Author of the publication

A Post-Mortem Empirical Investigation of the Popularity and Distribution of Malware Files in the Contemporary Web-Facing Internet.

, , , , , and . EISIC, page 144-147. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Ruohonen, Jukka
add a person with the name Ruohonen, Jukka
 

Other publications of authors with the same name

Software Vulnerability Life Cycles and the Age of Software Products: An Empirical Assertion with Operating System Products., , and . CAiSE Workshops, volume 249 of Lecture Notes in Business Information Processing, page 207-218. Springer, (2016)Malware distributions and graph structure of the Web., , , , , and . CoRR, (2017)Whose Hands Are in the Finnish Cookie Jar?, and . CoRR, (2018)On the Design of a Simple Network Resolver for DNS Mining., and . CompSysTech, page 105-112. ACM, (2016)An Empirical Analysis of Vulnerabilities in Python Packages for Web Applications.. IWESEP, page 25-30. IEEE, (2018)A Demand-Side Viewpoint to Software Vulnerabilities in WordPress Plugins.. EASE, page 222-228. ACM, (2019)Exploring the clustering of software vulnerability disclosure notifications across software vendors., , , and . AICCSA, page 1-8. IEEE Computer Society, (2016)Software evolution and time series volatility: an empirical exploration., , and . IWPSE, page 56-65. ACM, (2015)Tightroping between APT and BCI in small enterprises., , , , and . Inf. & Comput. Security, 25 (3): 226-239 (2017)A Case-Control Study on the Server-Side Bandages Against XSS., and . SQAMIA, volume 2217 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)