Inger Anne Tøndel
Inger Anne Tøndel
Research Scientist at SINTEF Digital
Verified email at sintef.no
Title
Cited by
Cited by
Year
Security requirements for the rest of us: A survey
IA Tondel, MG Jaatun, PH Meland
Software, IEEE 25 (1), 20-27, 2008
1602008
Information security incident management: Current practice as reported in the literature
IA Tøndel, MB Line, MG Jaatun
Computers & Security 45, 42-57, 2014
912014
Cyber security challenges in Smart Grids
MB Line, IA Tøndel, MG Jaatun
2011 2nd IEEE PES international conference and exhibition on innovative …, 2011
592011
A framework for incident response management in the petroleum industry
MG Jaatun, E Albrechtsen, MB Line, IA Tøndel, OH Longva
International Journal of Critical Infrastructure Protection 2 (1-2), 26-37, 2009
592009
Combining misuse cases with attack trees and security activity models
IA Tøndel, J Jensen, L Røstad
2010 International Conference on Availability, Reliability and Security, 438-445, 2010
562010
Safety vs security?
MB Line, O Nordland, L Røstad, IA Tøndel
PSAM conference, New Orleans, USA, 2006
462006
Interdependencies and reliability in the combined ICT and power system: An overview of current research
IA Tøndel, J Foros, SS Kilskar, P Hokstad, MG Jaatun
Applied computing and informatics 14 (1), 17-27, 2018
342018
Mitigating risk with cyberinsurance
PH Meland, IA Tondel, B Solhaug
IEEE Security & Privacy 13 (6), 38-43, 2015
322015
Covering your assets in software engineering
MG Jaatun, IA Tøndel
2008 Third International Conference on Availability, Reliability and …, 2008
312008
Reusable security requirements for healthcare applications
J Jensen, IA Tøndel, MG Jaatun, PH Meland, H Andresen
2009 International Conference on Availability, Reliability and Security, 380-385, 2009
292009
Information security incident management: Planning for failure
MB Line, IA Tøndel, MG Jaatun
2014 Eighth International Conference on IT Security Incident Management & IT …, 2014
272014
Current practices and challenges in industrial control organizations regarding information security incident management–Does size matter? Information security incident …
MB Line, IA Tøndel, MG Jaatun
International journal of critical infrastructure protection 12, 12-26, 2016
252016
How can the developer benefit from security modeling?
S Ardi, D Byers, PH Meland, IA Tondel, N Shahmehri
The Second International Conference on Availability, Reliability and …, 2007
252007
Software security maturity in public organisations
MG Jaatun, DS Cruzes, K Bernsmed, IA Tøndel, L Røstad
International Conference on Information Security, 120-138, 2015
242015
An architectural foundation for security model sharing and reuse
PH Meland, S Ardi, J Jensen, E Rios, T Sanchez, N Shahmehri, IA Tøndel
2009 International Conference on Availability, Reliability and Security, 823-828, 2009
242009
Access control and integration of health care systems: An experience report and future challenges
L Rostad, O Nytro, IA Tondel, PH Meland
The Second International Conference on Availability, Reliability and …, 2007
222007
Learning privacy preferences
IA Tondel, ÅA Nyre, K Bernsmed
2011 Sixth International Conference on Availability, Reliability and …, 2011
192011
Idea: reusability of threat models–two approaches with an experimental evaluation
PH Meland, IA Tøndel, J Jensen
International Symposium on Engineering Secure Software and Systems, 114-122, 2010
192010
Threat modeling of AMI
IA Tøndel, MG Jaatun, MB Line
Critical Information Infrastructures Security, 264-275, 2013
162013
Secure fast handover in an open broadband access network using Kerberos-style tickets
MG Jaatun, IA Tøndel, TH Johannessen, JC Francis, C Duranton
IFIP International Information Security Conference, 389-400, 2006
152006
The system can't perform the operation now. Try again later.
Articles 1–20