Follow
Sampsa Rauti
Sampsa Rauti
Verified email at utu.fi
Title
Cited by
Cited by
Year
Diversification and obfuscation techniques for software security: A systematic literature review
S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä, J Holvitie, S Hyrynsalmi, ...
Information and Software Technology 104, 72-93, 2018
1052018
A survey on anti-honeypot and anti-introspection methods
J Uitto, S Rauti, S Laurén, V Leppänen
Recent Advances in Information Systems and Technologies: Volume 2 5, 125-134, 2017
432017
Why playing augmented reality games feels meaningful to players? The roles of imagination and social experience
S Laato, S Rauti, AKMN Islam, E Sutinen
Computers in Human Behavior 121, 106816, 2021
362021
Location-based games as exergames-from pokémon to the wizarding world
S Laato, S Hyrynsalmi, S Rauti, AKMN Islam, TH Laine
International Journal of Serious Games 7 (1), 79-95, 2020
362020
A Review of Location-based Games-Do They All Support Exercise, Social Interaction and Cartographical Training?
S Laato, T Pietarinen, S Rauti, M Paloheimo, N Inaba, E Sutinen
Proceedings of the 11th International Conference on Computer Supported …, 2019
362019
Browser extension-based man-in-the-browser attacks against Ajax applications with countermeasures
S Rauti, V Leppänen
Proceedings of the 13th international conference on computer systems and …, 2012
362012
Analysis of the quality of points of interest in the most popular location-based games
S Laato, T Pietarinen, S Rauti, TH Laine
Proceedings of the 20th International Conference on Computer Systems and …, 2019
312019
Security in the internet of things through obfuscation and diversification
S Hosseinzadeh, S Rauti, S Hyrynsalmi, V Leppänen
2015 International Conference on Computing, Communication and Security …, 2015
302015
A survey on fake entities as a method to detect and monitor malicious activity
S Rauti, V Leppänen
2017 25th Euromicro international conference on Parallel, Distributed and …, 2017
242017
Diversification of system calls in linux binaries
S Rauti, S Laurén, S Hosseinzadeh, JM Mäkelä, S Hyrynsalmi, ...
Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China …, 2015
222015
Interface diversification in IoT operating systems
P Mäki, S Rauti, S Hosseinzadeh, L Koivunen, V Leppänen
Proceedings of the 9th International Conference on Utility and Cloud …, 2016
212016
Symbol diversification of linux binaries
S Laurén, P Mäki, S Rauti, S Hosseinzadeh, S Hyrynsalmi, V Leppänen
World Congress on Internet Security (WorldCIS-2014), 74-79, 2014
202014
The effects playing pokémon go has on physical activity-a systematic literature review
S Laato, S Hyrynsalmi, S Rauti, E Sutinen
192020
Software security considerations for IoT
A Koivu, L Koivunen, S Hosseinzadeh, S Laurén, S Hyrynsalmi, S Rauti, ...
2016 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2016
192016
A case study on software vulnerability coordination
J Ruohonen, S Rauti, S Hyrynsalmi, V Leppänen
Information and Software Technology 103, 239-257, 2018
182018
An interface diversified honeypot for malware analysis
S Laurén, S Rauti, V Leppänen
Proccedings of the 10th European Conference on Software Architecture …, 2016
172016
Preventing malicious attacks by diversifying Linux shell commands
J Uitto, S Rauti, JM Mäkelä, V Leppänen
SPLST, 206-220, 2015
152015
“You have a potential hacker’s infection”: A study on technical support scams
S Rauti, V Leppänen
2017 IEEE International Conference on Computer and Information Technology …, 2017
142017
Potential benefits of playing location-based games: an analysis of game mechanics
S Laato, T Pietarinen, S Rauti, E Sutinen
Computer Supported Education: 11th International Conference, CSEDU 2019 …, 2020
132020
A honeypot proxy framework for deceiving attackers with fabricated content
J Papalitsas, S Rauti, J Tammi, V Leppänen
Cyber Threat Intelligence, 239-258, 2018
132018
The system can't perform the operation now. Try again later.
Articles 1–20