Follow
Per Håkon Meland
Per Håkon Meland
SINTEF and NTNU
Verified email at sintef.no
Title
Cited by
Cited by
Year
Security requirements for the rest of us: A survey
IA Tøndel, MG Jaatun, PH Meland
Software, IEEE 25 (1), 20-27, 2008
2022008
The Ransomware-as-a-Service Economy within the Darknet
PH Meland, YFF Bayoumy, G Sindre
Computers & Security, 101762, 2020
1812020
Security SLAs for Federated Cloud Services
K Bernsmed, MG Jaatun, PH Meland, A Undheim
Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011
1322011
Attribute Decoration of Attack–Defense Trees
A Bagnato, B Kordy, PH Meland, P Schweitzer
International Journal of Secure Software Engineering (IJSSE) 3 (2), 1-35, 2012
922012
A Retrospective Analysis of Maritime Cyber Security Incidents
PH Meland, K Bernsmed, E Wille, ØJ Rødseth, DA Nesheim
TransNav, International Journal on Marine Navigation and Safety od Sea …, 2021
912021
Mitigating Risk with Cyberinsurance
PH Meland, IA Tondel, B Solhaug
IEEE Security & Privacy, 38-43, 2015
632015
Secure software design in practice
PH Meland, J Jensen
Availability, Reliability and Security, 2008. ARES 08. Third International …, 2008
552008
Visualizing Cyber Security Risks with Bow-Tie Diagrams
K Bernsmed, C Frøystad, PH Meland, DA Nesheim, ØJ Rødseth
International Workshop on Graphical Models for Security, 38-56, 2017
472017
SeaMonster: Providing tool support for security modeling
PH Meland, DG Spampinato, E Hagen, ET Baadshaug, KM Krister, ...
Norsk informasjonssikkerhetskonferanse, NISK, 2008
452008
Evacuation support system for improved medical documentation and information flow in the field
S Walderhaug, PH Meland, M Mikalsen, T Sagen, JI Brevik
International journal of medical informatics 77 (2), 137-151, 2008
422008
SINTEF ICT, Oslo, Norway
K Bernsmed, MG Jaatun, PH Meland, A Undheim
Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th …, 2012
36*2012
Thunder in the Clouds: Security challenges and solutions for federated Clouds
A Undheim, PH Meland, K Bernsmed, MG Jaatun
Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing …, 2012
36*2012
Reusable Security Requirements for Healthcare Applications
J Jensen, IA Tondel, MG Jaatun, PH Meland, H Andresen
Availability, Reliability and Security, 2009. ARES'09. International …, 2009
352009
How can the developer benefit from security modeling?
S Ardi, D Byers, PH Meland, IA Tøndel, N Shahmehri
Availability, Reliability and Security, 2007. ARES 2007. The Second …, 2007
352007
Representing Threats in BPMN 2.0
PH Meland, EA Gjære
Availability, Reliability and Security (ARES), 2012 Seventh International …, 2012
292012
Assessing cyber threats for storyless systems
PH Meland, DA Nesheim, K Bernsmed, G Sindre
Journal of Information Security and Applications 64, 103050, 2022
282022
Security Requirements Engineering for Secure Business Processes
E Paja, P Giorgini, S Paul, PH Meland
Workshops on Business Informatics Research, 77-89, 2012
262012
An architectural foundation for security model sharing and reuse
PH Meland, S Ardi, J Jensen, E Rios, T Sanchez, N Shahmehri, IA Tondel
Availability, Reliability and Security, 2009. ARES'09. International …, 2009
262009
Access control and integration of health care systems: An experience report and future challenges
L Rostad, O Nytro, IA Tondel, PH Meland
Availability, Reliability and Security, 2007. ARES 2007. The Second …, 2007
242007
Threat Analysis in Goal-Oriented Security Requirements Modelling
PH Meland, E Paja, EA Gjære, S Paul, F Dalpiaz, P Giorgini
International Journal of Secure Software Engineering (IJSSE) 5 (2), 1-19, 2014
232014
The system can't perform the operation now. Try again later.
Articles 1–20