Beyond lightning: A survey on security challenges in cloud computing C Rong, ST Nguyen, MG Jaatun Computers & Electrical Engineering 39 (1), 47-54, 2013 | 513 | 2013 |
Security requirements for the rest of us: A survey IA Tondel, MG Jaatun, PH Meland IEEE software 25 (1), 20-27, 2008 | 200 | 2008 |
Information security incident management: Current practice as reported in the literature IA Tøndel, MB Line, MG Jaatun Computers & Security 45, 42-57, 2014 | 155 | 2014 |
Security SLAs for federated cloud services K Bernsmed, MG Jaatun, PH Meland, A Undheim 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 130 | 2011 |
Accountability for cloud and other future internet services S Pearson, V Tountopoulos, D Catteddu, M Südholt, R Molva, C Reich, ... 4th IEEE international conference on cloud computing technology and science …, 2012 | 105 | 2012 |
Cyber security challenges in Smart Grids MB Line, IA Tøndel, MG Jaatun 2011 2nd IEEE PES international conference and exhibition on innovative …, 2011 | 97 | 2011 |
Interdependencies and reliability in the combined ICT and power system: An overview of current research IA Tøndel, J Foros, SS Kilskar, P Hokstad, MG Jaatun Applied computing and informatics 14 (1), 17-27, 2018 | 81 | 2018 |
A framework for incident response management in the petroleum industry MG Jaatun, E Albrechtsen, MB Line, IA Tøndel, OH Longva International Journal of Critical Infrastructure Protection 2 (1-2), 26-37, 2009 | 80 | 2009 |
Deployment models: Towards eliminating security concerns from cloud computing G Zhao, C Rong, MG Jaatun, FE Sandnes 2010 International Conference on High Performance Computing & Simulation …, 2010 | 59 | 2010 |
CloudCom'09 Proceedings of the 1st International Conference on Cloud Computing MG Jaatun, G Zhao, C Rong Springer-Verlag Berlin, Heidelberg, 2009 | 59* | 2009 |
An empirical study on the relationship between software security skills, usage and training needs in agile settings TD Oyetoyan, DS Cruzes, MG Jaatun 2016 11th International Conference on Availability, Reliability and Security …, 2016 | 50 | 2016 |
Challenges and experiences with applying microsoft threat modeling in agile development projects DS Cruzes, MG Jaatun, K Bernsmed, IA Tøndel 2018 25th Australasian Software Engineering Conference (ASWEC), 111-120, 2018 | 49 | 2018 |
Adopting threat modelling in agile software development projects K Bernsmed, DS Cruzes, MG Jaatun, M Iovan Journal of Systems and Software 183, 111090, 2022 | 42 | 2022 |
Monitoring intrusions and security breaches in highly distributed cloud environments AT Monfared, MG Jaatun 2011 IEEE Third International Conference on Cloud Computing Technology and …, 2011 | 42 | 2011 |
Enhancing accountability in the cloud MG Jaatun, S Pearson, F Gittler, R Leenes, M Niezen International Journal of Information Management 53, 101498, 2020 | 40 | 2020 |
Reference deployment models for eliminating user concerns on cloud security G Zhao, C Rong, MG Jaatun, FE Sandnes The Journal of Supercomputing 61, 337-352, 2012 | 40 | 2012 |
Current practices and challenges in industrial control organizations regarding information security incident management–Does size matter? Information security incident … MB Line, IA Tøndel, MG Jaatun International Journal of Critical Infrastructure Protection 12, 12-26, 2016 | 38 | 2016 |
Information security incident management: Planning for failure MB Line, IA Tøndel, MG Jaatun 2014 Eighth International Conference on IT Security Incident Management & IT …, 2014 | 37 | 2014 |
Covering your assets in software engineering MG Jaatun, IA Tøndel 2008 Third International Conference on Availability, Reliability and …, 2008 | 37 | 2008 |
Influencing the security prioritisation of an agile software development project IA Tøndel, DS Cruzes, MG Jaatun, G Sindre Computers & Security 118, 102744, 2022 | 36 | 2022 |