Seppo Virtanen
Vice Head (Education), Department of Computing
seppo.virtanen@utu.fi +358 29 450 2776 +358 50 352 8086 Office: 456B ORCID identifier: https://orcid.org/0000-0002-9487-3018 |
Cyber Security; Smart Environments; Network Security; e-voting; Network Technology and Protocols; Communication Systems; Embedded Systems
Dr. Seppo Virtanen is an Associate Professor in Cyber Security Engineering and Vice Head of Department of Computing, the University of Turku, Finland. He received his MSc in applied physics (electronics and information technology) in 1998 and his PhD [DSc(Tech)] in Communication Systems in 2004 from the University of Turku. In 2009, he was awarded the title of adjunct professor (dosentti) in Embedded Communication Systems. He completed his certificate in university pedagogy in 2010 and became a holder of the government decree regulated teacher's competence and qualification. He is a Senior Member of the IEEE. He has supervised more than 130 Master’s theses and taught more than 70 instances of 23 different university courses to engineering students as principal instructor. His current research interests are on cyber security in smart environments, secure network and communication technology and security technologies for IoT.
Application-domain specific communication and data security: Ensuring the security, privacy and safety of communication and data when Internet-of-Things is an everyday commodity to the general public; especially in application domains dealing with e-Health, autonomous traffic and smart environments,
Cyber Security technology and assessment: Development of cyber security technologies and assessment methods for future networked systems; detection technologies for new network security solutions and methods for assessing and predicting the security levels of deployed networks; systems with security, privacy and safety considered as elements to be built in,
Cyber security for the society and the individual: Addressing the human element and factor in cyber security to prevent the potential massive personal and societal damage arising from the threats and risks in the wide-spread adoption of future smart environments (smart cities, smart traffic, smart spaces, e-Health, e-voting) and technologies by individuals and organizations; securing the human side of digital transformation, including research on the effectiveness, content and development of cybersecurity education.
Our lab has the main educational responsibility in two Master’s level major programs, of which one has a double degree option within the EIT Digital Master School. We also teach several courses in our undergraduate program and Collaborate with foreign institutions in implementing educational partnership degree programs.
Master's degree majors:
- Cyber Security: The major focus is on Researching cyber security technologies developed for networked systems and applications of the communication-Intensive future. The technological topics covered include security of smart environments, system and network security, security of communication systems and applications, and designing secure systems.
- EIT Digital Master School Cyber Security, Security of Networked Systems: this is a double degree implementation of the UTU Cyber Security major in the EIT Digital Master School. The EIT Digital Master School is a two-year Master’s program jointly run by 20 top European Universities, renowned researchers, and leading businesses. The program leads to a double degree and an EIT labeled Certificate. The Cyber Security major acts as both an entry site and an exit site for the EIT Master School. The students start their cyber security studies in one of the Universities offering the entry year studies and move to another university in another country for the exit (specialization) year. In the field of cyber security, the cyber security major subject at UTU is the only degree program in Finland to participate in the EIT Digital Master School.
- Communication and Cyber Security Engineering: this major is officially taught in Finnish, although in most courses, the teaching language is English. The major is part of the degree program “Degree Program in Information and Communication Technology”. The course-level implementation is more or less equal to the two cyber security majors.
- A method for endpoint aware inspection in a Network Security Solution (2022)
- IEEE Access
(Refereed journal article or data article (A1)) - Battle of the bands: a long-term analysis of frequency band and channel distribution development in WLANs (2022)
- IEEE Access
(Refereed journal article or data article (A1)) - The COVID-19 pandemic and remote working did not improve WLAN security (2022)
- Procedia Computer Science
(Refereed article in conference proceedings (A4)) - A Resource Management Model for Distributed Multi-Task Applications in Fog Computing Networks (2021)
- IEEE Access
(Refereed journal article or data article (A1)) - A systematic methodology for continuous WLAN abundance and security analysis (2021)
- Computer Networks
(Refereed journal article or data article (A1)) - Understanding Dynamics of Initial Trust and its Antecedents in Password Managers Adoption Intention among Young Adults (2021)
- Procedia Computer Science
(Refereed article in conference proceedings (A4)) - Cybersecurity Education and Skills: Exploring Students’ Perceptions, Preferences and Performance in a Blended Learning Initiative (2020)
- IEEE Global Engineering Education Conference
(Refereed article in conference proceedings (A4)) - Conceptual Security System Design for Mobile Platforms Based on Human Nervous System (2019)
- International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
(Refereed article in conference proceedings (A4)) - Refining Engineering MSc Theses with a Focus Enhancing Structure Model (2019)
- Proceedings of the International CDIO Conference
(Refereed article in conference proceedings (A4)) - SAMoC: Self-aware Access Monitoring and Controlling Framework for Android (2019)
- Communications in Computer and Information Science
(Refereed article in conference proceedings (A4)) - CoDRA: Context-based dynamically reconfigurable access control system for android (2018)
- Journal of Network and Computer Applications
(Refereed journal article or data article (A1)) - Hybrid Internal Anomaly Detection System for IoT: Reactive Nodes with Cross-Layer Operation (2018)
- Security and Communication Networks
(Refereed journal article or data article (A1)) - Ihmislähtöisyyden integrointi tietotekniikan diplomi-insinöörikoulutukseen (2018) Valmiina työelämään! Visioita ja näkökulmia työhyvinvoinnista ja työelämävalmiuksista sekä menetelmiä niiden kehittämiseen Johanna Isoaho, Jouni Isoaho, Seppo Virtanen, Tapio Salakoski
(Article in a professional research book (D2)) - Kyberturvallisuusosaaminen työelämässä (2018) Valmiina työelämään! Valmiina työelämään! Visioita ja näkökulmia työhyvinvointiin ja työelämävalmiuksiin ja menetelmiä niiden kehittämiseen Antti Hakkala, Jouni Isoaho, Seppo Virtanen
(Article in a professional research book (D2)) - Low-latency Approach for Secure ECG Feature Based Cryptographic Key Generation (2018)
- IEEE Access
(Refereed journal article or data article (A1)) - Performance Analysis of End-to-End Security Schemes in Healthcare IoT (2018)
- Procedia Computer Science
(Refereed article in conference proceedings (A4)) - Towards Comprehensive Information Security Awareness: A Systematic Classification of Concerns among University Students (2018)
- Electronic Workshops in Computing
(Refereed article in conference proceedings (A4)) - Towards human bio-inspired defence mechanism for cyber security (2018) Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018 Thanigaivelan N., Nigussie E., Virtanen S., Isoaho J.
(Refereed article in conference proceedings (A4)) - Cryptographic key generation using ECG signal (2017) Moosavi Sanaz Rahimi, Nigussie Ethiopia, Virtanen Seppo, Isoaho Jouni
(Refereed article in conference proceedings (A4)) - Development of Collaborative Learning and Entrepreneurial Climate - Ten Years of ICT Showroom (2017)
- Proceedings of the International CDIO Conference
(Refereed article in conference proceedings (A4))