Siv Hilde Houmb

Orcid: 0000-0003-1897-5132

Affiliations:
  • Norwegian University of Science and Technology, Norway


According to our database1, Siv Hilde Houmb authored at least 42 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation.
Int. J. Inf. Sec., August, 2024

Decoding the Human Element in APT Attacks: Unveiling Attention Diversion Techniques in Cyber-Physical System Security.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2024

2023
Workshop on Cybersecurity of Critical Infrastructures.
Proceedings of the Privacy and Identity Management. Sharing in a Digital World, 2023

2022
Building a hardware-in-the-loop (HiL) digital energy station infrastructure for cyber operation resiliency testing.
Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems, 2022

Attribute Based Access Control Model for Protecting Programmable Logic Controllers.
Proceedings of the Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2022

Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Saving Nine Without Stitching in Time: Integrity Check After-the-fact.
Proceedings of the 2nd International Conference on Societal Automation, 2021

2020
Cyber-Security Gaps in a Digital Substation: From Sensors to SCADA.
Proceedings of the 9th Mediterranean Conference on Embedded Computing, 2020

2017
SikkerhetsLøypa - Knowledge Toward Sustainable and Secure Paths of Creative and Critical Digital Skills.
Proceedings of the Entertainment Computing - ICEC 2017, 2017

CSIRA: A Method for Analysing the Risk of Cybersecurity Incidents.
Proceedings of the Graphical Models for Security - 4th International Workshop, 2017

2016
The Role of the Supply Chain in Cybersecurity Incident Handling for Drilling Rigs.
Proceedings of the Computer Safety, Reliability, and Security, 2016

2014
Introduction to Special Issue on Risk and Trust in Embedded Critical Systems.
ACM Trans. Embed. Comput. Syst., 2014

A Graphical Adversarial Risk Analysis Model for Oil and Gas Drilling Cybersecurity.
Proceedings of the Proceedings First International Workshop on Graphical Models for Security, 2014

2012
Enhancing security requirements engineering by organizational learning.
Requir. Eng., 2012

2011
Towards a Framework for Offshore Outsource Software Development Risk Management Model.
J. Softw., 2011

Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications.
Proceedings of the Formal Methods for Eternal Networked Software Systems, 2011

Supporting Requirements Engineers in Recognising Security Issues.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2011

2010
Verification and Trade-Off Analysis of Security Properties in UML System Models.
IEEE Trans. Software Eng., 2010

Trust-Based Security Level Evaluation Using Bayesian Belief Networks.
Trans. Comput. Sci., 2010

Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec.
Requir. Eng., 2010

Quantifying security risk level from CVSS estimates of frequency and impact.
J. Syst. Softw., 2010

Integrating Risk Management Activities into Requirements Engineering.
Proceedings of the Fourth IEEE International Conference on Research Challenges in Information Science, 2010

Using Real Option Thinking to Improve Decision Making in Security Investment.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010, 2010

Business Process-Based Information Security Risk Assessment.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Using Trust-Based Information Aggregation for Predicting Security Level of Systems.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

2009
Performance analysis of security aspects by weaving scenarios extracted from UML models.
J. Syst. Softw., 2009

An aspect-oriented methodology for designing secure applications.
Inf. Softw. Technol., 2009

Extended eTVRA vs. security checklist: Experiences in a value-web.
Proceedings of the 31st International Conference on Software Engineering, 2009

Goal and Risk Factors in Offshore Outsourced Software Development from Vendor's Viewpoint.
Proceedings of the 4th IEEE International Conference on Global Software Engineering, 2009

Estimating ToE Risk Level Using CVSS.
Proceedings of the The Forth International Conference on Availability, 2009

2007
Decision Support for Choice of Security Solution: The Aspect-Oriented Risk Driven Development (AORDD)Framework.
PhD thesis, 2007

Performance analysis of security aspects in UML models.
Proceedings of the 6th International Workshop on Software and Performance, 2007

2006
Critical Systems Development Using Modeling Languages - CSDUML 2006 Workshop Report.
Proceedings of the Models in Software Engineering, 2006

Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation.
Proceedings of the Trust Management, 4th International Conference, 2006

Aspect-Oriented Risk Driven Development of Secure Applications.
Proceedings of the Data and Applications Security XX, 2006

2005
Dynamic Secure Aspect Modeling with UML: From Models to Code.
Proceedings of the Model Driven Engineering Languages and Systems, 2005

Cost-Benefit Trade-Off Analysis Using BBN for Aspect-Oriented Risk-Driven Development.
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005

2004
Using UML in a Risk-Driven Development Process.
Proceedings of the International Conference on Software Engineering Research and Practice, 2004

Risk-Driven Development Of Security-Critical Systems Using UMLsec.
Proceedings of the Information Technology, Selected Tutorials, 2004

2003
Development of Safety-Critical Systems and Model-Based Risk Analysis with UML.
Proceedings of the Dependable Computing, First Latin-American Symposium, 2003

Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec.
Proceedings of the 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 2003

2002
Integrating Model-based Security Risk Management into eBusiness Systems Development: The CORAS Approach.
Proceedings of the Towards The Knowledge Society: eCommerce, 2002


  Loading...