Einar Snekkenes
Orcid: 0000-0002-2277-6964
According to our database1,
Einar Snekkenes
authored at least 55 papers
between 1990 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2021
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021
Inferring Delay Discounting Factors from Public Observables: Applications in Risk Analysis and the Design of Adaptive Incentives.
Proceedings of the 5th International Conference on Computer-Human Interaction Research and Applications, 2021
2020
IEEE Access, 2020
Data-Driven and Artificial Intelligence (AI) Approach for Modelling and Analyzing Healthcare Security Practice: A Systematic Review.
Proceedings of the Intelligent Systems and Applications, 2020
Representing Decision-Makers in SGAM-H: The Smart Grid Architecture Model Extended with the Human Layer.
Proceedings of the Graphical Models for Security - 7th International Workshop, 2020
2019
Healthcare Staffs' Information Security Practices Towards Mitigating Data Breaches: A Literature Survey.
Proceedings of the pHealth 2019 - Proceedings of the 16th International Conference on Wearable Micro and Nano Technologies for Personalized Health, 2019
Using Demographic Features for the Prediction of Basic Human Values Underlying Stakeholder Motivation.
Proceedings of the 21st International Conference on Enterprise Information Systems, 2019
Proceedings of the 25th Conference of Open Innovations Association, 2019
Observational Measures for Effective Profiling of Healthcare Staffs' Security Practices.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
A framework for estimating information security risk assessment method completeness - Core Unified Risk Framework, CURF.
Int. J. Inf. Sec., 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
2017
UnRizkNow: An open electronic community of practice for information security professionals.
Proceedings of the 9th International Conference on Education Technology and Computers, 2017
Factors Influencing the Participation of Information Security Professionals in Electronic Communities of Practice.
Proceedings of the 9th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, 2017
Proceedings of the Collaboration and Technology - 23rd International Conference, 2017
2016
Future Internet, 2016
2015
EDAS: An Evaluation Prototype for Autonomic Event-Driven Adaptive Security in the Internet of Things.
Future Internet, 2015
Design and Performance Aspects of Information Security Prediction Markets for Risk Management.
Proceedings of the SECRYPT 2015, 2015
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
2014
Proceedings of the Security and Trust Management - 10th International Workshop, 2014
A Comparison between Business Process Management and Information Security Management.
Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, 2014
Proceedings of the 25th International Workshop on Database and Expert Systems Applications, 2014
2013
Risk Acceptance and Rejection for Threat and Opportunity Risks in Conflicting Incentives Risk Analysis.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Proceedings of the Policies and Research in Identity Management, 2013
2012
Proceedings of the Information Security - 15th International Conference, 2012
2011
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011
Proceedings of the Communications and Multimedia Security, 2011
2010
Proceedings of the Privacy and Identity Management for Life, 2010
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
2009
EURASIP J. Adv. Signal Process., 2009
2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 2nd International Conference on Human Aspects of Information Security and Assurance, 2008
Proceedings of the 2nd International Conference on Human Aspects of Information Security and Assurance, 2008
Proceedings of the 8th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2008), 2008
2007
Proceedings of the 2007 IEEE Workshop on Automatic Identification Advanced Technologies, 2007
2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the Information and Communications Security, 8th International Conference, 2006
Proceedings of the Advances in Biometrics, International Conference, 2006
2005
Proceedings of the Information Security Practice and Experience, 2005
2004
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004
2001
Proceedings of the Proceedings 3rd ACM Conference on Electronic Commerce (EC-2001), 2001
1992
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992
1991
Applying a Formal Analysis Technique to the CCITT X.509 Strong Two-Way Authentication Protocol.
J. Cryptol., 1991
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991
1990
Authentication in Open Systems.
Proceedings of the Protocol Specification, 1990
Proceedings of the Advances in Cryptology, 1990