default search action
Mass Soldal Lund
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Marie Haugli-Sandvik, Mass Soldal Lund, Frøy Birte Bjørneseth:
Maritime decision-makers and cyber security: deck officers' perception of cyber risks towards IT and OT systems. Int. J. Inf. Sec. 23(3): 1721-1739 (2024) - 2021
- [j3]Marie Haugli Larsen, Mass Soldal Lund:
Cyber Risk Perception in the Maritime Domain: A Systematic Literature Review. IEEE Access 9: 144895-144905 (2021)
2010 – 2019
- 2018
- [c13]Mass Soldal Lund, Jorgen Emil Gulland, Odd Sveinung Hareide, Øyvind Jøsok, Karl Olav Carlsson Weum:
Integrity of Integrated Navigation Systems. CNS 2018: 1-5 - 2016
- [j2]Kirsi Helkala, Benjamin Knox, Øyvind Jøsok, Silje Knox, Mass Soldal Lund:
Factors to affect improvement in cyber officer performance. Inf. Comput. Secur. 24(2): 152-163 (2016) - 2015
- [c12]Kirsi Helkala, Silje Knox, Mass Soldal Lund:
Effect of Motivation and Physical Fitness on Cyber Tasks. HAISA 2015: 108-119 - 2011
- [b2]Mass Soldal Lund, Bjørnar Solhaug, Ketil Stølen:
Model-Driven Risk Analysis - The CORAS Approach. Springer 2011, ISBN 978-3-642-12322-1, pp. I-XVI, 1-460 - [c11]Mass Soldal Lund, Bjørnar Solhaug, Ketil Stølen:
Risk Analysis of Changing and Evolving Systems Using CORAS. FOSAD 2011: 231-274 - [c10]Olav S. Ligaarden, Mass Soldal Lund, Atle Refsdal, Fredrik Seehusen, Ketil Stølen:
An architectural pattern for enterprise level monitoring tools. MESOCA 2011: 1-10 - [c9]Fabio Massacci, Fabrice Bouquet, Elizabeta Fourneret, Jan Jürjens, Mass Soldal Lund, Sébastien Madelénat, Jan Tobias Mühlberg, Federica Paci, Stéphane Paul, Frank Piessens, Bjørnar Solhaug, Sven Wenzel:
Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper). ServiceWave 2011: 134-143 - 2010
- [j1]Mass Soldal Lund, Bjørnar Solhaug, Ketil Stølen:
Evolution in Relation to Risk and Trust Management. Computer 43(5): 49-55 (2010)
2000 – 2009
- 2007
- [b1]Mass Soldal Lund:
Operational analysis of sequence diagram specifications. University of Oslo, Norway, 2007 - [c8]Mass Soldal Lund, Atle Refsdal, Ketil Stølen:
Semantics of UML Models for Dynamic Behavior - A Survey of Different Approaches. Model-Based Engineering of Embedded Real-Time Systems 2007: 77-103 - 2006
- [c7]Mass Soldal Lund, Ketil Stølen:
A Fully General Operational Semantics for UML 2.0 Sequence Diagrams with Potential and Mandatory Choice. FM 2006: 380-395 - [c6]Mass Soldal Lund, Ketil Stølen:
Deriving Tests from UML 2.0 Sequence Diagrams with neg and assert. AST 2006: 22-28 - [p1]Judith E. Y. Rossebeø, Mass Soldal Lund, Knut Eilif Husa, Atle Refsdal:
A Conceptual Model for Service Availability. Quality of Protection 2006: 107-118 - 2005
- [c5]Fredrik Vraalsen, Mass Soldal Lund, Tobias Mahler, Xavier Parent, Ketil Stølen:
Specifying Legal Risk Scenarios Using the CORAS Threat Modelling Language. iTrust 2005: 45-60 - [c4]Fredrik Vraalsen, Folker den Braber, Mass Soldal Lund, Ketil Stølen:
The CORAS Tool for Security Risk Analysis. iTrust 2005: 402-405 - [r1]Folker den Braber, Mass Soldal Lund, Ketil Stølen, Fredrik Vraalsen:
Integrating Security in the Development Process with UML. Encyclopedia of Information Science and Technology (III) 2005: 1560-1566 - 2003
- [c3]Mass Soldal Lund, Folker den Braber, Ketil Stølen:
Maintaining Results from Security Assessment. CSMR 2003: 341-350 - [c2]Yannis C. Stamatiou, Eva Skipenes, Eva Henriksen, Nikos Stathiakis, Adamantios Sikianakis, Eliana Charalambous, Nikos Antonakis, Ketil Stølen, Folker den Braber, Mass Soldal Lund, Katerina Papadaki, George Valvis:
The CORAS approach for model-based risk management applied to a telemedicine service. MIE 2003: 206-211 - [c1]Mass Soldal Lund:
Testing Decomposition of Component Specifications Based on a Rule for Formal Verification. QSIC 2003: 154-160
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint