Fredrik Seehusen

According to our database1, Fredrik Seehusen authored at least 20 papers between 2005 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
When to Treat Security Risks with Cyber Insurance.
Int. J. Cyber Situational Aware., 2018

2017
Facing Uncertainty in Cyber Insurance Policies.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

A Method for Developing Algorithms for Assessing Cyber-Risk Cost.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

2016
Differentiating Cyber Risk of Insurance Customers: The Insurance Company Perspective.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016

2015
Assessing the Usefulness of Testing for Validating and Correcting Security Risk Models Based on Two Industrial Case Studies.
Int. J. Secur. Softw. Eng., 2015

Using CAPEC for Risk-Based Security Testing.
Proceedings of the Risk Assessment and Risk-Driven Testing - Third International Workshop, 2015

Combining Security Risk Assessment and Security Testing Based on Standards.
Proceedings of the Risk Assessment and Risk-Driven Testing - Third International Workshop, 2015

An integrated method for compliance and risk assessment.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Approaches for the combined use of risk analysis and testing: a systematic literature review.
Int. J. Softw. Tools Technol. Transf., 2014

Model-driven risk analysis of evolving critical infrastructures.
J. Ambient Intell. Humaniz. Comput., 2014

A Technique for Risk-Based Test Procedure Identification, Prioritization and Selection.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications, 2014

2012
Tool-Supported Risk Modeling and Analysis of Evolving Critical Infrastructures.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
An architectural pattern for enterprise level monitoring tools.
Proceedings of the 5th IEEE International Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems, 2011

An Evaluation of the Graphical Modeling Framework (GMF) Based on the Development of the CORAS Tool.
Proceedings of the Theory and Practice of Model Transformations, 2011

2009
Adherence preserving refinement of trace-set properties in STAIRS: exemplified for information flow properties and policies.
Softw. Syst. Model., 2009

Information flow security, abstraction and composition.
IET Inf. Secur., 2009

2008
A Transformational Approach to Facilitate Monitoring of High-Level Policies.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

2006
Information flow property preserving transformation of UML interaction diagrams.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Maintaining Information Flow Security Under Refinement and Transformation.
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006

2005
Graphical Specification of Dynamic Network Structure.
Proceedings of the ICEIS 2005, 2005


  Loading...