We study the future internet with focus on three viewpoints: information security, interactive applications and embedded/distributed implementations. Communication systems are viewed as whole entities and the three viewpoints are all addressed in our research as we take on the challenges met in future networked multimedia and communication applications found in embedded systems. The cloud computing paradigm is bringing forth completely new challenges to the information security field both in terms of hand-held embedded communication systems and the distributed processing cloud. Currently our special interests are in self-aware approach for future communication and interdisciplinary applications including information security and dependability aspects.
Information security research in Communication Systems concentrates on researching information security technologies for networked systems and applications of the communication-intensive future from the engineering and human points of view. The strategic goal in our research is to apply research and technological development to building the secure information society. We consider the basic elements for human well-being as the most fundamental drivers for pursuing this strategic goal, in which the technology driven and human driven development directions meet. This is pursued with an interdisciplinary approach, where new innovations create active interaction between traditional scientific areas.
Further details on the TUCS web pages: Communication Systems (ComSys)
- NOMeS: Near-Optimal Metaheuristic Scheduling for MPSoCs
Amin Majd, Masoud Daneshtalab, Juha Plosila, Nima Khalilzad, Golnaz Sahebi, Elena Troubitsyna
- Parallel Imperialist Competitive Algorithms
Amin Majd, Golnaz Sahebi, Masoud Daneshtalab, Juha Plosila, Shahriar Lotfi, Hannu Tenhunen
- CoDRA: Context-based dynamically reconfigurable access control system for android
Kumar Thanigaivelan N., Nigussie E., Hakkala A., Virtanen S., Isoaho J.
- A Reliable Weighted Feature Selection for Auto Medical Diagnosis (2017)
Golnaz Sahebi, Amin Majd, Masoumeh Ebrahimi, Juha Plosila, Hannu Tenhunen
- Security, Privacy'); DROP TABLE users; -- and Forced Trust in the Information Age? (2017)
Antti Hakkala, Olli I. Heimo, Sami Hyrynsalmi, Kai K. Kimppa
- Development of Collaborative Learning and Entrepreneurial Climate - Ten Years of ICT Showroom (2017)
Janne Roslöf, Jerker Björkqvist, Seppo Virtanen
- Low-latency Approach for Secure ECG Feature Based Cryptographic Key Generation (2017)
Sanaz Rahimi Moosavi, Ethiopia Nigussie, Marco Levorato, Seppo Virtanen, Jouni Isoaho
- Towards Self-Aware Approach for Mobile Devices Security (2017)
Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho
- Self-aware access control system for android (2017)
Thanigaivelan N., Nigussie E., Virtanen S., Isoaho J.
- Cryptographic key generation using ECG signal (2017)
Moosavi Sanaz Rahimi, Nigussie Ethiopia, Virtanen Seppo, Isoaho Jouni