Security requirements for the rest of us: A survey IA Tøndel, MG Jaatun, PH Meland Software, IEEE 25 (1), 20-27, 2008 | 200 | 2008 |
The Ransomware-as-a-Service Economy within the Darknet PH Meland, YFF Bayoumy, G Sindre Computers & Security, 101762, 2020 | 165 | 2020 |
Security SLAs for Federated Cloud Services K Bernsmed, MG Jaatun, PH Meland, A Undheim Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011 | 132 | 2011 |
Attribute Decoration of Attack–Defense Trees A Bagnato, B Kordy, PH Meland, P Schweitzer International Journal of Secure Software Engineering (IJSSE) 3 (2), 1-35, 2012 | 92 | 2012 |
A Retrospective Analysis of Maritime Cyber Security Incidents PH Meland, K Bernsmed, E Wille, ØJ Rødseth, DA Nesheim TransNav, International Journal on Marine Navigation and Safety od Sea …, 2021 | 75 | 2021 |
Mitigating Risk with Cyberinsurance PH Meland, IA Tondel, B Solhaug IEEE Security & Privacy, 38-43, 2015 | 61 | 2015 |
Secure software design in practice PH Meland, J Jensen Availability, Reliability and Security, 2008. ARES 08. Third International …, 2008 | 55 | 2008 |
SeaMonster: Providing tool support for security modeling PH Meland, DG Spampinato, E Hagen, ET Baadshaug, KM Krister, ... Norsk informasjonssikkerhetskonferanse, NISK, 2008 | 45 | 2008 |
Evacuation support system for improved medical documentation and information flow in the field S Walderhaug, PH Meland, M Mikalsen, T Sagen, JI Brevik International journal of medical informatics 77 (2), 137-151, 2008 | 42 | 2008 |
Visualizing Cyber Security Risks with Bow-Tie Diagrams K Bernsmed, C Frøystad, PH Meland, DA Nesheim, ØJ Rødseth International Workshop on Graphical Models for Security, 38-56, 2017 | 40 | 2017 |
SINTEF ICT, Oslo, Norway K Bernsmed, MG Jaatun, PH Meland, A Undheim Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th …, 2012 | 36* | 2012 |
Thunder in the Clouds: Security challenges and solutions for federated Clouds A Undheim, PH Meland, K Bernsmed, MG Jaatun Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing …, 2012 | 36* | 2012 |
Reusable Security Requirements for Healthcare Applications J Jensen, IA Tondel, MG Jaatun, PH Meland, H Andresen Availability, Reliability and Security, 2009. ARES'09. International …, 2009 | 35 | 2009 |
How can the developer benefit from security modeling? S Ardi, D Byers, PH Meland, IA Tøndel, N Shahmehri Availability, Reliability and Security, 2007. ARES 2007. The Second …, 2007 | 35 | 2007 |
Representing Threats in BPMN 2.0 PH Meland, EA Gjære Availability, Reliability and Security (ARES), 2012 Seventh International …, 2012 | 29 | 2012 |
Assessing cyber threats for storyless systems PH Meland, DA Nesheim, K Bernsmed, G Sindre Journal of Information Security and Applications 64, 103050, 2022 | 27 | 2022 |
Security Requirements Engineering for Secure Business Processes E Paja, P Giorgini, S Paul, PH Meland Workshops on Business Informatics Research, 77-89, 2012 | 26 | 2012 |
An architectural foundation for security model sharing and reuse PH Meland, S Ardi, J Jensen, E Rios, T Sanchez, N Shahmehri, IA Tondel Availability, Reliability and Security, 2009. ARES'09. International …, 2009 | 26 | 2009 |
Access control and integration of health care systems: An experience report and future challenges L Rostad, O Nytro, IA Tondel, PH Meland Availability, Reliability and Security, 2007. ARES 2007. The Second …, 2007 | 24 | 2007 |
Idea: Reusability of Threat Models–Two Approaches with an Experimental Evaluation P Meland, I Tøndel, J Jensen Engineering Secure Software and Systems, 114-122, 2010 | 23 | 2010 |