scispace - formally typeset
T

Timo Hämäläinen

Researcher at University of Jyväskylä

Publications -  598
Citations -  8390

Timo Hämäläinen is an academic researcher from University of Jyväskylä. The author has contributed to research in topics: Quality of service & Encoder. The author has an hindex of 38, co-authored 560 publications receiving 7648 citations. Previous affiliations of Timo Hämäläinen include Dalian Medical University & Nokia.

Papers
More filters
Proceedings ArticleDOI

Evaluation of ensemble machine learning methods in mobile threat detection

TL;DR: A network based model which uses ensemble Machine Learning methods in order to identify the mobile threats, by analyzing the network flows of the malware communication, was found efficient at detecting known and unknown threats with the accuracy of 98.2%.
Proceedings ArticleDOI

Windows NT software design and implementation for a wireless LAN base station

TL;DR: The architecture of a base station designed for a new Wireless Local Area Network (WLAN) is introduced, with the main design objective to develop a simple and low-cost system while maintaining suitability for a large variety of applications.
Proceedings ArticleDOI

Applying IP-XACT in product data management

TL;DR: This work extends the use of IP-XACT standard from HW integration at IP-level to board and chip level designs, describes SW as IP- XACT metadata objects, and adds reusability status to objects for PDM.
Proceedings Article

Modeling Embedded Software Platforms with a UML Profile.

TL;DR: Additives disclosed are multiply adducted alkenyl or alkyl succinimides which contain carbamate functionalities which are useful as dispersants in lubricating oils, gasolines, marine crankcase oils and hydraulic oils.
Proceedings ArticleDOI

On Artificial Intelligent Malware Tolerant Networking for IoT

TL;DR: This paper proposes a defense system for IoT networks based on software-defined networking and network function virtualization that includes a reinforcement machine learning agent that evaluates risks of potential attack and takes the most optimal action in order to mitigate it.