Ai in cybersecurity education-a systematic literature review of studies on cybersecurity moocs S Laato, A Farooq, H Tenhunen, T Pitkamaki, A Hakkala, A Airola 2020 IEEE 20th International Conference on Advanced Learning Technologies …, 2020 | 33 | 2020 |
CoDRA: Context-based dynamically reconfigurable access control system for android NK Thanigaivelan, E Nigussie, A Hakkala, S Virtanen, J Isoaho Journal of Network and Computer Applications 101, 1-17, 2018 | 27 | 2018 |
A systematic methodology for continuous WLAN abundance and security analysis S Lindroos, A Hakkala, S Virtanen Computer Networks 197, 108359, 2021 | 17 | 2021 |
Propagating ai knowledge across university disciplines-the design of a multidisciplinary ai study module S Laato, H Vilppu, J Heimonen, A Hakkala, J Björne, A Farooq, ... 2020 IEEE Frontiers in education conference (FIE), 1-9, 2020 | 17 | 2020 |
How to abuse biometric passport systems OI Heimo, A Hakkala, KK Kimppa Journal of Information, Communication and Ethics in Society 10 (2), 68-81, 2012 | 17 | 2012 |
Cybersecurity education and skills: exploring students’ perceptions, preferences and performance in a blended learning initiative A Farooq, A Hakkala, S Virtanen, J Isoaho 2020 IEEE Global Engineering Education Conference (EDUCON), 1361-1369, 2020 | 12 | 2020 |
Study of methods for endpoint aware inspection in a next generation firewall J Heino, A Hakkala, S Virtanen Cybersecurity 5 (1), 25, 2022 | 10 | 2022 |
On Security and Privacy for Networked Information Society: Observations and Solutions for Security Engineering and Trust Building in Advanced Societal Processes A Hakkala University of Turku; Turku Centre for Computer Science|, 2017 | 10 | 2017 |
The COVID-19 pandemic and remote working did not improve WLAN security S Lindroos, A Hakkala, S Virtanen Procedia Computer Science 201, 158-165, 2022 | 7 | 2022 |
Security, privacy'); DROP TABLE users;-and forced trust in the information age? A Hakkala, OI Heimo, S Hyrynsalmi, KK Kimppa ACM SIGCAS Computers & Society 47 (4), 68-80, 2018 | 7 | 2018 |
Security, Privacy'); DROP TABLE users; -- and Forced Trust in the Information Age? When trusting an information system is not optional and why it matters A Hakkala, OI Heimo, S Hyrynsalmi, KK Kimppa CEPE/Ethicomp 2017 Electronic Collection, 330-342, 2017 | 7 | 2017 |
Energy-aware Adaptive Security Management for Wireless Sensor Networks E Nigussie, A Hakkala, S Virtanen, J Isoaho 15th IEEE International Symposium on A World of Wireless, Mobile and …, 2014 | 7 | 2014 |
A Dynamic Tactical Command System Operating with an Ad Hoc Network J Timonen University of Turku Dep. Information Technology, 2011 | 6 | 2011 |
On usability of hash fingerprinting for endpoint application identification J Heino, A Gupta, A Hakkala, S Virtanen 2022 IEEE International Conference on Cyber Security and Resilience (CSR), 38-43, 2022 | 5 | 2022 |
Automobile automation and lifecycle: how digitalisation and security issues affect the car as a product and service? A Hakkala, OI Heimo Intelligent Systems and Applications: Proceedings of the 2019 Intelligent …, 2020 | 5 | 2020 |
Specification analysis for secure RFID implant systems SR Moosavi, A Hakkala, J Isoaho, S Virtanen, J Isoaho International Journal of Computer Theory and Engineering 6 (2), 177, 2014 | 5 | 2014 |
Enhancing a cybersecurity curriculum development tool with a competence framework to meet industry needs for cybersecurity AM Majanoja, A Hakkala Proceedings of the 24th International Conference on Computer Systems and …, 2023 | 4 | 2023 |
Battle of the bands: a long-term analysis of frequency band and channel distribution development in WLANs S Lindroos, A Hakkala, S Virtanen IEEE Access 10, 61463-61471, 2022 | 4 | 2022 |
Personal data protection in the age of mass surveillance A Hakkala, J Koskinen Journal of Computer Security, 1-25, 2022 | 4 | 2022 |
Accelerating cryptographic protocols: a review of theory and technologies A Hakkala, S Virtanen Proceedings of CTRQ, 2011 | 4 | 2011 |