Security requirements for the rest of us: A survey IA Tondel, MG Jaatun, PH Meland Software, IEEE 25 (1), 20-27, 2008 | 160 | 2008 |
Information security incident management: Current practice as reported in the literature IA Tøndel, MB Line, MG Jaatun Computers & Security 45, 42-57, 2014 | 91 | 2014 |
Cyber security challenges in Smart Grids MB Line, IA Tøndel, MG Jaatun 2011 2nd IEEE PES international conference and exhibition on innovative …, 2011 | 59 | 2011 |
A framework for incident response management in the petroleum industry MG Jaatun, E Albrechtsen, MB Line, IA Tøndel, OH Longva International Journal of Critical Infrastructure Protection 2 (1-2), 26-37, 2009 | 59 | 2009 |
Combining misuse cases with attack trees and security activity models IA Tøndel, J Jensen, L Røstad 2010 International Conference on Availability, Reliability and Security, 438-445, 2010 | 56 | 2010 |
Safety vs security? MB Line, O Nordland, L Røstad, IA Tøndel PSAM conference, New Orleans, USA, 2006 | 46 | 2006 |
Interdependencies and reliability in the combined ICT and power system: An overview of current research IA Tøndel, J Foros, SS Kilskar, P Hokstad, MG Jaatun Applied computing and informatics 14 (1), 17-27, 2018 | 34 | 2018 |
Mitigating risk with cyberinsurance PH Meland, IA Tondel, B Solhaug IEEE Security & Privacy 13 (6), 38-43, 2015 | 32 | 2015 |
Covering your assets in software engineering MG Jaatun, IA Tøndel 2008 Third International Conference on Availability, Reliability and …, 2008 | 31 | 2008 |
Reusable security requirements for healthcare applications J Jensen, IA Tøndel, MG Jaatun, PH Meland, H Andresen 2009 International Conference on Availability, Reliability and Security, 380-385, 2009 | 29 | 2009 |
Information security incident management: Planning for failure MB Line, IA Tøndel, MG Jaatun 2014 Eighth International Conference on IT Security Incident Management & IT …, 2014 | 27 | 2014 |
Current practices and challenges in industrial control organizations regarding information security incident management–Does size matter? Information security incident … MB Line, IA Tøndel, MG Jaatun International journal of critical infrastructure protection 12, 12-26, 2016 | 25 | 2016 |
How can the developer benefit from security modeling? S Ardi, D Byers, PH Meland, IA Tondel, N Shahmehri The Second International Conference on Availability, Reliability and …, 2007 | 25 | 2007 |
Software security maturity in public organisations MG Jaatun, DS Cruzes, K Bernsmed, IA Tøndel, L Røstad International Conference on Information Security, 120-138, 2015 | 24 | 2015 |
An architectural foundation for security model sharing and reuse PH Meland, S Ardi, J Jensen, E Rios, T Sanchez, N Shahmehri, IA Tøndel 2009 International Conference on Availability, Reliability and Security, 823-828, 2009 | 24 | 2009 |
Access control and integration of health care systems: An experience report and future challenges L Rostad, O Nytro, IA Tondel, PH Meland The Second International Conference on Availability, Reliability and …, 2007 | 22 | 2007 |
Learning privacy preferences IA Tondel, ÅA Nyre, K Bernsmed 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 19 | 2011 |
Idea: reusability of threat models–two approaches with an experimental evaluation PH Meland, IA Tøndel, J Jensen International Symposium on Engineering Secure Software and Systems, 114-122, 2010 | 19 | 2010 |
Threat modeling of AMI IA Tøndel, MG Jaatun, MB Line Critical Information Infrastructures Security, 264-275, 2013 | 16 | 2013 |
Secure fast handover in an open broadband access network using Kerberos-style tickets MG Jaatun, IA Tøndel, TH Johannessen, JC Francis, C Duranton IFIP International Information Security Conference, 389-400, 2006 | 15 | 2006 |