Publications (44)
Publication type
JYU unit
A2 Review article, Literature review, Systematic review
Artificial compound eye: a survey of the state-of-the-art (2017)
Artificial Intelligence Review, 48 (4), 573-603, http://doi.org/10.1007/s10462-016-9513-7
Wu, Sidong; Jiang, Tao; Zhang, Gexiang; Schoenemann, Brigitte; Neri, Ferrante; Zhu, Ming; Bu, Chunguang; Han, Jianda; Kuhnert, Klaus-Dieter
A2 Review article, Literature review, Systematic review
Archives of Computational Methods in Engineering, 24 (4), 703-750, http://doi.org/10.1007/s11831-016-9187-y
Greiner, David; Periaux, Jacques; Emperador, Jose M.; Galván, Blas; Winter, Gabriel
A2 Review article, Literature review, Systematic review
Machine-to-machine communication and research challenges : A survey (2017)
Wireless Personal Communications, 97 (3), 3569-3585, http://doi.org/10.1007/s11277-017-4686-1
Zhao, Ming; Kumar, Arun; Ristaniemi, Tapani; Chong, Peter Han Joo
A2 Review article, Literature review, Systematic review
Cognitive Mimetics for Designing Intelligent Technologies (2018)
Advances in Human-Computer Interaction, 2018 (0), 9215863, http://doi.org/10.1155/2018/9215863; OA
Kujala, Tuomo; Saariluoma, Pertti
A2 Review article, Literature review, Systematic review
Omission of Quality Software Development Practices : A Systematic Literature Review (2018)
ACM Computing Surveys, 51 (2), 38, http://doi.org/10.1145/3177746; OA
Ghanbari, Hadi; Vartiainen, Tero; Siponen, Mikko
A2 Review article, Literature review, Systematic review
Toward a Unified Model of Information Security Policy Compliance (2018)
MIS Quarterly, 42 (1), 285-311, http://doi.org/10.25300/MISQ/2018/13853; OA
Moody, Gregory D.; Siponen, Mikko; Pahnila, Seppo
A2 Review article, Literature review, Systematic review
Using stage theorizing to make anti-phishing recommendations more effective (2018)
Information and Computer Security, 26 (4), 401-419, http://doi.org/10.1108/ics-06-2017-0040; OA
Tambe Ebot, Alain Claude
A2 Review article, Literature review, Systematic review
A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security (2019)
IEEE Communications Surveys and Tutorials, 21 (3), 2734-2771, http://doi.org/10.1109/COMST.2018.2865607; OA
Jameel, Furqan; Wyne, Shurjeel; Kaddoum, Georges; Duong, Trung Q.
A2 Review article, Literature review, Systematic review
Soft Computing, 23 (9), 3137-3166, http://doi.org/10.1007/s00500-017-2965-0; OA
Chugh, Tinkle; Sindhya, Karthik; Hakanen, Jussi; Miettinen, Kaisa
A2 Review article, Literature review, Systematic review
Data-Driven Evolutionary Optimization : An Overview and Case Studies (2019)
IEEE Transactions on Evolutionary Computation, 23 (3), 442-458, http://doi.org/10.1109/TEVC.2018.2869001; OA
Jin, Yaochu; Wang, Handing; Chugh, Tinkle; Guo, Dan; Miettinen, Kaisa