The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Reijo Savola: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Reijo Savola, Ilkka Uusitalo
    Towards Node-Level Security Management in Self-Organizing Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    AICT/ICIW, 2006, pp:36- [Conf]
  2. Reijo Savola
    Architecture for Self-Estimation of Security Level in Ad Hoc Network Nodes. [Citation Graph (0, 0)][DBLP]
    AISM, 2005, pp:88-94 [Conf]
  3. Jorma Kajava, Reijo Savola, Rauno Varonen
    Weak Signals in Information Security Management. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:508-517 [Conf]
  4. Reijo Savola
    Towards Security Evaluation Based on Evidence Collection. [Citation Graph (0, 0)][DBLP]
    FSKD, 2006, pp:1178-1181 [Conf]
  5. Jarkko Holappa, Reijo Savola
    Security Threats to Digital Television Platform and Service Development. [Citation Graph (0, 0)][DBLP]
    ICEIS (3), 2006, pp:508-515 [Conf]
  6. Reijo Savola
    Estimation of the Security Level in a Mobile and Ubiquitous Environment Based on the Semantic Web. [Citation Graph (0, 0)][DBLP]
    ICEIS (4), 2005, pp:256-262 [Conf]
  7. Reijo Savola
    A Requirement Centric Framework for Information Security Evaluation. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:48-59 [Conf]
  8. Reijo Savola
    Towards Requirement and Modeling Driven Security Evaluation. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:20- [Conf]
  9. Jorma Kajava, Juhani Anttila, Rauno Varonen, Reijo Savola, Juha Röning
    Senior Executives Commitment to Information Security - from Motivation to Responsibility. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:833-838 [Conf]
  10. Reijo Savola
    Requirement Centric Security Evaluation of Software Intensive Systems. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2007, pp:135-144 [Conf]
  11. Pekka Savolainen, Eila Niemelä, Reijo Savola
    A Taxonomy of Information Security for Service-Centric Systems. [Citation Graph (0, 0)][DBLP]
    EUROMICRO-SEAA, 2007, pp:5-12 [Conf]

  12. Security Objectives within a Security Testing Case Study. [Citation Graph (, )][DBLP]


  13. Practical Security Testing of Telecommunications Software--A Case Study. [Citation Graph (, )][DBLP]


  14. Towards a taxonomy for information security metrics. [Citation Graph (, )][DBLP]


  15. Development of Security Metrics - Based on Decomposition of Security Requirements and Ontologies. [Citation Graph (, )][DBLP]


  16. A Secure Running Environment for Multiple Platforms. [Citation Graph (, )][DBLP]


  17. Node Level Security Management and Authentication in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  18. Towards a Security Metrics Taxonomy for the Information and Communication Technology Industry. [Citation Graph (, )][DBLP]


  19. Towards an abstraction layer for security assurance measurements: (invited paper). [Citation Graph (, )][DBLP]


  20. First International Workshop on Measurability of Security in Software Architectures -- MeSSa 2010. [Citation Graph (, )][DBLP]


  21. Applicability of security metrics for adaptive security management in a universal banking hub system. [Citation Graph (, )][DBLP]


  22. A Novel Security Metrics Taxonomy for R&D Organisations. [Citation Graph (, )][DBLP]


  23. Towards Security Evaluation based on Evidence Collection. [Citation Graph (, )][DBLP]


  24. Identification of Basic Measurable Security Components for a Distributed Messaging System. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002