Sampsa Rauti

Orcid: 0000-0002-1891-2353

According to our database1, Sampsa Rauti authored at least 73 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Towards an Automatic Tool for Detecting Third-Party Data Leaks on Websites.
Proceedings of the Tenth Workshop on Software Quality Analysis, 2023

Data Leaks to Third-Party Services on Medical Websites.
Proceedings of the 16th International Conference on Security of Information and Networks, 2023

Privacy Risks of Third-Party Services on Women's Shelter Websites.
Proceedings of the 16th International Conference on Security of Information and Networks, 2023

From Whistle to Echo: Data Leaks in Web-Based Whistleblowing Channels.
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023

Privacy in Popular Children's Mobile Applications: A Network Traffic Analysis.
Proceedings of the 46th MIPRO ICT and Electronics Convention, 2023

Data leaks to third parties in web services for vulnerable groups.
Proceedings of the 46th MIPRO ICT and Electronics Convention, 2023

Composing Music Through Tile-based Games.
Proceedings of the IEEE International Symposium on Multimedia, 2023

Understanding Software Obfuscation and Diversification as Defensive Measures for the Cybersecurity of Internet of Things.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

Third-party services as a privacy threat on university websites.
Proceedings of the 24th International Conference on Computer Systems and Technologies, 2023

An assessment of privacy policies for smart home devices.
Proceedings of the 24th International Conference on Computer Systems and Technologies, 2023

Resemblance of religion and pervasive games: A study among church employees and gamers.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
Where Does Your Data Go? Comparing Network Traffic and Privacy Policies of Public Sector Mobile Applications.
Proceedings of the Information Systems and Technologies, 2022

Comparing Social Media Reactions to Early Game Songs and Final Boss Music in Single Player Adventure Games.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

Assessing discrepancies between network traffic and privacy policies of public sector web services.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Learning History with Location-Based Applications: An Architecture for Points of Interest in Multiple Layers.
Sensors, 2021

Why playing augmented reality games feels meaningful to players? The roles of imagination and social experience.
Comput. Hum. Behav., 2021

Filters that Fight Back Revisited: Conceptualization and Future Agenda.
Proceedings of the Trends and Applications in Information Systems and Technologies, 2021

When Player Communities Revolt Against the Developer: A Study of Pokémon GO and Diablo Immortal.
Proceedings of the Software Business - 12th International Conference, 2021

Central Themes of the Pokémon Franchise and why they Appeal to Humans.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Video games and religion: Lutheran Church employees' perspectives on similarities between virtual and spiritual worlds.
Proceedings of the 5th International GamiFIN Conference, Levi, Finland, April 7-9, 2021, 2021

Technical cheating prevention in location-based games.
Proceedings of the CompSysTech '21: International Conference on Computer Systems and Technologies '21, 2021

2020
Location-based Games as Exergames - From Pokémon To The Wizarding World.
Int. J. Serious Games, 2020

Location-Based Games as Interfaces for Collecting User Data.
Proceedings of the Trends and Innovations in Information Systems and Technologies, 2020

Building a Virtualized Environment for Programming Courses.
Proceedings of the Trends and Innovations in Information Systems and Technologies, 2020

Man-in-the-Browser Attacks Against IoT Devices: A Study of Smart Homes.
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020

Scambaiting as a Form of Online Video Entertainment: An Exploratory Study.
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020

Increasing Customer Awareness on Food Waste at University Cafeteria with a Sensor-Based Intelligent Self-Serve Lunch Line.
Proceedings of the 2020 IEEE International Conference on Engineering, 2020

The Role of Music in 21st Century Education-Comparing Programming and Music Composing.
Proceedings of the 20th IEEE International Conference on Advanced Learning Technologies, 2020

The Effects Playing Pokémon GO has on Physical Activity -A Systematic Literature Review.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Do primal instincts explain engagement in location-based games? A hypothesis-forming focus group study on territorial behavior.
Proceedings of the 4th International GamiFIN Conference, Levi, Finland, April 1-3, 2020, 2020

Learning Social Skills and Acquiring Social Capital through Pervasive Gaming.
Proceedings of DELbA 2020, 2020

2019
Protecting Computer Systems from Cyber Attacks with Internal Interface Diversification.
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019

Controlling Uncertainty with Proactive Cyber Defense: A Clausewitzian Perspective.
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019

Man-in-the-browser Attack: A Case Study on Malicious Browser Extensions.
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019

Bridging the gap between software architecture and business model development: A literature study.
Proceedings of the 42nd International Convention on Information and Communication Technology, 2019

Towards Cyber Attribution by Deception.
Proceedings of the Hybrid Intelligent Systems, 2019

A Survey on Countermeasures Against Man-in-the-Browser Attacks.
Proceedings of the Hybrid Intelligent Systems, 2019

Potential Benefits of Playing Location-Based Games: An Analysis of Game Mechanics.
Proceedings of the Computer Supported Education - 11th International Conference, 2019

A Review of Location-based Games: Do They All Support Exercise, Social Interaction and Cartographical Training?
Proceedings of the 11th International Conference on Computer Supported Education, 2019

An Inquiry into Localized Email Spam.
Proceedings of the 20th International Conference on Computer Systems and Technologies, 2019

Analysis of the Quality of Points of Interest in the Most Popular Location-based Games.
Proceedings of the 20th International Conference on Computer Systems and Technologies, 2019

2018
Internal Interface Diversification as a Security Measure in Sensor Networks.
J. Sens. Actuator Networks, 2018

A case study on software vulnerability coordination.
Inf. Softw. Technol., 2018

Diversification and obfuscation techniques for software security: A systematic literature review.
Inf. Softw. Technol., 2018

Recognizing Dynamic Fields in Network Traffic with a Manually Assisted Solution.
Proceedings of the Trends and Advances in Information Systems and Technologies, 2018

A Survey on the Use of Data Points in IDS Research.
Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition, 2018

Towards Profiling Program Instances in Host-Based Intrusion Detection Systems by Recognizing Software Update Patterns.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

A Comparison of Online JavaScript Obfuscators.
Proceedings of the International Conference on Software Security and Assurance, 2018

2017
A Proxy-Based Solution for Asynchronous Telemedical Systems.
Int. J. E Health Medical Commun., 2017

A Survey on Anti-honeypot and Anti-introspection Methods.
Proceedings of the Recent Advances in Information Systems and Technologies, 2017

Practical challenges in building fake services with the record and play approach.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

Internal interface diversification with multiple fake interfaces.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

A Survey on Fake Entities as a Method to Detect and Monitor Malicious Activity.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

Mining social networks of open source CVE coordination.
Proceedings of the 27th International Workshop on Software Measurement and 12th International Conference on Software Process and Product Measurement, 2017

A Comparison of Record and Play Honeypot Designs.
Proceedings of the 18th International Conference on Computer Systems and Technologies, 2017

A Survey on Application Sandboxing Techniques.
Proceedings of the 18th International Conference on Computer Systems and Technologies, 2017

"You have a Potential Hacker's Infection": A Study on Technical Support Scams.
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017

2016
Interface diversification in IoT operating systems.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016

A Survey on Internal Interfaces Used by Exploits and Implications on Interface Diversification.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016

Software Security Considerations for IoT.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

Applying Internal Interface Diversification to IoT Operating Systems.
Proceedings of the International Conference on Software Security and Assurance, 2016

An interface diversified honeypot for malware analysis.
Proceedings of the Proccedings of the 10th European Conference on Software Architecture Workshops, Copenhagen, Denmark, November 28, 2016

Practical implications and requirements of diversifying interpreted languages.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

A Survey on Aims and Environments of Diversification and Obfuscation in Software Security.
Proceedings of the 17th International Conference on Computer Systems and Technologies, 2016

2015
Diversifying SQL to Prevent Injection Attacks.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Preventing malicious attacks by diversifying Linux shell commands.
Proceedings of the 14th Symposium on Programming Languages and Software Tools (SPLST'15), 2015

Obfuscation and Diversification for Securing Cloud Computing.
Proceedings of the Enterprise Security - Second International Workshop, 2015

Diversification of system calls in linux kernel.
Proceedings of the 16th International Conference on Computer Systems and Technologies, 2015

2014
Symbol diversification of linux binaries.
Proceedings of the 2014 World Congress on Internet Security, 2014

A Proxy-Based Security Solution for Web-Based Online eHealth Services.
Proceedings of the Safe and Secure Cities, 2014

Diversification of System Calls in Linux Binaries.
Proceedings of the Trusted Systems - 6th International Conference, 2014

Towards a diversification framework for operating system protection.
Proceedings of the 15th International Conference on Computer Systems and Technologies, 2014

2012
Browser extension-based man-in-the-browser attacks against Ajax applications with countermeasures.
Proceedings of the 2012 Conference on Computer Systems and Technologies, 2012


  Loading...