Sami Hyrynsalmi

According to our database1, Sami Hyrynsalmi
  • authored at least 58 papers between 2011 and 2017.
  • has a "Dijkstra number"2 of five.



In proceedings 
PhD thesis 




The false prometheus: customer choice, smart devices, and trust.
SIGCAS Computers and Society, 2017

Tightroping between APT and BCI in small enterprises.
Inf. & Comput. Security, 2017

Case Study of Agile Security Engineering: Building Identity Management for a Government Agency.
IJSSE, 2017

A Proxy-Based Solution for Asynchronous Telemedical Systems.
IJEHMC, 2017

Evaluating the use of internet search volumes for time series modeling of sales in the video game industry.
Electronic Markets, 2017

Malware distributions and graph structure of the Web.
CoRR, 2017

Modeling the delivery of security advisories and CVEs.
Comput. Sci. Inf. Syst., 2017

Top Management Support for Software Cost Estimation - A Case Study of the Current Practice and Impacts.
Proceedings of the Product-Focused Software Process Improvement, 2017

The role of applications and their vendors in evolution of software ecosystems.
Proceedings of the 40th International Convention on Information and Communication Technology, 2017

The Shades of Grey: Datenherrschaft in Data-Driven Gamification.
Proceedings of the First International Workshop on Data-Driven Gamification Design co-located with 21st International Academic MindTrek Conference (AcademicMindtrek 2017), 2017

Mining social networks of open source CVE coordination.
Proceedings of the 27th International Workshop on Software Measurement and 12th International Conference on Software Process and Product Measurement, 2017

How Do Software Ecosystems Co-Evolve? - A View from OpenStack and Beyond.
Proceedings of the Software Business - 8th International Conference, 2017

Knitting Company Performance and Board Interlocks - An Exploration with the Finnish Software Industry.
Proceedings of the Software Business - 8th International Conference, 2017

Multi-homing and Software Firm Performance - Towards a Research Agenda.
Proceedings of the Digital Nations - Smart Cities, Innovation, and Sustainability, 2017

Measuring Software Security from the Design of Software.
Proceedings of the 18th International Conference on Computer Systems and Technologies, 2017

Busting a Myth: Review of Agile Security Engineering Methods.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

The influence of developer multi-homing on competition between software ecosystems.
Journal of Systems and Software, 2016

An outlook on the institutional evolution of the European Union cyber security apparatus.
Government Information Quarterly, 2016

Exploring the Use of Deprecated PHP Releases in the Wild Internet: Still a LAMP Issue?
Proceedings of the 6th International Conference on Web Intelligence, Mining and Semantics, 2016

Trading exploits online: A preliminary case study.
Proceedings of the Tenth IEEE International Conference on Research Challenges in Information Science, 2016

A Survey on Internal Interfaces Used by Exploits and Implications on Interface Diversification.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016

Software Security Considerations for IoT.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

Ecosystems Here, There, and Everywhere - A Barometrical Analysis of the Roots of 'Software Ecosystem'.
Proceedings of the Software Business - 7th International Conference, 2016

Multi-homing in ecosystems and firm performance: Does it improve software companies' ROA?
Proceedings of the International Workshop on Software Ecosystems co-located with 10th International Conference on Information Systemss, 2016

The Black Mark beside My Name Server: Exploring the Importance of Name Server IP Addresses in Malware DNS Graphs.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016

A Post-Mortem Empirical Investigation of the Popularity and Distribution of Malware Files in the Contemporary Web-Facing Internet.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

Correlating file-based malware graphs against the empirical ground truth of DNS graphs.
Proceedings of the Proccedings of the 10th European Conference on Software Architecture Workshops, Copenhagen, Denmark, November 28, 2016

A Survey on Aims and Environments of Diversification and Obfuscation in Software Security.
Proceedings of the 17th International Conference on Computer Systems and Technologies, 2016

An Evaluation Framework for Cross-Platform Mobile App Development Tools: A case analysis of Adobe PhoneGap framework.
Proceedings of the 17th International Conference on Computer Systems and Technologies, 2016

Software Vulnerability Life Cycles and the Age of Software Products: An Empirical Assertion with Operating System Products.
Proceedings of the Advanced Information Systems Engineering Workshops, 2016

Adoption and Suitability of Software Development Methods and Practices.
Proceedings of the 23rd Asia-Pacific Software Engineering Conference, 2016

Exploring the clustering of software vulnerability disclosure notifications across software vendors.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

Case Study of Security Development in an Agile Environment: Building Identity Management for a Government Agency.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

Time series trends in software evolution.
Journal of Software: Evolution and Process, 2015

Busting Myths of Electronic Word of Mouth: The Relationship between Customer Ratings and the Sales of Mobile Applications.
JTAER, 2015

The sigmoidal growth of operating system security vulnerabilities: An empirical revisit.
Computers & Security, 2015

Securing Scrum for VAHTI.
Proceedings of the 14th Symposium on Programming Languages and Software Tools (SPLST'15), 2015

Accounting testing in software cost estimation: A case study of the current practice and impacts.
Proceedings of the 14th Symposium on Programming Languages and Software Tools (SPLST'15), 2015

Software evolution and time series volatility: an empirical exploration.
Proceedings of the 14th International Workshop on Principles of Software Evolution, 2015

The potential development impact of mobile application vendors in developing countries.
Proceedings of the 2015 IEEE International Symposium on Technology and Society, 2015

Lean Software Startup - An Experience Report from an Entrepreneurial Software Business Course.
Proceedings of the Software Business - 6th International Conference, 2015

Wealthy, Healthy and/or Happy - What does 'Ecosystem Health' Stand for?
Proceedings of the Software Business - 6th International Conference, 2015

Exploring the Stability of Software with Time-Series Cross-Sectional Data.
Proceedings of the 2nd IEEE/ACM International Workshop on Software Architecture and Metrics, 2015

The Theoretical Connections Between Agile Software Development and Innovative Climate.
Proceedings of the Information and Software Technologies - 21st International Conference, 2015

Obfuscation and Diversification for Securing Cloud Computing.
Proceedings of the Enterprise Security - Second International Workshop, 2015

A comparison of security assurance support of agile software development methods.
Proceedings of the 16th International Conference on Computer Systems and Technologies, 2015

Security and Privacy in Cloud Computing via Obfuscation and Diversification: A Survey.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Young mobile users: Radical and individual - Not.
Telematics and Informatics, 2014

Sources of value in application ecosystems.
Journal of Systems and Software, 2014

The Emerging Application Ecosystems: An Introductory Analysis of Android Ecosystem.
IJEBR, 2014

Symbol diversification of linux binaries.
Proceedings of the 2014 World Congress on Internet Security, 2014

Diversification of System Calls in Linux Binaries.
Proceedings of the Trusted Systems - 6th International Conference, 2014

Technical Debt and the Effect of Agile Software Development Practices on It - An Industry Practitioner Survey.
Proceedings of the Sixth International Workshop on Managing Technical Debt, 2014

Agile methods for embedded systems development - a literature review and a mapping study.
EURASIP J. Emb. Sys., 2013

Game Development Accelerator - Initial Design and Research Approach.
Proceedings of the From Start-ups to SaaS Conglomerate: Life Cycles of Software Products Workshop 2013 co-located with 4th International Conference on Software Business (ICSOB 2013), 2013

Revenue Models of Application Developers in Android Market Ecosystem.
Proceedings of the Software Business - Third International Conference, 2012

App Store, Marketplace, Play! An Analysis of Multi-Homing in Mobile Software Ecosystems.
Proceedings of the Forth International Workshop on Software Ecosystems, 2012

Reducing the number of unit tests with design by contract.
Proceedings of the 12th International Conference on Computer Systems and Technologies, 2011