default search action
Siv Hilde Houmb
Person information
- affiliation: Norwegian University of Science and Technology, Norway
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Aida Akbarzadeh, Laszlo Erdodi, Siv Hilde Houmb, Tore Geir Soltvedt:
Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation. Int. J. Inf. Sec. 23(4): 2739-2758 (2024) - [c31]Aida Akbarzadeh, Laszlo Erdodi, Siv Hilde Houmb, Tore Geir Soltvedt:
Decoding the Human Element in APT Attacks: Unveiling Attention Diversion Techniques in Cyber-Physical System Security. HCI (46) 2024: 3-19 - 2023
- [c30]Aida Akbarzadeh, Sabarathinam Chockalingam, Xhesika Ramaj, Lama Amro, Mary Sánchez-Gordón, Vasileios Gkioulos, Ricardo Colomo Palacios, László Erdodi, Nathan Lau, Siv Hilde Houmb:
Workshop on Cybersecurity of Critical Infrastructures. Privacy and Identity Management 2023: 325-339 - 2022
- [c29]László Erdodi, Pallavi Kaliyar, Siv Hilde Houmb, Aida Akbarzadeh, André Jung Waltoft-Olsen:
Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104. ARES 2022: 69:1-69:10 - [c28]Shwetha Gowdanakatte, Indrakshi Ray, Siv Hilde Houmb:
Attribute Based Access Control Model for Protecting Programmable Logic Controllers. SAT-CPS@CODASPY 2022: 47-56 - [c27]Per-Arne Jørgensen, André Waltoft-Olsen, Siv Hilde Houmb, Aleksander Lygren Toppe, Tore Geir Soltvedt, Hans Kristian Muggerud:
Building a hardware-in-the-loop (HiL) digital energy station infrastructure for cyber operation resiliency testing. EnCyCriS@ICSE 2022: 9-16 - 2021
- [c26]Racin Gudmestad, Siv Hilde Houmb, Martin Gilje Jaatun:
Saving Nine Without Stitching in Time: Integrity Check After-the-fact. SA 2021: 1-8 - 2020
- [c25]Athar Khodabakhsh, Sule Yildirim Yayilgan, Siv Hilde Houmb, Nargis Hurzuk, Jørn Foros, Maren Istad:
Cyber-Security Gaps in a Digital Substation: From Sensors to SCADA. MECO 2020: 1-4
2010 – 2019
- 2017
- [c24]Aitor Couce Vieira, Siv Hilde Houmb, David Ríos Insua:
CSIRA: A Method for Analysing the Risk of Cybersecurity Incidents. GraMSec@CSF 2017: 57-74 - [c23]Letizia Jaccheri, Deepti Mishra, Siv Hilde Houmb, Aida Omerovic, Sofia Papavlasopoulou:
SikkerhetsLøypa - Knowledge Toward Sustainable and Secure Paths of Creative and Critical Digital Skills. ICEC 2017: 157-168 - 2016
- [c22]Aitor Couce Vieira, Siv Hilde Houmb:
The Role of the Supply Chain in Cybersecurity Incident Handling for Drilling Rigs. SAFECOMP Workshops 2016: 246-255 - 2014
- [j9]Judith E. Y. Rossebø, Siv Hilde Houmb, Geri Georg, Virginia N. L. Franqueira, Dimitrios Serpanos:
Introduction to Special Issue on Risk and Trust in Embedded Critical Systems. ACM Trans. Embed. Comput. Syst. 13(5s): 152:1 (2014) - [c21]Aitor Couce Vieira, Siv Hilde Houmb, David Ríos Insua:
A Graphical Adversarial Risk Analysis Model for Oil and Gas Drilling Cybersecurity. GraMSec 2014: 78-93 - 2012
- [j8]Kurt Schneider, Eric Knauss, Siv Hilde Houmb, Shareeful Islam, Jan Jürjens:
Enhancing security requirements engineering by organizational learning. Requir. Eng. 17(1): 35-56 (2012) - 2011
- [j7]Shareeful Islam, Siv Hilde Houmb:
Towards a Framework for Offshore Outsource Software Development Risk Management Model. J. Softw. 6(1): 38-47 (2011) - [c20]Eric Knauss, Siv Hilde Houmb, Kurt Schneider, Shareeful Islam, Jan Jürjens:
Supporting Requirements Engineers in Recognising Security Issues. REFSQ 2011: 4-18 - [c19]Jan Jürjens, Martín Ochoa, Holger Schmidt, Loïc Marchal, Siv Hilde Houmb, Shareeful Islam:
Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications. SFM 2011: 504-526 - 2010
- [j6]Siv Hilde Houmb, Virginia N. L. Franqueira, Erlend Agoy Engum:
Quantifying security risk level from CVSS estimates of frequency and impact. J. Syst. Softw. 83(9): 1622-1634 (2010) - [j5]Siv Hilde Houmb, Shareeful Islam, Eric Knauss, Jan Jürjens, Kurt Schneider:
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec. Requir. Eng. 15(1): 63-93 (2010) - [j4]Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray, Sudip Chakraborty:
Trust-Based Security Level Evaluation Using Bayesian Belief Networks. Trans. Comput. Sci. 10: 154-186 (2010) - [j3]Geri Georg, Kyriakos Anastasakis, Behzad Bordbar, Siv Hilde Houmb, Indrakshi Ray, Manachai Toahchoodee:
Verification and Trade-Off Analysis of Security Properties in UML System Models. IEEE Trans. Software Eng. 36(3): 338-356 (2010) - [c18]Siv Hilde Houmb, Sudip Chakraborty, Indrakshi Ray, Indrajit Ray:
Using Trust-Based Information Aggregation for Predicting Security Level of Systems. DBSec 2010: 241-256 - [c17]Kobra Khanmohammadi, Siv Hilde Houmb:
Business Process-Based Information Security Risk Assessment. NSS 2010: 199-206 - [c16]Virginia N. L. Franqueira, Siv Hilde Houmb, Maya Daneva:
Using Real Option Thinking to Improve Decision Making in Security Investment. OTM Conferences (1) 2010: 619-638 - [c15]Shareeful Islam, Siv Hilde Houmb:
Integrating Risk Management Activities into Requirements Engineering. RCIS 2010: 299-310
2000 – 2009
- 2009
- [j2]Geri Georg, Indrakshi Ray, Kyriakos Anastasakis, Behzad Bordbar, Manachai Toahchoodee, Siv Hilde Houmb:
An aspect-oriented methodology for designing secure applications. Inf. Softw. Technol. 51(5): 846-864 (2009) - [j1]C. Murray Woodside, Dorina C. Petriu, Dorin Bogdan Petriu, Jing Xu, Tauseef A. Israr, Geri Georg, Robert B. France, James M. Bieman, Siv Hilde Houmb, Jan Jürjens:
Performance analysis of security aspects by weaving scenarios extracted from UML models. J. Syst. Softw. 82(1): 56-74 (2009) - [c14]Siv Hilde Houmb, Virginia N. L. Franqueira:
Estimating ToE Risk Level Using CVSS. ARES 2009: 718-725 - [c13]Shareeful Islam, Md. Mahbubul Alam Joarder, Siv Hilde Houmb:
Goal and Risk Factors in Offshore Outsourced Software Development from Vendor's Viewpoint. ICGSE 2009: 347-352 - [c12]Ayse Morali, Emmanuele Zambon, Siv Hilde Houmb, Karin Sallhammar, Sandro Etalle:
Extended eTVRA vs. security checklist: Experiences in a value-web. ICSE Companion 2009: 130-140 - 2007
- [b1]Siv Hilde Houmb:
Decision Support for Choice of Security Solution: The Aspect-Oriented Risk Driven Development (AORDD)Framework. Norwegian University of Science and Technology, Trondheim, Norway, 2007 - [c11]Dorina C. Petriu, C. Murray Woodside, Dorin Bogdan Petriu, Jing Xu, Toqeer Israr, Geri Georg, Robert B. France, James M. Bieman, Siv Hilde Houmb, Jan Jürjens:
Performance analysis of security aspects in UML models. WOSP 2007: 91-102 - 2006
- [c10]Geri Georg, Siv Hilde Houmb, Indrakshi Ray:
Aspect-Oriented Risk Driven Development of Secure Applications. DBSec 2006: 282-296 - [c9]Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray:
Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation. iTrust 2006: 135-149 - [c8]Geri Georg, Siv Hilde Houmb, Robert B. France, Steffen Zschaler, Dorina C. Petriu, Jan Jürjens:
Critical Systems Development Using Modeling Languages - CSDUML 2006 Workshop Report. MoDELS (Workshops) 2006: 27-31 - 2005
- [c7]Siv Hilde Houmb, Geri Georg, Robert B. France, James M. Bieman, Jan Jürjens:
Cost-Benefit Trade-Off Analysis Using BBN for Aspect-Oriented Risk-Driven Development. ICECCS 2005: 195-204 - [c6]Jan Jürjens, Siv Hilde Houmb:
Dynamic Secure Aspect Modeling with UML: From Models to Code. MoDELS 2005: 142-155 - 2004
- [c5]Jan Jürjens, Siv Hilde Houmb:
Risk-Driven Development Of Security-Critical Systems Using UMLsec. IFIP Congress Tutorials 2004: 21-53 - [c4]Siv Hilde Houmb, Ørjan Markhus Lillevik:
Using UML in a Risk-Driven Development Process. Software Engineering Research and Practice 2004: 400-406 - 2003
- [c3]Siv Hilde Houmb, Jan Jürjens:
Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec. APSEC 2003: 488- - [c2]Jan Jürjens, Siv Hilde Houmb:
Development of Safety-Critical Systems and Model-Based Risk Analysis with UML. LADC 2003: 364-365 - 2002
- [c1]Theodosis Dimitrakos, Brian Ritchie, Dimitris Raptis, Jan Øyvind Aagedal, Folker den Braber, Ketil Stølen, Siv Hilde Houmb:
Integrating Model-based Security Risk Management into eBusiness Systems Development: The CORAS Approach. I3E 2002: 159-175
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint