Current Research Information SysTem In Norway
 
 

 English version


 
Hovedside
Forskningsresultater/NVI
Forskere
Prosjekter
Forskningsenheter
Logg inn
Om Cristin
 
 
   
Eksporter til


Viser treff 1-50 av 68 << Forrige 1 2    Neste >>

2019
1 Branlat, Matthieu; Meland, Per Håkon; Evjemo, Tor Erik; Smoker, Anthony.
Connectivity and resilience of remote operations: insights from Air Traffic Management. 8th Resilience Engineering Association symposium; 2019-06-24 - 2019-06-27
SINTEF Untitled
 
2 Meland, Per Håkon; Bernsmed, Karin; Frøystad, Christian; Li, Jingyue; Sindre, Guttorm.
An experimental evaluation of bow-tie analysis for cybersecurity requirements. Lecture Notes in Computer Science 2019 ;Volum 11387. s. 173-191
NTNU SINTEF Untitled
 
3 Meland, Per Håkon; Bernsmed, Karin; Frøystad, Christian; Li, Jingyue; Sindre, Guttorm.
An experimental evaluation of bow-tie analysis for security. Information and Computer Security 2019 ;Volum 27.(4) s. 536-561
NTNU SINTEF Untitled
 
4 Rødseth, Ørnulf Jan; Meland, Per Håkon; Frøystad, Christian; Drugan, Ovidiu Valentin.
PKI vs. Blockchain when Securing Maritime Operations. European Journal of Navigation 2019
OCEAN NTNU SINTEF Untitled
 
2018
5 Bayoumy, Yara; Meland, Per Håkon; Sindre, Guttorm.
A Netnographic Study on the Dark Net Ecosystem for Ransomware. I: 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), Glasgow UK, 11-12 June 2018. IEEE 2018 ISBN 978-1-5386-4565-9.
NTNU SINTEF Untitled
 
6 Bernsmed, Karin; Frøystad, Christian; Meland, Per Håkon; Nesheim, Dag Atle; Rødseth, Ørnulf Jan.
Visualizing cyber security risks with bow-tie diagrams. Lecture Notes in Computer Science 2018 ;Volum 10744. s. 38-56
OCEAN NTNU SINTEF Untitled
 
7 Bernsmed, Karin; Meland, Per Håkon; Jaatun, Martin Gilje.
Safety Critical Software and Security - How Low Can You Go?. I: 2018 IEEE AIAA 37th Digital Avionics Systems Conference (DASC) Proceedings. IEEE 2018 ISBN 978-1-5386-4112-5. s. 210-215
SINTEF Untitled
 
8 Meland, Per Håkon.
Combining threat models with security economics. NISK 2018; 2018-09-19 - 2018-09-20
NTNU Untitled
 
9 Meland, Per Håkon; Bayoumy, Yara.
The Dark Economy of Ransomware. Sikkerhet & Sårbarhet 2018; 2018-05-07 - 2018-05-08
NTNU Untitled
 
10 Meland, Per Håkon; Garbo, Ingvald.
Løsepengevirus. NRK P2 Studio2 [Radio] 2018-06-14
NTNU Untitled
 
11 Meland, Per Håkon; Seehusen, Fredrik.
When to Treat Security Risks with Cyber Insurance. I: 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), Glasgow UK, 11-12 June 2018. IEEE 2018 ISBN 978-1-5386-4565-9. s. -
NTNU SINTEF Untitled
 
12 Rødseth, Ørnulf Jan; Meland, Per Håkon; Frøystad, Christian; Drugan, Ovidiu Valentin.
PKI vs. Blockchain when Securing Maritime Operations. ISIS -MTE 2018; 2018-09-27 - 2018-09-28
OCEAN NTNU SINTEF Untitled
 
13 Stolt-Nielsen, Harald; Strøm, Trond; Bayoumy, Yara; Meland, Per Håkon.
– Løsepengevirus er blitt en industri på det mørke nettet. Aftenposten [Avis] 2018-06-07
SINTEF Untitled
 
2017
14 Bernsmed, Karin; Frøystad, Christian; Meland, Per Håkon; Myrvoll, Tor Andre.
Security Requirements for SATCOM Datalink Systems for Future Air Traffic Management. I: 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC) Proceedings, St. Petersburg, Florida, 17-21 September 2017. IEEE 2017 ISBN 978-1-5386-0364-2. s. -
SINTEF Untitled
 
15 Frøystad, Christian; Bernsmed, Karin; Meland, Per Håkon.
Protecting Future Maritime Communication. I: ARES'17. Proceedings of The 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy — August 29 - September 01, 2017. Association for Computing Machinery (ACM) 2017 ISBN 978-1-4503-5257-4. s. -
SINTEF Untitled
 
16 Meland, Per Håkon.
Cyber Security in Merchant Shipping (CySiMS). MAROFF formidlingsmøte 25-26 oktober 2017; 2017-10-25 - 2017-10-26
SINTEF Untitled
 
17 Meland, Per Håkon.
H2020: Digital Security. Seminar Secure Societies; 2017-03-01 - 2017-03-01
SINTEF Untitled
 
18 Meland, Per Håkon.
What’s hot or not in cyber security research and innovation. DND Sikkerhet og sårbarhet 2017; 2017-05-08 - 2017-05-09
SINTEF Untitled
 
19 Meland, Per Håkon; Tøndel, Inger Anne; Moe, Marie Elisabeth Gaup; Seehusen, Fredrik.
Facing uncertainty in cyber insurance policies. Lecture Notes in Computer Science 2017 ;Volum 10547. s. 89-100
NTNU SINTEF Untitled
 
2016
20 Moe, Nils Brede; Meland, Per Håkon.
Dyrekjøpt utflaggings-erfaring. Gemini 2016
NTNU SINTEF Untitled
 
21 Moe, Nils Brede; Meland, Per Håkon.
Dyrekjøpt utflaggingserfaring. Dagens næringsliv 2016
NTNU SINTEF Untitled
 
2015
22 Bernsmed, Karin; Meland, Per Håkon; Jaatun, Martin Gilje.
Cloud Security Requirements - A checklist with security and privacy requirements for public cloud services. : SINTEF 2015 (ISBN 978-82-14-05908-3) 23 s. SINTEF Rapport(A27131)
SINTEF Untitled
 
23 Gjære, Erlend Andreas; Jaatun, Martin Gilje; Meland, Per Håkon; Tøndel, Inger Anne; Bernsmed, Karin; Moe, Marie Elisabeth Gaup; Line, Maria Bartnes.
Blogg fra SINTEF forskningsgruppe informasjonssikkerhet.
SINTEF Untitled
 
24 Meland, Per Håkon; Tøndel, Inger Anne; Solhaug, Bjørnar.
Mitigating Risk with Cyberinsurance. IEEE Security and Privacy 2015 ;Volum 13.(6) s. 38-43
SINTEF Untitled
 
25 Mohammadi, Nazila Gol; Bandyszak, Torsten; Paulus, Sachar; Meland, Per Håkon; Weyer, Thorsten; Pohl, Klaus.
Extending software development methodologies to support trustworthiness-by-design. CEUR Workshop Proceedings 2015 ;Volum 1367. s. 213-220
SINTEF Untitled
 
26 Tøndel, Inger Anne; Meland, Per Håkon; Omerovic, Aida; Gjære, Erlend Andreas; Solhaug, Bjørnar.
Using Cyber-Insurance as a Risk Management Strategy: Knowledge Gaps and Recommendations for Further Research. : SINTEF 2015 (ISBN 978-82-14-05914-4) 24 s. SINTEF Rapport(A27298)
SINTEF Untitled
 
2014
27 Brucker,, Achim D.; Dalpiaz, Fabiano; Giorgini, Paolo; Meland, Per Håkon; Rios, Erkuden.
Secure and Trustworthy Service Composition. The Aniketos Approach. Springer 2014 (ISBN 978-3-319-13517-5) ;Volum 8900.247 s. Lecture Notes in Computer Science(.)
SINTEF Untitled
 
28 Gjære, Erlend Andreas; Meland, Per Håkon.
Threats management throughout the software service life-cycle. Electronic Proceedings in Theoretical Computer Science 2014 ;Volum 148. s. 1-14
SINTEF Untitled
 
29 Gjære, Erlend Andreas; Meland, Per Håkon; Vilarinho, Thomas.
Notification Support Infrastructure for Self-Adapting Composite Services. I: DEPEND 2014, The Seventh International Conference on Dependability, Lisbon, November 16 to November 20, 2014. International Academy, Research and Industry Association (IARIA) 2014 ISBN 978-1-61208-378-0. s. 17-24
SINTEF Untitled
 
30 Gjære, Erlend Andreas; Tøndel, Inger Anne; Jaatun, Martin Gilje; Meland, Per Håkon; Nyre, Åsmund Ahlmann; Bernsmed, Karin; Line, Maria Bartnes.
Infosec - Blogg fra faggruppe for informasjonssikkerhet, SINTEF IKT.
SINTEF Untitled
 
31 Meland, Per Håkon.
Composite Services with Dynamic Behaviour. I: Secure and Trustworthy Service Composition. The Aniketos Approach. Springer 2014 ISBN 978-3-319-13517-5. s. 1-9
SINTEF Untitled
 
32 Meland, Per Håkon; Asim, Muhammad; Ayed, Dhouha; Dalpiaz, Fabiano; Félix, Edith; Giorgini, Paolo; Gonzales, Susana Villa; Lempereur, Brett; Ronan, John.
Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions. I: Secure and Trustworthy Service Composition. The Aniketos Approach. Springer 2014 ISBN 978-3-319-13517-5. s. 10-35
SINTEF Untitled
 
33 Meland, Per Håkon; Bernsmed, Karin; Jaatun, Martin Gilje; Castejon, Humberto Nicolas; Undheim, Astrid.
Expressing cloud security requirements for SLAs in deontic contract languages for cloud brokers. International Journal of Cloud Computing 2014 ;Volum 3.(1) s. 69-93
SINTEF Untitled
 
34 Meland, Per Håkon; Paja, Elda; Gjære, Erlend Andreas; Paul, Stéphane; Dalpiaz, Fabiano; Giorgini, Paolo.
Threat Analysis in Goal-Oriented Security Requirements Modelling. International Journal of Secure Software Engineering 2014 ;Volum 5.(2) s. -
SINTEF Untitled
 
35 Meland, Per Håkon; Rios, Erkuden; Tountopoulos, Vasilis; Brucker, Achim D..
The aniketos platform. I: Secure and Trustworthy Service Composition. The Aniketos Approach. Springer 2014 ISBN 978-3-319-13517-5. s. 50-62
SINTEF Untitled
 
36 Mohammadi, Nazila Gol; Bandyszak, Torsten; Paulus, Sachar; Meland, Per Håkon; Weyer, Thorsten; Pohl, Klaus.
Extending Development Methodologies with Trustworthiness-By-Design for Socio-Technical Systems. I: Trust and Trustworthy Computing : 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings. Springer 2014 ISBN 978-3-319-08592-0. s. 206-207
SINTEF Untitled
 
2013
37 Bernsmed, Karin; Undheim, Astrid; Meland, Per Håkon; Jaatun, Martin Gilje.
Towards an Ontology for Cloud Security Obligations. I: 2013 Eighth International Conference on Availability, Reliability and Security (ARES), Regensburg, 2-6 Sept. 2013. IEEE 2013 ISBN 978-0-7695-5008-4. s. 577-581
SINTEF Untitled
 
38 Di Cerbo, Francesco; Bisson, Pascal; Hartman, Alan; Keller, Sebastien; Meland, Per Håkon; Micha, Moffie; Gol Mohammadi, Nazila; Paulus, Sachar; Short, Stuart.
Towards Trustworthiness Assurance in the Cloud. Communications in Computer and Information Science 2013 ;Volum 182. s. 3-15
SINTEF Untitled
 
39 Frtunic, Milena; Jovanovic, Filip; Gligorijvic, Mladen; Dordevic, Lazar; Janicijevic, Srecko; Meland, Per Håkon; Bernsmed, Karin; Castejon, Humberto Nicolas.
CloudSurfer - A Cloud Broker Application for Security Concerns. I: CLOSER 2013 : Proceedings of the 3rd International Conference on Cloud Computing and Services Science, Aachen, Germany, 8-10 May, 2013. SciTePress 2013 ISBN 978-989-8565-52-5. s. 199-206
NTNU SINTEF Untitled
 
40 Meland, Per Håkon; Gjære, Erlend Andreas.
Threat Representation Methods for Composite Service Process Models. International Journal of Secure Software Engineering 2013 ;Volum 4.(2) s. -
SINTEF Untitled
 
41 Meland, Per Håkon; Gjære, Erlend Andreas; Nyre, Åsmund Ahlmann; Tøndel, Inger Anne; Jaatun, Martin Gilje; Line, Maria Bartnes; Jensen, Jostein; Bernsmed, Karin.
Infosec - Blogg fra faggruppe for informasjonssikkerhet, SINTEF IKT.
SINTEF Untitled
 
42 Meland, Per Håkon; Gjære, Erlend Andreas; Paul, Stéphane.
The Use and Usefulness of Threats in Goal-Oriented Modelling. I: 2013 Eighth International Conference on Availability, Reliability and Security (ARES), Regensburg, 2-6 September 2013. IEEE 2013 ISBN 978-0-7695-5008-4. s. 428-436
SINTEF Untitled
 
2012
43 Bagnato, Alessandra; Kordy, Barbara; Meland, Per Håkon; Schweitzer, Patrick.
Attribute Decoration of Attack–Defense Trees. International Journal of Secure Software Engineering 2012 ;Volum 3.(2) s. -
SINTEF Untitled
 
44 Bernsmed, Karin; Jaatun, Martin Gilje; Meland, Per Håkon; Undheim, Astrid.
Thunder in the Clouds: Security Challenges and Solutions for Federated Clouds. I: CloudCom 2012 : Fourth IEEE International Conference on Cloud Computing Technology and Science, Proceedings, Taipei, Taiwan, December 3-6, 2012. IEEE conference proceedings 2012 ISBN 978-1-4673-4509-5. s. 113-120
SINTEF Untitled
 
45 de Leon, M. P.; Sanders, Richard; Meland, Per Håkon; Egea, Marina; Zeta, Dooly.
Aniketos: Challenges and Results. Lecture Notes in Computer Science 2012 ;Volum 7449. s. 234-235
SINTEF Untitled
 
46 Line, Maria Bartnes; Jaatun, Martin Gilje; Tøndel, Inger Anne; Meland, Per Håkon; Jensen, Jostein; Gjære, Erlend Andreas; Nyre, Åsmund Ahlmann; Bernsmed, Karin.
Infosec - Blogg fra faggruppe for informasjonssikkerhet, SINTEF IKT.
SINTEF Untitled
 
47 Meland, Per Håkon.
Service Injection: A Threat to Self-managed Complex Systems. I: 2011 Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC) : Sydney 12-14 Dec. 2011. IEEE conference proceedings 2012 ISBN 978-1-4673-0006-3. s. -
SINTEF Untitled
 
48 Meland, Per Håkon; Bernsmed, Karin; Jaatun, Martin Gilje; Undheim, Astrid; Castejon, Humberto Nicolas.
Expressing Cloud Security Requirements in Deontic Contract Languages. I: CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science. SciTePress 2012 ISBN 978-989-8565-05-1. s. 638-646
SINTEF Untitled
 
49 Meland, Per Håkon; Gjære, Erlend Andreas.
Representing Threats in BPMN 2.0. I: 2012 Seventh International Conference on Availability, Reliability and Security (ARES), Prague, 20-24 August, 2012. IEEE conference proceedings 2012 ISBN 978-1-4673-2244-7. s. 542-550
SINTEF Untitled
 
50 Paja, Elda; Giorgini, Paolo; Paul, Stéphane; Meland, Per Håkon.
Security Requirements Engineering for Secure Business Processes. Lecture Notes in Business Information Processing 2012 ;Volum 106.(part 2) s. 77-89
SINTEF Untitled
 
    Vis neste liste