Per Håkon Meland

Orcid: 0000-0002-5509-0184

According to our database1, Per Håkon Meland authored at least 49 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Evaluating the Impact of ChatGPT on Exercises of a Software Security Course.
Proceedings of the ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2023

2022
Assessing cyber threats for storyless systems.
J. Inf. Secur. Appl., 2022

2021
Integrating and Validating Maritime Transport Security Services: Initial results from the CS4EU demonstrator.
Proceedings of the IC3 2021: Thirteenth International Conference on Contemporary Computing, Noida, India, August 5, 2021

2020
The Ransomware-as-a-Service economy within the darknet.
Comput. Secur., 2020

On the Certificate Revocation Problem in the Maritime Sector.
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020

Breaking the Cyber Kill Chain by Modelling Resource Costs.
Proceedings of the Graphical Models for Security - 7th International Workshop, 2020

2019
An experimental evaluation of bow-tie analysis for security.
Inf. Comput. Secur., 2019

An Experimental Analysis of Cryptojacking Attacks.
Proceedings of the Secure IT Systems, 2019

Demand side expectations of cyber insurance.
Proceedings of the International Conference on Cyber Situational Awareness, 2019

2018
When to Treat Security Risks with Cyber Insurance.
Int. J. Cyber Situational Aware., 2018

An Experimental Evaluation of Bow-Tie Analysis for Cybersecurity Requirements.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

A Netnographic Study on the Dark Net Ecosystem for Ransomware.
Proceedings of the International Conference On Cyber Situational Awareness, 2018

2017
Facing Uncertainty in Cyber Insurance Policies.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

Visualizing Cyber Security Risks with Bow-Tie Diagrams.
Proceedings of the Graphical Models for Security - 4th International Workshop, 2017

Protecting Future Maritime Communication.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2015
Mitigating Risk with Cyberinsurance.
IEEE Secur. Priv., 2015

Extending Software Development Methodologies to Support Trustworthiness-by-Design.
Proceedings of the CAiSE 2015 Forum at the 27th International Conference on Advanced Information Systems Engineering co-located with 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015), 2015

2014
The Aniketos Platform.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

Composite Services with Dynamic Behaviour.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

Threat Analysis in Goal-Oriented Security Requirements Modelling.
Int. J. Secur. Softw. Eng., 2014

Expressing cloud security requirements for SLAs in deontic contract languages for cloud brokers.
Int. J. Cloud Comput., 2014

Threats Management Throughout the Software Service Life-Cycle.
Proceedings of the Proceedings First International Workshop on Graphical Models for Security, 2014

Extending Development Methodologies with Trustworthiness-By-Design for Socio-Technical Systems - (Extended Abstract).
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

2013
Threat Representation Methods for Composite Service Process Models.
Int. J. Secur. Softw. Eng., 2013

CloudSurfer - A Cloud Broker Application for Security Concerns.
Proceedings of the CLOSER 2013, 2013

The Use and Usefulness of Threats in Goal-Oriented Modelling.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

Towards an Ontology for Cloud Security Obligations.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Attribute Decoration of Attack-Defense Trees.
Int. J. Secur. Softw. Eng., 2012

Aniketos: Challenges and Results.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

Thunder in the Clouds: Security challenges and solutions for federated Clouds.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

Expressing Cloud Security Requirements in Deontic Contract Languages.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

Representing Threats in BPMN 2.0.
Proceedings of the Seventh International Conference on Availability, 2012

2011
The challenges of secure and trustworthy service composition in the Future Internet.
Proceedings of the 6th International Conference on System of Systems Engineering, 2011

Service Injection: A Threat to Self-Managed Complex Systems.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

Security Requirements Engineering for Secure Business Processes.
Proceedings of the Workshops on Business Informatics Research, 2011

Security SLAs for Federated Cloud Services.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Security Testing in Agile Web Application Development - A Case Study Using the EAST Methodology.
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2010

Experimental Threat Model Reuse with Misuse Case Diagrams.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Idea: Reusability of Threat Models - Two Approaches with an Experimental Evaluation.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

Security Modeling and Tool Support Advantages.
Proceedings of the ARES 2010, 2010

2009
An Architectural Foundation for Security Model Sharing and Reuse.
Proceedings of the The Forth International Conference on Availability, 2009

Reusable Security Requirements for Healthcare Applications.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Security Requirements for the Rest of Us: A Survey.
IEEE Softw., 2008

Evacuation support system for improved medical documentation and information flow in the field.
Int. J. Medical Informatics, 2008

Learning by Failing (and Fixing).
IEEE Secur. Priv., 2008

Secure Software Design in Practice.
Proceedings of the The Third International Conference on Availability, 2008

2007
Linkcare - Enabling Continuity of Care for the Chronically Ill across Levels and Profession.
Proceedings of the MEDINFO 2007 - Proceedings of the 12th World Congress on Health (Medical) Informatics, 2007

How can the developer benefit from security modeling?
Proceedings of the The Second International Conference on Availability, 2007


  Loading...