014: 1-6 - [c52]Ilya Nikolaevskiy, Dmitry G. Korzun, Andrei V. Gurtov:
Security for medical sensor networks in mobile health systems. WoWMoM 2014: 1-6 - [i9]Marco Chiesa, Ilya Nikolaevskiy, Aurojit Panda, Andrei V. Gurtov, Michael Schapira, Scott Shenker:
Exploring the Limits of Static Failover Routing. CoRR abs/1409.0034 (2014) - 2013
- [j17]Zoltán Faigl, László Bokor, Jani Pellikka, Andrei V. Gurtov:
Suitability analysis of existing and new authentication methods for future 3GPP Evolved Packet Core. Comput. Networks 57(17): 3370-3388 (2013) - [j16]Oscar García Morchon, Dmitriy Kuptsov, Andrei V. Gurtov, Klaus Wehrle:
Cooperative security in distributed networks. Comput. Commun. 36(12): 1284-1297 (2013) - [j15]Huayang Cao, Peidong Zhu, Xicheng Lu, Andrei V. Gurtov:
A layered encryption mechanism for networked critical infrastructures. IEEE Netw. 27(1): 12-18 (2013) - [j14]Suneth Namal, Madhusanka Liyanage, Andrei V. Gurtov:
Realization of Mobile Femtocells: Operational and Protocol Requirements. Wirel. Pers. Commun. 71(1): 339-364 (2013) - [c51]Madhusanka Liyanage, Mika Ylianttila, Andrei V. Gurtov:
Secure hierarchical Virtual Private LAN Services for provider provisioned networks. CNS 2013: 233-241 - [c50]Pawani Porambage, Pardeep Kumar, Corinna Schmitt, Andrei V. Gurtov, Mika Ylianttila:
Certificate-Based Pairwise Key Establishment Protocol for Wireless Sensor Networks. CSE 2013: 667-674 - [c49]Simone Soderi, Harri Viittala, Jani Saloranta, Matti Hämäläinen, Jari H. Iinatti, Andrei V. Gurtov:
Security of Wi-Fi on-board intra-vehicular communication: Field trials of tunnel scenario. ITST 2013: 278-283 - [c48]Dmitry G. Korzun, Sergey I. Balandin, Andrei V. Gurtov:
Deployment of Smart Spaces in Internet of Things: Overview of the Design Challenges. NEW2AN 2013: 48-59 - [c47]Ekaterina Balandina, Yevgeni Koucheryavy, Andrei V. Gurtov:
Computing the Retransmission Timeout in CoAP. NEW2AN 2013: 352-362 - [c46]Dmitriy Kuptsov, Boris Nechaev, Andrei V. Gurtov, Andrey Lukyanenko:
A novel demand-aware fairness metric for IEEE 802.11 wireless networks. SAC 2013: 603-610 - [c45]Ilya Nikolaevskiy, Andrey Lukyanenko, Tatiana Polishchuk, Valentin Polishchuk, Andrei V. Gurtov:
isBF: scalable in-packet bloom filter based multicast. SAC 2013: 646-648 - [c44]Suneth Namal, Ijaz Ahmad, Andrei V. Gurtov, Mika Ylianttila:
SDN Based Inter-Technology Load Balancing Leveraged by Flow Admission Control. SDN4FNS 2013: 1-5 - [c43]Suneth Namal, Ijaz Ahmad, Andrei V. Gurtov, Mika Ylianttila:
Enabling Secure Mobility with OpenFlow. SDN4FNS 2013: 1-5 - [c42]Pardeep Kumar, Pawani Porambage, Mika Ylianttila, Andrei V. Gurtov:
A Mobile Object-Based Secret Key Distribution Scheme for Wireless Sensor Networks. UIC/ATC 2013: 656-661 - [c41]Madhusanka Liyanage, Andrei V. Gurtov:
A scalable and secure VPLS architecture for provider provisioned networks. WCNC 2013: 1115-1120 - [c40]Suneth Namal, Konstantinos Georgantas, Andrei V. Gurtov:
Lightweight authentication and key management on 802.11 with Elliptic Curve Cryptography. WCNC 2013: 1830-1835 - 2012
- [j13]Andrey Lukyanenko, Andrei V. Gurtov, Evsey Morozov:
An Adaptive Backoff Protocol with Markovian Contention Window Control. Commun. Stat. Simul. Comput. 41(7): 1093-1106 (2012) - [c39]Dmitriy Kuptsov, Boris Nechaev, Andrei V. Gurtov:
Demand-aware flow allocation in data center networks. CSWS@CoNEXT 2012: 53-58 - [c38]Michael Karl, Tatiana Polishchuk, Thorsten Herfet, Andrei V. Gurtov:
Mediating Multimedia Traffic with Strict Delivery Constraints. ISM 2012: 241-248 - [c37]Ekaterina Dashkova, Andrei V. Gurtov:
Survey on Congestion Control Mechanisms for Wireless Sensor Networks. NEW2AN 2012: 75-85 - [c36]Madhusanka Liyanage, Andrei V. Gurtov:
Secured VPN Models for LTE Backhaul Networks. VTC Fall 2012: 1-5 - [c35]Suneth Namal, Jani Pellikka, Andrei V. Gurtov:
Secure and Multihomed Vehicular Femtocells. VTC Spring 2012: 1-5 - [c34]Marek Skowron, Suneth Namal, Jani Pellikka, Andrei V. Gurtov:
Inter Technology Load Balancing Algorithm for Evolved Packet System. VTC Fall 2012: 1-5 - [c33]Jani Pellikka, Andrei V. Gurtov, Zoltán Faigl:
Lightweight host and user authentication protocol for All-IP telecom networks. WOWMOM 2012: 1-7 - [c32]Tatiana Polishchuk, Michael Karl, Thorsten Herfet, Andrei V. Gurtov:
Scalable architecture for multimedia multicast Internet applications. WOWMOM 2012: 1-6 - [i8]Dmitriy Kuptsov, Boris Nechaev, Andrey Lukyanenko, Andrei V. Gurtov:
How Penalty Leads to Improvement: a Measurement Study of Wireless Backoff. CoRR abs/1208.6318 (2012) - [i7]Thomas R. Henderson, Andrei V. Gurtov:
The Host Identity Protocol (HIP) Experiment Report. RFC 6538: 1-35 (2012) - [i6]Thomas R. Henderson, Sally Floyd, Andrei V. Gurtov, Yoshifumi Nishida:
The NewReno Modification to TCP's Fast Recovery Algorithm. RFC 6582: 1-16 (2012) - 2011
- [j12]Boris Nechaev, Dmitry G. Korzun, Andrei V. Gurtov:
CR-Chord: Improving lookup availability in the presence of malicious DHT nodes. Comput. Networks 55(13): 2914-2928 (2011) - [j11]Dmitry G. Korzun, Andrei V. Gurtov:
Survey on hierarchical routing schemes in "flat" distributed hash tables. Peer-to-Peer Netw. Appl. 4(4): 346-375 (2011) - [c31]Suneth Namal, Andrei V. Gurtov, Mehdi Bennis:
Securing the backhaul for mobile and multi-homed femtocells. Future Network & Mobile Summit 2011: 1-15 - [c30]Samu Varjonen, Tobias Heer, Ken Rimey, Andrei V. Gurtov:
Secure Resolution of End-Host Identifiers for Mobile Clients. GLOBECOM 2011: 1-6 - [c29]Andrey Lukyanenko, Andrei V. Gurtov, Antti Ylä-Jääski:
DISPUTE: Distributed puzzle tussle. ISCC 2011: 775-778 - [c28]Dmitriy Kuptsov, Boris Nechaev, Andrei V. Gurtov:
Securing Medical Sensor Network with HIP. MobiHealth 2011: 150-157 - [c27]Pin Nie, Juho Vähä-Herttua, Tuomas Aura, Andrei V. Gurtov:
Performance analysis of HIP diet exchange for WSN security establishment. Q2SWinet 2011: 51-56 - [c26]Jani Pellikka, Marek Skowron, Andrei V. Gurtov:
Comparison and Analysis of Secure Mobile Architecture (SMA) and Evolved Packet System. VTC Spring 2011: 1-5 - 2010
- [j10]Pekka Nikander, Andrei V. Gurtov, Thomas R. Henderson:
Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks. IEEE Commun. Surv. Tutorials 12(2): 186-204 (2010) - [c25]Tatiana Polishchuk, Andrei V. Gurtov:
Improving TCP-Friendliness for mHIP. AccessNets 2010: 3-17 - [c24]Andrey Lukyanenko, Vladimir V. Mazalov, Andrei V. Gurtov, I. Falko:
Playing Defense by Offense: Equilibrium in the DoS-attack problem. ISCC 2010: 433-436 - [c23]Andrey Khurri, Dmitriy Kuptsov, Andrei V. Gurtov:
On application of Host Identity Protocol in wireless sensor networks. MASS 2010: 358-345 - [c22]Joakim Koskela, Kristiina Karvonen, Theofanis Kilinkaridis, Andrei V. Gurtov:
Secure and usable P2P VoIP for mobile devices. Mobile HCI 2010: 439-442 - [c21]Boris Nechaev, Mark Allman, Vern Paxson, Andrei V. Gurtov:
A Preliminary Analysis of TCP Performance in an Enterprise Network. INM/WREN 2010 - [c20]Dmitriy Kuptsov, Andrei V. Gurtov, Oscar García Morchon, Klaus Wehrle:
Brief announcement: distributed trust management and revocation. PODC 2010: 233-234 - [c19]Joakim Koskela, Andrei V. Gurtov:
A secure peer-to-peer web framework. WOWMOM 2010: 1-6
2000 – 2009
- 2009
- [j9]Dmitry G. Korzun, Andrei V. Gurtov:
A local equilibrium model for P2P resource ranking. SIGMETRICS Perform. Evaluation Rev. 37(2): 27-29 (2009) - [j8]Joakim Koskela, Juho Heikkilä, Andrei V. Gurtov:
Poster abstract: a secure P2P SIP system with SPAM prevention. ACM SIGMOBILE Mob. Comput. Commun. Rev. 13(3): 26-29 (2009) - [c18]Kristiina Karvonen, Miika Komu, Andrei V. Gurtov:
Usable security management with host identity protocol. AICCSA 2009: 279-286 - [c17]Dmitry G. Korzun, Boris Nechaev, Andrei V. Gurtov:
Cyclic routing: Generalizing look-ahead in peer-to-peer networks. AICCSA 2009: 697-704 - [c16]Andrei V. Gurtov, Tatiana Polishchuk:
Secure multipath transport for legacy Internet applications. BROADNETS 2009: 1-8 - [c15]Joakim Koskela, Nicholas Weaver, Andrei V. Gurtov, Mark Allman:
Securing web content. ReArch@CoNEXT 2009: 7-12 - [c14]Ruishan Zhang, Andrei V. Gurtov:
Collaborative Reputation-based Voice Spam Filtering. DEXA Workshops 2009: 33-37 - [c13]Andrey Lukyanenko, Andrei V. Gurtov:
Towards behavioral control in multi-player network games. GAMENETS 2009: 683-690 - [c12]Andrey Khurri, Dmitriy Kuptsov, Andrei V. Gurtov:
Performance of Host Identity Protocol on Symbian OS. ICC 2009: 1-6 - [c11]Boris Nechaev, Vern Paxson, Mark Allman, Andrei V. Gurtov:
On calibrating enterprise switch measurements. Internet Measurement Conference 2009: 143-155 - [c10]Juho Heikkilä, Andrei V. Gurtov:
Filtering SPAM in P2PSIP Communities with Web of Trust. MobiSec 2009: 110-121 - [c9]Dmitriy Kuptsov, Andrei V. Gurtov:
SAVAH: Source Address Validation with Host Identity Protocol . MobiSec 2009: 190-201 - [c8]Dmitriy Kuptsov, Andrey Khurri, Andrei V. Gurtov:
Distributed user authentication in wireless LANs. WOWMOM 2009: 1-9 - 2008
- [j7]Andrei V. Gurtov, Dmitry G. Korzun, Andrey Lukyanenko, Pekka Nikander:
Hi3: An efficient and secure networking architecture for mobile hosts. Comput. Commun. 31(10): 2457-2467 (2008) - [j6]Dmitry G. Korzun, Andrei V. Gurtov:
A Diophantine model of routes in structured P2P overlays. SIGMETRICS Perform. Evaluation Rev. 35(4): 52-61 (2008) - 2007
- [e1]Bengt Ahlgren, Lars Eggert, Anja Feldmann, Andrei V. Gurtov, Thomas R. Henderson:
Naming and Addressing for Next-Generation Internetworks, 29.10. - 01.11.2006. Dagstuhl Seminar Proceedings 06441, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 [contents] - 2006
- [j5]Dmitry G. Korzun, Andrei V. Gurtov:
On scalability properties of the Hi3 control plane. Comput. Commun. 29(17): 3591-3601 (2006) - [i5]Bengt Ahlgren, Lars Eggert, Anja Feldmann, Andrei V. Gurtov, Thomas R. Henderson:
06441 Abstracts Collection -- Naming and Addressing for Next Generation Internetworks. Naming and Addressing for Next-Generation Internetworks 2006 - [i4]Thomas R. Henderson, Andrei V. Gurtov, Lars Eggert, Christian Dannewitz:
06441 Summary -- Naming and Addressing for Next Generation Internetworks. Naming and Addressing for Next-Generation Internetworks 2006 - 2005
- [c7]Hannes Tschofenig, Andrei V. Gurtov, Jukka Ylitalo, Aarthi Nagarajan, Murugaraj Shanmugam:
Traversing Middleboxes with the Host Identity Protocol. ACISP 2005: 17-28 - [c6]Tuomas Aura, Aarthi Nagarajan, Andrei V. Gurtov:
Analysis of the HIP Base Exchange Protocol. ACISP 2005: 481-493 - [c5]Miika Komu, Sasu Tarkoma, Jaakko Kangasharju, Andrei V. Gurtov:
Applying a cryptographic namespace to applications. DIN@MobiCom 2005: 23-27 - [i3]Reiner Ludwig, Andrei V. Gurtov:
The Eifel Response Algorithm for TCP. RFC 4015: 1-13 (2005) - 2004
- [j4]Andrei V. Gurtov, Sally Floyd:
Modeling wireless links for transport protocols. Comput. Commun. Rev. 34(2): 85-96 (2004) - [j3]Andrei V. Gurtov, Jouni Korhonen:
Effect of vertical handovers on performance of TCP-friendly rate control. ACM SIGMOBILE Mob. Comput. Commun. Rev. 8(3): 73-87 (2004) - [i2]Sally Floyd, Thomas R. Henderson, Andrei V. Gurtov:
The NewReno Modification to TCP's Fast Recovery Algorithm. RFC 3782: 1-19 (2004) - 2003
- [j2]Andrei V. Gurtov, Reiner Ludwig:
Lifetime packet discard for efficient real-time transport over cellular links. ACM SIGMOBILE Mob. Comput. Commun. Rev. 7(4): 32-45 (2003) - [j1]Andrei V. Gurtov:
Eliminating aborted data delivery over cellular links. ACM SIGMOBILE Mob. Comput. Commun. Rev. 7(4): 53-54 (2003) - [c4]Andrei V. Gurtov, Reiner Ludwig:
Responding to Spurious Timeouts in TCP. INFOCOM 2003: 2312-2322 - [i1]Hiroshi Inamura, Gabriel Montenegro, Reiner Ludwig, Andrei V. Gurtov, Farid Khafizov:
TCP over Second (2.5G) and Third (3G) Generation Wireless Networks. RFC 3481: 1-26 (2003) - 2001
- [c3]Jouni Korhonen, Olli Aalto, Andrei V. Gurtov, Heimo Laamanen:
Measured performance of GSM, HSCSD and GPRS. ICC 2001: 1330-1334 - [c2]Andrei V. Gurtov:
Effect of Delays on TCP Performance. PWC 2001: 87-105 - [c1]Markku Kojo, Andrei V. Gurtov, Jukka Manner, Pasi Sarolahti, Timo O. Alanko, Kimmo E. E. Raatikainen:
Seawind: a Wireless Network Emulator . MMB 2001: 151-166
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint