Author of the publication

Securing Scrum for VAHTI.

, , and . SPLST, volume 1525 of CEUR Workshop Proceedings, page 236-250. CEUR-WS.org, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Leppänen, Ville
add a person with the name Leppänen, Ville
 

Other publications of authors with the same name

EyeCloud: A BotCloud Detection System., , and . TrustCom/BigDataSE/ISPA (1), page 1067-1072. IEEE, (2015)Lambda-Systolic Routing in a Dense Optical Torus., and . PDPTA, page 515-520. CSREA Press, (2010)Client based Object-Oriented Cohesion Metrics., and . COMPSAC (2), page 743-748. IEEE Computer Society, (2007)978-0-7695-2870-0.Exploration of a Heterogeneous Concentrated-Sparse On-Chip Interconnect for Energy Efficient Multicore Architecture., , and . CIT, page 204-211. IEEE Computer Society, (2014)Applications of Trusted Computing in Cloud Context., , , , and . Research Advances in Cloud Computing, Springer, (2017)Investigating the Effects of Agile Practices and Processes on Technical Debt - The Viewpoint of the Brazilian Software Industry., , , , , and . SEKE, page 506-505. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2018)A Survey on the Use of Data Points in IDS Research., , and . SoCPaR, volume 942 of Advances in Intelligent Systems and Computing, page 329-337. Springer, (2018)Co-Existence of the 'Technical Debt' and 'Software Legacy' Concepts., , , and . QuASoQ/TDA@APSEC, volume 1771 of CEUR Workshop Proceedings, page 80-83. CEUR-WS.org, (2016)On the Integrity of Cross-Origin JavaScripts., , and . SEC, volume 529 of IFIP Advances in Information and Communication Technology, page 385-398. Springer, (2018)Obfuscation and Diversification for Securing Cloud Computing., , , , , and . ES, volume 10131 of Lecture Notes in Computer Science, page 179-202. Springer, (2015)