dblp.uni-trier.dewww.uni-trier.de

Reijo Savola

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
17EEReijo Savola: A Novel Security Metrics Taxonomy for R&D Organisations. ISSA 2008: 1-12
2007
16EEReijo Savola, Kaarina Karppinen: Practical Security Testing of Telecommunications Software--A Case Study. AICT 2007: 7
15EEKaarina Karppinen, Reijo Savola, Mikko Rapeli, Esa Tikkala: Security Objectives within a Security Testing Case Study. ARES 2007: 1060-1065
14EEReijo Savola: Requirement Centric Security Evaluation of Software Intensive Systems. DepCoS-RELCOMEX 2007: 135-144
13EEPekka Savolainen, Eila Niemelä, Reijo Savola: A Taxonomy of Information Security for Service-Centric Systems. EUROMICRO-SEAA 2007: 5-12
12EEReijo Savola: Towards a Security Metrics Taxonomy for the Information and Communication Technology Industry. ICSEA 2007: 60
11EEReijo Savola: Towards a taxonomy for information security metrics. QoP 2007: 28-30
2006
10EEReijo Savola, Ilkka Uusitalo: Towards Node-Level Security Management in Self-Organizing Mobile Ad Hoc Networks. AICT/ICIW 2006: 36
9EEJorma Kajava, Juhani Anttila, Rauno Varonen, Reijo Savola, Juha Röning: Senior Executives Commitment to Information Security - from Motivation to Responsibility. CIS 2006: 833-838
8EEReijo Savola: Towards Security Evaluation Based on Evidence Collection. FSKD 2006: 1178-1181
7 Jarkko Holappa, Reijo Savola: Security Threats to Digital Television Platform and Service Development. ICEIS (3) 2006: 508-515
6EEReijo Savola: Towards Requirement and Modeling Driven Security Evaluation. ICSNC 2006: 20
5EEReijo Savola: Towards Security Evaluation based on Evidence Collection. ISSA 2006: 1-10
4EEReijo Savola: A Requirement Centric Framework for Information Security Evaluation. IWSEC 2006: 48-59
2005
3 Reijo Savola: Architecture for Self-Estimation of Security Level in Ad Hoc Network Nodes. AISM 2005: 88-94
2EEJorma Kajava, Reijo Savola, Rauno Varonen: Weak Signals in Information Security Management. CIS (2) 2005: 508-517
1 Reijo Savola: Estimation of the Security Level in a Mobile and Ubiquitous Environment Based on the Semantic Web. ICEIS (4) 2005: 256-262

Coauthor Index

1Juhani Anttila [9]
2Jarkko Holappa [7]
3Jorma Kajava [2] [9]
4Kaarina Karppinen [15] [16]
5Eila Niemelä [13]
6Mikko Rapeli [15]
7Juha Röning [9]
8Pekka Savolainen [13]
9Esa Tikkala [15]
10Ilkka Uusitalo [10]
11Rauno Varonen [2] [9]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)