default search action
Fredrik Seehusen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j6]Per Håkon Meland, Fredrik Seehusen:
When to Treat Security Risks with Cyber Insurance. Int. J. Cyber Situational Aware. 3(1): 39-60 (2018) - [c15]Per Håkon Meland, Fredrik Seehusen:
When to Treat Security Risks with Cyber Insurance. CyberSA 2018: 1-8 - 2017
- [c14]Gencer Erdogan, Alejandra Gonzalez, Atle Refsdal, Fredrik Seehusen:
A Method for Developing Algorithms for Assessing Cyber-Risk Cost. QRS 2017: 192-199 - [c13]Per Håkon Meland, Inger Anne Tøndel, Marie Elisabeth Gaup Moe, Fredrik Seehusen:
Facing Uncertainty in Cyber Insurance Policies. STM 2017: 89-100 - [e3]Jürgen Großmann, Michael Felderer, Fredrik Seehusen:
Risk Assessment and Risk-Driven Quality Assurance - 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10224, 2017, ISBN 978-3-319-57857-6 [contents] - 2016
- [c12]Inger Anne Tøndel, Fredrik Seehusen, Erlend Andreas Gjære, Marie Elisabeth Gaup Moe:
Differentiating Cyber Risk of Insurance Customers: The Insurance Company Perspective. CD-ARES 2016: 175-190 - 2015
- [j5]Gencer Erdogan, Fredrik Seehusen, Ketil Stølen, Jon Hofstad, Jan Øyvind Aagedal:
Assessing the Usefulness of Testing for Validating and Correcting Security Risk Models Based on Two Industrial Case Studies. Int. J. Secur. Softw. Eng. 6(2): 90-112 (2015) - [c11]Samson Yoseph Esayas, Tobias Mahler, Fredrik Seehusen, Frode Bjornstad, Veda Brubakk:
An integrated method for compliance and risk assessment. CNS 2015: 568-576 - [c10]Jürgen Großmann, Fredrik Seehusen:
Combining Security Risk Assessment and Security Testing Based on Standards. RISK 2015: 18-33 - [c9]Fredrik Seehusen:
Using CAPEC for Risk-Based Security Testing. RISK 2015: 77-92 - [e2]Fredrik Seehusen, Michael Felderer, Jürgen Großmann, Marc-Florian Wendland:
Risk Assessment and Risk-Driven Testing - Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papers. Lecture Notes in Computer Science 9488, Springer 2015, ISBN 978-3-319-26415-8 [contents] - 2014
- [j4]Bjørnar Solhaug, Fredrik Seehusen:
Model-driven risk analysis of evolving critical infrastructures. J. Ambient Intell. Humaniz. Comput. 5(2): 187-204 (2014) - [j3]Gencer Erdogan, Yan Li, Ragnhild Kobro Runde, Fredrik Seehusen, Ketil Stølen:
Approaches for the combined use of risk analysis and testing: a systematic literature review. Int. J. Softw. Tools Technol. Transf. 16(5): 627-642 (2014) - [c8]Fredrik Seehusen:
A Technique for Risk-Based Test Procedure Identification, Prioritization and Selection. ISoLA (2) 2014: 277-291 - [e1]Thomas Bauer, Jürgen Großmann, Fredrik Seehusen, Ketil Stølen, Marc-Florian Wendland:
Risk Assessment and Risk-Driven Testing - First International Workshop, RISK 2013, Held in Conjunction with ICTSS 2013, Istanbul, Turkey, November 12, 2013. Revised Selected Papers. Lecture Notes in Computer Science 8418, Springer 2014, ISBN 978-3-319-07075-9 [contents] - 2012
- [c7]Fredrik Seehusen, Bjørnar Solhaug:
Tool-Supported Risk Modeling and Analysis of Evolving Critical Infrastructures. CD-ARES 2012: 562-577 - 2011
- [c6]Fredrik Seehusen, Ketil Stølen:
An Evaluation of the Graphical Modeling Framework (GMF) Based on the Development of the CORAS Tool. ICMT@TOOLS 2011: 152-166 - [c5]Olav S. Ligaarden, Mass Soldal Lund, Atle Refsdal, Fredrik Seehusen, Ketil Stølen:
An architectural pattern for enterprise level monitoring tools. MESOCA 2011: 1-10
2000 – 2009
- 2009
- [j2]Fredrik Seehusen, Ketil Stølen:
Information flow security, abstraction and composition. IET Inf. Secur. 3(1): 9-33 (2009) - [j1]Fredrik Seehusen, Bjørnar Solhaug, Ketil Stølen:
Adherence preserving refinement of trace-set properties in STAIRS: exemplified for information flow properties and policies. Softw. Syst. Model. 8(1): 45-65 (2009) - 2008
- [c4]Fredrik Seehusen, Ketil Stølen:
A Transformational Approach to Facilitate Monitoring of High-Level Policies. POLICY 2008: 70-73 - 2006
- [c3]Fredrik Seehusen, Ketil Stølen:
Maintaining Information Flow Security Under Refinement and Transformation. Formal Aspects in Security and Trust 2006: 143-157 - [c2]Fredrik Seehusen, Ketil Stølen:
Information flow property preserving transformation of UML interaction diagrams. SACMAT 2006: 150-159 - 2005
- [c1]Fredrik Seehusen, Ketil Stølen:
Graphical Specification of Dynamic Network Structure. ICEIS (3) 2005: 203-210
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-05 01:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint