Security requirements for the rest of us: A survey IA Tondel, MG Jaatun, PH Meland Software, IEEE 25 (1), 20-27, 2008 | 200 | 2008 |
Information security incident management: Current practice as reported in the literature IA Tøndel, MB Line, MG Jaatun Computers & Security 45, 42-57, 2014 | 155 | 2014 |
Cyber security challenges in Smart Grids MB Line, IA Tøndel, MG Jaatun 2011 2nd IEEE PES international conference and exhibition on innovative …, 2011 | 97 | 2011 |
Safety vs security? MB Line, O Nordland, L Røstad, IA Tøndel PSAM Conference, New Orleans, USA, 2006 | 86 | 2006 |
Interdependencies and reliability in the combined ICT and power system: An overview of current research IA Tøndel, J Foros, SS Kilskar, P Hokstad, MG Jaatun Applied computing and informatics 14 (1), 17-27, 2018 | 81 | 2018 |
A framework for incident response management in the petroleum industry MG Jaatun, E Albrechtsen, MB Line, IA Tøndel, OH Longva International Journal of Critical Infrastructure Protection 2 (1-2), 26-37, 2009 | 80 | 2009 |
Combining misuse cases with attack trees and security activity models IA Tøndel, J Jensen, L Røstad 2010 International Conference on Availability, Reliability and Security, 438-445, 2010 | 71 | 2010 |
Mitigating risk with cyberinsurance PH Meland, IA Tondel, B Solhaug IEEE Security & Privacy 13 (6), 38-43, 2015 | 61 | 2015 |
Challenges and experiences with applying microsoft threat modeling in agile development projects DS Cruzes, MG Jaatun, K Bernsmed, IA Tøndel 2018 25th Australasian Software Engineering Conference (ASWEC), 111-120, 2018 | 49 | 2018 |
Improving smart grid security through 5G enabled IoT and edge computing R Borgaonkar, I Anne Tøndel, M Zenebe Degefa, M Gilje Jaatun Concurrency and Computation: Practice and Experience 33 (18), e6466, 2021 | 46 | 2021 |
Current practices and challenges in industrial control organizations regarding information security incident management–Does size matter? Information security incident … MB Line, IA Tøndel, MG Jaatun International Journal of Critical Infrastructure Protection 12, 12-26, 2016 | 38 | 2016 |
Information security incident management: Planning for failure MB Line, IA Tøndel, MG Jaatun 2014 Eighth International Conference on IT Security Incident Management & IT …, 2014 | 37 | 2014 |
Covering your assets in software engineering MG Jaatun, IA Tøndel 2008 Third International Conference on Availability, Reliability and …, 2008 | 37 | 2008 |
Influencing the security prioritisation of an agile software development project IA Tøndel, DS Cruzes, MG Jaatun, G Sindre Computers & Security 118, 102744, 2022 | 36 | 2022 |
Reusable security requirements for healthcare applications J Jensen, IA Tøndel, MG Jaatun, PH Meland, H Andresen 2009 International conference on availability, Reliability and Security, 380-385, 2009 | 36 | 2009 |
How can the developer benefit from security modeling? S Ardi, D Byers, PH Meland, IA Tondel, N Shahmehri The Second International Conference on Availability, Reliability and …, 2007 | 35 | 2007 |
Software security maturity in public organisations MG Jaatun, DS Cruzes, K Bernsmed, IA Tøndel, L Røstad Information Security: 18th International Conference, ISC 2015, Trondheim …, 2015 | 32 | 2015 |
Threat modeling of AMI IA Tøndel, MG Jaatun, MB Line Critical Information Infrastructures Security: 7th International Workshop …, 2013 | 27 | 2013 |
An architectural foundation for security model sharing and reuse PH Meland, S Ardi, J Jensen, E Rios, T Sanchez, N Shahmehri, IA Tøndel 2009 International Conference on Availability, Reliability and Security, 823-828, 2009 | 25 | 2009 |
Access control and integration of health care systems: An experience report and future challenges L Rostad, O Nytro, IA Tondel, PH Meland The Second International Conference on Availability, Reliability and …, 2007 | 24 | 2007 |