Seuraa
Jukka Ruohonen
Jukka Ruohonen
Vahvistettu sähköpostiosoite verkkotunnuksessa utu.fi
Nimike
Viittaukset
Viittaukset
Vuosi
A look at the time delays in CVSS vulnerability scoring
J Ruohonen
Applied Computing and Informatics 15 (2), 129-135, 2017
832017
Security in agile software development: A practitioner survey
K Rindell, J Ruohonen, J Holvitie, S Hyrynsalmi, V Leppänen
Information and Software Technology 131, 106488, 2021
672021
Physical activity among children: objective measurements using Fitbit One® and ActiGraph
L Hamari, T Kullberg, J Ruohonen, OJ Heinonen, N Díaz-Rodríguez, ...
BMC Research Notes 10, 1-6, 2017
512017
The general data protection regulation: Requirements, architectures, and constraints
K Hjerppe, J Ruohonen, V Leppänen
2019 IEEE 27th International Requirements Engineering Conference (RE), 265-275, 2019
422019
The GDPR Enforcement Fines at Glance
J Ruohonen, K Hjerppe
Information Systems 106, 101876, 2022
392022
A Bug Bounty Perspective on the Disclosure of Web Vulnerabilities
J Ruohonen, L Allodi
17th Annual Workshop on the Economics of Information Security, Innsbruck …, 2018
312018
An outlook on the institutional evolution of the European Union cyber security apparatus
J Ruohonen, S Hyrynsalmi, V Leppänen
Government Information Quarterly 33 (4), 746-756, 2016
302016
An empirical analysis of vulnerabilities in Python packages for web applications
J Ruohonen
2018 9th International Workshop on Empirical Software Engineering in …, 2018
272018
The sigmoidal growth of operating system security vulnerabilities: an empirical revisit
J Ruohonen, S Hyrynsalmi, V Leppänen
Computers & Security 55, 1-20, 2015
252015
A Large-Scale Security-Oriented Static Analysis of Python Packages in PyPI
J Ruohonen, K Hjerppe, K Rindell
18th Annual International Conference on Privacy, Security and Trust (PST 2021), 2021
232021
Evaluating the use of internet search volumes for time series modeling of sales in the video game industry
J Ruohonen, S Hyrynsalmi
Electronic Markets 27 (4), 351-370, 2017
232017
The Treachery of Images in the Digital Sovereignty Debate
J Ruohonen
Minds and Machines 31 (439-456), 2020
212020
Toward validation of textual information retrieval techniques for software weaknesses
J Ruohonen, V Leppänen
Database and Expert Systems Applications: DEXA 2018 International Workshops …, 2018
212018
Top management support in software cost estimation: A study of attitudes and practice in Finland
J Rahikkala, V Leppänen, J Ruohonen, J Holvitie
International Journal of Managing Projects in Business 8 (3), 513-532, 2015
212015
Surveying secure software development practices in Finland
K Rindell, J Ruohonen, S Hyrynsalmi
Proceedings of the 13th International Conference on Availability …, 2018
182018
A Case Study on Software Vulnerability Coordination
J Ruohonen, S Rauti, S Hyrynsalmi, V Leppänen
Information and Software Technology 103, 239-257, 2018
182018
A demand-side viewpoint to software vulnerabilities in wordpress plugins
J Ruohonen
Proceedings of the 23rd International Conference on Evaluation and …, 2019
172019
Updating the Wassenaar debate once again: Surveillance, intrusion software, and ambiguity
J Ruohonen, KK Kimppa
Journal of Information Technology & Politics 16 (2), 169-186, 2019
162019
Classifying web exploits with topic modeling
J Ruohonen
2017 28th International Workshop on Database and Expert Systems Applications …, 2017
162017
An Acid Test for Europeanization: Public Cyber Security Procurement in the European Union
J Ruohonen
European Journal for Security Research 5 (2), 349-377, 2020
152020
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20