" Security-Aware and Data Intensive Low-Cost Mobile Systems" Editorial J Koodziej, MG Jaatun, SU Khan, M Koeppen Mobile Networks and Applications 18 (5), 591, 2013 | | 2013 |
“Security-Aware and Data Intensive Low-Cost Mobile Systems” Editorial J Kołodziej, MG Jaatun, SU Khan, M Koeppen Mobile Networks and Applications 18, 591-593, 2013 | 3 | 2013 |
2023 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)| 979-8-3503-3982-6/23/$31.00© 2023 IEEE| DOI: 10.1109/CloudCom59040. 2023.00063 M Abbadini, T Ahmad, LA Alexandru, G Amarasinghe, V Argyriou, ... | | |
2nd IEEE STC CC and RDA Workshop on Curricula and Teaching Methods in Cloud Computing, Big Data, and Data Science T Wiktorski, TJ Hacker, Y Demchenko, G Rodgers, R Hansen, C Rong, ... | | |
5G as an enabler for secure IoT in the smart grid R Borgaonkar, MG Jaatun 2019 first international conference on societal automation (SA), 1-7, 2019 | 20 | 2019 |
A briefing on cloud security challenges and opportunities MG Jaatun, PH Meland, K Bernsmed, H Castejón, A Undheim Cloud Security Whitepaper, 2013 | 1 | 2013 |
A Checklist for Supply Chain Security for Critical Infrastructure Operators MG Jaatun, H Sæle The International Conference on Cybersecurity, Situational Awareness and …, 2023 | 1 | 2023 |
A continuous OT cybersecurity risk analysis and Mitigation process GK Hanssen, CA Thieme, AV Bjarkø, MA Lundteigen, KE Bernsmed, ... Proceedings of the The 33rd European Safety and Reliability Conference …, 2023 | | 2023 |
A cost-efficient protocol for open blockchains C Li, C Rong, MG Jaatun 2019 International Conference on Cyber Security and Protection of Digital …, 2019 | 1 | 2019 |
A cryptographic protocol for communication in a redundant array of independent net-storages MG Jaatun, G Zhao, S Alapnes 2011 IEEE Third International Conference on Cloud Computing Technology and …, 2011 | 5 | 2011 |
A Cyber-Physical All-Hazard Risk Management Approach: The Case of the Wastewater Treatment Plant of Copenhagen C Bosco, C Thirsing, MG Jaatun, R Ugarelli Water 15 (22), 3964, 2023 | | 2023 |
A farewell to trust: An approach to confidentiality control in the cloud MG Jaatun, ÅA Nyre, S Alapnes, G Zhao 2011 2nd International Conference on Wireless Communication, Vehicular …, 2011 | 17 | 2011 |
A Framework Addressing Challenges in Cybersecurity Testing of IoT Ecosystems and Components S Taylor, MG Jaatun, A McGibney, R Seidl, P Hrynchenko, D Prosvirin, ... IoTBDS 2024 Proceedings of the 9th International Conference on Internet of …, 2024 | | 2024 |
A framework for incident response management in the petroleum industry MG Jaatun, E Albrechtsen, MB Line, IA Tøndel, OH Longva International Journal of Critical Infrastructure Protection 2 (1-2), 26-37, 2009 | 80 | 2009 |
A lightweight approach to secure software engineering MG Jaatun, J Jensen, PH Meland, IA Tøndel A Multidisciplinary Introduction to Information Security, 183, 2011 | 3 | 2011 |
A lightweight measurement of software security skills, usage and training needs in agile teams TD Oyetoyan, MG Jaatun, DS Cruzes International Journal of Secure Software Engineering (IJSSE) 8 (1), 1-27, 2017 | 12 | 2017 |
A Method for Threat Modelling of Industrial Control Systems LH Flå, MG Jaatun The International Conference on Cybersecurity, Situational Awareness and …, 2023 | | 2023 |
A New Dawn for the Dark Knight: Securing BATMAN EG Graarud, AG Bowitz, L Brown, MG Jaatun | 1 | 2011 |
A probabilistic approach to information control AA Nyre, MG Jaatun Journal of Internet Technology 11 (3), 407-416, 2010 | 16 | 2010 |
A Secure MANET Routing Protocol for Crisis Situations MG Jaatun, ÅA Nyre, IA Tøndel International Journal of Systems and Software Security and Protection …, 2018 | | 2018 |