Physical activity among children: Objective measurements using Fitbit One® and ActiGraph L Hamari, T Kullberg, J Ruohonen, OJ Heinonen, N Díaz-Rodríguez, ... BMC research notes 10 (1), 1-6, 2017 | 26 | 2017 |
The sigmoidal growth of operating system security vulnerabilities: an empirical revisit J Ruohonen, S Hyrynsalmi, V Leppänen Computers & Security 55, 1-20, 2015 | 22 | 2015 |
An outlook on the institutional evolution of the European Union cyber security apparatus J Ruohonen, S Hyrynsalmi, V Leppänen Government Information Quarterly 33 (4), 746-756, 2016 | 16 | 2016 |
A look at the time delays in CVSS vulnerability scoring J Ruohonen Applied Computing and Informatics 15 (2), 129-135, 2017 | 15 | 2017 |
Top management support in software cost estimation: a study of attitudes and practice in Finland J Rahikkala, V Leppänen, J Ruohonen, J Holvitie International Journal of Managing Projects in Business, 2015 | 13 | 2015 |
The general data protection regulation: requirements, architectures, and constraints K Hjerppe, J Ruohonen, V Leppänen 2019 IEEE 27th International Requirements Engineering Conference (RE), 265-275, 2019 | 10 | 2019 |
A Bug Bounty Perspective on the Disclosure of Web Vulnerabilities J Ruohonen, L Allodi 17th Annual Workshop on the Economics of Information Security, Innsbruck …, 2018 | 10 | 2018 |
Classifying web exploits with topic modeling J Ruohonen 2017 28th International Workshop on Database and Expert Systems Applications …, 2017 | 10 | 2017 |
Evaluating the use of internet search volumes for time series modeling of sales in the video game industry J Ruohonen, S Hyrynsalmi Electronic Markets 27 (4), 351-370, 2017 | 10 | 2017 |
Trading exploits online: A preliminary case study J Ruohonen, S Hyrynsalmi, V Leppănen 2016 IEEE Tenth International Conference on Research Challenges in …, 2016 | 10 | 2016 |
Toward validation of textual information retrieval techniques for software weaknesses J Ruohonen, V Leppänen International Conference on Database and Expert Systems Applications, 265-277, 2018 | 9 | 2018 |
A Case Study on Software Vulnerability Coordination J Ruohonen, S Rauti, S Hyrynsalmi, V Leppänen Information and Software Technology 103, 239-257, 2018 | 8 | 2018 |
Time series trends in software evolution J Ruohonen, S Hyrynsalmi, V Leppänen Journal of Software: Evolution and Process 27 (12), 990-1015, 2015 | 8 | 2015 |
An empirical analysis of vulnerabilities in python packages for web applications J Ruohonen 2018 9th International Workshop on Empirical Software Engineering in …, 2018 | 7 | 2018 |
Invisible Pixels Are Dead, Long Live Invisible Pixels! J Ruohonen, V Leppänen Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 28-32, 2018 | 7 | 2018 |
Mining social networks of open source CVE coordination J Ruohonen, S Hyrynsalmi, S Rauti, V Leppänen Proceedings of the 27th International Workshop on Software Measurement and …, 2017 | 7 | 2017 |
Modeling the Delivery of Security Advisories and CVEs J Ruohonen, S Hyrynsalmi, V Leppänen Computer Science and Information Systems 14 (2), 537-555, 2017 | 7 | 2017 |
Exploring the clustering of software vulnerability disclosure notifications across software vendors J Ruohonen, J Holvitie, S Hyrynsalmi, V Leppänen 2016 IEEE/ACS 13th International Conference of Computer Systems and …, 2016 | 7 | 2016 |
A Demand-Side Viewpoint to Software Vulnerabilities in WordPress Plugins J Ruohonen Proceedings of the Evaluation and Assessment on Software Engineering, 222-228, 2019 | 6 | 2019 |
Healthy until otherwise proven: some proposals for renewing research of software ecosystem health S Hyrynsalmi, J Ruohonen, M Seppänen 2018 IEEE/ACM 1st International Workshop on Software Health (SoHeal), 18-24, 2018 | 6 | 2018 |