Name
Affiliation
Papers
REIJO SAVOLA
VTT Technical Research Centre of Finland
56
Collaborators
Citations 
PageRank 
64
318
35.00
Referers 
Referees 
References 
609
566
334
Search Limit
100609
Title
Citations
PageRank
Year
Risk-driven security metrics for an Android smartphone application.00.342020
Current Level Of Cybersecurity Competence And Future Development - Case Finland00.342017
Mitigating IoT security threats with a trusted Network element10.412016
Towards security metrics-supported IP traceback.00.342016
Architecture for High Confidence Cloud Security Monitoring20.382015
Security objectives, controls and metrics development for an Android smartphone application00.342014
Security Measuring for Self-adaptive Security00.342014
Quality of security metrics and measurements140.892013
Metrics-driven security objective decomposition for an e-health application with adaptive security management120.582013
Toward risk-driven security measurement for Android smartphone platforms.20.412013
Security risks in the short-range communication of ubiquitous application00.342013
Requirements of secure WSN-MCN edge router20.822013
Taxonomy of quality metrics for assessing assurance of security correctness70.622013
A Risk-Driven Security Analysis And Metrics Development For Wsn-Mcn Router10.372013
Risk-Driven Security Metrics in Agile Software Development - An Industrial Pilot Study.50.632012
Metrics driven security management framework for e-health digital ecosystem focusing on chronic diseases00.342012
Towards metrics-driven adaptive security management in e-health IoT applications.100.752012
Strategies For Security Measurement Objective Decomposition40.592012
A Visualization and Modeling Tool for Security Metrics and Measurements Management.90.782011
Towards security effectiveness measurement utilizing risk-based security assurance50.572010
User Experience and Security in the Cloud -- An Empirical Study in the Finnish Cloud Consortium70.472010
Applicability of security metrics for adaptive security management in a universal banking hub system60.462010
Security-Measurability-Enhancing Mechanisms for a Distributed Adaptive Security Monitoring System120.752010
Towards an abstraction layer for security assurance measurements: (invited paper)60.572010
Future Internet - FIS 2009, Second Future Internet Symposium, FIS 2009, Berlin, Germany, September 1-3, 200980.822010
Trust and Cloud Services - An Interview Study90.592010
Towards a Risk-Driven Methodology for Privacy Metrics Development30.502010
First International Workshop on Measurability of Security in Software Architectures -- MeSSa 201000.342010
Identification of Basic Measurable Security Components for a Distributed Messaging System151.092009
Identification of Basic Measurable Security Components in Software-Intensive Systems.00.342009
Node Level Security Management and Authentication in Mobile Ad Hoc Networks20.372009
Development Of Security Metrics Based On Decomposition Of Security Requirements And Ontologies00.342009
A Security Metrics Taxonomization Model For Software-Intensive Systems211.582009
The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece504.372009
A Secure Running Environment For Multiple Platforms00.342009
On-Line and Off-Line Security Measurement Framework for Mobile Ad Hoc Networks40.412009
A Novel Security Metrics Taxonomy for R&D Organisations121.092008
Architecture Requirements of the Future Internet.00.342008
GEMOM - Significant and Measurable Progress beyond the State of the Art161.112008
Requirement Centric Security Evaluation of Software Intensive Systems30.612007
Practical Security Testing of Telecommunications Software--A Case Study00.342007
Information Security Threats To Mobile Service Development00.342007
A Taxonomy of Information Security for Service-Centric Systems150.832007
Towards a Security Metrics Taxonomy for the Information and Communication Technology Industry161.002007
Security Objectives within a Security Testing Case Study30.642007
Towards a taxonomy for information security metrics221.332007
A requirement centric framework for information security evaluation30.402006
Towards Node-Level Security Management in Self-Organizing Mobile Ad Hoc Networks30.422006
Towards security evaluation based on evidence collection00.342006
Towards Requirement and Modeling Driven Security Evaluation20.452006
  • 1
  • 2