Martin Gilje Jaatun
Orcid: 0000-0001-7127-6694
According to our database1,
Martin Gilje Jaatun
authored at least 140 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
J. Univers. Comput. Sci., 2024
Identification of Cyber Threats and Vulnerabilities in Norwegian Distribution Networks.
Proceedings of the ICT Systems Security and Privacy Protection, 2024
Proceedings of the 17th International Conference on PErvasive Technologies Related to Assistive Environments, 2024
A Framework Addressing Challenges in Cybersecurity Testing of IoT Ecosystems and Components.
Proceedings of the 9th International Conference on Internet of Things, 2024
Proceedings of the European Interdisciplinary Cybersecurity Conference, 2024
2023
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023
Proceedings of the CENTERIS 2023 - International Conference on ENTERprise Information Systems / ProjMAN - International Conference on Project MANagement / HCist, 2023
2022
Security and Independence of Process Safety and Control Systems in the Petroleum Industry.
J. Cybersecur. Priv., February, 2022
J. Syst. Softw., 2022
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
J. Cloud Comput., 2022
Comput. Secur., 2022
Proceedings of the 7th International Conference on Internet of Things, 2022
Needs and Challenges Concerning Cyber-risk Assessment in the Cyber-physical Smart Grid.
Proceedings of the 17th International Conference on Software Technologies, 2022
Adapting Cyber-Risk Assessment for the Planning of Cyber-Physical Smart Grids Based on Industrial Needs.
Proceedings of the Software Technologies - 17th International Conference, 2022
Proceedings of the International Conference on Cybersecurity, 2022
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022
Privacy and security challenges for autonomous agents : A study of two social humanoid service robots.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022
2021
Concurr. Comput. Pract. Exp., 2021
Proceedings of the 2nd International Conference on Societal Automation, 2021
Proceedings of the 2nd International Conference on Societal Automation, 2021
With a Little Help from Your Friends: Collaboration with Vendors During Smart Grid Incident Response Exercises.
Proceedings of the EICC '21: European Interdisciplinary Cybersecurity Conference, 2021
DID-eFed: Facilitating Federated Learning as a Service with Decentralized Identities.
Proceedings of the EASE 2021: Evaluation and Assessment in Software Engineering, 2021
Proceedings of the International Conference on Cyber Situational Awareness, 2021
Proceedings of the International Conference on Cyber Situational Awareness, 2021
Proceedings of the International Conference on Cyber Situational Awareness, 2021
2020
Towards a Conceptual Framework for Security Requirements Work in Agile Software Development.
Int. J. Syst. Softw. Secur. Prot., 2020
Towards a Secure DevOps Approach for Cyber-Physical Systems: An Industrial Perspective.
Int. J. Syst. Softw. Secur. Prot., 2020
A Trustworthy Blockchain-based Decentralised Resource Management System in the Cloud.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020
Using Situational and Narrative Analysis for Investigating the Messiness of Software Security.
Proceedings of the ESEM '20: ACM / IEEE International Symposium on Empirical Software Engineering and Measurement, 2020
Proceedings of the EASE '20: Evaluation and Assessment in Software Engineering, 2020
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020
2019
Inf. Comput. Secur., 2019
Proceedings of the Security and Trust Management - 15th International Workshop, 2019
Proceedings of the First International Conference on Societal Automation, 2019
Threat modelling and agile software development: Identified practice in four Norwegian organisations.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019
Putting the "Account" into Cloud Accountability.
Proceedings of the 9th International Conference on Cloud Computing and Services Science, 2019
The Security Intention Meeting Series as a way to increase visibility of software security decisions in agile development projects.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
Managing Security in Software: Or: How I Learned to Stop Worrying and Manage the Security Technical Debt.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Int. J. Syst. Softw. Secur. Prot., 2018
Cryptogr., 2018
Session details: SecSE 2018: International workshop on secure software engineering in DevOps and agile development.
Proceedings of the 19th International Conference on Agile Software Development, 2018
Proceedings of the 2018 International Conference on High Performance Computing & Simulation, 2018
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018
Challenges and approaches of performing canonical action research in software security: research paper.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018
Challenges and Experiences with Applying Microsoft Threat Modeling in Agile Development Projects.
Proceedings of the 25th Australasian Software Engineering Conference, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Int. J. Secur. Softw. Eng., 2017
A Lightweight Measurement of Software Security Skills, Usage and Training Needs in Agile Teams.
Int. J. Secur. Softw. Eng., 2017
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Current practices and challenges in industrial control organizations regarding information security incident management - Does size matter? Information security incident management in large and small industrial control organizations.
Int. J. Crit. Infrastructure Prot., 2016
Proceedings of the Product-Focused Software Process Improvement, 2016
Proceedings of the International Conference on Internet of Things and Big Data, 2016
Proceedings of the International Conference on Internet of Things and Big Data, 2016
Proceedings of the Innovations for Community Services - 16th International Conference, 2016
Proceedings of the 7th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2016)/The 6th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2016)/Affiliated Workshops, 2016
Proceedings of the Digital Media Industry & Academic Forum, 2016
An Empirical Study on the Relationship between Software Security Skills, Usage and Training Needs in Agile Settings.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Proceedings of the Information Security - 18th International Conference, 2015
Could the Outsourcing of Incident Response Management Provide a Blueprint for Managing Other Cloud Security Requirements?
Proceedings of the Enterprise Security - Second International Workshop, 2015
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015
Proceedings of the Cloud Computing and Services Science - 5th International Conference, 2015
Proceedings of the CLOSER 2015, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Expressing cloud security requirements for SLAs in deontic contract languages for cloud brokers.
Int. J. Cloud Comput., 2014
Information security incident management: Current practice as reported in the literature.
Comput. Secur., 2014
Proceedings of the 2nd European Workshop on Practical Aspects of Health Informatics, 2014
Proceedings of the Eighth International Conference on IT Security Incident Management & IT Forensics, 2014
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014
Proceedings of the Ninth International Conference on Availability, 2014
Proceedings of the Ninth International Conference on Availability, 2014
2013
Mob. Networks Appl., 2013
IEEE Secur. Priv., 2013
Comput. Electr. Eng., 2013
Towards Improved Understanding and Holistic Management of the Cyber Security Challenges in Power Transmission Systems.
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
J. Supercomput., 2012
J. Cloud Comput., 2012
The design of a redundant array of independent net-storages for improved confidentiality in cloud computing.
J. Cloud Comput., 2012
Proceedings of the 12th International Conference on Innovative Internet Community Systems (I<sup>2</sup>CS 2012), 2012
Proceedings of the 12th International Conference on Innovative Internet Community Systems (I<sup>2</sup>CS 2012), 2012
Proceedings of the Critical Information Infrastructures Security, 2012
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012
Expressing Cloud Security Requirements in Deontic Contract Languages.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012
Usage Control in Inter-organisational Collaborative Environments - A Case Study from an Industry Perspective.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
2011
Int. J. Secur. Softw. Eng., 2011
Proceedings of the 2nd IEEE PES International Conference and Exhibition on "Innovative Smart Grid Technologies", 2011
Proceedings of the Sixth IEEE International Conference on Digital Information Management, 2011
Monitoring Intrusions and Security Breaches in Highly Distributed Cloud Environments.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
A Cryptographic Protocol for Communication in a Redundant Array of Independent Net-storages.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
Security in Service Level Agreements for Cloud Computing.
Proceedings of the CLOSER 2011, 2011
Proceedings of the Sixth International Conference on Availability, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
Int. J. Secur. Softw. Eng., 2010
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010
Managing Emerging Information Security Risks during Transitions to Integrated Operations.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
The Road to Hell is Paved with Good Intentions: A Story of (In)secure Software Development.
Proceedings of the ARES 2010, 2010
2009
Int. J. Crit. Infrastructure Prot., 2009
Int. J. Auton. Adapt. Commun. Syst., 2009
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008
Proceedings of the Critical Information Infrastructure Security, 2008
Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installations.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Extending 3G/WiMAX Networks and Services through Residential Access Capacity[Wireless Broadband Access].
IEEE Commun. Mag., 2007
2006
Secure Fast Handover in an Open Broadband Access Network using Kerberos-style Tickets.
Proceedings of the Security and Privacy in Dynamic Environments, 2006