Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards security metrics-supported IP traceback., , and . ECSA Workshops, page 32. ACM, (2016)Toward risk-driven security measurement for Android smartphone platforms., , , , , and . ISSA, page 1-8. IEEE, (2013)Cyber security of smart metering of electricity consumption in Finland, , , and . 11th Nordic Electricity Distribution and Management Conference, Stockholm, Sweden, (September 2014)Towards a Lightweight Security Solution for User-Friendly Management of Distributed Sensor Networks., , , , , , , and . NEW2AN, volume 5764 of Lecture Notes in Computer Science, page 97-109. Springer, (2009)A study on cybersecurity industrial end-user perspectives in Finland., , , and . ECSA (Companion), page 95-101. ACM, (2017)Improving Knowledge Sharing in Embedded Software Production Line., and . MARK@RE, page 68-72. IEEE Computer Society, (2008)An Integrated QoS-Aware Service Development and Management Framework., , and . WICSA, page 13. IEEE Computer Society, (2007)A Taxonomy of Information Security for Service-Centric Systems., , and . EUROMICRO-SEAA, page 5-12. IEEE Computer Society, (2007)Risk-driven security metrics development for software-defined networking., and . ECSA (Companion), page 56:1-56:5. ACM, (2018)Risk-driven security metrics development for an e-health IoT application., , , , and . ISSA, page 1-6. IEEE, (2015)