Seuraa
Keijo Haataja
Keijo Haataja
Experienced Senior Manager Funded Projects
Vahvistettu sähköpostiosoite verkkotunnuksessa uef.fi
Nimike
Viittaukset
Viittaukset
Vuosi
Security threats in ZigBee-enabled systems: Vulnerability evaluation, practical experiments, countermeasures, and lessons learned
N Vidgren, K Haataja, JL Patino-Andres, JJ Ramirez-Sanchis, P Toivanen
2013 46th Hawaii International Conference on System Sciences, 5132-5138, 2013
1552013
Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures
K Haataja, P Toivanen
IEEE Transactions on Wireless communications 9 (1), 384-392, 2010
1242010
Three practical attacks against ZigBee security: Attack scenario definitions, practical experiments, countermeasures, and lessons learned
O Olawumi, K Haataja, M Asikainen, N Vidgren, P Toivanen
2014 14th international conference on hybrid intelligent systems, 199-206, 2014
1082014
Man-in-the-middle attacks on bluetooth: a comparative analysis, a novel attack, and countermeasures
KMJ Haataja, K Hypponen
2008 3rd International Symposium on Communications, Control and Signal …, 2008
1072008
An open, PKI-based mobile payment system
M Hassinen, K Hyppönen, K Haataja
International Conference on Emerging trends in information and communication …, 2006
1032006
“Nino” man-in-the-middle attack on bluetooth secure simple pairing
K Hypponen, KMJ Haataja
2007 3rd IEEE/IFIP International Conference in Central Asia on Internet, 1-5, 2007
752007
“Nino” man-in-the-middle attack on bluetooth secure simple pairing
K Hypponen, KMJ Haataja
2007 3rd IEEE/IFIP International Conference in Central Asia on Internet, 1-5, 2007
752007
Practical man-in-the-middle attacks against bluetooth secure simple pairing
K Haataja, P Toivanen
2008 4th International Conference on Wireless Communications, Networking and …, 2008
692008
Security threats and countermeasures in Bluetooth-enabled systems
K Haataja
University of Kuopio, 2009
542009
Novel hybrid encryption algorithm based on aes, RSA, and twofish for bluetooth encryption
MA Albahar, O Olawumi, K Haataja, P Toivanen
Scientific Research Publishing, Inc,, 2018
412018
Bluetooth security attacks: comparative analysis, attacks, and countermeasures
K Haataja, K Hyppönen, S Pasanen, P Toivanen
Springer Science & Business Media, 2013
412013
AI in healthcare: A narrative review
A Väänänen, K Haataja, K Vehviläinen-Julkunen, P Toivanen
F1000Research 10, 6, 2021
372021
Security issues in smart homes and mobile health system: Threat analysis, possible countermeasures and lessons learned
O Olayemi, V Antti, H Keijo, T Pekka
Union of Scientists in Bulgaria, 2017
362017
Wireless indoor tracking of livestock for behavioral analysis
M Asikainen, K Haataja, P Toivanen
2013 9th International Wireless Communications and Mobile Computing …, 2013
292013
Computer-aided breast cancer histopathological diagnosis: Comparative analysis of three DTOCS-based features: SW-DTOCS, SW-WDTOCS and SW-3-4-DTOCS
I Pöllänen, B Braithwaite, T Ikonen, H Niska, K Haataja, P Toivanen, ...
2014 4th International Conference on Image Processing Theory, Tools and …, 2014
262014
New efficient intrusion detection and prevention system for Bluetooth networks
KMJ Haataja
1st International ICST Conference on Mobile Wireless Middleware, Operating …, 2010
252010
Bluetooth MITM vulnerabilities: a literature review, novel attack scenarios, novel countermeasures, and lessons learned
MA Albahar, K Haataja, P Toivanen
International Journal on Information Technologies & Security 8 (4), 25-49, 2016
222016
New efficient rf fingerprint-based security solution for bluetooth secure simple pairing
S Pasanen, K Haataja, N Paivinen, P Toivanen
2010 43rd Hawaii International Conference on System Sciences, 1-8, 2010
172010
Designing and implementing an intelligent Bluetooth-enabled robot car
H Rissanen, J Mahonen, K Haataja, M Johansson, J Mielikainen, ...
2009 IFIP International Conference on Wireless and Optical Communications …, 2009
172009
Security in Bluetooth, WLAN and IrDA: a comparison
KMJ Haataja
university of Kuopio, Dept. of computer science, Finland, 2006
152006
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20