Остановите войну!
for scientists:
default search action
Jukka Ruohonen
- > Home > Persons > Jukka Ruohonen
Publications
- 2023
- [j12]Kalle Hjerppe, Jukka Ruohonen, Ville Leppänen:
Extracting LPL privacy policy purposes from annotated web service source code. Softw. Syst. Model. 22(1): 331-349 (2023) - 2021
- [j10]Kalle Rindell, Jukka Ruohonen, Johannes Holvitie, Sami Hyrynsalmi, Ville Leppänen:
Security in agile software development: A practitioner survey. Inf. Softw. Technol. 131: 106488 (2021) - [i30]Jukka Ruohonen, Joonas Salovaara, Ville Leppänen:
Crossing Cross-Domain Paths in the Current Web. CoRR abs/2106.13478 (2021) - 2020
- [j8]Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen:
A mixed methods probe into the direct disclosure of software vulnerabilities. Comput. Hum. Behav. 103: 161-173 (2020) - [c32]Kalle Hjerppe, Jukka Ruohonen, Ville Leppänen:
Extracting Layered Privacy Language Purposes from Web Services. EuroS&P Workshops 2020: 318-325 - [i24]Kalle Hjerppe, Jukka Ruohonen, Ville Leppänen:
Annotation-Based Static Analysis for Personal Data Protection. CoRR abs/2003.09890 (2020) - [i23]Kalle Hjerppe, Jukka Ruohonen, Ville Leppänen:
Extracting Layered Privacy Language Purposes from Web Services. CoRR abs/2004.14897 (2020) - [i22]Jukka Ruohonen, Sampsa Rauti, Sami Hyrynsalmi, Ville Leppänen:
A Case Study on Software Vulnerability Coordination. CoRR abs/2007.12356 (2020) - 2019
- [c27]Kalle Hjerppe, Jukka Ruohonen, Ville Leppänen:
Annotation-Based Static Analysis for Personal Data Protection. Privacy and Identity Management 2019: 343-358 - [c26]Kalle Hjerppe, Jukka Ruohonen, Ville Leppänen:
The General Data Protection Regulation: Requirements, Architectures, and Constraints. RE 2019: 265-275 - [i15]Kalle Hjerppe, Jukka Ruohonen, Ville Leppänen:
The General Data Protection Regulation: Requirements, Architectures, and Constraints. CoRR abs/1907.07498 (2019) - 2018
- [j7]Jukka Ruohonen, Sampsa Rauti, Sami Hyrynsalmi, Ville Leppänen:
A case study on software vulnerability coordination. Inf. Softw. Technol. 103: 239-257 (2018) - [c24]Jukka Ruohonen, Ville Leppänen:
Toward Validation of Textual Information Retrieval Techniques for Software Weaknesses. DEXA Workshops 2018: 265-277 - [c21]Jukka Ruohonen, Joonas Salovaara, Ville Leppänen:
Crossing Cross-Domain Paths in the Current Web. PST 2018: 1-5 - [c20]Jukka Ruohonen, Joonas Salovaara, Ville Leppänen:
On the Integrity of Cross-Origin JavaScripts. SEC 2018: 385-398 - [c19]Jukka Ruohonen, Ville Leppänen:
A Case-Control Study on the Server-Side Bandages Against XSS. SQAMIA 2018 - [c18]Jukka Ruohonen, Ville Leppänen:
Invisible Pixels Are Dead, Long Live Invisible Pixels! WPES@CCS 2018: 28-32 - [i12]Jukka Ruohonen, Ville Leppänen:
Whose Hands Are in the Finnish Cookie Jar? CoRR abs/1801.07759 (2018) - [i10]Jukka Ruohonen, Ville Leppänen:
Investigating the Agility Bias in DNS Graph Mining. CoRR abs/1805.06158 (2018) - [i8]Jukka Ruohonen, Ville Leppänen:
Invisible Pixels Are Dead, Long Live Invisible Pixels! CoRR abs/1808.07293 (2018) - [i7]Jukka Ruohonen, Ville Leppänen:
Toward Validation of Textual Information Retrieval Techniques for Software Weaknesses. CoRR abs/1809.01360 (2018) - [i6]Jukka Ruohonen, Joonas Salovaara, Ville Leppänen:
On the Integrity of Cross-Origin JavaScripts. CoRR abs/1809.05628 (2018) - 2017
- [j6]Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen:
Modeling the delivery of security advisories and CVEs. Comput. Sci. Inf. Syst. 14(2): 537-555 (2017) - [j4]Jesse Kaukola, Jukka Ruohonen, Antti Tuomisto, Sami Hyrynsalmi, Ville Leppänen:
Tightroping between APT and BCI in small enterprises. Inf. Comput. Secur. 25(3): 226-239 (2017) - [c17]Jukka Ruohonen, Ville Leppänen:
Investigating the Agility Bias in DNS Graph Mining. CIT 2017: 253-260 - [c16]Jukka Ruohonen, Ville Leppänen:
How PHP Releases Are Adopted in the Wild? APSEC 2017: 71-80 - [c14]Jukka Ruohonen, Ville Leppänen:
Whose Hands Are in the Finnish Cookie Jar? EISIC 2017: 127-130 - [c12]Jukka Ruohonen, Sami Hyrynsalmi, Sampsa Rauti, Ville Leppänen:
Mining social networks of open source CVE coordination. IWSM-Mensura 2017: 176-188 - [i1]Jukka Ruohonen, Ville Leppänen:
How PHP Releases Are Adopted in the Wild? CoRR abs/1710.05570 (2017) - 2016
- [j3]Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen:
An outlook on the institutional evolution of the European Union cyber security apparatus. Gov. Inf. Q. 33(4): 746-756 (2016) - [c11]Jukka Ruohonen, Johannes Holvitie, Sami Hyrynsalmi, Ville Leppänen:
Exploring the clustering of software vulnerability disclosure notifications across software vendors. AICCSA 2016: 1-8 - [c10]Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen:
Software Vulnerability Life Cycles and the Age of Software Products: An Empirical Assertion with Operating System Products. CAiSE Workshops 2016: 207-218 - [c9]Jukka Ruohonen, Ville Leppänen:
On the Design of a Simple Network Resolver for DNS Mining. CompSysTech 2016: 105-112 - [c8]Jukka Ruohonen, Sanja Scepanovic, Sami Hyrynsalmi, Igor Mishkovski, Tuomas Aura, Ville Leppänen:
Correlating file-based malware graphs against the empirical ground truth of DNS graphs. ECSA Workshops 2016: 30 - [c7]Jukka Ruohonen, Sanja Scepanovic, Sami Hyrynsalmi, Igor Mishkovski, Tuomas Aura, Ville Leppänen:
A Post-Mortem Empirical Investigation of the Popularity and Distribution of Malware Files in the Contemporary Web-Facing Internet. EISIC 2016: 144-147 - [c6]Jukka Ruohonen, Sanja Scepanovic, Sami Hyrynsalmi, Igor Mishkovski, Tuomas Aura, Ville Leppänen:
The Black Mark beside My Name Server: Exploring the Importance of Name Server IP Addresses in Malware DNS Graphs. FiCloud Workshops 2016: 264-269 - [c5]Sampsa Rauti, Samuel Laurén, Joni Uitto, Shohreh Hosseinzadeh, Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen:
A Survey on Internal Interfaces Used by Exploits and Implications on Interface Diversification. NordSec 2016: 152-168 - [c4]Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen:
Trading exploits online: A preliminary case study. RCIS 2016: 1-12 - [c3]Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen:
Exploring the Use of Deprecated PHP Releases in the Wild Internet: Still a LAMP Issue? WIMS 2016: 26:1-26:12 - 2015
- [j2]Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen:
The sigmoidal growth of operating system security vulnerabilities: An empirical revisit. Comput. Secur. 55: 1-20 (2015) - [j1]Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen:
Time series trends in software evolution. J. Softw. Evol. Process. 27(12): 990-1015 (2015) - [c2]Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen:
Exploring the Stability of Software with Time-Series Cross-Sectional Data. SAM@ICSE 2015: 41-47 - [c1]Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen:
Software evolution and time series volatility: an empirical exploration. IWPSE 2015: 56-65
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint