Follow
Ville Leppänen
Ville Leppänen
Professor of software engineering and software security, University of Turku
Verified email at utu.fi
Title
Cited by
Cited by
Year
Promoting children's health with digital games: A review of reviews
H Parisod, A Pakarinen, L Kauhanen, M Aromaa, V Leppänen, ...
GAMES FOR HEALTH: Research, Development, and Clinical Applications 3 (3 …, 2014
792014
Diversification and obfuscation techniques for software security: A systematic literature review
S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä, J Holvitie, S Hyrynsalmi, ...
Information and Software Technology 104, 72-93, 2018
732018
Technical debt and the effect of agile software development practices on it-an industry practitioner survey
J Holvitie, V Leppänen, S Hyrynsalmi
2014 Sixth International Workshop on Managing Technical Debt, 35-42, 2014
712014
Technical debt and agile software development practices and processes: An industry practitioner survey
J Holvitie, SA Licorish, RO Spínola, S Hyrynsalmi, SG MacDonell, ...
Information and Software Technology 96, 141-160, 2018
702018
DebtFlag: Technical debt management with a development environment integrated tool
J Holvitie, V Leppänen
2013 4th International Workshop on Managing Technical Debt (MTD), 20-27, 2013
482013
Physical activity among children: Objective measurements using Fitbit One® and ActiGraph
L Hamari, T Kullberg, J Ruohonen, OJ Heinonen, N Díaz-Rodríguez, ...
BMC Research Notes 10 (1), 1-6, 2017
432017
A survey on anti-honeypot and anti-introspection methods
J Uitto, S Rauti, S Laurén, V Leppänen
World Conference on Information Systems and Technologies, 125-134, 2017
342017
Browser extension-based man-in-the-browser attacks against Ajax applications with countermeasures
S Rauti, V Leppänen
proceedings of the 13th international conference on computer systems and …, 2012
312012
Studies on the realization of PRAM
V Leppänen
BULLETIN-EUROPEAN ASSOCIATION FOR THEORETICAL COMPUTER SCIENCE 61, 239-242, 1997
311997
Security in the internet of things through obfuscation and diversification
S Hosseinzadeh, S Rauti, S Hyrynsalmi, V Leppänen
2015 International Conference on Computing, Communication and Security …, 2015
292015
Security in container-based virtualization through vTPM
S Hosseinzadeh, S Laurén, V Leppänen
Proceedings of the 9th International Conference on Utility and Cloud …, 2016
272016
The advantages and limitations of digital games in children’s health promotion
H Parisod, M Aromaa, L Kauhanen, K Kimppa, C Laaksonen, V Leppänen, ...
Finnish Journal of eHealth and eWelfare 6 (4), 164-173, 2014
272014
Work-optimal simulation of PRAM models on meshes
V Leppänen, M Penttonen
Nordic Journal of Computing 2 (1), 51-69, 1995
251995
Busting a myth: Review of agile security engineering methods
K Rindell, S Hyrynsalmi, V Leppänen
Proceedings of the 12th International Conference on Availability …, 2017
242017
The sigmoidal growth of operating system security vulnerabilities: an empirical revisit
J Ruohonen, S Hyrynsalmi, V Leppänen
Computers & Security 55, 1-20, 2015
242015
The general data protection regulation: requirements, architectures, and constraints
K Hjerppe, J Ruohonen, V Leppänen
2019 IEEE 27th International Requirements Engineering Conference (RE), 265-275, 2019
232019
Improving object integrity and preventing side effects via deeply immutable references
H Hakonen, V Leppänen, T Raita, T Salakoski, J Teuhola
In Proceedings of sixth Fenno-Ugric Symposium on Software Technology, FUSST'99, 1999
231999
A survey on fake entities as a method to detect and monitor malicious activity
S Rauti, V Leppänen
2017 25th Euromicro International Conference on Parallel, Distributed and …, 2017
222017
Resource allocation methodology for the segmented bus platform
T Seceleanu, V Leppanen, J Suomi, O Nevalainen
Proceedings 2005 IEEE International SOC Conference, 129-132, 2005
222005
Hot-potato routing algorithms for sparse optical torus
R Honkanen, V Leppanen, M Penttonen
Proceedings International Conference on Parallel Processing Workshops, 302-307, 2001
222001
The system can't perform the operation now. Try again later.
Articles 1–20