Security in agile software development: A practitioner survey K Rindell, J Ruohonen, J Holvitie, S Hyrynsalmi, V Leppänen Information and Software Technology 131, 106488, 2021 | 98 | 2021 |
A look at the time delays in CVSS vulnerability scoring J Ruohonen Applied Computing and Informatics 15 (2), 129-135, 2017 | 91 | 2017 |
Physical activity among children: objective measurements using Fitbit One® and ActiGraph L Hamari, T Kullberg, J Ruohonen, OJ Heinonen, N Díaz-Rodríguez, ... BMC Research Notes 10, 1-6, 2017 | 54 | 2017 |
The general data protection regulation: requirements, architectures, and constraints K Hjerppe, J Ruohonen, V Leppänen 2019 IEEE 27th International Requirements Engineering Conference (RE), 265-275, 2019 | 52 | 2019 |
The GDPR Enforcement Fines at Glance J Ruohonen, K Hjerppe Information Systems 106, 101876, 2022 | 49 | 2022 |
A Bug Bounty Perspective on the Disclosure of Web Vulnerabilities J Ruohonen, L Allodi 17th Annual Workshop on the Economics of Information Security, Innsbruck …, 2018 | 35 | 2018 |
An outlook on the institutional evolution of the European Union cyber security apparatus J Ruohonen, S Hyrynsalmi, V Leppänen Government Information Quarterly 33 (4), 746-756, 2016 | 33 | 2016 |
A Large-Scale Security-Oriented Static Analysis of Python Packages in PyPI J Ruohonen, K Hjerppe, K Rindell 18th Annual International Conference on Privacy, Security and Trust (PST 2021), 2021 | 30 | 2021 |
An empirical analysis of vulnerabilities in Python packages for web applications J Ruohonen 2018 9th International Workshop on Empirical Software Engineering in …, 2018 | 27 | 2018 |
The sigmoidal growth of operating system security vulnerabilities: an empirical revisit J Ruohonen, S Hyrynsalmi, V Leppänen Computers & Security 55, 1-20, 2015 | 25 | 2015 |
The Treachery of Images in the Digital Sovereignty Debate J Ruohonen Minds and Machines 31 (439-456), 2020 | 24 | 2020 |
Toward validation of textual information retrieval techniques for software weaknesses J Ruohonen, V Leppänen Database and Expert Systems Applications: DEXA 2018 International Workshops …, 2018 | 24 | 2018 |
Evaluating the use of internet search volumes for time series modeling of sales in the video game industry J Ruohonen, S Hyrynsalmi Electronic Markets 27 (4), 351-370, 2017 | 24 | 2017 |
A Case Study on Software Vulnerability Coordination J Ruohonen, S Rauti, S Hyrynsalmi, V Leppänen Information and Software Technology 103, 239-257, 2018 | 23 | 2018 |
Top management support in software cost estimation: A study of attitudes and practice in Finland J Rahikkala, V Leppänen, J Ruohonen, J Holvitie International Journal of Managing Projects in Business 8 (3), 513-532, 2015 | 23 | 2015 |
Surveying secure software development practices in Finland K Rindell, J Ruohonen, S Hyrynsalmi Proceedings of the 13th International Conference on Availability …, 2018 | 21 | 2018 |
An Acid Test for Europeanization: Public Cyber Security Procurement in the European Union J Ruohonen European Journal for Security Research 5 (2), 349-377, 2020 | 19 | 2020 |
Updating the Wassenaar debate once again: Surveillance, intrusion software, and ambiguity J Ruohonen, KK Kimppa Journal of Information Technology & Politics 16 (2), 169-186, 2019 | 19 | 2019 |
A demand-side viewpoint to software vulnerabilities in wordpress plugins J Ruohonen Proceedings of the 23rd International Conference on Evaluation and …, 2019 | 18 | 2019 |
Annotation-based static analysis for personal data protection K Hjerppe, J Ruohonen, V Leppänen Privacy and Identity Management. Data for Better Living: AI and Privacy …, 2020 | 17 | 2020 |