Name
Affiliation
Papers
MARTIN GILJE JAATUN
SINTEF ICT, NO-7465 Trondheim Norway
97
Collaborators
Citations 
PageRank 
114
482
63.81
Referers 
Referees 
References 
1170
856
533
Search Limit
1001000
Title
Citations
PageRank
Year
Influencing the security prioritisation of an agile software development project10.392022
Secure Mobile Cloud Computing00.342021
Improving Smart Grid Security Through 5g Enabled Iot And Edge Computing00.342021
DID-eFed: Facilitating Federated Learning as a Service with Decentralized Identities10.402021
What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios00.342020
Achieving "Good Enough" Software Security - The Role of Objectivity.00.342020
Using Situational and Narrative Analysis for Investigating the Messiness of Software Security00.342020
IT Security Is From Mars, Software Security Is From Venus00.342020
Enhancing accountability in the cloud40.472020
An Empirical Study of CERT Capacity in the North Sea00.342020
A Trustworthy Blockchain-based Decentralised Resource Management System in the Cloud00.342020
A Cost-efficient Protocol for Open Blockchains10.402019
Is a Smarter Grid Also Riskier?00.342019
Threat modelling and agile software development: Identified practice in four Norwegian organisations00.342019
Managing Security in Software: Or: How I Learned to Stop Worrying and Manage the Security Technical Debt00.342019
Tackling the Cloud Forensic Problem While Keeping Your Eye on the GDPR00.342019
Architectural Risk Analysis in Agile Development of Cloud Software00.342019
The Security Intention Meeting Series as a way to increase visibility of software security decisions in agile development projects00.342019
Collaborative security risk estimation in agile software development.00.342019
Cyber Security Considerations for Self-healing Smart Grid Networks00.342018
Accountability Requirements in the Cloud Provider Chain.00.342018
Session details - SecSE 2018 - International workshop on secure software engineering in DevOps and agile development.00.342018
Challenges and approaches of performing canonical action research in software security: research paper.00.342018
Challenges and Experiences with Applying Microsoft Threat Modeling in Agile Development Projects30.442018
Security Incident Information Exchange For Cloud Service Provisioning Chains00.342018
Understanding Challenges to Adoption of the Protection Poker Software Security Game.00.342018
OWASP Top 10 - Do Startups Care?00.342018
Understanding challenges to adoption of the Microsoft elevation of privilege game.00.342018
Guiding Lights For Cloud Accountability00.342018
Risk Centric Activities in Secure Software Development in Public Organisations.00.342017
DevOps for Better Software Security in the Cloud Invited Paper00.342017
Accountability Requirements for the Cloud10.362017
A Lightweight Measurement of Software Security Skills, Usage and Training Needs in Agile Teams.30.432017
Current practices and challenges in industrial control organizations regarding information security incident management – Does size matter? Information security incident management in large and small industrial control organizations10.372016
Advanced Healthcare Services Enabled by a Computerized Pain Body Map.00.342016
Zebras and Lions: Better Incident Handling Through Improved Cooperation.00.342016
Cyber Security Incident Management in the Aviation Domain10.352016
I'll Trust You - for Now.00.342016
Playing Protection Poker for Practical Software Security.00.342016
Software Security Maturity in Public Organisations40.512015
How Much Cloud Can You Handle?00.342015
Could the Outsourcing of Incident Response Management Provide a Blueprint for Managing Other Cloud Security Requirements?00.342015
Cloud Provider Transparency - A View from Cloud Customers.10.362015
Passing the Buck: Outsourcing Incident Response Management.00.342015
Accountability Through Transparency for Cloud Customers.10.442015
Information security incident management: Current practice as reported in the literature130.832014
Expressing cloud security requirements for SLAs in deontic contract languages for cloud brokers.50.432014
Healthcare Services in the Cloud -- Obstacles to Adoption, and a Way Forward00.342014
Information Security Incident Management: Planning for Failure60.592014
Towards an Ontology for Cloud Security Obligations.00.342013
  • 1
  • 2