Blar i SINTEF Open på forfatter "Meland, Per Håkon"
-
Security Requirements for SATCOM Datalink Systems for Future Air Traffic Management
Bernsmed, Karin; Frøystad, Christian; Meland, Per Håkon; Myrvoll, Tor Andre (Chapter, 2017)Aircraft equipped with satellite communication (SATCOM) systems will enable advanced Air Traffic Management (ATM) operations over datalink on a global basis. A key concept of future ATM is 4D trajectory management, which ... -
Security requirements for the rest of us: A survey
Tøndel, Inger Anne; Jaatun, Martin Gilje; Meland, Per Håkon (Journal article; Peer reviewed, 2008) -
Structured Description of Autonomous Inland Waterway Barge Operations
Hagaseth, Marianne; Meland, Per Håkon; Wille, Egil (Journal article; Peer reviewed, 2023)Autonomous and unmanned shipping is revolutionizing the maritime industry by introducing a paradigm shift on how to design the vessels and supporting land-side infrastructure. Currently, there is a lack of formalisms on ... -
A Systematic Mapping Study on Cyber Security Indicator Data
Meland, Per Håkon; Tokas, Shukun; Erdogan, Gencer; Bernsmed, Karin; Omerovic, Aida (Peer reviewed; Journal article, 2021)A security indicator is a sign that shows us what something is like or how a situation is changing and can aid us in making informed estimations on cyber risks. There are many different breeds of security indicators, ... -
Using Cyber-Insurance as a Risk Management Strategy: Knowledge Gaps and Recommendations for Further Research
Tøndel, Inger Anne; Meland, Per Håkon; Omerovic, Aida; Gjære, Erlend Andreas; Solhaug, Bjørnar (Research report, 2015)Risk transfer can be an economically favorable way of handling security and privacy issues, but choosing this option indiscriminately and without proper knowledge is a risk in itself. This report provides an overview of ... -
Visualizing Cyber Security Risks with Bow-Tie Diagrams
Bernsmed, Karin; Frøystad, Christian; Meland, Per Håkon; Nesheim, Dag Atle; Rødseth, Ørnulf Jan (Journal article; Peer reviewed, 2018)Safety and security risks are usually analyzed independently, by different people using different tools. Consequently, the system analyst may fail to realize cyber attacks as a contributing factor to safety impacts or, on ... -
Visualizing Cyber Security Risks with Bow-Tie Diagrams
Bernsmed, Karin; Frøystad, Christian; Meland, Per Håkon; Nesheim, Dag Atle; Rødseth, Ørnulf Jan (Journal article; Peer reviewed, 2018-01-19)Safety and security risks are usually analyzed independently, by different people using different tools. Consequently, the system analyst may fail to realize cyber attacks as a contributing factor to safety impacts or, on ... -
When to Treat Security Risks with Cyber Insurance
Meland, Per Håkon; Seehusen, Fredrik (Journal article; Peer reviewed, 2018)Transferring security risk to a third party through cyber insurance is an unfamiliar playing field for a lot of organisations, and therefore many hesitate to make such investments. Indeed, there is a general need for ... -
When to Treat Security Risks with Cyber Insurance
Meland, Per Håkon; Seehusen, Fredrik (Chapter, 2018)Transferring security risk to a third party through cyber insurance is an unfamiliar playing field for a lot of organisations, and therefore many hesitate to make such investments. Indeed, there is a general need for ...