Seguir
Per Håkon Meland
Per Håkon Meland
SINTEF and NTNU
Dirección de correo verificada de sintef.no
Título
Citado por
Citado por
Año
Security requirements for the rest of us: A survey
IA Tøndel, MG Jaatun, PH Meland
Software, IEEE 25 (1), 20-27, 2008
2032008
The Ransomware-as-a-Service Economy within the Darknet
PH Meland, YFF Bayoumy, G Sindre
Computers & Security, 101762, 2020
1942020
Security SLAs for Federated Cloud Services
K Bernsmed, MG Jaatun, PH Meland, A Undheim
Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011
1322011
A Retrospective Analysis of Maritime Cyber Security Incidents
PH Meland, K Bernsmed, E Wille, ØJ Rødseth, DA Nesheim
TransNav, International Journal on Marine Navigation and Safety od Sea …, 2021
942021
Attribute Decoration of Attack–Defense Trees
A Bagnato, B Kordy, PH Meland, P Schweitzer
International Journal of Secure Software Engineering (IJSSE) 3 (2), 1-35, 2012
922012
Mitigating Risk with Cyberinsurance
PH Meland, IA Tondel, B Solhaug
IEEE Security & Privacy, 38-43, 2015
632015
Secure software design in practice
PH Meland, J Jensen
Availability, Reliability and Security, 2008. ARES 08. Third International …, 2008
562008
Visualizing Cyber Security Risks with Bow-Tie Diagrams
K Bernsmed, C Frøystad, PH Meland, DA Nesheim, ØJ Rødseth
International Workshop on Graphical Models for Security, 38-56, 2017
472017
SeaMonster: Providing tool support for security modeling
PH Meland, DG Spampinato, E Hagen, ET Baadshaug, KM Krister, ...
Norsk informasjonssikkerhetskonferanse, NISK, 2008
452008
Evacuation support system for improved medical documentation and information flow in the field
S Walderhaug, PH Meland, M Mikalsen, T Sagen, JI Brevik
International journal of medical informatics 77 (2), 137-151, 2008
432008
SINTEF ICT, Oslo, Norway
K Bernsmed, MG Jaatun, PH Meland, A Undheim
Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th …, 2012
38*2012
Thunder in the Clouds: Security challenges and solutions for federated Clouds
A Undheim, PH Meland, K Bernsmed, MG Jaatun
Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing …, 2012
38*2012
Reusable Security Requirements for Healthcare Applications
J Jensen, IA Tondel, MG Jaatun, PH Meland, H Andresen
Availability, Reliability and Security, 2009. ARES'09. International …, 2009
352009
How can the developer benefit from security modeling?
S Ardi, D Byers, PH Meland, IA Tøndel, N Shahmehri
Availability, Reliability and Security, 2007. ARES 2007. The Second …, 2007
352007
Representing Threats in BPMN 2.0
PH Meland, EA Gjære
Availability, Reliability and Security (ARES), 2012 Seventh International …, 2012
302012
Assessing cyber threats for storyless systems
PH Meland, DA Nesheim, K Bernsmed, G Sindre
Journal of Information Security and Applications 64, 103050, 2022
292022
Security Requirements Engineering for Secure Business Processes
E Paja, P Giorgini, S Paul, PH Meland
Workshops on Business Informatics Research, 77-89, 2012
262012
An architectural foundation for security model sharing and reuse
PH Meland, S Ardi, J Jensen, E Rios, T Sanchez, N Shahmehri, IA Tondel
Availability, Reliability and Security, 2009. ARES'09. International …, 2009
262009
Threat Analysis in Goal-Oriented Security Requirements Modelling
PH Meland, E Paja, EA Gjære, S Paul, F Dalpiaz, P Giorgini
International Journal of Secure Software Engineering (IJSSE) 5 (2), 1-19, 2014
242014
Security testing in agile web application development-a case study using the east methodology
G Erdogan, PH Meland, D Mathieson
Agile Processes in Software Engineering and Extreme Programming, 14-27, 2010
242010
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20