Reijo Savola

According to our database1, Reijo Savola authored at least 63 papers between 1993 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Adaptive Security and Trust Management for Autonomous Messaging Systems.
CoRR, 2022

2021
Towards Federated Learning-based Collaborative Adaptive Cybersecurity for Multi-microgrids.
Proceedings of the 18th International Conference on Wireless Networks and Mobile Systems, 2021

2020
Risk-driven security metrics for an Android smartphone application.
Int. J. Electron. Bus., 2020

2018
Risk-driven security metrics development for software-defined networking.
Proceedings of the 12th European Conference on Software Architecture: Companion Proceedings, 2018

2017
Current level of cybersecurity competence and future development: case Finland.
Proceedings of the 11th European Conference on Software Architecture, 2017

2016
Mitigating IoT security threats with a trusted Network element.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

Towards security metrics-supported IP traceback.
Proceedings of the Proccedings of the 10th European Conference on Software Architecture Workshops, Copenhagen, Denmark, November 28, 2016

2015
Risk-driven security metrics development for an e-health IoT application.
Proceedings of the 2015 Information Security for South Africa, 2015

Architecture for High Confidence Cloud Security Monitoring.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

2014
Security objectives, controls and metrics development for an Android smartphone application.
Proceedings of the 2014 Information Security for South Africa, 2014

Security Measuring for Self-adaptive Security.
Proceedings of the ECSA 2014 Workshops & Tool Demos Track, 2014

2013
Taxonomy of quality metrics for assessing assurance of security correctness.
Softw. Qual. J., 2013

Quality of security metrics and measurements.
Comput. Secur., 2013

Toward risk-driven security measurement for Android smartphone platforms.
Proceedings of the 2013 Information Security for South Africa, 2013

A risk-driven security analysis and metrics development for WSN-MCN router.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013

Requirements of secure WSN-MCN edge router.
Proceedings of the International Conference on Information Networking 2013, 2013

Security risks in the short-range communication of ubiquitous application.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Metrics-driven security objective decomposition for an e-health application with adaptive security management.
Proceedings of the International Workshop on Adaptive Security, 2013

2012
Risk-Driven Security Metrics in Agile Software Development - An Industrial Pilot Study.
J. Univers. Comput. Sci., 2012

Metrics driven security management framework for e-health digital ecosystem focusing on chronic diseases.
Proceedings of the International Conference on Management of Emergent Digital EcoSystems, 2012

Strategies for security measurement objective decomposition.
Proceedings of the 2012 Information Security for South Africa, 2012

Towards metrics-driven adaptive security management in e-health IoT applications.
Proceedings of the 7th International Conference on Body Area Networks, 2012

2011
A Visualization and Modeling Tool for Security Metrics and Measurements Management.
Proceedings of the Information Security South Africa Conference 2011, 2011

Operational Security Assurance Evaluation in Open Infrastructures.
Proceedings of the CRiSIS 2011, 2011

2010
Towards a Risk-Driven Methodology for Privacy Metrics Development.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Security-Measurability-Enhancing Mechanisms for a Distributed Adaptive Security Monitoring System.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

Towards Security Effectiveness Measurement utilizing Risk-Based Security Assurance.
Proceedings of the Information Security South Africa Conference 2010, 2010

Innovations and Advances in Adaptive Secure Message Oriented Middleware.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

First International Workshop on Measurability of Security in Software Architectures -- MeSSa 2010.
Proceedings of the Software Architecture, 4th European Conference, 2010

Towards an abstraction layer for security assurance measurements: (invited paper).
Proceedings of the Software Architecture, 4th European Conference, 2010

Applicability of security metrics for adaptive security management in a universal banking hub system.
Proceedings of the Software Architecture, 4th European Conference, 2010

Trust and Cloud Services - An Interview Study.
Proceedings of the Cloud Computing, Second International Conference, 2010

User Experience and Security in the Cloud -- An Empirical Study in the Finnish Cloud Consortium.
Proceedings of the Cloud Computing, Second International Conference, 2010

2009
On-Line and Off-Line Security Measurement Framework for Mobile Ad Hoc Networks.
J. Networks, 2009

A Security Metrics Taxonomization Model for Software-Intensive Systems.
J. Inf. Process. Syst., 2009

Identification of Basic Measurable Security Components for a Distributed Messaging System.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Node Level Security Management and Authentication in Mobile Ad Hoc Networks.
Proceedings of the MDM 2009, 2009

Identification of Basic Measurable Security Components in Software-Intensive Systems.
Proceedings of the Information Security South Africa Conference 2009, 2009

Development of Security Metrics - Based on Decomposition of Security Requirements and Ontologies.
Proceedings of the ICSOFT 2009, 2009

A Secure Running Environment for Multiple Platforms.
Proceedings of the ICSOFT 2009, 2009

2008
Architecture Requirements of the Future Internet.
Proceedings of the 4th International ICST Mobile Multimedia Communications Conference, 2008

A Novel Security Metrics Taxonomy for R&D Organisations.
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008

GEMOM - Significant and Measurable Progress beyond the State of the Art.
Proceedings of the 3rd International Conference on Systems and Networks Communications, 2008

2007
Towards a Security Metrics Taxonomy for the Information and Communication Technology Industry.
Proceedings of the Second International Conference on Software Engineering Advances (ICSEA 2007), 2007

A Taxonomy of Information Security for Service-Centric Systems.
Proceedings of the 33rd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA 2007), 2007

Requirement Centric Security Evaluation of Software Intensive Systems.
Proceedings of the 2007 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2007), 2007

Towards a taxonomy for information security metrics.
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007

Automated Trustworthiness Management for Database Software Components.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

Information Security Threats to Mobile Service Development.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

Practical Security Testing of Telecommunications Software--A Case Study.
Proceedings of the Third Advanced International Conference on Telecommunications (AICT 2007), 2007

Security Objectives within a Security Testing Case Study.
Proceedings of the The Second International Conference on Availability, 2007

2006
A Requirement Centric Framework for Information Security Evaluation.
Proceedings of the Advances in Information and Computer Security, 2006

Towards Security Evaluation based on Evidence Collection.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

Towards Requirement and Modeling Driven Security Evaluation.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

Security Threats to Digital Television Platform and Service Development.
Proceedings of the ICEIS 2006, 2006

Senior Executives Commitment to Information Security - from Motivation to Responsibility.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Towards Node-Level Security Management in Self-Organizing Mobile Ad Hoc Networks.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

2005
Estimation of the Security Level in a Mobile and Ubiquitous Environment Based on the Semantic Web.
Proceedings of the ICEIS 2005, 2005

Weak Signals in Information Security Management.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Architecture for Self-Estimation of Security Level in Ad Hoc Network Nodes.
Proceedings of the 3rd Australian Information Security Management Conference, 2005

2004
Measurement of Information Security in Processes and Products.
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004

1994
Object-oriented enhancement of real-time software using a heterogeneous re-engineering approach.
Proceedings of the Sixth Euromicro Workshop on Real-Time Systems, 1994

1993
Executable Object-Oriented Graphical Models of Real-Time Software.
Proceedings of the Fifth Euromicro Workshop on Real-Time Systems, 1993


  Loading...