Suivre
Jukka Ruohonen
Jukka Ruohonen
Adresse e-mail validée de mmmi.sdu.dk - Page d'accueil
Titre
Citée par
Citée par
Année
Security in agile software development: A practitioner survey
K Rindell, J Ruohonen, J Holvitie, S Hyrynsalmi, V Leppänen
Information and Software Technology 131, 106488, 2021
1092021
A look at the time delays in CVSS vulnerability scoring
J Ruohonen
Applied Computing and Informatics 15 (2), 129-135, 2017
942017
The general data protection regulation: requirements, architectures, and constraints
K Hjerppe, J Ruohonen, V Leppänen
2019 IEEE 27th International Requirements Engineering Conference (RE), 265-275, 2019
652019
The GDPR Enforcement Fines at Glance
J Ruohonen, K Hjerppe
Information Systems 106, 101876, 2022
612022
Physical activity among children: objective measurements using Fitbit One® and ActiGraph
L Hamari, T Kullberg, J Ruohonen, OJ Heinonen, N Díaz-Rodríguez, ...
BMC Research Notes 10, 1-6, 2017
592017
A Large-Scale Security-Oriented Static Analysis of Python Packages in PyPI
J Ruohonen, K Hjerppe, K Rindell
18th Annual International Conference on Privacy, Security and Trust (PST 2021), 2021
372021
An outlook on the institutional evolution of the European Union cyber security apparatus
J Ruohonen, S Hyrynsalmi, V Leppänen
Government Information Quarterly 33 (4), 746-756, 2016
372016
A Bug Bounty Perspective on the Disclosure of Web Vulnerabilities
J Ruohonen, L Allodi
17th Annual Workshop on the Economics of Information Security, Innsbruck …, 2018
362018
The Treachery of Images in the Digital Sovereignty Debate
J Ruohonen
Minds and Machines 31 (439-456), 2020
322020
An empirical analysis of vulnerabilities in Python packages for web applications
J Ruohonen
2018 9th International Workshop on Empirical Software Engineering in …, 2018
292018
A Case Study on Software Vulnerability Coordination
J Ruohonen, S Rauti, S Hyrynsalmi, V Leppänen
Information and Software Technology 103, 239-257, 2018
282018
The sigmoidal growth of operating system security vulnerabilities: an empirical revisit
J Ruohonen, S Hyrynsalmi, V Leppänen
Computers & Security 55, 1-20, 2015
282015
Evaluating the use of internet search volumes for time series modeling of sales in the video game industry
J Ruohonen, S Hyrynsalmi
Electronic Markets 27 (4), 351-370, 2017
252017
Updating the Wassenaar debate once again: Surveillance, intrusion software, and ambiguity
J Ruohonen, KK Kimppa
Journal of Information Technology & Politics 16 (2), 169-186, 2019
242019
Toward validation of textual information retrieval techniques for software weaknesses
J Ruohonen, V Leppänen
Database and Expert Systems Applications: DEXA 2018 International Workshops …, 2018
242018
Top management support in software cost estimation: A study of attitudes and practice in Finland
J Rahikkala, V Leppänen, J Ruohonen, J Holvitie
International Journal of Managing Projects in Business 8 (3), 513-532, 2015
242015
Surveying secure software development practices in Finland
K Rindell, J Ruohonen, S Hyrynsalmi
Proceedings of the 13th International Conference on Availability …, 2018
222018
An Acid Test for Europeanization: Public Cyber Security Procurement in the European Union
J Ruohonen
European Journal for Security Research 5 (2), 349-377, 2020
212020
Classifying web exploits with topic modeling
J Ruohonen
2017 28th International Workshop on Database and Expert Systems Applications …, 2017
202017
Annotation-based static analysis for personal data protection
K Hjerppe, J Ruohonen, V Leppänen
Privacy and Identity Management. Data for Better Living: AI and Privacy …, 2020
192020
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20