Jukka Ruohonen

Orcid: 0000-0001-5147-3084

According to our database1, Jukka Ruohonen authored at least 65 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Reflections on the Data Governance Act.
Digit. Soc., April, 2023

Extracting LPL privacy policy purposes from annotated web service source code.
Softw. Syst. Model., February, 2023

A Note on the Proposed Law for Improving the Transparency of Political Advertising in the European Union.
CoRR, 2023

Recent Trends in Cross-Border Data Access by Law Enforcement Agencies.
CoRR, 2023

A Text Mining Analysis of Data Protection Politics: The Case of Plenary Sessions of the European Parliament.
CoRR, 2023

Mysterious and Manipulative Black Boxes: A Qualitative Analysis of Perceptions on Recommender Systems.
CoRR, 2023

2022
The GDPR enforcement fines at glance.
Inf. Syst., 2022

2021
The Treachery of Images in the Digital Sovereignty Debate.
Minds Mach., 2021

Security in agile software development: A practitioner survey.
Inf. Softw. Technol., 2021

Digital Divides and Online Media.
CoRR, 2021

A Comparative Study of Online Disinformation and Offline Protests.
CoRR, 2021

Reassessing Measures for Press Freedom.
CoRR, 2021

A Few Observations About State-Centric Online Propaganda.
CoRR, 2021

Assessing the Readability of Policy Documents on the Digital Single Market of the European Union.
CoRR, 2021

A Review of Product Safety Regulations in the European Union.
CoRR, 2021

A Large-Scale Security-Oriented Static Analysis of Python Packages in PyPI.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

2020
Do Cyber Capabilities and Cyber Power Incentivize International Cooperation?
CoRR, 2020

A Critical Correspondence on Humpty Dumpty's Funding for European Journalism.
CoRR, 2020

A mixed methods probe into the direct disclosure of software vulnerabilities.
Comput. Hum. Behav., 2020

Measuring Basic Load-Balancing and Fail-Over Setups for Email Delivery via DNS MX Records.
Proceedings of the 2020 IFIP Networking Conference, 2020

A Dip into a Deep Well: Online Political Advertisements, Valence, and European Electoral Campaigning.
Proceedings of the Disinformation in Open Online Media, 2020

Extracting Layered Privacy Language Purposes from Web Services.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Predicting the Amount of GDPR Fines.
Proceedings of the First International Workshop "CAiSE for Legal Documents" (COUrT 2020) co-located with the 32nd International Conference on Advanced Information Systems Engineering (CAiSE 2020), 2020

2019
Updating the Wassenaar Debate Once Again: Surveillance, Intrusion Software, and Ambiguity.
CoRR, 2019

David and Goliath: Privacy Lobbying in the European Union.
CoRR, 2019

The General Data Protection Regulation: Requirements, Architectures, and Constraints.
Proceedings of the 27th IEEE International Requirements Engineering Conference, 2019

Annotation-Based Static Analysis for Personal Data Protection.
Proceedings of the Privacy and Identity Management. Data for Better Living: AI and Privacy, 2019

Empirical Notes on the Interaction Between Continuous Kernel Fuzzing and Development.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019

A Demand-Side Viewpoint to Software Vulnerabilities in WordPress Plugins.
Proceedings of the Evaluation and Assessment on Software Engineering, 2019

2018
A case study on software vulnerability coordination.
Inf. Softw. Technol., 2018

A Bug Bounty Perspective on the Disclosure of Web Vulnerabilities.
CoRR, 2018

An Empirical Survey on the Early Adoption of DNS Certification Authority Authorization.
CoRR, 2018

A Look at the Time Delays in CVSS Vulnerability Scoring.
CoRR, 2018

Invisible Pixels Are Dead, Long Live Invisible Pixels!
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

A Case-Control Study on the Server-Side Bandages Against XSS.
Proceedings of the Seventh Workshop on Software Quality Analysis, 2018

On the Integrity of Cross-Origin JavaScripts.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Crossing Cross-Domain Paths in the Current Web.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

An Empirical Analysis of Vulnerabilities in Python Packages for Web Applications.
Proceedings of the 9th International Workshop on Empirical Software Engineering in Practice, 2018

Healthy until otherwise proven: some proposals for renewing research of software ecosystem health.
Proceedings of the 1st International Workshop on Software Health, 2018

Toward Validation of Textual Information Retrieval Techniques for Software Weaknesses.
Proceedings of the Database and Expert Systems Applications, 2018

Surveying Secure Software Development Practices in Finland.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Tightroping between APT and BCI in small enterprises.
Inf. Comput. Secur., 2017

Evaluating the use of internet search volumes for time series modeling of sales in the video game industry.
Electron. Mark., 2017

Malware distributions and graph structure of the Web.
CoRR, 2017

Modeling the delivery of security advisories and CVEs.
Comput. Sci. Inf. Syst., 2017

Mining social networks of open source CVE coordination.
Proceedings of the 27th International Workshop on Software Measurement and 12th International Conference on Software Process and Product Measurement, 2017

Knitting Company Performance and Board Interlocks - An Exploration with the Finnish Software Industry.
Proceedings of the Software Business - 8th International Conference, 2017

Whose Hands Are in the Finnish Cookie Jar?
Proceedings of the European Intelligence and Security Informatics Conference, 2017

Classifying Web Exploits with Topic Modeling.
Proceedings of the 28th International Workshop on Database and Expert Systems Applications, 2017

How PHP Releases Are Adopted in the Wild?
Proceedings of the 24th Asia-Pacific Software Engineering Conference, 2017

Investigating the Agility Bias in DNS Graph Mining.
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017

2016
An outlook on the institutional evolution of the European Union cyber security apparatus.
Gov. Inf. Q., 2016

Exploring the Use of Deprecated PHP Releases in the Wild Internet: Still a LAMP Issue?
Proceedings of the 6th International Conference on Web Intelligence, Mining and Semantics, 2016

Trading exploits online: A preliminary case study.
Proceedings of the Tenth IEEE International Conference on Research Challenges in Information Science, 2016

A Survey on Internal Interfaces Used by Exploits and Implications on Interface Diversification.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016

The Black Mark beside My Name Server: Exploring the Importance of Name Server IP Addresses in Malware DNS Graphs.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016

A Post-Mortem Empirical Investigation of the Popularity and Distribution of Malware Files in the Contemporary Web-Facing Internet.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

Correlating file-based malware graphs against the empirical ground truth of DNS graphs.
Proceedings of the Proccedings of the 10th European Conference on Software Architecture Workshops, Copenhagen, Denmark, November 28, 2016

On the Design of a Simple Network Resolver for DNS Mining.
Proceedings of the 17th International Conference on Computer Systems and Technologies, 2016

Software Vulnerability Life Cycles and the Age of Software Products: An Empirical Assertion with Operating System Products.
Proceedings of the Advanced Information Systems Engineering Workshops, 2016

Exploring the clustering of software vulnerability disclosure notifications across software vendors.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

2015
Time series trends in software evolution.
J. Softw. Evol. Process., 2015

The sigmoidal growth of operating system security vulnerabilities: An empirical revisit.
Comput. Secur., 2015

Software evolution and time series volatility: an empirical exploration.
Proceedings of the 14th International Workshop on Principles of Software Evolution, 2015

Exploring the Stability of Software with Time-Series Cross-Sectional Data.
Proceedings of the 2nd IEEE/ACM International Workshop on Software Architecture and Metrics, 2015


  Loading...