Juha Nurmi

Orcid: 0000-0003-3071-9027

According to our database1, Juha Nurmi authored at least 8 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Investigating child sexual abuse material availability, searches, and users on the anonymous Tor network for a public health intervention strategy.
CoRR, 2024

2023
SoK: A Systematic Review of TEE Usage for Developing Trusted Applications.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

Malware Finances and Operations: a Data-Driven Study of the Value Chain for Infections and Compromised Access.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2018
PESTEL Analysis of Hacktivism Campaign Motivations.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

2017
Tor De-anonymisation Techniques.
Proceedings of the Network and System Security - 11th International Conference, 2017

2016
Observing Hidden Service Directory Spying with a Private Hidden Service Honeynet.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

2011
An Implementation of a Semantic, Web-Based Virtual Machine Laboratory Prototyping Environment.
Proceedings of the Semantic Web - ISWC 2011, 2011

2007
Grain Size Measurement of Crystalline Products Using Maximum Difference Method.
Proceedings of the Image Analysis, 15th Scandinavian Conference, 2007


  Loading...