Christian Frøystad
Christian Frøystad
Secure Practice AS
Geverifieerd e-mailadres voor securepractice.no
Titel
Geciteerd door
Geciteerd door
Jaar
Visualizing Cyber Security Risks with Bow-Tie Diagrams
K Bernsmed, C Frøystad, PH Meland, DA Nesheim, ØJ Rødseth
International Workshop on Graphical Models for Security, 38-56, 2017
102017
Protecting Future Maritime Communication
C Frøystad, K Bernsmed, PH Meland
Proceedings of the 12th International Conference on Availability …, 2017
42017
Security Incident Information Exchange for Cloud Services.
C Frøystad, EA Gjære, IA Tøndel, MG Jaatun
IoTBD, 391-398, 2016
42016
Is a Smarter Grid Also Riskier?
K Bernsmed, MG Jaatun, C Frøystad
International Workshop on Security and Trust Management, 36-52, 2019
32019
Security requirements for SATCOM datalink systems for future air traffic management
K Bernsmed, C Frøystad, PH Meland, TA Myrvoll
2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC), 1-10, 2017
32017
An Experimental Evaluation of Bow-Tie Analysis for Cybersecurity Requirements
PH Meland, K Bernsmed, C Frøystad, J Li, G Sindre
Computer Security, 173-191, 2018
22018
Exchange of Security Incident Information in the context of Cloud Services
C Frøystad
NTNU, 2015
22015
The need for a public key infrastructure for automated and autonomous ships
ØJ Rødseth, C Frøystad, PH Meland, K Bernsmed, DA Nesheim
IOP Conference Series: Materials Science and Engineering 929 (1), 012017, 2020
12020
An experimental evaluation of bow-tie analysis for security
PH Meland, K Bernsmed, C Frøystad, J Li, G Sindre
Information & Computer Security, 2019
12019
PKI vs. Blockchain when Securing Maritime Operations
ØJ Rødseth, PH Meland, C Frøystad, OV Drugan
European Journal of Navigation, 2019
12019
D: A4. 1 Socio-economic impact assessment
M Niezen, D van Woensel, D Nunez, C Fernandez-Gago, S Adams, ...
TILT, Tilburg University, 2016
12016
Five Things You Should Not Use Blockchain For
MG Jaatun, PH Haro, C Frøystad
2020 IEEE Cloud Summit, 167-169, 2020
2020
What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios
IA Tøndel, R Borgaonkar, MG Jaatun, C Frøystad
2020 International Conference on Cyber Security and Protection of Digital …, 2020
2020
Risiko-og sårbarhetsanalyse for økt integrasjon av AMS-DMS-SCADA
C Frøystad, MG Jaatun, K Bernsmed, M Moe
2018
Security Incident Information Exchange for Cloud Service Provisioning Chains
C Frøystad, IA Tøndel, MG Jaatun
Cryptography 2 (4), 16, 2018
2018
An Incident Management Tool for Cloud Provider Chains
MG Jaatun, C Froystad, IA Tondel
ERCIM NEWS, 46-47, 2016
2016
Essay on Pervasive Computing
C Frøystad
D2. 2 Using digital signatures in the maritime domain
C Frøystad, K Bernsmed, PH Meland, ØJ Rødseth, D Atle
D: D-5.1 User Interface Prototypes V1
SFH KAU, K Bernsmed, JA KAU, C Frøystad, EA Gjære, EW KAU, ...
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–19