Model-driven risk analysis: the CORAS approach MS Lund, B Solhaug, K Stølen Springer, 2011 | 634 | 2011 |
Model-based security analysis in seven steps—a guided tour to the CORAS method F Den Braber, I Hogganvik, MS Lund, K Stølen, F Vraalsen BT Technology Journal 25 (1), 101-117, 2007 | 299 | 2007 |
The CORAS methodology: model-based risk assessment using UML and UP F den Braber, T Dimitrakos, BA Gran, MS Lund, K Stolen, JO Aagedal UML and the Unified Process, 332-357, 2003 | 87 | 2003 |
Model-based risk assessment-the coras approach K Stolen, F den Braber, T Dimitrakos, R Fredriksen, BA Gran, SH Houmb, ... NIK'02, 2002 | 83 | 2002 |
Towards a UML profile for model-based risk assessment SH Houmb, F Den Braber, MS Lund, K Stølen Critical systems development with UML-Proceedings of the UML’02 workshop, 79-91, 2002 | 81 | 2002 |
Enhancing navigator competence by demonstrating maritime cyber security OS Hareide, Ø Jøsok, MS Lund, R Ostnes, K Helkala The Journal of Navigation 71 (5), 1025-1039, 2018 | 66 | 2018 |
Evolution in relation to risk and trust management MS Lund, B Solhaug, K Stølen Computer 43 (05), 49-55, 2010 | 64 | 2010 |
Risk analysis of changing and evolving systems using CORAS MS Lund, B Solhaug, K Stølen Foundations of Security Analysis and Design VI: FOSAD Tutorial Lectures 11 …, 2011 | 57 | 2011 |
A fully general operational semantics for UML 2.0 sequence diagrams with potential and mandatory choice MS Lund, K Stølen International Symposium on Formal Methods, 380-395, 2006 | 54 | 2006 |
Operational analysis of sequence diagram specifications MS Lund | 38 | 2007 |
Integrity of Integrated Navigation Systems MS Lund, JE Gulland, OS Hareide, Ø Jøsok, KOC Weum | 36 | 2018 |
The CORAS approach for model-based risk management applied to a telemedicine service Y Stamatiou, E Skipenes, E Henriksen, N Stathiakis, A Sikianakis, ... The New Navigators: from Professionals to Patients, 206-211, 2003 | 35 | 2003 |
An attack on an integrated navigation system MS Lund, OS Hareide, Ø Jøsok Sjøkrigsskolen, 2018 | 33 | 2018 |
UML profile for security assessment MS Lund, I Hogganvik, F Seehusen, K Stølen Techinical report STF A 3066, 2003 | 32 | 2003 |
Deriving tests from UML 2.0 sequence diagrams with neg and assert MS Lund, K Stølen Proceedings of the 2006 international Workshop on Automation of Software …, 2006 | 31 | 2006 |
Specifying legal risk scenarios using the CORAS threat modelling language: Experiences and the way forward F Vraalsen, MS Lund, T Mahler, X Parent, K Stølen Trust Management: Third International Conference, iTrust 2005, Paris, France …, 2005 | 29 | 2005 |
The CORAS tool-supported methodology for UML-based security analysis F Vraalsen, F Den Braber, I Hogganvik, MS Lund, K Stølen | 28* | 2004 |
A UML profile for the identification and analysis of security risks during structured brainstorming MS Lund, F den Braber, K Stølen, F Vraalsen | 28 | 2004 |
Cyber risk perception in the maritime domain: a systematic literature review MH Larsen, MS Lund IEEE Access 9, 144895-144905, 2021 | 26* | 2021 |
Maintaining results from security assessments MS Lund, F den Braber, K Stølen Seventh European Conference on Software Maintenance and Reengineering, 341, 2003 | 26 | 2003 |