Follow
Ville Leppänen
Ville Leppänen
Professor of software engineering and software security, University of Turku
Verified email at utu.fi
Title
Cited by
Cited by
Year
Diversification and obfuscation techniques for software security: A systematic literature review
S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä, J Holvitie, S Hyrynsalmi, ...
Information and Software Technology 104, 72-93, 2018
1052018
Technical debt and agile software development practices and processes: An industry practitioner survey
J Holvitie, SA Licorish, RO Spínola, S Hyrynsalmi, SG MacDonell, ...
Information and Software Technology 96, 141-160, 2018
952018
Promoting children's health with digital games: A review of reviews
H Parisod, A Pakarinen, L Kauhanen, M Aromaa, V Leppänen, ...
GAMES FOR HEALTH: Research, Development, and Clinical Applications 3 (3 …, 2014
912014
Technical debt and the effect of agile software development practices on it-an industry practitioner survey
J Holvitie, V Leppänen, S Hyrynsalmi
2014 Sixth International Workshop on Managing Technical Debt, 35-42, 2014
872014
Debtflag: Technical debt management with a development environment integrated tool
J Holvitie, V Leppänen
2013 4th International Workshop on Managing Technical Debt (MTD), 20-27, 2013
592013
Security in agile software development: A practitioner survey
K Rindell, J Ruohonen, J Holvitie, S Hyrynsalmi, V Leppänen
Information and Software Technology 131, 106488, 2021
522021
Physical activity among children: objective measurements using Fitbit One® and ActiGraph
L Hamari, T Kullberg, J Ruohonen, OJ Heinonen, N Díaz-Rodríguez, ...
BMC Research Notes 10, 1-6, 2017
512017
The general data protection regulation: requirements, architectures, and constraints
K Hjerppe, J Ruohonen, V Leppänen
2019 IEEE 27th International Requirements Engineering Conference (RE), 265-275, 2019
432019
A survey on anti-honeypot and anti-introspection methods
J Uitto, S Rauti, S Laurén, V Leppänen
Recent Advances in Information Systems and Technologies: Volume 2 5, 125-134, 2017
432017
Security in container-based virtualization through vTPM
S Hosseinzadeh, S Laurén, V Leppänen
Proceedings of the 9th International Conference on Utility and Cloud …, 2016
392016
Browser extension-based man-in-the-browser attacks against Ajax applications with countermeasures
S Rauti, V Leppänen
proceedings of the 13th international conference on computer systems and …, 2012
362012
Studies on the realization of PRAM
V Leppänen
BULLETIN-EUROPEAN ASSOCIATION FOR THEORETICAL COMPUTER SCIENCE 61, 239-242, 1997
331997
Mitigating branch-shadowing attacks on intel sgx using control flow randomization
S Hosseinzadeh, H Liljestrand, V Leppänen, A Paverd
Proceedings of the 3rd Workshop on System Software for Trusted Execution, 42-47, 2018
312018
Security in the internet of things through obfuscation and diversification
S Hosseinzadeh, S Rauti, S Hyrynsalmi, V Leppänen
2015 International Conference on Computing, Communication and Security …, 2015
302015
The advantages and limitations of digital games in children’s health promotion
H Parisod, M Aromaa, L Kauhanen, K Kimppa, C Laaksonen, V Leppänen, ...
Finnish Journal of eHealth and eWelfare 6 (4), 164-173, 2014
292014
Busting a myth: Review of agile security engineering methods
K Rindell, S Hyrynsalmi, V Leppänen
Proceedings of the 12th International Conference on Availability …, 2017
282017
An outlook on the institutional evolution of the European Union cyber security apparatus
J Ruohonen, S Hyrynsalmi, V Leppänen
Government Information Quarterly 33 (4), 746-756, 2016
272016
The sigmoidal growth of operating system security vulnerabilities: an empirical revisit
J Ruohonen, S Hyrynsalmi, V Leppänen
Computers & Security 55, 1-20, 2015
262015
Improving object integrity and preventing side effects via deeply immutable references
H Hakonen, V Leppänen, T Raita, T Salakoski, J Teuhola
Proceedings of Sixth Fenno-Ugric Symposium on Software Technology, FUSST 99 …, 1999
261999
Work-optimal simulation of PRAM models on meshes
V Leppänen, M Penttonen
Nordic Journal of Computing 2 (1), 51-69, 1995
261995
The system can't perform the operation now. Try again later.
Articles 1–20