Jukka Ruohonen
Jukka Ruohonen
Verified email at utu.fi
Title
Cited by
Cited by
Year
Physical activity among children: Objective measurements using Fitbit One® and ActiGraph
L Hamari, T Kullberg, J Ruohonen, OJ Heinonen, N Díaz-Rodríguez, ...
BMC research notes 10 (1), 1-6, 2017
262017
The sigmoidal growth of operating system security vulnerabilities: an empirical revisit
J Ruohonen, S Hyrynsalmi, V Leppänen
Computers & Security 55, 1-20, 2015
222015
An outlook on the institutional evolution of the European Union cyber security apparatus
J Ruohonen, S Hyrynsalmi, V Leppänen
Government Information Quarterly 33 (4), 746-756, 2016
162016
A look at the time delays in CVSS vulnerability scoring
J Ruohonen
Applied Computing and Informatics 15 (2), 129-135, 2017
152017
Top management support in software cost estimation: a study of attitudes and practice in Finland
J Rahikkala, V Leppänen, J Ruohonen, J Holvitie
International Journal of Managing Projects in Business, 2015
132015
The general data protection regulation: requirements, architectures, and constraints
K Hjerppe, J Ruohonen, V Leppänen
2019 IEEE 27th International Requirements Engineering Conference (RE), 265-275, 2019
102019
A Bug Bounty Perspective on the Disclosure of Web Vulnerabilities
J Ruohonen, L Allodi
17th Annual Workshop on the Economics of Information Security, Innsbruck …, 2018
102018
Classifying web exploits with topic modeling
J Ruohonen
2017 28th International Workshop on Database and Expert Systems Applications …, 2017
102017
Evaluating the use of internet search volumes for time series modeling of sales in the video game industry
J Ruohonen, S Hyrynsalmi
Electronic Markets 27 (4), 351-370, 2017
102017
Trading exploits online: A preliminary case study
J Ruohonen, S Hyrynsalmi, V Leppănen
2016 IEEE Tenth International Conference on Research Challenges in …, 2016
102016
Toward validation of textual information retrieval techniques for software weaknesses
J Ruohonen, V Leppänen
International Conference on Database and Expert Systems Applications, 265-277, 2018
92018
A Case Study on Software Vulnerability Coordination
J Ruohonen, S Rauti, S Hyrynsalmi, V Leppänen
Information and Software Technology 103, 239-257, 2018
82018
Time series trends in software evolution
J Ruohonen, S Hyrynsalmi, V Leppänen
Journal of Software: Evolution and Process 27 (12), 990-1015, 2015
82015
An empirical analysis of vulnerabilities in python packages for web applications
J Ruohonen
2018 9th International Workshop on Empirical Software Engineering in …, 2018
72018
Invisible Pixels Are Dead, Long Live Invisible Pixels!
J Ruohonen, V Leppänen
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 28-32, 2018
72018
Mining social networks of open source CVE coordination
J Ruohonen, S Hyrynsalmi, S Rauti, V Leppänen
Proceedings of the 27th International Workshop on Software Measurement and …, 2017
72017
Modeling the Delivery of Security Advisories and CVEs
J Ruohonen, S Hyrynsalmi, V Leppänen
Computer Science and Information Systems 14 (2), 537-555, 2017
72017
Exploring the clustering of software vulnerability disclosure notifications across software vendors
J Ruohonen, J Holvitie, S Hyrynsalmi, V Leppänen
2016 IEEE/ACS 13th International Conference of Computer Systems and …, 2016
72016
A Demand-Side Viewpoint to Software Vulnerabilities in WordPress Plugins
J Ruohonen
Proceedings of the Evaluation and Assessment on Software Engineering, 222-228, 2019
62019
Healthy until otherwise proven: some proposals for renewing research of software ecosystem health
S Hyrynsalmi, J Ruohonen, M Seppänen
2018 IEEE/ACM 1st International Workshop on Software Health (SoHeal), 18-24, 2018
62018
The system can't perform the operation now. Try again later.
Articles 1–20