Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Per Håkon Meland
@inproceedings{DBLP:conf/esem/LiMNST23, author = {Jingyue Li and Per H{\aa}kon Meland and Jakob Svennevik Notland and Andr{\'{e}} Storhaug and Jostein Hjortland Tysse}, title = {Evaluating the Impact of ChatGPT on Exercises of a Software Security Course}, booktitle = {{ACM/IEEE} International Symposium on Empirical Software Engineering and Measurement, {ESEM} 2023, New Orleans, LA, USA, October 26-27, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ESEM56168.2023.10304857}, doi = {10.1109/ESEM56168.2023.10304857}, timestamp = {Fri, 17 Nov 2023 08:57:22 +0100}, biburl = {https://dblp.org/rec/conf/esem/LiMNST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-10085, author = {Jingyue Li and Per H{\aa}kon Meland and Jakob Svennevik Notland and Andr{\'{e}} Storhaug and Jostein Hjortland Tysse}, title = {Evaluating the Impact of ChatGPT on Exercises of a Software Security Course}, journal = {CoRR}, volume = {abs/2309.10085}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.10085}, doi = {10.48550/ARXIV.2309.10085}, eprinttype = {arXiv}, eprint = {2309.10085}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-10085.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MelandNBS22, author = {Per H{\aa}kon Meland and Dag Atle Nesheim and Karin Bernsmed and Guttorm Sindre}, title = {Assessing cyber threats for storyless systems}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103050}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103050}, doi = {10.1016/J.JISA.2021.103050}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MelandNBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3/GrigoriadisPKDD21, author = {Christos Grigoriadis and Spyridon Papastergiou and Panayiotis Kotzanikolaou and Christos Douligeris and Antreas Dionysiou and Elias Athanasopoulos and Karin Bernsmed and Per H{\aa}kon Meland and Liina Kamm}, title = {Integrating and Validating Maritime Transport Security Services: Initial results from the {CS4EU} demonstrator}, booktitle = {{IC3} 2021: Thirteenth International Conference on Contemporary Computing, Noida, India, August 5 - 7, 2021}, pages = {371--377}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474124.3474213}, doi = {10.1145/3474124.3474213}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic3/GrigoriadisPKDD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MelandBS20, author = {Per H{\aa}kon Meland and Yara Fareed Fahmy Bayoumy and Guttorm Sindre}, title = {The Ransomware-as-a-Service economy within the darknet}, journal = {Comput. Secur.}, volume = {92}, pages = {101762}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101762}, doi = {10.1016/J.COSE.2020.101762}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MelandBS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/HagaMS20, author = {Kristian Haga and Per H{\aa}kon Meland and Guttorm Sindre}, editor = {Harley Eades III and Olga Gadyatskaya}, title = {Breaking the Cyber Kill Chain by Modelling Resource Costs}, booktitle = {Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12419}, pages = {111--126}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62230-5\_6}, doi = {10.1007/978-3-030-62230-5\_6}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/HagaMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BourBBM20, author = {Guillaume Bour and Karin Bernsmed and Ravishankar Borgaonkar and Per H{\aa}kon Meland}, editor = {Mikael Asplund and Simin Nadjm{-}Tehrani}, title = {On the Certificate Revocation Problem in the Maritime Sector}, booktitle = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12556}, pages = {142--157}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70852-8\_9}, doi = {10.1007/978-3-030-70852-8\_9}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BourBBM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MelandBFLS19, author = {Per H{\aa}kon Meland and Karin Bernsmed and Christian Fr{\o}ystad and Jingyue Li and Guttorm Sindre}, title = {An experimental evaluation of bow-tie analysis for security}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {4}, year = {2019}, url = {https://doi.org/10.1108/ICS-11-2018-0132}, doi = {10.1108/ICS-11-2018-0132}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MelandBFLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/FrankeM19, author = {Ulrik Franke and Per H{\aa}kon Meland}, title = {Demand side expectations of cyber insurance}, booktitle = {International Conference on Cyber Situational Awareness, Data Analytics And Assessment, Cyber {SA} 2019, Oxford, United Kingdom, June 3-4, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CyberSA.2019.8899685}, doi = {10.1109/CYBERSA.2019.8899685}, timestamp = {Mon, 25 Nov 2019 12:51:24 +0100}, biburl = {https://dblp.org/rec/conf/cybersa/FrankeM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/MelandJS19, author = {Per H{\aa}kon Meland and Bent Heier Johansen and Guttorm Sindre}, editor = {Aslan Askarov and Ren{\'{e}} Rydhof Hansen and Willard Rafnsson}, title = {An Experimental Analysis of Cryptojacking Attacks}, booktitle = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11875}, pages = {155--170}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35055-0\_10}, doi = {10.1007/978-3-030-35055-0\_10}, timestamp = {Tue, 21 Mar 2023 20:59:10 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/MelandJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcysa/MelandS18, author = {Per H{\aa}kon Meland and Fredrik Seehusen}, title = {When to Treat Security Risks with Cyber Insurance}, journal = {Int. J. Cyber Situational Aware.}, volume = {3}, number = {1}, pages = {39--60}, year = {2018}, url = {https://doi.org/10.22619/ijcsa.2018.100119}, doi = {10.22619/IJCSA.2018.100119}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcysa/MelandS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/BayoumyMS18, author = {Yara Fareed Fahmy Bayoumy and Per H{\aa}kon Meland and Guttorm Sindre}, title = {A Netnographic Study on the Dark Net Ecosystem for Ransomware}, booktitle = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSA.2018.8551424}, doi = {10.1109/CYBERSA.2018.8551424}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/BayoumyMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/MelandS18, author = {Per H{\aa}kon Meland and Fredrik Seehusen}, title = {When to Treat Security Risks with Cyber Insurance}, booktitle = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSA.2018.8551456}, doi = {10.1109/CYBERSA.2018.8551456}, timestamp = {Thu, 06 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersa/MelandS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MelandBFLS18, author = {Per H{\aa}kon Meland and Karin Bernsmed and Christian Fr{\o}ystad and Jingyue Li and Guttorm Sindre}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and John Mylopoulos and Christos Kalloniatis}, title = {An Experimental Evaluation of Bow-Tie Analysis for Cybersecurity Requirements}, booktitle = {Computer Security - {ESORICS} 2018 International Workshops, CyberICPS 2018 and {SECPRE} 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11387}, pages = {173--191}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12786-2\_11}, doi = {10.1007/978-3-030-12786-2\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MelandBFLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/FroystadBM17, author = {Christian Fr{\o}ystad and Karin Bernsmed and Per H{\aa}kon Meland}, title = {Protecting Future Maritime Communication}, booktitle = {Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017}, pages = {97:1--97:10}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098954.3103169}, doi = {10.1145/3098954.3103169}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/FroystadBM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BernsmedFMNR17, author = {Karin Bernsmed and Christian Fr{\o}ystad and Per H{\aa}kon Meland and Dag Atle Nesheim and {\O}rnulf Jan R{\o}dseth}, editor = {Peng Liu and Sjouke Mauw and Ketil St{\o}len}, title = {Visualizing Cyber Security Risks with Bow-Tie Diagrams}, booktitle = {Graphical Models for Security - 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10744}, pages = {38--56}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-74860-3\_3}, doi = {10.1007/978-3-319-74860-3\_3}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/BernsmedFMNR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/MelandTMS17, author = {Per H{\aa}kon Meland and Inger Anne T{\o}ndel and Marie Elisabeth Gaup Moe and Fredrik Seehusen}, editor = {Giovanni Livraga and Chris J. Mitchell}, title = {Facing Uncertainty in Cyber Insurance Policies}, booktitle = {Security and Trust Management - 13th International Workshop, {STM} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10547}, pages = {89--100}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68063-7\_6}, doi = {10.1007/978-3-319-68063-7\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/MelandTMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MelandTS15, author = {Per H{\aa}kon Meland and Inger Anne T{\o}ndel and Bj{\o}rnar Solhaug}, title = {Mitigating Risk with Cyberinsurance}, journal = {{IEEE} Secur. Priv.}, volume = {13}, number = {6}, pages = {38--43}, year = {2015}, url = {https://doi.org/10.1109/MSP.2015.137}, doi = {10.1109/MSP.2015.137}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/MelandTS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/MohammadiBPMWP15, author = {Nazila Gol Mohammadi and Torsten Bandyszak and Sachar Paulus and Per H{\aa}kon Meland and Thorsten Weyer and Klaus Pohl}, editor = {Janis Grabis and Kurt Sandkuhl}, title = {Extending Software Development Methodologies to Support Trustworthiness-by-Design}, booktitle = {Proceedings of the CAiSE 2015 Forum at the 27th International Conference on Advanced Information Systems Engineering co-located with 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015), Stockholm, Sweden, June 10th, 2015}, series = {{CEUR} Workshop Proceedings}, volume = {1367}, pages = {213--220}, publisher = {CEUR-WS.org}, year = {2015}, url = {https://ceur-ws.org/Vol-1367/paper-28.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:34 +0100}, biburl = {https://dblp.org/rec/conf/caise/MohammadiBPMWP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/MelandBJCU14, author = {Per H{\aa}kon Meland and Karin Bernsmed and Martin Gilje Jaatun and Humberto Nicol{\'{a}}s Castej{\'{o}}n Mart{\'{\i}}nez and Astrid Undheim}, title = {Expressing cloud security requirements for SLAs in deontic contract languages for cloud brokers}, journal = {Int. J. Cloud Comput.}, volume = {3}, number = {1}, pages = {69--93}, year = {2014}, url = {https://doi.org/10.1504/IJCC.2014.058831}, doi = {10.1504/IJCC.2014.058831}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/MelandBJCU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/MelandPGPDG14, author = {Per H{\aa}kon Meland and Elda Paja and Erlend Andreas Gj{\ae}re and St{\'{e}}phane Paul and Fabiano Dalpiaz and Paolo Giorgini}, title = {Threat Analysis in Goal-Oriented Security Requirements Modelling}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {2}, pages = {1--19}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014040101}, doi = {10.4018/IJSSE.2014040101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/MelandPGPDG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/MohammadiBPMWP14, author = {Nazila Gol Mohammadi and Torsten Bandyszak and Sachar Paulus and Per H{\aa}kon Meland and Thorsten Weyer and Klaus Pohl}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {Extending Development Methodologies with Trustworthiness-By-Design for Socio-Technical Systems - (Extended Abstract)}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {206--207}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_14}, doi = {10.1007/978-3-319-08593-7\_14}, timestamp = {Wed, 25 Sep 2019 18:21:56 +0200}, biburl = {https://dblp.org/rec/conf/trust/MohammadiBPMWP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/GjaereM14, author = {Erlend Andreas Gj{\ae}re and Per H{\aa}kon Meland}, editor = {Barbara Kordy and Sjouke Mauw and Wolter Pieters}, title = {Threats Management Throughout the Software Service Life-Cycle}, booktitle = {Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, April 12, 2014}, series = {{EPTCS}}, volume = {148}, pages = {1--14}, year = {2014}, url = {https://doi.org/10.4204/EPTCS.148.1}, doi = {10.4204/EPTCS.148.1}, timestamp = {Thu, 23 Sep 2021 11:46:10 +0200}, biburl = {https://dblp.org/rec/journals/corr/GjaereM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/Meland14, author = {Per H{\aa}kon Meland}, editor = {Achim D. Brucker and Fabiano Dalpiaz and Paolo Giorgini and Per H{\aa}kon Meland and Erkuden Rios}, title = {Composite Services with Dynamic Behaviour}, booktitle = {Secure and Trustworthy Service Composition - The Aniketos Approach}, series = {Lecture Notes in Computer Science}, volume = {8900}, pages = {1--9}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13518-2\_1}, doi = {10.1007/978-3-319-13518-2\_1}, timestamp = {Sun, 02 Oct 2022 16:18:07 +0200}, biburl = {https://dblp.org/rec/series/lncs/Meland14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/MelandAADFGGLR14, author = {Per H{\aa}kon Meland and Muhammad Asim and Dhouha Ayed and Fabiano Dalpiaz and Edith Felix and Paolo Giorgini and Susana Gonz{\'{a}}les and Brett Lempereur and John Ronan}, editor = {Achim D. Brucker and Fabiano Dalpiaz and Paolo Giorgini and Per H{\aa}kon Meland and Erkuden Rios}, title = {Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions}, booktitle = {Secure and Trustworthy Service Composition - The Aniketos Approach}, series = {Lecture Notes in Computer Science}, volume = {8900}, pages = {10--35}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13518-2\_2}, doi = {10.1007/978-3-319-13518-2\_2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/MelandAADFGGLR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/MelandRTB14, author = {Per H{\aa}kon Meland and Erkuden Rios and Vasilis Tountopoulos and Achim D. Brucker}, editor = {Achim D. Brucker and Fabiano Dalpiaz and Paolo Giorgini and Per H{\aa}kon Meland and Erkuden Rios}, title = {The Aniketos Platform}, booktitle = {Secure and Trustworthy Service Composition - The Aniketos Approach}, series = {Lecture Notes in Computer Science}, volume = {8900}, pages = {50--62}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13518-2\_4}, doi = {10.1007/978-3-319-13518-2\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/MelandRTB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/lncs/8900, editor = {Achim D. Brucker and Fabiano Dalpiaz and Paolo Giorgini and Per H{\aa}kon Meland and Erkuden Rios}, title = {Secure and Trustworthy Service Composition - The Aniketos Approach}, series = {Lecture Notes in Computer Science}, volume = {8900}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13518-2}, doi = {10.1007/978-3-319-13518-2}, isbn = {978-3-319-13517-5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/8900.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/MelandG13, author = {Per H{\aa}kon Meland and Erlend Andreas Gj{\ae}re}, title = {Threat Representation Methods for Composite Service Process Models}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {2}, pages = {1--18}, year = {2013}, url = {https://doi.org/10.4018/jsse.2013040101}, doi = {10.4018/JSSE.2013040101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/MelandG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MelandGP13, author = {Per H{\aa}kon Meland and Erlend Andreas Gj{\ae}re and St{\'{e}}phane Paul}, title = {The Use and Usefulness of Threats in Goal-Oriented Modelling}, booktitle = {2013 International Conference on Availability, Reliability and Security, {ARES} 2013, Regensburg, Germany, September 2-6, 2013}, pages = {428--436}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ARES.2013.57}, doi = {10.1109/ARES.2013.57}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/MelandGP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BernsmedUMJ13, author = {Karin Bernsmed and Astrid Undheim and Per H{\aa}kon Meland and Martin Gilje Jaatun}, title = {Towards an Ontology for Cloud Security Obligations}, booktitle = {2013 International Conference on Availability, Reliability and Security, {ARES} 2013, Regensburg, Germany, September 2-6, 2013}, pages = {577--581}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ARES.2013.76}, doi = {10.1109/ARES.2013.76}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BernsmedUMJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/closer/FrtunicJGDJMBC13, author = {Milena Frtunic and Filip Jovanovic and Mladen Gligorijvic and Lazar Dordevic and Srecko Janicijevic and Per H{\aa}kon Meland and Karin Bernsmed and Humberto Nicol{\'{a}}s Castej{\'{o}}n Mart{\'{\i}}nez}, editor = {Fr{\'{e}}d{\'{e}}ric Desprez and Donald Ferguson and Ethan Hadar and Frank Leymann and Matthias Jarke and Markus Helfert}, title = {CloudSurfer - {A} Cloud Broker Application for Security Concerns}, booktitle = {{CLOSER} 2013 - Proceedings of the 3rd International Conference on Cloud Computing and Services Science, Aachen, Germany, 8-10 May, 2013}, pages = {199--206}, publisher = {SciTePress}, year = {2013}, timestamp = {Fri, 31 Mar 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/closer/FrtunicJGDJMBC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/BagnatoKMS12, author = {Alessandra Bagnato and Barbara Kordy and Per H{\aa}kon Meland and Patrick Schweitzer}, title = {Attribute Decoration of Attack-Defense Trees}, journal = {Int. J. Secur. Softw. Eng.}, volume = {3}, number = {2}, pages = {1--35}, year = {2012}, url = {https://doi.org/10.4018/jsse.2012040101}, doi = {10.4018/JSSE.2012040101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/BagnatoKMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MelandG12, author = {Per H{\aa}kon Meland and Erlend Andreas Gj{\ae}re}, title = {Representing Threats in {BPMN} 2.0}, booktitle = {Seventh International Conference on Availability, Reliability and Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012}, pages = {542--550}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ARES.2012.13}, doi = {10.1109/ARES.2012.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/MelandG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/closer/MelandBJUC12, author = {Per H{\aa}kon Meland and Karin Bernsmed and Martin Gilje Jaatun and Astrid Undheim and Humberto Nicol{\'{a}}s Castej{\'{o}}n Mart{\'{\i}}nez}, editor = {Frank Leymann and Ivan I. Ivanov and Marten van Sinderen and Tony Shan}, title = {Expressing Cloud Security Requirements in Deontic Contract Languages}, booktitle = {{CLOSER} 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18 - 21 April, 2012}, pages = {638--646}, publisher = {SciTePress}, year = {2012}, timestamp = {Fri, 31 Mar 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/closer/MelandBJUC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/BernsmedJMU12, author = {Karin Bernsmed and Martin Gilje Jaatun and Per H{\aa}kon Meland and Astrid Undheim}, title = {Thunder in the Clouds: Security challenges and solutions for federated Clouds}, booktitle = {4th {IEEE} International Conference on Cloud Computing Technology and Science Proceedings, CloudCom 2012, Taipei, Taiwan, December 3-6, 2012}, pages = {113--120}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CloudCom.2012.6427547}, doi = {10.1109/CLOUDCOM.2012.6427547}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloudcom/BernsmedJMU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/LeonSMED12, author = {Miguel Ponce de Leon and Richard Sanders and Per H{\aa}kon Meland and Marina Egea and Zeta Dooly}, editor = {Simone Fischer{-}H{\"{u}}bner and Sokratis K. Katsikas and Gerald Quirchmayr}, title = {Aniketos: Challenges and Results}, booktitle = {Trust, Privacy and Security in Digital Business - 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7449}, pages = {234--235}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32287-7\_28}, doi = {10.1007/978-3-642-32287-7\_28}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/LeonSMED12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BernsmedJMU11, author = {Karin Bernsmed and Martin Gilje Jaatun and Per H{\aa}kon Meland and Astrid Undheim}, title = {Security SLAs for Federated Cloud Services}, booktitle = {Sixth International Conference on Availability, Reliability and Security, {ARES} 2011, Vienna, Austria, August 22-26, 2011}, pages = {202--209}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ARES.2011.34}, doi = {10.1109/ARES.2011.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BernsmedJMU11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bir/PajaGPM11, author = {Elda Paja and Paolo Giorgini and St{\'{e}}phane Paul and Per H{\aa}kon Meland}, editor = {Laila Niedrite and Renate Strazdina and Benkt Wangler}, title = {Security Requirements Engineering for Secure Business Processes}, booktitle = {Workshops on Business Informatics Research - {BIR} 2011 International Workshops and Doctoral Consortium, Riga, Latvia, October 6, 2011 Revised Selected Papers}, series = {Lecture Notes in Business Information Processing}, volume = {106}, pages = {77--89}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29231-6\_7}, doi = {10.1007/978-3-642-29231-6\_7}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bir/PajaGPM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/Meland11, author = {Per H{\aa}kon Meland}, title = {Service Injection: {A} Threat to Self-Managed Complex Systems}, booktitle = {{IEEE} Ninth International Conference on Dependable, Autonomic and Secure Computing, {DASC} 2011, 12-14 December 2011, Sydney, Australia}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/DASC.2011.25}, doi = {10.1109/DASC.2011.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/Meland11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sysose/MelandGL11, author = {Per H{\aa}kon Meland and Juan Bare{\~{n}}o Guerenabarrena and David Llewellyn{-}Jones}, title = {The challenges of secure and trustworthy service composition in the Future Internet}, booktitle = {6th International Conference on System of Systems Engineering, SoSE 2011, Albuquerque, New Mexico, USA, June 27-30, 2011}, pages = {329--334}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/SYSOSE.2011.5966619}, doi = {10.1109/SYSOSE.2011.5966619}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/sysose/MelandGL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BaadshaugEM10, author = {Egil Trygve Baadshaug and Gencer Erdogan and Per H{\aa}kon Meland}, title = {Security Modeling and Tool Support Advantages}, booktitle = {{ARES} 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland}, pages = {537--542}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ARES.2010.11}, doi = {10.1109/ARES.2010.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BaadshaugEM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/MelandTJ10, author = {Per H{\aa}kon Meland and Inger Anne T{\o}ndel and Jostein Jensen}, editor = {Fabio Massacci and Dan S. Wallach and Nicola Zannone}, title = {Idea: Reusability of Threat Models - Two Approaches with an Experimental Evaluation}, booktitle = {Engineering Secure Software and Systems, Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5965}, pages = {114--122}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11747-3\_9}, doi = {10.1007/978-3-642-11747-3\_9}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/essos/MelandTJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/JensenTM10, author = {Jostein Jensen and Inger Anne T{\o}ndel and Per H{\aa}kon Meland}, editor = {Miguel Soriano and Sihan Qing and Javier L{\'{o}}pez}, title = {Experimental Threat Model Reuse with Misuse Case Diagrams}, booktitle = {Information and Communications Security - 12th International Conference, {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6476}, pages = {355--366}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17650-0\_25}, doi = {10.1007/978-3-642-17650-0\_25}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/JensenTM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/xpu/ErdoganMM10, author = {Gencer Erdogan and Per H{\aa}kon Meland and Derek Mathieson}, editor = {Alberto Sillitti and Angela Martin and Xiaofeng Wang and Elizabeth Whitworth}, title = {Security Testing in Agile Web Application Development - {A} Case Study Using the {EAST} Methodology}, booktitle = {Agile Processes in Software Engineering and Extreme Programming, 11th International Conference, {XP} 2010, Trondheim, Norway, June 1-4, 2010. Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {48}, pages = {14--27}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13054-0\_2}, doi = {10.1007/978-3-642-13054-0\_2}, timestamp = {Tue, 20 Feb 2018 11:22:27 +0100}, biburl = {https://dblp.org/rec/conf/xpu/ErdoganMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/JensenTJMA09, author = {Jostein Jensen and Inger Anne T{\o}ndel and Martin Gilje Jaatun and Per H{\aa}kon Meland and Herbj{\o}rn Andresen}, title = {Reusable Security Requirements for Healthcare Applications}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {380--385}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.107}, doi = {10.1109/ARES.2009.107}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/JensenTJMA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MelandAJRSST09, author = {Per H{\aa}kon Meland and Shanai Ardi and Jostein Jensen and Erkuden Rios and Txus Sanchez and Nahid Shahmehri and Inger Anne T{\o}ndel}, title = {An Architectural Foundation for Security Model Sharing and Reuse}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {823--828}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.110}, doi = {10.1109/ARES.2009.110}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/MelandAJRSST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RostadTMO08, author = {Lillian R{\o}stad and Inger Anne T{\o}ndel and Per H{\aa}kon Meland and Gunnar Ren{\'{e}} {\O}ie}, title = {Learning by Failing (and Fixing)}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {4}, pages = {54--56}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.89}, doi = {10.1109/MSP.2008.89}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/RostadTMO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmi/WalderhaugMMSB08, author = {St{\aa}le Walderhaug and Per H{\aa}kon Meland and Marius Mikalsen and Terje Sagen and John Ivar Brevik}, title = {Evacuation support system for improved medical documentation and information flow in the field}, journal = {Int. J. Medical Informatics}, volume = {77}, number = {2}, pages = {137--151}, year = {2008}, url = {https://doi.org/10.1016/j.ijmedinf.2007.01.006}, doi = {10.1016/J.IJMEDINF.2007.01.006}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmi/WalderhaugMMSB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/software/TondelJM08, author = {Inger Anne T{\o}ndel and Martin Gilje Jaatun and Per H{\aa}kon Meland}, title = {Security Requirements for the Rest of Us: {A} Survey}, journal = {{IEEE} Softw.}, volume = {25}, number = {1}, pages = {20--27}, year = {2008}, url = {https://doi.org/10.1109/MS.2008.19}, doi = {10.1109/MS.2008.19}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/software/TondelJM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MelandJ08, author = {Per H{\aa}kon Meland and Jostein Jensen}, title = {Secure Software Design in Practice}, booktitle = {Proceedings of the The Third International Conference on Availability, Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain}, pages = {1164--1171}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ARES.2008.48}, doi = {10.1109/ARES.2008.48}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/MelandJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ArdiBMTS07, author = {Shanai Ardi and David Byers and Per H{\aa}kon Meland and Inger Anne T{\o}ndel and Nahid Shahmehri}, title = {How can the developer benefit from security modeling?}, booktitle = {Proceedings of the The Second International Conference on Availability, Reliability and Security, {ARES} 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria}, pages = {1017--1025}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ARES.2007.96}, doi = {10.1109/ARES.2007.96}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/ArdiBMTS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/medinfo/MikalsenWMW07, author = {Marius Mikalsen and St{\aa}le Walderhaug and Per H{\aa}kon Meland and Ole Martin Winnem}, editor = {Klaus A. Kuhn and James R. Warren and Tze{-}Yun Leong}, title = {Linkcare - Enabling Continuity of Care for the Chronically Ill across Levels and Profession}, booktitle = {{MEDINFO} 2007 - Proceedings of the 12th World Congress on Health (Medical) Informatics - Building Sustainable Health Systems, 20-24 August, 2007, Brisbane, Australia}, series = {Studies in Health Technology and Informatics}, volume = {129}, pages = {3--7}, publisher = {{IOS} Press}, year = {2007}, url = {https://doi.org/10.3233/978-1-58603-774-1-3}, doi = {10.3233/978-1-58603-774-1-3}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/medinfo/MikalsenWMW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.