Search the dblp DataBase
Reijo Savola :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Reijo Savola , Ilkka Uusitalo Towards Node-Level Security Management in Self-Organizing Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] AICT/ICIW, 2006, pp:36- [Conf ] Reijo Savola Architecture for Self-Estimation of Security Level in Ad Hoc Network Nodes. [Citation Graph (0, 0)][DBLP ] AISM, 2005, pp:88-94 [Conf ] Jorma Kajava , Reijo Savola , Rauno Varonen Weak Signals in Information Security Management. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:508-517 [Conf ] Reijo Savola Towards Security Evaluation Based on Evidence Collection. [Citation Graph (0, 0)][DBLP ] FSKD, 2006, pp:1178-1181 [Conf ] Jarkko Holappa , Reijo Savola Security Threats to Digital Television Platform and Service Development. [Citation Graph (0, 0)][DBLP ] ICEIS (3), 2006, pp:508-515 [Conf ] Reijo Savola Estimation of the Security Level in a Mobile and Ubiquitous Environment Based on the Semantic Web. [Citation Graph (0, 0)][DBLP ] ICEIS (4), 2005, pp:256-262 [Conf ] Reijo Savola A Requirement Centric Framework for Information Security Evaluation. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:48-59 [Conf ] Reijo Savola Towards Requirement and Modeling Driven Security Evaluation. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:20- [Conf ] Jorma Kajava , Juhani Anttila , Rauno Varonen , Reijo Savola , Juha Röning Senior Executives Commitment to Information Security - from Motivation to Responsibility. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:833-838 [Conf ] Reijo Savola Requirement Centric Security Evaluation of Software Intensive Systems. [Citation Graph (0, 0)][DBLP ] DepCoS-RELCOMEX, 2007, pp:135-144 [Conf ] Pekka Savolainen , Eila Niemelä , Reijo Savola A Taxonomy of Information Security for Service-Centric Systems. [Citation Graph (0, 0)][DBLP ] EUROMICRO-SEAA, 2007, pp:5-12 [Conf ] Security Objectives within a Security Testing Case Study. [Citation Graph (, )][DBLP ] Practical Security Testing of Telecommunications Software--A Case Study. [Citation Graph (, )][DBLP ] Towards a taxonomy for information security metrics. [Citation Graph (, )][DBLP ] Development of Security Metrics - Based on Decomposition of Security Requirements and Ontologies. [Citation Graph (, )][DBLP ] A Secure Running Environment for Multiple Platforms. [Citation Graph (, )][DBLP ] Node Level Security Management and Authentication in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP ] Towards a Security Metrics Taxonomy for the Information and Communication Technology Industry. [Citation Graph (, )][DBLP ] Towards an abstraction layer for security assurance measurements: (invited paper). [Citation Graph (, )][DBLP ] First International Workshop on Measurability of Security in Software Architectures -- MeSSa 2010. [Citation Graph (, )][DBLP ] Applicability of security metrics for adaptive security management in a universal banking hub system. [Citation Graph (, )][DBLP ] A Novel Security Metrics Taxonomy for R&D Organisations. [Citation Graph (, )][DBLP ] Towards Security Evaluation based on Evidence Collection. [Citation Graph (, )][DBLP ] Identification of Basic Measurable Security Components for a Distributed Messaging System. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.002secs