Per Håkon Meland
Per Håkon Meland
Verified email at
Cited by
Cited by
Security requirements for the rest of us: A survey
IA Tøndel, MG Jaatun, PH Meland
Software, IEEE 25 (1), 20-27, 2008
The Ransomware-as-a-Service Economy within the Darknet
PH Meland, YFF Bayoumy, G Sindre
Computers & Security, 101762, 2020
Security SLAs for Federated Cloud Services
K Bernsmed, MG Jaatun, PH Meland, A Undheim
Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011
Attribute Decoration of Attack–Defense Trees
A Bagnato, B Kordy, PH Meland, P Schweitzer
International Journal of Secure Software Engineering (IJSSE) 3 (2), 1-35, 2012
Mitigating Risk with Cyberinsurance
PH Meland, IA Tondel, B Solhaug
IEEE Security & Privacy, 38-43, 2015
A Retrospective Analysis of Maritime Cyber Security Incidents
PH Meland, K Bernsmed, E Wille, ØJ Rødseth, DA Nesheim
TransNav, International Journal on Marine Navigation and Safety od Sea …, 2021
Secure software design in practice
PH Meland, J Jensen
Availability, Reliability and Security, 2008. ARES 08. Third International …, 2008
Evacuation support system for improved medical documentation and information flow in the field
S Walderhaug, PH Meland, M Mikalsen, T Sagen, JI Brevik
International journal of medical informatics 77 (2), 137-151, 2008
SeaMonster: Providing tool support for security modeling
PH Meland, DG Spampinato, E Hagen, ET Baadshaug, KM Krister, ...
Norsk informasjonssikkerhetskonferanse, NISK, 2008
Reusable Security Requirements for Healthcare Applications
J Jensen, IA Tondel, MG Jaatun, PH Meland, H Andresen
Availability, Reliability and Security, 2009. ARES'09. International …, 2009
How can the developer benefit from security modeling?
S Ardi, D Byers, PH Meland, IA Tøndel, N Shahmehri
Availability, Reliability and Security, 2007. ARES 2007. The Second …, 2007
Visualizing Cyber Security Risks with Bow-Tie Diagrams
K Bernsmed, C Frøystad, PH Meland, DA Nesheim, ØJ Rødseth
International Workshop on Graphical Models for Security, 38-56, 2017
SINTEF ICT, Oslo, Norway
K Bernsmed, MG Jaatun, PH Meland, A Undheim
Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th …, 2012
Thunder in the Clouds: Security challenges and solutions for federated Clouds
A Undheim, PH Meland, K Bernsmed, MG Jaatun
Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing …, 2012
Representing Threats in BPMN 2.0
PH Meland, EA Gjære
Availability, Reliability and Security (ARES), 2012 Seventh International …, 2012
Security Requirements Engineering for Secure Business Processes
E Paja, P Giorgini, S Paul, PH Meland
Workshops on Business Informatics Research, 77-89, 2012
An architectural foundation for security model sharing and reuse
PH Meland, S Ardi, J Jensen, E Rios, T Sanchez, N Shahmehri, IA Tondel
Availability, Reliability and Security, 2009. ARES'09. International …, 2009
Assessing cyber threats for storyless systems
PH Meland, DA Nesheim, K Bernsmed, G Sindre
Journal of Information Security and Applications 64, 103050, 2022
Access control and integration of health care systems: An experience report and future challenges
L Rostad, O Nytro, IA Tondel, PH Meland
Availability, Reliability and Security, 2007. ARES 2007. The Second …, 2007
Security testing in agile web application development-a case study using the east methodology
G Erdogan, PH Meland, D Mathieson
Agile Processes in Software Engineering and Extreme Programming, 14-27, 2010
The system can't perform the operation now. Try again later.
Articles 1–20