default search action
Sampsa Rauti
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Samuli Laato, Sampsa Rauti, Bastian Kordyaka, Konstantinos Papangelis, Sangwon Jung, Timo Nummenmaa, Juho Hamari:
Gamification of walking in nature: A field experiment with Pokémon GO Routes. Proc. ACM Hum. Comput. Interact. 8(CHI): 1-25 (2024) - [c72]Sampsa Rauti, Esko Vuorinen, Panu Puhtila, Robin Carlsson:
Analysis of Third-Party Data Leaks on Finnish Mental Health Websites. MIPRO 2024: 1543-1548 - [c71]Sampsa Rauti, Robin Carlsson, Samuli Laato, Timi Heino, Panu Puhtila, Ville Leppänen:
Health data leaks to third parties in web-based health services. TKTP 2024: 117-121 - [c70]Samuli Laato, Sampsa Rauti, Anni Maria Laato, Samaan Al-Msallam, Sangwon Jung, Erkki Sutinen, Juho Hamari:
Sacred Spaces in the Digital Age: Perceptions of Lutheran Christian Priests on Augmented Reality at Holy Sites. IMX 2024: 256-267 - [c69]Panu Puhtila, Esko Vuorinen, Sampsa Rauti:
Third-Party Data Leaks in the Websites of Finnish Social and Healthcare Districts. WorldCIST (1) 2024: 139-152 - 2023
- [c68]Samuli Laato, Sampsa Rauti, Juho Hamari:
Resemblance of religion and pervasive games: A study among church employees and gamers. CHI 2023: 292:1-292:15 - [c67]Timi Heino, Sampsa Rauti, Robin Carlsson:
An assessment of privacy policies for smart home devices. CompSysTech 2023: 129-133 - [c66]Timi Heino, Sampsa Rauti, Robin Carlsson, Ville Leppänen:
Third-party services as a privacy threat on university websites. CompSysTech 2023: 134-138 - [c65]Sampsa Rauti, Samuli Laato:
Understanding Software Obfuscation and Diversification as Defensive Measures for the Cybersecurity of Internet of Things. HICSS 2023: 6645-6654 - [c64]Sampsa Rauti, Esko Vuorinen, Robin Carlsson:
How not to design an online pharmacy: A case study. ICISE 2023: 90-94 - [c63]Sampsa Rauti:
Lessons learned from studying third-party data leaks in web services. ICISE 2023: 125-129 - [c62]Samuli Laato, Sampsa Rauti, Alexander Espeseth, Heinrich Söbke, Juho Hamari, Oguz 'Oz' Buruk:
Composing Music Through Tile-based Games. ISM 2023: 309-314 - [c61]Robin Carlsson, Sampsa Rauti, Timi Heino:
Data leaks to third parties in web services for vulnerable groups. MIPRO 2023: 1208-1212 - [c60]Robin Carlsson, Sampsa Rauti, Samuli Laato, Timi Heino, Ville Leppänen:
Privacy in Popular Children's Mobile Applications: A Network Traffic Analysis. MIPRO 2023: 1213-1218 - [c59]Esko Vuorinen, Panu Puhtila, Sampsa Rauti, Ville Leppänen:
From Whistle to Echo: Data Leaks in Web-Based Whistleblowing Channels. NordSec 2023: 37-53 - [c58]Panu Puhtila, Robin Carlsson, Sampsa Rauti:
Privacy Risks of Third-Party Services on Women's Shelter Websites. SIN 2023: 1-6 - [c57]Sampsa Rauti, Esko Vuorinen, Robin Carlsson, Panu Puhtila:
Data Leaks to Third-Party Services on Medical Websites. SIN 2023: 1-7 - [c56]Robin Carlsson, Panu Puhtila, Sampsa Rauti:
Towards an Automatic Tool for Detecting Third-Party Data Leaks on Websites. SQAMIA 2023 - 2022
- [c55]Timi Heino, Robin Carlsson, Sampsa Rauti, Ville Leppänen:
Assessing discrepancies between network traffic and privacy policies of public sector web services. ARES 2022: 11:1-11:6 - [c54]Samuli Laato, Sampsa Rauti:
Comparing Social Media Reactions to Early Game Songs and Final Boss Music in Single Player Adventure Games. HICSS 2022: 1-10 - [c53]Robin Carlsson, Timi Heino, Lauri Koivunen, Sampsa Rauti, Ville Leppänen:
Where Does Your Data Go? Comparing Network Traffic and Privacy Policies of Public Sector Mobile Applications. WorldCIST (1) 2022: 214-225 - 2021
- [j7]Samuli Laato, Sampsa Rauti, A. K. M. Najmul Islam, Erkki Sutinen:
Why playing augmented reality games feels meaningful to players? The roles of imagination and social experience. Comput. Hum. Behav. 121: 106816 (2021) - [j6]Samuli Laato, Sampsa Rauti, Antti Laato, Teemu Henrikki Laine, Erkki Sutinen, Erno Lehtinen:
Learning History with Location-Based Applications: An Architecture for Points of Interest in Multiple Layers. Sensors 21(1): 129 (2021) - [c52]Samuli Laato, Sampsa Rauti, Lauri Koivunen, Jouni Smed:
Technical cheating prevention in location-based games. CompSysTech 2021: 40-48 - [c51]Samuli Laato, Sampsa Rauti:
Video games and religion: Lutheran Church employees' perspectives on similarities between virtual and spiritual worlds. GamiFIN 2021: 140-149 - [c50]Samuli Laato, Sampsa Rauti:
Central Themes of the Pokémon Franchise and why they Appeal to Humans. HICSS 2021: 1-10 - [c49]Samuli Laato, Sampsa Rauti:
When Player Communities Revolt Against the Developer: A Study of Pokémon GO and Diablo Immortal. ICSOB 2021: 194-201 - [c48]Sampsa Rauti, Samuli Laato:
Filters that Fight Back Revisited: Conceptualization and Future Agenda. WorldCIST (1) 2021: 365-374 - 2020
- [j5]Samuli Laato, Sonja Hyrynsalmi, Sampsa Rauti, A. K. M. Najmul Islam, Teemu Henrikki Laine:
Location-based Games as Exergames - From Pokémon To The Wizarding World. Int. J. Serious Games 7(1): 79-95 (2020) - [c47]Sampsa Rauti, Samuli Laato, Tarja Pietarinen:
Learning Social Skills and Acquiring Social Capital through Pervasive Gaming. DELbA@EC-TEL 2020 - [c46]Samuli Laato, Bastian Kordyaka, Sampsa Rauti, Sonja Hyrynsalmi, Marianna Hoikkala, Tarja Pietarinen, Teemu D. Laajala, Mauri Paloheimo, Nobufumi Inaba, Sami Hyrynsalmi:
Do primal instincts explain engagement in location-based games? A hypothesis-forming focus group study on territorial behavior. GamiFIN 2020: 115-125 - [c45]Samuli Laato, Sonja Hyrynsalmi, Sampsa Rauti, Erkki Sutinen:
The Effects Playing Pokémon GO has on Physical Activity -A Systematic Literature Review. HICSS 2020: 1-10 - [c44]Samuli Laato, Sampsa Rauti, Erkki Sutinen:
The Role of Music in 21st Century Education-Comparing Programming and Music Composing. ICALT 2020: 269-273 - [c43]Lauri Koivunen, Samuli Laato, Sampsa Rauti, Juhani Naskali, Petri Nissilä, Pauliina Ojansivu, Tuomas Mäkilä, Mari Norrdal:
Increasing Customer Awareness on Food Waste at University Cafeteria with a Sensor-Based Intelligent Self-Serve Lunch Line. ICE/ITMC 2020: 1-9 - [c42]Sampsa Rauti, Samuli Laato, Tinja Pitkämäki:
Man-in-the-Browser Attacks Against IoT Devices: A Study of Smart Homes. SoCPaR 2020: 727-737 - [c41]Samuli Laato, Sampsa Rauti:
Scambaiting as a Form of Online Video Entertainment: An Exploratory Study. SoCPaR 2020: 738-748 - [c40]Tuisku Polvinen, Timo Ylikännö, Ari Mäkeläinen, Sampsa Rauti, Jari-Matti Mäkelä, Jani Tammi:
Building a Virtualized Environment for Programming Courses. WorldCIST (2) 2020: 45-55 - [c39]Sampsa Rauti, Samuli Laato:
Location-Based Games as Interfaces for Collecting User Data. WorldCIST (2) 2020: 631-642 - [i1]Jukka Ruohonen, Sampsa Rauti, Sami Hyrynsalmi, Ville Leppänen:
A Case Study on Software Vulnerability Coordination. CoRR abs/2007.12356 (2020)
2010 – 2019
- 2019
- [c38]Sampsa Rauti:
An Inquiry into Localized Email Spam. CompSysTech 2019: 42-48 - [c37]Samuli Laato, Tarja Pietarinen, Sampsa Rauti, Teemu Henrikki Laine:
Analysis of the Quality of Points of Interest in the Most Popular Location-based Games. CompSysTech 2019: 153-160 - [c36]Samuli Laato, Tarja Pietarinen, Sampsa Rauti, Erkki Sutinen:
Potential Benefits of Playing Location-Based Games: An Analysis of Game Mechanics. CSEDU (Selected Papers) 2019: 557-581 - [c35]Samuli Laato, Tarja Pietarinen, Sampsa Rauti, Mauri Paloheimo, Nobufumi Inaba, Erkki Sutinen:
A Review of Location-based Games: Do They All Support Exercise, Social Interaction and Cartographical Training? CSEDU (1) 2019: 616-627 - [c34]Sampsa Rauti:
A Survey on Countermeasures Against Man-in-the-Browser Attacks. HIS 2019: 409-418 - [c33]Sampsa Rauti:
Towards Cyber Attribution by Deception. HIS 2019: 419-428 - [c32]Sami Hyrynsalmi, Sampsa Rauti, Erkki Kaila:
Bridging the gap between software architecture and business model development: A literature study. MIPRO 2019: 1519-1524 - [c31]Sampsa Rauti:
Man-in-the-browser Attack: A Case Study on Malicious Browser Extensions. SSCC 2019: 60-71 - [c30]Sampsa Rauti:
Controlling Uncertainty with Proactive Cyber Defense: A Clausewitzian Perspective. SSCC 2019: 335-347 - [c29]Sampsa Rauti:
Protecting Computer Systems from Cyber Attacks with Internal Interface Diversification. SSCC 2019: 348-359 - 2018
- [j4]Jukka Ruohonen, Sampsa Rauti, Sami Hyrynsalmi, Ville Leppänen:
A case study on software vulnerability coordination. Inf. Softw. Technol. 103: 239-257 (2018) - [j3]Shohreh Hosseinzadeh, Sampsa Rauti, Samuel Laurén, Jari-Matti Mäkelä, Johannes Holvitie, Sami Hyrynsalmi, Ville Leppänen:
Diversification and obfuscation techniques for software security: A systematic literature review. Inf. Softw. Technol. 104: 72-93 (2018) - [j2]Sampsa Rauti, Lauri Koivunen, Petteri Mäki, Shohreh Hosseinzadeh, Samuel Laurén, Johannes Holvitie, Ville Leppänen:
Internal Interface Diversification as a Security Measure in Sensor Networks. J. Sens. Actuator Networks 7(1): 12 (2018) - [c28]Sampsa Rauti, Ville Leppänen:
A Comparison of Online JavaScript Obfuscators. ICSSA 2018: 7-12 - [c27]Lauri Koivunen, Sampsa Rauti, Ville Leppänen:
Towards Profiling Program Instances in Host-Based Intrusion Detection Systems by Recognizing Software Update Patterns. SIN 2018: 21:1-21:4 - [c26]Heini Ahde, Sampsa Rauti, Ville Leppänen:
A Survey on the Use of Data Points in IDS Research. SoCPaR 2018: 329-337 - [c25]Jarko Papalitsas, Jani Tammi, Sampsa Rauti, Ville Leppänen:
Recognizing Dynamic Fields in Network Traffic with a Manually Assisted Solution. WorldCIST (2) 2018: 208-217 - 2017
- [j1]Sampsa Rauti, Janne Lahtiranta, Heidi Parisod, Sami Hyrynsalmi, Sanna Salanterä, Minna Elisabeth Aromaa, Jouni Smed, Ville Leppänen:
A Proxy-Based Solution for Asynchronous Telemedical Systems. Int. J. E Health Medical Commun. 8(3): 70-83 (2017) - [c24]Sampsa Rauti, Ville Leppänen:
"You have a Potential Hacker's Infection": A Study on Technical Support Scams. CIT 2017: 197-203 - [c23]Jarko Papalitsas, Sampsa Rauti, Ville Leppänen:
A Comparison of Record and Play Honeypot Designs. CompSysTech 2017: 133-140 - [c22]Samuel Laurén, Sampsa Rauti, Ville Leppänen:
A Survey on Application Sandboxing Techniques. CompSysTech 2017: 141-148 - [c21]Jukka Ruohonen, Sami Hyrynsalmi, Sampsa Rauti, Ville Leppänen:
Mining social networks of open source CVE coordination. IWSM-Mensura 2017: 176-188 - [c20]Sampsa Rauti, Ville Leppänen:
A Survey on Fake Entities as a Method to Detect and Monitor Malicious Activity. PDP 2017: 386-390 - [c19]Jani Tammi, Sampsa Rauti, Ville Leppänen:
Practical challenges in building fake services with the record and play approach. SIN 2017: 235-239 - [c18]Sampsa Rauti, Ville Leppänen:
Internal interface diversification with multiple fake interfaces. SIN 2017: 245-250 - [c17]Joni Uitto, Sampsa Rauti, Samuel Laurén, Ville Leppänen:
A Survey on Anti-honeypot and Anti-introspection Methods. WorldCIST (2) 2017: 125-134 - 2016
- [c16]Shohreh Hosseinzadeh, Sampsa Rauti, Samuel Laurén, Jari-Matti Mäkelä, Johannes Holvitie, Sami Hyrynsalmi, Ville Leppänen:
A Survey on Aims and Environments of Diversification and Obfuscation in Software Security. CompSysTech 2016: 113-120 - [c15]Joni Uitto, Sampsa Rauti, Ville Leppänen:
Practical implications and requirements of diversifying interpreted languages. CISRC 2016: 14:1-14:4 - [c14]Samuel Laurén, Sampsa Rauti, Ville Leppänen:
An interface diversified honeypot for malware analysis. ECSA Workshops 2016: 29 - [c13]Lauri Koivunen, Sampsa Rauti, Ville Leppänen:
Applying Internal Interface Diversification to IoT Operating Systems. ICSSA 2016: 1-5 - [c12]Aki Koivu, Lauri Koivunen, Shohreh Hosseinzadeh, Samuel Laurén, Sami Hyrynsalmi, Sampsa Rauti, Ville Leppänen:
Software Security Considerations for IoT. iThings/GreenCom/CPSCom/SmartData 2016: 392-397 - [c11]Sampsa Rauti, Samuel Laurén, Joni Uitto, Shohreh Hosseinzadeh, Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen:
A Survey on Internal Interfaces Used by Exploits and Implications on Interface Diversification. NordSec 2016: 152-168 - [c10]Petteri Mäki, Sampsa Rauti, Shohreh Hosseinzadeh, Lauri Koivunen, Ville Leppänen:
Interface diversification in IoT operating systems. UCC 2016: 304-309 - 2015
- [c9]Samuel Laurén, Sampsa Rauti, Ville Leppänen:
Diversification of system calls in linux kernel. CompSysTech 2015: 284-291 - [c8]Shohreh Hosseinzadeh, Samuel Laurén, Sampsa Rauti, Sami Hyrynsalmi, Mauro Conti, Ville Leppänen:
Obfuscation and Diversification for Securing Cloud Computing. ES 2015: 179-202 - [c7]Joni Uitto, Sampsa Rauti, Jari-Matti Mäkelä, Ville Leppänen:
Preventing malicious attacks by diversifying Linux shell commands. SPLST 2015: 206-220 - [c6]Sampsa Rauti, Jukka Teuhola, Ville Leppänen:
Diversifying SQL to Prevent Injection Attacks. TrustCom/BigDataSE/ISPA (1) 2015: 344-351 - 2014
- [c5]Sampsa Rauti, Johannes Holvitie, Ville Leppänen:
Towards a diversification framework for operating system protection. CompSysTech 2014: 286-293 - [c4]Sampsa Rauti, Samuel Laurén, Shohreh Hosseinzadeh, Jari-Matti Mäkelä, Sami Hyrynsalmi, Ville Leppänen:
Diversification of System Calls in Linux Binaries. INTRUST 2014: 15-35 - [c3]Sampsa Rauti, Heidi Parisod, Minna Elisabeth Aromaa, Sanna Salanterä, Sami Hyrynsalmi, Janne Lahtiranta, Jouni Smed, Ville Leppänen:
A Proxy-Based Security Solution for Web-Based Online eHealth Services. WIS 2014: 168-176 - [c2]Samuel Laurén, Petteri Mäki, Sampsa Rauti, Shohreh Hosseinzadeh, Sami Hyrynsalmi, Ville Leppänen:
Symbol diversification of linux binaries. WorldCIS 2014: 74-79 - 2012
- [c1]Sampsa Rauti, Ville Leppänen:
Browser extension-based man-in-the-browser attacks against Ajax applications with countermeasures. CompSysTech 2012: 251-258
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint