Follow
Ville Leppänen
Ville Leppänen
Professor of software engineering and software security, University of Turku
Verified email at utu.fi
Title
Cited by
Cited by
Year
Diversification and obfuscation techniques for software security: A systematic literature review
S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä, J Holvitie, S Hyrynsalmi, ...
Information and Software Technology 104, 72-93, 2018
1132018
Technical debt and agile software development practices and processes: An industry practitioner survey
J Holvitie, SA Licorish, RO Spínola, S Hyrynsalmi, SG MacDonell, ...
Information and Software Technology 96, 141-160, 2018
1102018
Security in agile software development: A practitioner survey
K Rindell, J Ruohonen, J Holvitie, S Hyrynsalmi, V Leppänen
Information and Software Technology 131, 106488, 2021
972021
Technical debt and the effect of agile software development practices on it-an industry practitioner survey
J Holvitie, V Leppänen, S Hyrynsalmi
2014 Sixth International Workshop on Managing Technical Debt, 35-42, 2014
942014
Promoting children's health with digital games: A review of reviews
H Parisod, A Pakarinen, L Kauhanen, M Aromaa, V Leppänen, ...
GAMES FOR HEALTH: Research, Development, and Clinical Applications 3 (3 …, 2014
912014
DebtFlag: Technical debt management with a development environment integrated tool
J Holvitie, V Leppänen
2013 4th International Workshop on Managing Technical Debt (MTD), 20-27, 2013
612013
Physical activity among children: objective measurements using Fitbit One® and ActiGraph
L Hamari, T Kullberg, J Ruohonen, OJ Heinonen, N Díaz-Rodríguez, ...
BMC Research Notes 10, 1-6, 2017
532017
The general data protection regulation: requirements, architectures, and constraints
K Hjerppe, J Ruohonen, V Leppänen
2019 IEEE 27th International Requirements Engineering Conference (RE), 265-275, 2019
512019
A survey on anti-honeypot and anti-introspection methods
J Uitto, S Rauti, S Laurén, V Leppänen
Recent Advances in Information Systems and Technologies: Volume 2 5, 125-134, 2017
462017
Security in container-based virtualization through vTPM
S Hosseinzadeh, S Laurén, V Leppänen
Proceedings of the 9th International Conference on Utility and Cloud …, 2016
432016
Browser extension-based man-in-the-browser attacks against Ajax applications with countermeasures
S Rauti, V Leppänen
proceedings of the 13th international conference on computer systems and …, 2012
362012
Mitigating branch-shadowing attacks on intel sgx using control flow randomization
S Hosseinzadeh, H Liljestrand, V Leppänen, A Paverd
Proceedings of the 3rd Workshop on System Software for Trusted Execution, 42-47, 2018
342018
An outlook on the institutional evolution of the European Union cyber security apparatus
J Ruohonen, S Hyrynsalmi, V Leppänen
Government Information Quarterly 33 (4), 746-756, 2016
332016
Busting a myth: Review of agile security engineering methods
K Rindell, S Hyrynsalmi, V Leppänen
Proceedings of the 12th International Conference on Availability …, 2017
312017
The advantages and limitations of digital games in children’s health promotion
H Parisod, M Aromaa, L Kauhanen, K Kimppa, C Laaksonen, V Leppänen, ...
Finnish Journal of eHealth and eWelfare 6 (4), 164-173, 2014
312014
Security in the internet of things through obfuscation and diversification
S Hosseinzadeh, S Rauti, S Hyrynsalmi, V Leppänen
2015 International Conference on Computing, Communication and Security …, 2015
302015
Studies on the realization of PRAM
V Leppänen
BULLETIN-EUROPEAN ASSOCIATION FOR THEORETICAL COMPUTER SCIENCE 61, 239-242, 1997
301997
Work-optimal simulation of PRAM models on meshes
V Leppänen, M Penttonen
Nordic Journal of Computing 2 (1), 51-69, 1995
271995
A survey on fake entities as a method to detect and monitor malicious activity
S Rauti, V Leppänen
2017 25th Euromicro international conference on Parallel, Distributed and …, 2017
262017
Improving object integrity and preventing side effects via deeply immutable references
H Hakonen, V Leppänen, T Raita, T Salakoski, J Teuhola
Proceedings of Sixth Fenno-Ugric Symposium on Software Technology, FUSST 99 …, 1999
261999
The system can't perform the operation now. Try again later.
Articles 1–20