Hypervisors vs. lightweight virtualization: a performance comparison R Morabito, J Kjällman, M Komu 2015 IEEE International Conference on cloud engineering, 386-393, 2015 | 586 | 2015 |
Capillary networks-bridging the cellular and IoT worlds O Novo, N Beijar, M Ocak, J Kjällman, M Komu, T Kauppinen 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 571-578, 2015 | 106 | 2015 |
Host Identity Protocol (HIP): Identifier/locator split for host mobility and multihoming A Gurtov, M Komu, R Moskowitz Internet Protocol Journal 12 (1), 27-32, 2009 | 59 | 2009 |
Secure networking for virtual machines in the cloud M Komu, M Sethi, R Mallavarapu, H Oirola, R Khan, S Tarkoma 2012 IEEE international conference on cluster computing workshops, 88-96, 2012 | 34 | 2012 |
Using the Host Identity Protocol with legacy applications T Henderson, P Nikander, M Komu RFC 5338 (Experimental), Sep, 2008 | 32 | 2008 |
An SDN-based approach to enhance the end-to-end security: SSL/TLS case study A Ranjbar, M Komu, P Salmela, T Aura NOMS 2016-2016 IEEE/IFIP network operations and management symposium, 281-288, 2016 | 31 | 2016 |
Multi-cloud connectivity for kubernetes in 5g networks L Osmani, T Kauppinen, M Komu, S Tarkoma IEEE Communications Magazine 59 (10), 42-47, 2021 | 29 | 2021 |
Cure for spam over internet telephony J Lindqvist, M Komu 2007 4th IEEE Consumer Communications and Networking Conference, 896-900, 2007 | 29 | 2007 |
Basic Socket Interface Extensions for the Host Identity Protocol (HIP) M Komu, T Henderson | 26 | 2011 |
Basic Host Identity Protocol (HIP) Extensions for Traversal of Network Address Translators M Komu, J Melen, H Tschofenig, T Henderson | 26* | 2010 |
Energy consumption analysis of edge orchestrated virtualized wireless multimedia sensor networks T Mekonnen, M Komu, R Morabito, T Kauppinen, E Harjula, T Koskela, ... IEEE Access 6, 5090-5100, 2017 | 25 | 2017 |
Apparatus and method for managing client devices ON Diaz, N Beijar, D D'ambrosio, J Jiménez, K Miika, O Mert, P Salmela US Patent 10,623,504, 2020 | 23 | 2020 |
Socket application program interface (API) for multihoming shim M Komu, M Bagnulo, K Slavov, S Sugimoto draft-ietf-shim6-multihome-shim-api-03 (work in progress), 930-0804, 2007 | 22* | 2007 |
Applying a cryptographic namespace to applications M Komu, S Tarkoma, J Kangasharju, A Gurtov Proceedings of the 1st ACM Workshop on Dynamic Interconnection of Networks …, 2005 | 22 | 2005 |
A survey of identifier–locator split addressing architectures M Komu, M Sethi, N Beijar Computer Science Review 17, 25-42, 2015 | 21 | 2015 |
Synaptic: Secure and persistent connectivity for containers A Ranjbar, M Komu, P Salmela, T Aura 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017 | 18 | 2017 |
Methods and devices for access control of data flows in software defined networking system K Miika, T Kauppinen, A Ranjbar, P Salmela US Patent 10,313,397, 2019 | 16 | 2019 |
Application programming interfaces for the host identity protocol M Komu | 16 | 2004 |
Adoption barriers of network layer protocols: The case of host identity protocol T Levä, M Komu, A Keränen, S Luukkainen Computer networks 57 (10), 2218-2232, 2013 | 14 | 2013 |
Secure and efficient IPv4/IPv6 handovers using host-based identifier-locator split S Varjonen, M Komu, A Gurtov Journal of Communications Software and Systems 6 (1), 1-9, 2010 | 14 | 2010 |