Current Research Information SysTem In Norway
 
 

 Norsk versjon


 
Mainpage
Research results/NVI
Researchers
Projects
Research units
Log in
About Cristin
 
 
   
Back to search     Short format     Full format    
Export to


Showing results 1-50 of 76 << Previous 1 2    Next >>

2020
1 Meland, Per Håkon; Bayoumy, Yara; Sindre, Guttorm.
The Ransomware-as-a-Service economy within the darknet. Computers & security 2020 ;Volume 92.
NTNU SINTEF Untitled
 
2 Meland, Per Håkon; Sindre, Guttorm.
Cyber Attacks for Sale. I: Proceedings from the 2019 International Conference on Computational Science and Computational Intelligence (CSCI'19). IEEE conference proceedings 2020 ISBN 978-1-7281-5584-5. p. 54-59
NTNU SINTEF Untitled
 
2019
3 Branlat, Matthieu; Meland, Per Håkon; Evjemo, Tor Erik; Smoker, Anthony.
Connectivity and resilience of remote operations: insights from Air Traffic Management. 8th Resilience Engineering Association symposium; 2019-06-24 - 2019-06-27
SINTEF Untitled
 
4 Franke, Ulrik; Meland, Per Håkon.
Demand side expectations of cyber insurance. I: 2019 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA). IEEE 2019 ISBN 978-1-7281-0232-0. p. 1-8
SINTEF Untitled
 
5 Johansen, Bent; Sindre, Guttorm; Meland, Per Håkon.
You Don’t Know CryptoJack. Sikkerhet og Sårbarhet 2019; 2019-05-06 - 2019-05-08
NTNU Untitled
 
6 Meland, Per Håkon.
Resilient Cyber Security Through Cybercrime Market Analysis. 8th REA Symposium Embracing Resilience; 2019-06-24 - 2019-06-27
NTNU Untitled
 
7 Meland, Per Håkon; Bernsmed, Karin; Frøystad, Christian; Li, Jingyue; Sindre, Guttorm.
An experimental evaluation of bow-tie analysis for cybersecurity requirements. Lecture Notes in Computer Science (LNCS) 2019 ;Volume 11387. p. 173-191
NTNU SINTEF Untitled
 
8 Meland, Per Håkon; Bernsmed, Karin; Frøystad, Christian; Li, Jingyue; Sindre, Guttorm.
An experimental evaluation of bow-tie analysis for security. Information and Computer Security 2019 ;Volume 26.(4) p. 536-561
NTNU SINTEF Untitled
 
9 Meland, Per Håkon; Johansen, Bent.
You Don’t Know CryptoJack. Sikkerhetsfestivalen 2019; 2019-08-26 - 2019-08-28
NTNU Untitled
 
10 Meland, Per Håkon; Johansen, Bent Heier; Sindre, Guttorm.
An experimental analysis of cryptojacking attacks. I: Secure IT Systems. Springer 2019 ISBN 978-3-030-35055-0. p. 155-170
NTNU SINTEF Untitled
 
11 Myklebust, Thor; Meland, Per Håkon; Stålhane, Tor; Hanssen, Geir Kjetil.
The Agile RAMSS lifecycle for the future. I: Proceedings of the 29th European Safety and Reliability Conference(ESREL). 22 – 26 September 2019 Hannover, Germany. Research Publishing Services 2019 ISBN 978-981-11-2724-3. p. 4030-4035
NTNU SINTEF Untitled
 
12 Rødseth, Ørnulf Jan; Meland, Per Håkon; Frøystad, Christian; Drugan, Ovidiu Valentin.
PKI vs. Blockchain when Securing Maritime Operations. European Journal of Navigation 2019
OCEAN SINTEF Untitled
 
2018
13 Bayoumy, Yara; Meland, Per Håkon; Sindre, Guttorm.
A Netnographic Study on the Dark Net Ecosystem for Ransomware. I: 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), Glasgow UK, 11-12 June 2018. IEEE 2018 ISBN 978-1-5386-4565-9.
NTNU SINTEF Untitled
 
14 Bernsmed, Karin; Frøystad, Christian; Meland, Per Håkon; Nesheim, Dag Atle; Rødseth, Ørnulf Jan.
Visualizing cyber security risks with bow-tie diagrams. Lecture Notes in Computer Science (LNCS) 2018 ;Volume 10744. p. 38-56
OCEAN NTNU SINTEF Untitled
 
15 Bernsmed, Karin; Meland, Per Håkon; Jaatun, Martin Gilje.
Safety Critical Software and Security - How Low Can You Go?. I: 2018 IEEE AIAA 37th Digital Avionics Systems Conference (DASC) Proceedings. IEEE 2018 ISBN 978-1-5386-4112-5. p. 210-215
SINTEF Untitled
 
16 Meland, Per Håkon.
Combining threat models with security economics. NISK 2018; 2018-09-19 - 2018-09-20
NTNU Untitled
 
17 Meland, Per Håkon; Bayoumy, Yara.
The Dark Economy of Ransomware. Sikkerhet & Sårbarhet 2018; 2018-05-07 - 2018-05-08
NTNU Untitled
 
18 Meland, Per Håkon; Garbo, Ingvald.
Løsepengevirus. NRK P2 Studio2 [Radio] 2018-06-14
NTNU Untitled
 
19 Meland, Per Håkon; Seehusen, Fredrik.
When to Treat Security Risks with Cyber Insurance. I: 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), Glasgow UK, 11-12 June 2018. IEEE 2018 ISBN 978-1-5386-4565-9. p. -
NTNU SINTEF Untitled
 
20 Rødseth, Ørnulf Jan; Meland, Per Håkon; Frøystad, Christian; Drugan, Ovidiu Valentin.
PKI vs. Blockchain when Securing Maritime Operations. ISIS -MTE 2018; 2018-09-27 - 2018-09-28
OCEAN NTNU SINTEF Untitled
 
21 Stolt-Nielsen, Harald; Strøm, Trond; Bayoumy, Yara; Meland, Per Håkon.
– Løsepengevirus er blitt en industri på det mørke nettet. Aftenposten [Newspaper] 2018-06-07
SINTEF Untitled
 
2017
22 Bernsmed, Karin; Frøystad, Christian; Meland, Per Håkon; Myrvoll, Tor Andre.
Security Requirements for SATCOM Datalink Systems for Future Air Traffic Management. I: 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC) Proceedings, St. Petersburg, Florida, 17-21 September 2017. IEEE 2017 ISBN 978-1-5386-0364-2. p. -
SINTEF Untitled
 
23 Frøystad, Christian; Bernsmed, Karin; Meland, Per Håkon.
Protecting Future Maritime Communication. I: ARES'17. Proceedings of The 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy — August 29 - September 01, 2017. Association for Computing Machinery (ACM) 2017 ISBN 978-1-4503-5257-4. p. -
SINTEF Untitled
 
24 Meland, Per Håkon.
Cyber Security in Merchant Shipping (CySiMS). MAROFF formidlingsmøte 25-26 oktober 2017; 2017-10-25 - 2017-10-26
SINTEF Untitled
 
25 Meland, Per Håkon.
H2020: Digital Security. Seminar Secure Societies; 2017-03-01 - 2017-03-01
SINTEF Untitled
 
26 Meland, Per Håkon.
What’s hot or not in cyber security research and innovation. DND Sikkerhet og sårbarhet 2017; 2017-05-08 - 2017-05-09
SINTEF Untitled
 
27 Meland, Per Håkon; Tøndel, Inger Anne; Moe, Marie Elisabeth Gaup; Seehusen, Fredrik.
Facing uncertainty in cyber insurance policies. Lecture Notes in Computer Science (LNCS) 2017 ;Volume 10547. p. 89-100
NTNU SINTEF Untitled
 
2016
28 Moe, Nils Brede; Meland, Per Håkon.
Dyrekjøpt utflaggings-erfaring. Gemini 2016
NTNU SINTEF Untitled
 
29 Moe, Nils Brede; Meland, Per Håkon.
Dyrekjøpt utflaggingserfaring. Dagens næringsliv 2016
NTNU SINTEF Untitled
 
2015
30 Bernsmed, Karin; Meland, Per Håkon; Jaatun, Martin Gilje.
Cloud Security Requirements - A checklist with security and privacy requirements for public cloud services. : SINTEF 2015 (ISBN 978-82-14-05908-3) 23 p. SINTEF Rapport(A27131)
SINTEF Untitled
 
31 Gjære, Erlend Andreas; Jaatun, Martin Gilje; Meland, Per Håkon; Tøndel, Inger Anne; Bernsmed, Karin; Moe, Marie Elisabeth Gaup; Line, Maria Bartnes.
Blogg fra SINTEF forskningsgruppe informasjonssikkerhet.
SINTEF Untitled
 
32 Meland, Per Håkon; Tøndel, Inger Anne; Solhaug, Bjørnar.
Mitigating Risk with Cyberinsurance. IEEE Security and Privacy 2015 ;Volume 13.(6) p. 38-43
SINTEF Untitled
 
33 Mohammadi, Nazila Gol; Bandyszak, Torsten; Paulus, Sachar; Meland, Per Håkon; Weyer, Thorsten; Pohl, Klaus.
Extending software development methodologies to support trustworthiness-by-design. CEUR Workshop Proceedings 2015 ;Volume 1367. p. 213-220
SINTEF Untitled
 
34 Tøndel, Inger Anne; Meland, Per Håkon; Omerovic, Aida; Gjære, Erlend Andreas; Solhaug, Bjørnar.
Using Cyber-Insurance as a Risk Management Strategy: Knowledge Gaps and Recommendations for Further Research. : SINTEF 2015 (ISBN 978-82-14-05914-4) 24 p. SINTEF Rapport(A27298)
SINTEF Untitled
 
2014
35 Brucker,, Achim D.; Dalpiaz, Fabiano; Giorgini, Paolo; Meland, Per Håkon; Rios, Erkuden.
Secure and Trustworthy Service Composition. The Aniketos Approach. Springer 2014 (ISBN 978-3-319-13517-5) ;Volume 8900.247 p. Lecture Notes in Computer Science(.)
SINTEF Untitled
 
36 Gjære, Erlend Andreas; Meland, Per Håkon.
Threats management throughout the software service life-cycle. Electronic Proceedings in Theoretical Computer Science 2014 ;Volume 148. p. 1-14
SINTEF Untitled
 
37 Gjære, Erlend Andreas; Meland, Per Håkon; Vilarinho, Thomas.
Notification Support Infrastructure for Self-Adapting Composite Services. I: DEPEND 2014, The Seventh International Conference on Dependability, Lisbon, November 16 to November 20, 2014. International Academy, Research and Industry Association (IARIA) 2014 ISBN 978-1-61208-378-0. p. 17-24
SINTEF Untitled
 
38 Gjære, Erlend Andreas; Tøndel, Inger Anne; Jaatun, Martin Gilje; Meland, Per Håkon; Nyre, Åsmund Ahlmann; Bernsmed, Karin; Line, Maria Bartnes.
Infosec - Blogg fra faggruppe for informasjonssikkerhet, SINTEF IKT.
SINTEF Untitled
 
39 Meland, Per Håkon.
Composite Services with Dynamic Behaviour. I: Secure and Trustworthy Service Composition. The Aniketos Approach. Springer 2014 ISBN 978-3-319-13517-5. p. 1-9
SINTEF Untitled
 
40 Meland, Per Håkon; Asim, Muhammad; Ayed, Dhouha; Dalpiaz, Fabiano; Félix, Edith; Giorgini, Paolo; Gonzales, Susana Villa; Lempereur, Brett; Ronan, John.
Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions. I: Secure and Trustworthy Service Composition. The Aniketos Approach. Springer 2014 ISBN 978-3-319-13517-5. p. 10-35
SINTEF Untitled
 
41 Meland, Per Håkon; Bernsmed, Karin; Jaatun, Martin Gilje; Castejon, Humberto Nicolas; Undheim, Astrid.
Expressing cloud security requirements for SLAs in deontic contract languages for cloud brokers. International Journal of Cloud Computing 2014 ;Volume 3.(1) p. 69-93
SINTEF Untitled
 
42 Meland, Per Håkon; Paja, Elda; Gjære, Erlend Andreas; Paul, Stéphane; Dalpiaz, Fabiano; Giorgini, Paolo.
Threat Analysis in Goal-Oriented Security Requirements Modelling. International Journal of Secure Software Engineering (IJSSE) 2014 ;Volume 5.(2) p. -
SINTEF Untitled
 
43 Meland, Per Håkon; Rios, Erkuden; Tountopoulos, Vasilis; Brucker, Achim D..
The aniketos platform. I: Secure and Trustworthy Service Composition. The Aniketos Approach. Springer 2014 ISBN 978-3-319-13517-5. p. 50-62
SINTEF Untitled
 
44 Mohammadi, Nazila Gol; Bandyszak, Torsten; Paulus, Sachar; Meland, Per Håkon; Weyer, Thorsten; Pohl, Klaus.
Extending Development Methodologies with Trustworthiness-By-Design for Socio-Technical Systems. I: Trust and Trustworthy Computing : 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings. Springer 2014 ISBN 978-3-319-08592-0. p. 206-207
SINTEF Untitled
 
2013
45 Bernsmed, Karin; Undheim, Astrid; Meland, Per Håkon; Jaatun, Martin Gilje.
Towards an Ontology for Cloud Security Obligations. I: 2013 Eighth International Conference on Availability, Reliability and Security (ARES), Regensburg, 2-6 Sept. 2013. IEEE 2013 ISBN 978-0-7695-5008-4. p. 577-581
SINTEF Untitled
 
46 Di Cerbo, Francesco; Bisson, Pascal; Hartman, Alan; Keller, Sebastien; Meland, Per Håkon; Micha, Moffie; Gol Mohammadi, Nazila; Paulus, Sachar; Short, Stuart.
Towards Trustworthiness Assurance in the Cloud. Communications in Computer and Information Science 2013 ;Volume 182. p. 3-15
SINTEF Untitled
 
47 Frtunic, Milena; Jovanovic, Filip; Gligorijvic, Mladen; Dordevic, Lazar; Janicijevic, Srecko; Meland, Per Håkon; Bernsmed, Karin; Castejon, Humberto Nicolas.
CloudSurfer - A Cloud Broker Application for Security Concerns. I: CLOSER 2013 : Proceedings of the 3rd International Conference on Cloud Computing and Services Science, Aachen, Germany, 8-10 May, 2013. SciTePress 2013 ISBN 978-989-8565-52-5. p. 199-206
NTNU SINTEF Untitled
 
48 Meland, Per Håkon; Gjære, Erlend Andreas.
Threat Representation Methods for Composite Service Process Models. International Journal of Secure Software Engineering (IJSSE) 2013 ;Volume 4.(2) p. -
SINTEF Untitled
 
49 Meland, Per Håkon; Gjære, Erlend Andreas; Nyre, Åsmund Ahlmann; Tøndel, Inger Anne; Jaatun, Martin Gilje; Line, Maria Bartnes; Jensen, Jostein; Bernsmed, Karin.
Infosec - Blogg fra faggruppe for informasjonssikkerhet, SINTEF IKT.
SINTEF Untitled
 
50 Meland, Per Håkon; Gjære, Erlend Andreas; Paul, Stéphane.
The Use and Usefulness of Threats in Goal-Oriented Modelling. I: 2013 Eighth International Conference on Availability, Reliability and Security (ARES), Regensburg, 2-6 September 2013. IEEE 2013 ISBN 978-0-7695-5008-4. p. 428-436
SINTEF Untitled
 
    Show next list