Jukka Ruohonen
Orcid: 0000-0001-5147-3084
According to our database1,
Jukka Ruohonen
authored at least 80 papers
between 2015 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2016
2018
2020
2022
2024
0
5
10
15
1
13
5
1
8
3
2
4
4
1
2
2
1
4
4
8
6
9
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
2024
Mysterious and manipulative black boxes: A qualitative analysis of perceptions on recommender systems.
First Monday, June, 2024
Fast Fixes and Faulty Drivers: An Empirical Analysis of Regression Bug Fixing Times in the Linux Kernel.
CoRR, 2024
The Potential of Citizen Platforms for Requirements Engineering of Large Socio-Technical Software Systems.
CoRR, 2024
Proceedings of the Disruptive Innovation in a Digitally Connected Healthy World, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Softw. Syst. Model., February, 2023
A Note on the Proposed Law for Improving the Transparency of Political Advertising in the European Union.
CoRR, 2023
A Text Mining Analysis of Data Protection Politics: The Case of Plenary Sessions of the European Parliament.
CoRR, 2023
2022
2021
Inf. Softw. Technol., 2021
Assessing the Readability of Policy Documents on the Digital Single Market of the European Union.
CoRR, 2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
2020
CoRR, 2020
CoRR, 2020
Comput. Hum. Behav., 2020
Measuring Basic Load-Balancing and Fail-Over Setups for Email Delivery via DNS MX Records.
Proceedings of the 2020 IFIP Networking Conference, 2020
A Dip into a Deep Well: Online Political Advertisements, Valence, and European Electoral Campaigning.
Proceedings of the Disinformation in Open Online Media, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Proceedings of the First International Workshop "CAiSE for Legal Documents" (COUrT 2020) co-located with the 32nd International Conference on Advanced Information Systems Engineering (CAiSE 2020), 2020
2019
Updating the Wassenaar Debate Once Again: Surveillance, Intrusion Software, and Ambiguity.
CoRR, 2019
The General Data Protection Regulation: Requirements, Architectures, and Constraints.
Proceedings of the 27th IEEE International Requirements Engineering Conference, 2019
Proceedings of the Privacy and Identity Management. Data for Better Living: AI and Privacy, 2019
Empirical Notes on the Interaction Between Continuous Kernel Fuzzing and Development.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019
Proceedings of the Evaluation and Assessment on Software Engineering, 2019
2018
An Empirical Survey on the Early Adoption of DNS Certification Authority Authorization.
CoRR, 2018
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018
Proceedings of the Seventh Workshop on Software Quality Analysis, 2018
Proceedings of the ICT Systems Security and Privacy Protection, 2018
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the 9th International Workshop on Empirical Software Engineering in Practice, 2018
Healthy until otherwise proven: some proposals for renewing research of software ecosystem health.
Proceedings of the 1st International Workshop on Software Health, 2018
Toward Validation of Textual Information Retrieval Techniques for Software Weaknesses.
Proceedings of the Database and Expert Systems Applications, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Evaluating the use of internet search volumes for time series modeling of sales in the video game industry.
Electron. Mark., 2017
Proceedings of the 27th International Workshop on Software Measurement and 12th International Conference on Software Process and Product Measurement, 2017
Knitting Company Performance and Board Interlocks - An Exploration with the Finnish Software Industry.
Proceedings of the Software Business - 8th International Conference, 2017
Proceedings of the European Intelligence and Security Informatics Conference, 2017
Proceedings of the 28th International Workshop on Database and Expert Systems Applications, 2017
Proceedings of the 24th Asia-Pacific Software Engineering Conference, 2017
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017
2016
An outlook on the institutional evolution of the European Union cyber security apparatus.
Gov. Inf. Q., 2016
Exploring the Use of Deprecated PHP Releases in the Wild Internet: Still a LAMP Issue?
Proceedings of the 6th International Conference on Web Intelligence, Mining and Semantics, 2016
Proceedings of the Tenth IEEE International Conference on Research Challenges in Information Science, 2016
A Survey on Internal Interfaces Used by Exploits and Implications on Interface Diversification.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016
The Black Mark beside My Name Server: Exploring the Importance of Name Server IP Addresses in Malware DNS Graphs.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016
A Post-Mortem Empirical Investigation of the Popularity and Distribution of Malware Files in the Contemporary Web-Facing Internet.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016
Correlating file-based malware graphs against the empirical ground truth of DNS graphs.
Proceedings of the Proccedings of the 10th European Conference on Software Architecture Workshops, Copenhagen, Denmark, November 28, 2016
Proceedings of the 17th International Conference on Computer Systems and Technologies, 2016
Software Vulnerability Life Cycles and the Age of Software Products: An Empirical Assertion with Operating System Products.
Proceedings of the Advanced Information Systems Engineering Workshops, 2016
Exploring the clustering of software vulnerability disclosure notifications across software vendors.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016
2015
The sigmoidal growth of operating system security vulnerabilities: An empirical revisit.
Comput. Secur., 2015
Proceedings of the 14th International Workshop on Principles of Software Evolution, 2015
Proceedings of the 2nd IEEE/ACM International Workshop on Software Architecture and Metrics, 2015