Influencing the security prioritisation of an agile software development project | 1 | 0.39 | 2022 |
Secure Mobile Cloud Computing | 0 | 0.34 | 2021 |
Improving Smart Grid Security Through 5g Enabled Iot And Edge Computing | 0 | 0.34 | 2021 |
DID-eFed: Facilitating Federated Learning as a Service with Decentralized Identities | 1 | 0.40 | 2021 |
What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios | 0 | 0.34 | 2020 |
Achieving "Good Enough" Software Security - The Role of Objectivity. | 0 | 0.34 | 2020 |
Using Situational and Narrative Analysis for Investigating the Messiness of Software Security | 0 | 0.34 | 2020 |
IT Security Is From Mars, Software Security Is From Venus | 0 | 0.34 | 2020 |
Enhancing accountability in the cloud | 4 | 0.47 | 2020 |
An Empirical Study of CERT Capacity in the North Sea | 0 | 0.34 | 2020 |
A Trustworthy Blockchain-based Decentralised Resource Management System in the Cloud | 0 | 0.34 | 2020 |
A Cost-efficient Protocol for Open Blockchains | 1 | 0.40 | 2019 |
Is a Smarter Grid Also Riskier? | 0 | 0.34 | 2019 |
Threat modelling and agile software development: Identified practice in four Norwegian organisations | 0 | 0.34 | 2019 |
Managing Security in Software: Or: How I Learned to Stop Worrying and Manage the Security Technical Debt | 0 | 0.34 | 2019 |
Tackling the Cloud Forensic Problem While Keeping Your Eye on the GDPR | 0 | 0.34 | 2019 |
Architectural Risk Analysis in Agile Development of Cloud Software | 0 | 0.34 | 2019 |
The Security Intention Meeting Series as a way to increase visibility of software security decisions in agile development projects | 0 | 0.34 | 2019 |
Collaborative security risk estimation in agile software development. | 0 | 0.34 | 2019 |
Cyber Security Considerations for Self-healing Smart Grid Networks | 0 | 0.34 | 2018 |
Accountability Requirements in the Cloud Provider Chain. | 0 | 0.34 | 2018 |
Session details - SecSE 2018 - International workshop on secure software engineering in DevOps and agile development. | 0 | 0.34 | 2018 |
Challenges and approaches of performing canonical action research in software security: research paper. | 0 | 0.34 | 2018 |
Challenges and Experiences with Applying Microsoft Threat Modeling in Agile Development Projects | 3 | 0.44 | 2018 |
Security Incident Information Exchange For Cloud Service Provisioning Chains | 0 | 0.34 | 2018 |
Understanding Challenges to Adoption of the Protection Poker Software Security Game. | 0 | 0.34 | 2018 |
OWASP Top 10 - Do Startups Care? | 0 | 0.34 | 2018 |
Understanding challenges to adoption of the Microsoft elevation of privilege game. | 0 | 0.34 | 2018 |
Guiding Lights For Cloud Accountability | 0 | 0.34 | 2018 |
Risk Centric Activities in Secure Software Development in Public Organisations. | 0 | 0.34 | 2017 |
DevOps for Better Software Security in the Cloud Invited Paper | 0 | 0.34 | 2017 |
Accountability Requirements for the Cloud | 1 | 0.36 | 2017 |
A Lightweight Measurement of Software Security Skills, Usage and Training Needs in Agile Teams. | 3 | 0.43 | 2017 |
Current practices and challenges in industrial control organizations regarding information security incident management – Does size matter? Information security incident management in large and small industrial control organizations | 1 | 0.37 | 2016 |
Advanced Healthcare Services Enabled by a Computerized Pain Body Map. | 0 | 0.34 | 2016 |
Zebras and Lions: Better Incident Handling Through Improved Cooperation. | 0 | 0.34 | 2016 |
Cyber Security Incident Management in the Aviation Domain | 1 | 0.35 | 2016 |
I'll Trust You - for Now. | 0 | 0.34 | 2016 |
Playing Protection Poker for Practical Software Security. | 0 | 0.34 | 2016 |
Software Security Maturity in Public Organisations | 4 | 0.51 | 2015 |
How Much Cloud Can You Handle? | 0 | 0.34 | 2015 |
Could the Outsourcing of Incident Response Management Provide a Blueprint for Managing Other Cloud Security Requirements? | 0 | 0.34 | 2015 |
Cloud Provider Transparency - A View from Cloud Customers. | 1 | 0.36 | 2015 |
Passing the Buck: Outsourcing Incident Response Management. | 0 | 0.34 | 2015 |
Accountability Through Transparency for Cloud Customers. | 1 | 0.44 | 2015 |
Information security incident management: Current practice as reported in the literature | 13 | 0.83 | 2014 |
Expressing cloud security requirements for SLAs in deontic contract languages for cloud brokers. | 5 | 0.43 | 2014 |
Healthcare Services in the Cloud -- Obstacles to Adoption, and a Way Forward | 0 | 0.34 | 2014 |
Information Security Incident Management: Planning for Failure | 6 | 0.59 | 2014 |
Towards an Ontology for Cloud Security Obligations. | 0 | 0.34 | 2013 |