Sampsa Rauti
Sampsa Rauti
Verified email at
Cited by
Cited by
Diversification and obfuscation techniques for software security: A systematic literature review
S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä, J Holvitie, S Hyrynsalmi, ...
Information and Software Technology 104, 72-93, 2018
A survey on anti-honeypot and anti-introspection methods
J Uitto, S Rauti, S Laurén, V Leppänen
Recent Advances in Information Systems and Technologies: Volume 2 5, 125-134, 2017
Why playing augmented reality games feels meaningful to players? The roles of imagination and social experience
S Laato, S Rauti, AKMN Islam, E Sutinen
Computers in Human Behavior 121, 106816, 2021
A Review of Location-based Games-Do They All Support Exercise, Social Interaction and Cartographical Training?
S Laato, T Pietarinen, S Rauti, M Paloheimo, N Inaba, E Sutinen
Proceedings of the 11th International Conference on Computer Supported …, 2019
Location-based games as exergames-from pokémon to the wizarding world
S Laato, S Hyrynsalmi, S Rauti, AKMN Islam, TH Laine
International Journal of Serious Games 7 (1), 79-95, 2020
Analysis of the quality of points of interest in the most popular location-based games
S Laato, T Pietarinen, S Rauti, TH Laine
Proceedings of the 20th International Conference on Computer Systems and …, 2019
Browser extension-based man-in-the-browser attacks against Ajax applications with countermeasures
S Rauti, V Leppänen
Proceedings of the 13th international conference on computer systems and …, 2012
Security in the internet of things through obfuscation and diversification
S Hosseinzadeh, S Rauti, S Hyrynsalmi, V Leppänen
2015 International Conference on Computing, Communication and Security …, 2015
A survey on fake entities as a method to detect and monitor malicious activity
S Rauti, V Leppänen
2017 25th Euromicro international conference on Parallel, Distributed and …, 2017
Diversification of system calls in linux binaries
S Rauti, S Laurén, S Hosseinzadeh, JM Mäkelä, S Hyrynsalmi, ...
Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China …, 2015
Interface diversification in IoT operating systems
P Mäki, S Rauti, S Hosseinzadeh, L Koivunen, V Leppänen
Proceedings of the 9th International Conference on Utility and Cloud …, 2016
The effects playing pokémon go has on physical activity-a systematic literature review
S Laato, S Hyrynsalmi, S Rauti, E Sutinen
Symbol diversification of linux binaries
S Laurén, P Mäki, S Rauti, S Hosseinzadeh, S Hyrynsalmi, V Leppänen
World Congress on Internet Security (WorldCIS-2014), 74-79, 2014
A case study on software vulnerability coordination
J Ruohonen, S Rauti, S Hyrynsalmi, V Leppänen
Information and Software Technology 103, 239-257, 2018
Software security considerations for IoT
A Koivu, L Koivunen, S Hosseinzadeh, S Laurén, S Hyrynsalmi, S Rauti, ...
2016 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2016
An interface diversified honeypot for malware analysis
S Laurén, S Rauti, V Leppänen
Proccedings of the 10th European Conference on Software Architecture …, 2016
“you have a potential hacker’s infection”: A study on technical support scams
S Rauti, V Leppänen
2017 IEEE International Conference on Computer and Information Technology …, 2017
Preventing malicious attacks by diversifying Linux shell commands
J Uitto, S Rauti, JM Mäkelä, V Leppänen
SPLST, 206-220, 2015
Assessing discrepancies between network traffic and privacy policies of public sector web services
T Heino, R Carlsson, S Rauti, V Leppänen
Proceedings of the 17th International Conference on Availability …, 2022
Location-based games as interfaces for collecting user data
S Rauti, S Laato
Trends and Innovations in Information Systems and Technologies: Volume 2 8 …, 2020
The system can't perform the operation now. Try again later.
Articles 1–20