default search action
Mikhail Zolotukhin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j3]Mikhail Zolotukhin, Di Zhang, Timo Hämäläinen, Parsa Miraghaei:
On Attacking Future 5G Networks with Adversarial Examples: Survey. Network 3(1): 39-90 (2023) - 2022
- [j2]Mikhail Zolotukhin, Parsa Miraghaei, Di Zhang, Timo Hämäläinen:
On Assessing Vulnerabilities of the 5G Networks to Adversarial Examples. IEEE Access 10: 126285-126303 (2022) - [c30]Mikhail Zolotukhin, Parsa Miraghaei, Di Zhang, Timo Hämäläinen, Wang Ke, Marja Dunderfelt:
Black-box Adversarial Examples against Intelligent Beamforming in 5G Networks. CSCN 2022: 64-70 - 2021
- [c29]Mikhail Zolotukhin, Pyry Kotilainen, Timo Hämäläinen:
Intelligent IDS Chaining for Network Attack Mitigation in SDN. MSN 2021: 786-791 - [c28]Mikhail Zolotukhin, Timo Hämäläinen, Riku Immonen:
Curious SDN for network attack mitigation. QRS Companion 2021: 630-635 - 2020
- [c27]Olli Väänänen, Mikhail Zolotukhin, Timo Hämäläinen:
Linear Approximation Based Compression Algorithms Efficiency to Compress Environmental Data Sets. AINA Workshops 2020: 110-121 - [c26]Mikhail Zolotukhin, Sanjay Kumar, Timo Hämäläinen:
Reinforcement Learning for Attack Mitigation in SDN-enabled Networks. NetSoft 2020: 282-286
2010 – 2019
- 2018
- [j1]Mikhail Zolotukhin, Alexander Sayenko, Timo Hämäläinen:
On optimal deployment of low power nodes for high frequency next generation wireless systems. Comput. Networks 144: 120-140 (2018) - [c25]Mikhail Zolotukhin, Timo Hämäläinen:
On Artificial Intelligent Malware Tolerant Networking for IoT. NFV-SDN 2018: 1-6 - 2017
- [c24]Alexander Sayenko, Mikhail Zolotukhin, Timo Hämäläinen:
Simulation and performance analysis of frame structures for multi-hop relay systems. CSCN 2017: 144-150 - [c23]Alexander Sayenko, Mikhail Zolotukhin, Timo Hämäläinen:
Multi-hop relays for high frequency next generation wireless systems. ICT 2017: 1-7 - [c22]Mikhail Zolotukhin, Elena Ivannikova, Timo Hämäläinen:
On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds. NEW2AN 2017: 235-246 - [c21]Elena Ivannikova, Mikhail Zolotukhin, Timo Hämäläinen:
Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks. NSS 2017: 531-543 - 2016
- [c20]Mikhail Zolotukhin, Timo Hämäläinen, Tero Kokkonen, Jarmo Siltanen:
Increasing web service availability by detecting application-layer DDoS attacks in encrypted traffic. ICT 2016: 1-6 - [c19]Alexander Sayenko, Mikhail Zolotukhin, Timo Hämäläinen:
On adaptive access and relay link resource allocation for in-band deployments. ISWCS 2016: 92-98 - [c18]Mikhail Zolotukhin, Tero Kokkonen, Timo Hämäläinen, Jarmo Siltanen:
Weighted Fuzzy Clustering for Online Detection of Application DDoS Attacks in Encrypted Network Traffic. NEW2AN 2016: 326-338 - [c17]Alexander Sayenko, Mikhail Zolotukhin, Timo Hämäläinen:
On optimal placement of low power nodes for improved performance in heterogeneous networks. NOMS 2016: 349-357 - 2015
- [c16]Di Zhang, Zheng Chang, Mikhail Zolotukhin, Timo Hämäläinen:
Energy efficient resource allocation in heterogeneous software defined network: A reverse combinatorial auction approach. ICCC 2015: 1-6 - [c15]Tero Kokkonen, Timo Hämäläinen, Marko Silokunnas, Jarmo Siltanen, Mikhail Zolotukhin, Mikko Neijonen:
Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise. NEW2AN 2015: 254-267 - [c14]Mikhail Zolotukhin, Timo Hämäläinen, Tero Kokkonen, Antti Niemelä, Jarmo Siltanen:
Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol. NEW2AN 2015: 274-285 - [c13]Mikhail Zolotukhin, Timo Hämäläinen, Tero Kokkonen, Jarmo Siltanen:
Online detection of anomalous network flows with soft clustering. NTMS 2015: 1-5 - 2014
- [c12]Mikhail Zolotukhin, Timo Hämäläinen:
Detection of zero-day malware based on the analysis of opcode sequences. CCNC 2014: 386-391 - [c11]Mikhail Zolotukhin, Timo Hämäläinen, Tero Kokkonen, Jarmo Siltanen:
Analysis of HTTP Requests for Anomaly Detection of Web Attacks. DASC 2014: 406-411 - [c10]Mikhail Zolotukhin, Alexander Sayenko, Timo Hämäläinen:
On optimal relay placement for improved performance in non-coverage limited scenarios. MSWiM 2014: 127-135 - 2013
- [c9]Mikhail Zolotukhin, Timo Hämäläinen:
Support vector machine integrated with game-theoretic approach and genetic algorithm for the detection and classification of malware. GLOBECOM Workshops 2013: 211-216 - [c8]Mikhail Zolotukhin, Timo Hämäläinen:
Detection of Anomalous HTTP Requests Based on Advanced N-gram Model and Clustering Techniques. NEW2AN 2013: 371-382 - 2012
- [c7]Mikhail Zolotukhin, Timo Hämäläinen, Antti Juvonen:
Online anomaly detection by using N-gram model and growing hierarchical self-organizing maps. IWCMC 2012: 47-52 - [c6]Aleksandr Puchko, Mikhail Zolotukhin, Vesa P. Hytönen, Thomas Höhne, Thomas Chapman:
Phase Adjustment in HS-SFN for HSDPA. NTMS 2012: 1-5 - [c5]Mikhail Zolotukhin, Timo Hämäläinen, Andrey Garnaev:
A Relay Deployment Mechanism for One Scenario of Cost-Effective Coverage Extension in IEEE 802.16j Networks. NTMS 2012: 1-6 - [c4]Mikhail Zolotukhin, Timo Hämäläinen, Antti Juvonen:
Growing Hierarchical Self-organizing Maps and Statistical Distribution Models for Online Detection of Web Attacks. WEBIST (Selected Papers) 2012: 281-295 - [c3]Mikhail Zolotukhin, Timo Hämäläinen, Antti Juvonen:
Growing Hierarchical Self-organising Maps for Online Anomaly Detection by using Network Logs. WEBIST 2012: 633-642 - 2011
- [c2]Mikhail Zolotukhin, Vesa P. Hytönen, Timo Hämäläinen, Andrey Garnaev:
Optimal Relays Deployment for 802.16j Networks. MONAMI 2011: 31-45 - [c1]Oleksandr Puchko, Mikhail Zolotukhin, Vesa P. Hytönen, Thomas Höhne, Thomas Chapman:
Enhanced LMMSE equalizer for high-speed single frequency network in HSDPA. Swe-CTW 2011: 92-97
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint