default search action
Jukka Ruohonen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Jukka Ruohonen:
Mysterious and manipulative black boxes: A qualitative analysis of perceptions on recommender systems. First Monday 29(6) (2024) - [c36]Jukka Ruohonen, Kalle Hjerppe, Maximilian von Zastrow:
An Exploratory Case Study on Data Breach Journalism. ARES 2024: 140:1-140:9 - [c35]Jukka Ruohonen:
The Incoherency Risk in the EU's New Cyber Security Policies. I3E 2024: 284-295 - [i48]Jukka Ruohonen, Kalle Hjerppe, Maximilian von Zastrow:
An Exploratory Case Study on Data Breach Journalism. CoRR abs/2405.01446 (2024) - [i47]Jukka Ruohonen:
The Incoherency Risk in the EU's New Cyber Security Policies. CoRR abs/2405.12043 (2024) - [i46]Jukka Ruohonen, Kalle Hjerppe, Katleena Kortesuo:
Crisis Communication in the Face of Data Breaches. CoRR abs/2406.01744 (2024) - [i45]Jukka Ruohonen, Mubashrah Saddiqa:
What Do We Know About the Psychology of Insider Threats? CoRR abs/2407.05943 (2024) - [i44]Jukka Ruohonen, Mubashrah Saddiqa, Krzysztof Sierszecki:
A Static Analysis of Popular C Packages in Linux. CoRR abs/2409.18530 (2024) - [i43]Jukka Ruohonen, Kalle Hjerppe:
The Potential of Citizen Platforms for Requirements Engineering of Large Socio-Technical Software Systems. CoRR abs/2410.03195 (2024) - [i42]Jukka Ruohonen:
An Empirical Study of Vulnerability Handling Times in CPython. CoRR abs/2411.00447 (2024) - [i41]Jukka Ruohonen, Adam Alami:
Fast Fixes and Faulty Drivers: An Empirical Analysis of Regression Bug Fixing Times in the Linux Kernel. CoRR abs/2411.02091 (2024) - 2023
- [j13]Jukka Ruohonen, Sini Mickelsson:
Reflections on the Data Governance Act. Digit. Soc. 2(1) (2023) - [j12]Kalle Hjerppe, Jukka Ruohonen, Ville Leppänen:
Extracting LPL privacy policy purposes from annotated web service source code. Softw. Syst. Model. 22(1): 331-349 (2023) - [i40]Jukka Ruohonen:
Mysterious and Manipulative Black Boxes: A Qualitative Analysis of Perceptions on Recommender Systems. CoRR abs/2302.09933 (2023) - [i39]Jukka Ruohonen:
A Text Mining Analysis of Data Protection Politics: The Case of Plenary Sessions of the European Parliament. CoRR abs/2302.09939 (2023) - [i38]Jukka Ruohonen:
Recent Trends in Cross-Border Data Access by Law Enforcement Agencies. CoRR abs/2302.09942 (2023) - [i37]Jukka Ruohonen, Sini Mickelsson:
Reflections on the Data Governance Act. CoRR abs/2302.09944 (2023) - [i36]Jukka Ruohonen:
A Note on the Proposed Law for Improving the Transparency of Political Advertising in the European Union. CoRR abs/2303.02863 (2023) - 2022
- [j11]Jukka Ruohonen, Kalle Hjerppe:
The GDPR enforcement fines at glance. Inf. Syst. 106: 101876 (2022) - 2021
- [j10]Kalle Rindell, Jukka Ruohonen, Johannes Holvitie, Sami Hyrynsalmi, Ville Leppänen:
Security in agile software development: A practitioner survey. Inf. Softw. Technol. 131: 106488 (2021) - [j9]Jukka Ruohonen:
The Treachery of Images in the Digital Sovereignty Debate. Minds Mach. 31(3): 439-456 (2021) - [c34]Jukka Ruohonen, Kalle Hjerppe, Kalle Rindell:
A Large-Scale Security-Oriented Static Analysis of Python Packages in PyPI. PST 2021: 1-10 - [i35]Jukka Ruohonen:
A Review of Product Safety Regulations in the European Union. CoRR abs/2102.03679 (2021) - [i34]Jukka Ruohonen:
Assessing the Readability of Policy Documents on the Digital Single Market of the European Union. CoRR abs/2102.11625 (2021) - [i33]Jukka Ruohonen:
A Few Observations About State-Centric Online Propaganda. CoRR abs/2104.04389 (2021) - [i32]Jukka Ruohonen:
Reassessing Measures for Press Freedom. CoRR abs/2106.10427 (2021) - [i31]Jukka Ruohonen:
A Comparative Study of Online Disinformation and Offline Protests. CoRR abs/2106.11000 (2021) - [i30]Jukka Ruohonen, Joonas Salovaara, Ville Leppänen:
Crossing Cross-Domain Paths in the Current Web. CoRR abs/2106.13478 (2021) - [i29]Jukka Ruohonen, Anne-Marie Tuikka:
Digital Divides and Online Media. CoRR abs/2106.13932 (2021) - [i28]Jukka Ruohonen, Kalle Hjerppe, Kalle Rindell:
A Large-Scale Security-Oriented Static Analysis of Python Packages in PyPI. CoRR abs/2107.12699 (2021) - 2020
- [j8]Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen:
A mixed methods probe into the direct disclosure of software vulnerabilities. Comput. Hum. Behav. 103: 161-173 (2020) - [c33]Jukka Ruohonen, Kalle Hjerppe:
Predicting the Amount of GDPR Fines. COUrT@CAiSE 2020: 3-14 - [c32]Kalle Hjerppe, Jukka Ruohonen, Ville Leppänen:
Extracting Layered Privacy Language Purposes from Web Services. EuroS&P Workshops 2020: 318-325 - [c31]Jukka Ruohonen:
A Dip into a Deep Well: Online Political Advertisements, Valence, and European Electoral Campaigning. MISDOOM 2020: 37-51 - [c30]Jukka Ruohonen:
Measuring Basic Load-Balancing and Fail-Over Setups for Email Delivery via DNS MX Records. Networking 2020: 815-820 - [i27]Jukka Ruohonen:
A Dip Into a Deep Well: Online Political Advertisements, Valence, and European Electoral Campaigning. CoRR abs/2001.10622 (2020) - [i26]Jukka Ruohonen:
Measuring Basic Load-Balancing and Fail-Over Setups for Email Delivery via DNS MX Records. CoRR abs/2002.10731 (2020) - [i25]Jukka Ruohonen, Kalle Hjerppe:
Predicting the Amount of GDPR Fines. CoRR abs/2003.05151 (2020) - [i24]Kalle Hjerppe, Jukka Ruohonen, Ville Leppänen:
Annotation-Based Static Analysis for Personal Data Protection. CoRR abs/2003.09890 (2020) - [i23]Kalle Hjerppe, Jukka Ruohonen, Ville Leppänen:
Extracting Layered Privacy Language Purposes from Web Services. CoRR abs/2004.14897 (2020) - [i22]Jukka Ruohonen, Sampsa Rauti, Sami Hyrynsalmi, Ville Leppänen:
A Case Study on Software Vulnerability Coordination. CoRR abs/2007.12356 (2020) - [i21]Jukka Ruohonen:
A Critical Correspondence on Humpty Dumpty's Funding for European Journalism. CoRR abs/2011.00751 (2020) - [i20]Jukka Ruohonen, Kalle Hjerppe:
The GDPR Enforcement Fines at Glance. CoRR abs/2011.00946 (2020) - [i19]Jukka Ruohonen:
Do Cyber Capabilities and Cyber Power Incentivize International Cooperation? CoRR abs/2011.07212 (2020) - [i18]Jukka Ruohonen:
The Treachery of Images in the Digital Sovereignty Debate. CoRR abs/2012.02724 (2020)
2010 – 2019
- 2019
- [c29]Jukka Ruohonen:
A Demand-Side Viewpoint to Software Vulnerabilities in WordPress Plugins. EASE 2019: 222-228 - [c28]Jukka Ruohonen, Kalle Rindell:
Empirical Notes on the Interaction Between Continuous Kernel Fuzzing and Development. ISSRE Workshops 2019: 276-281 - [c27]Kalle Hjerppe, Jukka Ruohonen, Ville Leppänen:
Annotation-Based Static Analysis for Personal Data Protection. Privacy and Identity Management 2019: 343-358 - [c26]Kalle Hjerppe, Jukka Ruohonen, Ville Leppänen:
The General Data Protection Regulation: Requirements, Architectures, and Constraints. RE 2019: 265-275 - [i17]Jukka Ruohonen:
David and Goliath: Privacy Lobbying in the European Union. CoRR abs/1906.01883 (2019) - [i16]Jukka Ruohonen, Kai Kimppa:
Updating the Wassenaar Debate Once Again: Surveillance, Intrusion Software, and Ambiguity. CoRR abs/1906.02235 (2019) - [i15]Kalle Hjerppe, Jukka Ruohonen, Ville Leppänen:
The General Data Protection Regulation: Requirements, Architectures, and Constraints. CoRR abs/1907.07498 (2019) - [i14]Jukka Ruohonen, Kalle Rindell:
Empirical Notes on the Interaction Between Continuous Kernel Fuzzing and Development. CoRR abs/1909.02441 (2019) - 2018
- [j7]Jukka Ruohonen, Sampsa Rauti, Sami Hyrynsalmi, Ville Leppänen:
A case study on software vulnerability coordination. Inf. Softw. Technol. 103: 239-257 (2018) - [c25]Kalle Rindell, Jukka Ruohonen, Sami Hyrynsalmi:
Surveying Secure Software Development Practices in Finland. ARES 2018: 6:1-6:7 - [c24]Jukka Ruohonen, Ville Leppänen:
Toward Validation of Textual Information Retrieval Techniques for Software Weaknesses. DEXA Workshops 2018: 265-277 - [c23]Sami Hyrynsalmi, Jukka Ruohonen, Marko Seppänen:
Healthy until otherwise proven: some proposals for renewing research of software ecosystem health. SoHeal@ICSE 2018: 18-24 - [c22]Jukka Ruohonen:
An Empirical Analysis of Vulnerabilities in Python Packages for Web Applications. IWESEP 2018: 25-30 - [c21]Jukka Ruohonen, Joonas Salovaara, Ville Leppänen:
Crossing Cross-Domain Paths in the Current Web. PST 2018: 1-5 - [c20]Jukka Ruohonen, Joonas Salovaara, Ville Leppänen:
On the Integrity of Cross-Origin JavaScripts. SEC 2018: 385-398 - [c19]Jukka Ruohonen, Ville Leppänen:
A Case-Control Study on the Server-Side Bandages Against XSS. SQAMIA 2018 - [c18]Jukka Ruohonen, Ville Leppänen:
Invisible Pixels Are Dead, Long Live Invisible Pixels! WPES@CCS 2018: 28-32 - [i13]Jukka Ruohonen:
A Look at the Time Delays in CVSS Vulnerability Scoring. CoRR abs/1801.00938 (2018) - [i12]Jukka Ruohonen, Ville Leppänen:
Whose Hands Are in the Finnish Cookie Jar? CoRR abs/1801.07759 (2018) - [i11]Jukka Ruohonen:
An Empirical Survey on the Early Adoption of DNS Certification Authority Authorization. CoRR abs/1804.07604 (2018) - [i10]Jukka Ruohonen, Ville Leppänen:
Investigating the Agility Bias in DNS Graph Mining. CoRR abs/1805.06158 (2018) - [i9]Jukka Ruohonen, Luca Allodi:
A Bug Bounty Perspective on the Disclosure of Web Vulnerabilities. CoRR abs/1805.09850 (2018) - [i8]Jukka Ruohonen, Ville Leppänen:
Invisible Pixels Are Dead, Long Live Invisible Pixels! CoRR abs/1808.07293 (2018) - [i7]Jukka Ruohonen, Ville Leppänen:
Toward Validation of Textual Information Retrieval Techniques for Software Weaknesses. CoRR abs/1809.01360 (2018) - [i6]Jukka Ruohonen, Joonas Salovaara, Ville Leppänen:
On the Integrity of Cross-Origin JavaScripts. CoRR abs/1809.05628 (2018) - [i5]Jukka Ruohonen:
An Empirical Analysis of Vulnerabilities in Python Packages for Web Applications. CoRR abs/1810.13310 (2018) - [i4]Jukka Ruohonen:
A Demand-Side Viewpoint to Software Vulnerabilities in WordPress Plugins. CoRR abs/1812.05293 (2018) - 2017
- [j6]Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen:
Modeling the delivery of security advisories and CVEs. Comput. Sci. Inf. Syst. 14(2): 537-555 (2017) - [j5]Jukka Ruohonen, Sami Hyrynsalmi:
Evaluating the use of internet search volumes for time series modeling of sales in the video game industry. Electron. Mark. 27(4): 351-370 (2017) - [j4]Jesse Kaukola, Jukka Ruohonen, Antti Tuomisto, Sami Hyrynsalmi, Ville Leppänen:
Tightroping between APT and BCI in small enterprises. Inf. Comput. Secur. 25(3): 226-239 (2017) - [c17]Jukka Ruohonen, Ville Leppänen:
Investigating the Agility Bias in DNS Graph Mining. CIT 2017: 253-260 - [c16]Jukka Ruohonen, Ville Leppänen:
How PHP Releases Are Adopted in the Wild? APSEC 2017: 71-80 - [c15]Jukka Ruohonen:
Classifying Web Exploits with Topic Modeling. DEXA Workshops 2017: 93-97 - [c14]Jukka Ruohonen, Ville Leppänen:
Whose Hands Are in the Finnish Cookie Jar? EISIC 2017: 127-130 - [c13]Sami Hyrynsalmi, Arho Suominen, Jukka Ruohonen, Marko Seppänen, Antero Järvi:
Knitting Company Performance and Board Interlocks - An Exploration with the Finnish Software Industry. ICSOB 2017: 67-81 - [c12]Jukka Ruohonen, Sami Hyrynsalmi, Sampsa Rauti, Ville Leppänen:
Mining social networks of open source CVE coordination. IWSM-Mensura 2017: 176-188 - [i3]Sanja Scepanovic, Igor Mishkovski, Jukka Ruohonen, Frederick Ayala-Gómez, Tuomas Aura, Sami Hyrynsalmi:
Malware distributions and graph structure of the Web. CoRR abs/1707.06071 (2017) - [i2]Jukka Ruohonen:
Classifying Web Exploits with Topic Modeling. CoRR abs/1710.05561 (2017) - [i1]Jukka Ruohonen, Ville Leppänen:
How PHP Releases Are Adopted in the Wild? CoRR abs/1710.05570 (2017) - 2016
- [j3]Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen:
An outlook on the institutional evolution of the European Union cyber security apparatus. Gov. Inf. Q. 33(4): 746-756 (2016) - [c11]Jukka Ruohonen, Johannes Holvitie, Sami Hyrynsalmi, Ville Leppänen:
Exploring the clustering of software vulnerability disclosure notifications across software vendors. AICCSA 2016: 1-8 - [c10]Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen:
Software Vulnerability Life Cycles and the Age of Software Products: An Empirical Assertion with Operating System Products. CAiSE Workshops 2016: 207-218 - [c9]Jukka Ruohonen, Ville Leppänen:
On the Design of a Simple Network Resolver for DNS Mining. CompSysTech 2016: 105-112 - [c8]Jukka Ruohonen, Sanja Scepanovic, Sami Hyrynsalmi, Igor Mishkovski, Tuomas Aura, Ville Leppänen:
Correlating file-based malware graphs against the empirical ground truth of DNS graphs. ECSA Workshops 2016: 30 - [c7]Jukka Ruohonen, Sanja Scepanovic, Sami Hyrynsalmi, Igor Mishkovski, Tuomas Aura, Ville Leppänen:
A Post-Mortem Empirical Investigation of the Popularity and Distribution of Malware Files in the Contemporary Web-Facing Internet. EISIC 2016: 144-147 - [c6]Jukka Ruohonen, Sanja Scepanovic, Sami Hyrynsalmi, Igor Mishkovski, Tuomas Aura, Ville Leppänen:
The Black Mark beside My Name Server: Exploring the Importance of Name Server IP Addresses in Malware DNS Graphs. FiCloud Workshops 2016: 264-269 - [c5]Sampsa Rauti, Samuel Laurén, Joni Uitto, Shohreh Hosseinzadeh, Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen:
A Survey on Internal Interfaces Used by Exploits and Implications on Interface Diversification. NordSec 2016: 152-168 - [c4]Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen:
Trading exploits online: A preliminary case study. RCIS 2016: 1-12 - [c3]Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen:
Exploring the Use of Deprecated PHP Releases in the Wild Internet: Still a LAMP Issue? WIMS 2016: 26:1-26:12 - 2015
- [j2]Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen:
The sigmoidal growth of operating system security vulnerabilities: An empirical revisit. Comput. Secur. 55: 1-20 (2015) - [j1]Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen:
Time series trends in software evolution. J. Softw. Evol. Process. 27(12): 990-1015 (2015) - [c2]Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen:
Exploring the Stability of Software with Time-Series Cross-Sectional Data. SAM@ICSE 2015: 41-47 - [c1]Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen:
Software evolution and time series volatility: an empirical exploration. IWPSE 2015: 56-65
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint