Reijo Savola
According to our database1,
Reijo Savola
authored at least 63 papers
between 1993 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
2021
Towards Federated Learning-based Collaborative Adaptive Cybersecurity for Multi-microgrids.
Proceedings of the 18th International Conference on Wireless Networks and Mobile Systems, 2021
2020
Int. J. Electron. Bus., 2020
2018
Proceedings of the 12th European Conference on Software Architecture: Companion Proceedings, 2018
2017
Proceedings of the 11th European Conference on Software Architecture, 2017
2016
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016
Proceedings of the Proccedings of the 10th European Conference on Software Architecture Workshops, Copenhagen, Denmark, November 28, 2016
2015
Proceedings of the 2015 Information Security for South Africa, 2015
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015
2014
Security objectives, controls and metrics development for an Android smartphone application.
Proceedings of the 2014 Information Security for South Africa, 2014
Proceedings of the ECSA 2014 Workshops & Tool Demos Track, 2014
2013
Softw. Qual. J., 2013
Proceedings of the 2013 Information Security for South Africa, 2013
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013
Proceedings of the International Conference on Information Networking 2013, 2013
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
Metrics-driven security objective decomposition for an e-health application with adaptive security management.
Proceedings of the International Workshop on Adaptive Security, 2013
2012
Risk-Driven Security Metrics in Agile Software Development - An Industrial Pilot Study.
J. Univers. Comput. Sci., 2012
Metrics driven security management framework for e-health digital ecosystem focusing on chronic diseases.
Proceedings of the International Conference on Management of Emergent Digital EcoSystems, 2012
Proceedings of the 2012 Information Security for South Africa, 2012
Proceedings of the 7th International Conference on Body Area Networks, 2012
2011
Proceedings of the Information Security South Africa Conference 2011, 2011
Proceedings of the CRiSIS 2011, 2011
2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Security-Measurability-Enhancing Mechanisms for a Distributed Adaptive Security Monitoring System.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010
Proceedings of the Information Security South Africa Conference 2010, 2010
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010
First International Workshop on Measurability of Security in Software Architectures -- MeSSa 2010.
Proceedings of the Software Architecture, 4th European Conference, 2010
Proceedings of the Software Architecture, 4th European Conference, 2010
Applicability of security metrics for adaptive security management in a universal banking hub system.
Proceedings of the Software Architecture, 4th European Conference, 2010
Proceedings of the Cloud Computing, Second International Conference, 2010
User Experience and Security in the Cloud -- An Empirical Study in the Finnish Cloud Consortium.
Proceedings of the Cloud Computing, Second International Conference, 2010
2009
J. Networks, 2009
J. Inf. Process. Syst., 2009
Identification of Basic Measurable Security Components for a Distributed Messaging System.
Proceedings of the Third International Conference on Emerging Security Information, 2009
Proceedings of the MDM 2009, 2009
Identification of Basic Measurable Security Components in Software-Intensive Systems.
Proceedings of the Information Security South Africa Conference 2009, 2009
Development of Security Metrics - Based on Decomposition of Security Requirements and Ontologies.
Proceedings of the ICSOFT 2009, 2009
A Secure Running Environment for Multiple Platforms.
Proceedings of the ICSOFT 2009, 2009
2008
Proceedings of the 4th International ICST Mobile Multimedia Communications Conference, 2008
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008
Proceedings of the 3rd International Conference on Systems and Networks Communications, 2008
2007
Towards a Security Metrics Taxonomy for the Information and Communication Technology Industry.
Proceedings of the Second International Conference on Software Engineering Advances (ICSEA 2007), 2007
Proceedings of the 33rd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA 2007), 2007
Proceedings of the 2007 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2007), 2007
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007
Proceedings of the Third Advanced International Conference on Telecommunications (AICT 2007), 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006
Security Threats to Digital Television Platform and Service Development.
Proceedings of the ICEIS 2006, 2006
Senior Executives Commitment to Information Security - from Motivation to Responsibility.
Proceedings of the Computational Intelligence and Security, International Conference, 2006
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006
2005
Estimation of the Security Level in a Mobile and Ubiquitous Environment Based on the Semantic Web.
Proceedings of the ICEIS 2005, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Architecture for Self-Estimation of Security Level in Ad Hoc Network Nodes.
Proceedings of the 3rd Australian Information Security Management Conference, 2005
2004
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004
1994
Object-oriented enhancement of real-time software using a heterogeneous re-engineering approach.
Proceedings of the Sixth Euromicro Workshop on Real-Time Systems, 1994
1993
Proceedings of the Fifth Euromicro Workshop on Real-Time Systems, 1993