关注
Martin Gilje Jaatun
Martin Gilje Jaatun
Senior Scientist at SINTEF Digital
在 sintef.no 的电子邮件经过验证 - 首页
标题
引用次数
年份
" Security-Aware and Data Intensive Low-Cost Mobile Systems" Editorial
J Koodziej, MG Jaatun, SU Khan, M Koeppen
Mobile Networks and Applications 18 (5), 591, 2013
2013
“Security-Aware and Data Intensive Low-Cost Mobile Systems” Editorial
J Kołodziej, MG Jaatun, SU Khan, M Koeppen
Mobile Networks and Applications 18, 591-593, 2013
32013
2023 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)| 979-8-3503-3982-6/23/$31.00© 2023 IEEE| DOI: 10.1109/CloudCom59040. 2023.00063
M Abbadini, T Ahmad, LA Alexandru, G Amarasinghe, V Argyriou, ...
2nd IEEE STC CC and RDA Workshop on Curricula and Teaching Methods in Cloud Computing, Big Data, and Data Science
T Wiktorski, TJ Hacker, Y Demchenko, G Rodgers, R Hansen, C Rong, ...
5G as an enabler for secure IoT in the smart grid
R Borgaonkar, MG Jaatun
2019 first international conference on societal automation (SA), 1-7, 2019
202019
A briefing on cloud security challenges and opportunities
MG Jaatun, PH Meland, K Bernsmed, H Castejón, A Undheim
Cloud Security Whitepaper, 2013
12013
A Checklist for Supply Chain Security for Critical Infrastructure Operators
MG Jaatun, H Sæle
The International Conference on Cybersecurity, Situational Awareness and …, 2023
12023
A continuous OT cybersecurity risk analysis and Mitigation process
GK Hanssen, CA Thieme, AV Bjarkø, MA Lundteigen, KE Bernsmed, ...
Proceedings of the The 33rd European Safety and Reliability Conference …, 2023
2023
A cost-efficient protocol for open blockchains
C Li, C Rong, MG Jaatun
2019 International Conference on Cyber Security and Protection of Digital …, 2019
12019
A cryptographic protocol for communication in a redundant array of independent net-storages
MG Jaatun, G Zhao, S Alapnes
2011 IEEE Third International Conference on Cloud Computing Technology and …, 2011
52011
A Cyber-Physical All-Hazard Risk Management Approach: The Case of the Wastewater Treatment Plant of Copenhagen
C Bosco, C Thirsing, MG Jaatun, R Ugarelli
Water 15 (22), 3964, 2023
2023
A farewell to trust: An approach to confidentiality control in the cloud
MG Jaatun, ÅA Nyre, S Alapnes, G Zhao
2011 2nd International Conference on Wireless Communication, Vehicular …, 2011
172011
A Framework Addressing Challenges in Cybersecurity Testing of IoT Ecosystems and Components
S Taylor, MG Jaatun, A McGibney, R Seidl, P Hrynchenko, D Prosvirin, ...
IoTBDS 2024 Proceedings of the 9th International Conference on Internet of …, 2024
2024
A framework for incident response management in the petroleum industry
MG Jaatun, E Albrechtsen, MB Line, IA Tøndel, OH Longva
International Journal of Critical Infrastructure Protection 2 (1-2), 26-37, 2009
802009
A lightweight approach to secure software engineering
MG Jaatun, J Jensen, PH Meland, IA Tøndel
A Multidisciplinary Introduction to Information Security, 183, 2011
32011
A lightweight measurement of software security skills, usage and training needs in agile teams
TD Oyetoyan, MG Jaatun, DS Cruzes
International Journal of Secure Software Engineering (IJSSE) 8 (1), 1-27, 2017
122017
A Method for Threat Modelling of Industrial Control Systems
LH Flå, MG Jaatun
The International Conference on Cybersecurity, Situational Awareness and …, 2023
2023
A New Dawn for the Dark Knight: Securing BATMAN
EG Graarud, AG Bowitz, L Brown, MG Jaatun
12011
A probabilistic approach to information control
AA Nyre, MG Jaatun
Journal of Internet Technology 11 (3), 407-416, 2010
162010
A Secure MANET Routing Protocol for Crisis Situations
MG Jaatun, ÅA Nyre, IA Tøndel
International Journal of Systems and Software Security and Protection …, 2018
2018
系统目前无法执行此操作,请稍后再试。
文章 1–20