Zobrazeno 1 - 10
of 52
pro vyhledávání: '"Per Håkon Meland"'
Autor:
Erlend Andreas Gjære, Per Håkon Meland
Publikováno v:
Electronic Proceedings in Theoretical Computer Science, Vol 148, Iss Proc. GraMSec 2014, Pp 1-14 (2014)
Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventive measures during design and development, but also require adaptive mitigations at runtime. In this paper we de
Externí odkaz:
https://doaj.org/article/a099cbe65fbe437a87d822cdf4106a75
Publikováno v:
Information and Computer Security
Purpose Within critical-infrastructure industries, bow-tie analysis is an established way of eliciting requirements for safety and reliability concerns. Because of the ever-increasing digitalisation and coupling between the cyber and physical world,
Publikováno v:
Secure IT Systems ISBN: 9783030708511
NordSec
NordSec
Maritime shipping is currently undergoing rapid digitalization, but with increasing exposure to cyber threats, there is a need to improve the security of the ship communication technology used during operations across international waters, as well as
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fb156cdcc3b96d6e799298b5644b7d9d
https://doi.org/10.1007/978-3-030-70852-8_9
https://doi.org/10.1007/978-3-030-70852-8_9
Publikováno v:
Journal of Information Security and Applications
A proper assessment of potential cyber threats is vital for security decision-making. This becomes an even more challenging task when dealing with new system designs and industry sectors where there is little or no historical data about past security
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::21e25fc6d191d8e496235b111593217b
https://hdl.handle.net/11250/3012379
https://hdl.handle.net/11250/3012379
Publikováno v:
TransNav, International Journal on Marine Navigation and Safety of Sea Transportation
The maritime industry is undergoing a rapid evolution through the introduction of new technology and the digitization of existing services. At the same time, the digital attack surface is increasing, and incidents can lead to severe consequences. Thi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a62125e8fcae8d43a5927d09fbb9bacf
https://hdl.handle.net/11250/3026870
https://hdl.handle.net/11250/3026870
Autor:
Tarcisio Abreu Saurin, IVONNE HERRERA, TROND KONGSVIK, PER HÅKON MELAND, DAYANA BASTOS COSTA, EDER HENRIQSON, TOR OLAV GROTAN
Resilience engineering (RE) has gained increasing attention from researchers and practitioners from a wide diversity of sectors and countries. This popularity results on diverse and even conflicting views, creating confusion that can hinder developme
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::89405f2588de31ded920d5195c4a21c0
Publikováno v:
Proceedings: 8th REA Symposium on Resilience Engineering: Scaling up and Speeding up Linnaeus Univerity, Kalmar, Sweden, 24th-27th June 2019.
Greater connectivity is transforming critical infrastructures profoundly. One specific aspect enabled by connectivity are remote operations, which allow for the provision of services difficult to provide in a direct capacity, physically (e.g., due to
Publikováno v:
Computers & security
Ransomware is an epidemic that adversely affects the lives of both individuals and large companies, where criminals demand payments to release infected digital assets. In the wake of the ransomware success, Ransomware-as-a-Service (RaaS) has become a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0501e318b58f57f1ee49455450bb925f
https://hdl.handle.net/11250/2726221
https://hdl.handle.net/11250/2726221
Autor:
Per Håkon Meland, Guttorm Sindre
The infamous darknet hosts an underground economy for illegal goods and services, some of which can be purchased and used for cyber attacks. By analyzing the properties and popularity of such items, we can get indications about the type and capabilit
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::73dbec0d15d67bd9dbfee913b98d30f2
https://hdl.handle.net/11250/2729645
https://hdl.handle.net/11250/2729645
Publikováno v:
Graphical Models for Security ISBN: 9783030622299
GraMSec@CSF
GraMSec@CSF
To combat cybercrime, a clearer understanding of the attacks and the offenders is necessary. When there is little available data about attack incidents, which is usually the case for new technology, one can make estimations about the necessary invest
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c2e3fe048e28fb9c408c07953eaca3e5
https://hdl.handle.net/11250/3061157
https://hdl.handle.net/11250/3061157