![]() |
| 2006 | ||
|---|---|---|
| 4 | Jarmo Mölsä: Cross-Layer Designs for Mitigating Range Attacks in Ad Hoc Networks. Parallel and Distributed Computing and Networks 2006: 64-69 | |
| 2005 | ||
| 3 | EE | Jarmo Mölsä: Mitigating denial of service attacks: A tutorial. Journal of Computer Security 13(6): 807-837 (2005) |
| 2004 | ||
| 2 | Jarmo Mölsä: Effectiveness of rate-limiting in mitigating flooding DOS attacks. Communications, Internet, and Information Technology 2004: 155-160 | |
| 2000 | ||
| 1 | EE | Arto Juhola, Kimmo Ahola, Jarmo Mölsä, Sami Lehtonen: Mobile Active Overlay. IWAN 2000: 416-422 |
| 1 | Kimmo Ahola | [1] |
| 2 | Arto Juhola | [1] |
| 3 | Sami Lehtonen | [1] |