![]() |
| 2008 | ||
|---|---|---|
| 3 | EE | Per Håkon Meland, Jostein Jensen: Secure Software Design in Practice. ARES 2008: 1164-1171 |
| 2 | EE | Inger Anne Tøndel, Martin Gilje Jaatun, Per Håkon Meland: Security Requirements for the Rest of Us: A Survey. IEEE Software 25(1): 20-27 (2008) |
| 2007 | ||
| 1 | EE | Shanai Ardi, David Byers, Per Håkon Meland, Inger Anne Tøndel, Nahid Shahmehri: How can the developer benefit from security modeling? ARES 2007: 1017-1025 |
| 1 | Shanai Ardi | [1] |
| 2 | David Byers | [1] |
| 3 | Martin Gilje Jaatun | [2] |
| 4 | Jostein Jensen | [3] |
| 5 | Nahid Shahmehri | [1] |
| 6 | Inger Anne Tøndel | [1] [2] |