Houmb, Siv Hilde
37  results:
Search for persons X
?
1

Decoding the Human Element in APT Attacks: Unveiling Attent..:

, In: HCI for Cybersecurity, Privacy and Trust; Lecture Notes in Computer Science,
 
?
2

Two-stage advanced persistent threat (APT) attack on an IEC..:

Akbarzadeh, Aida ; Erdodi, Laszlo ; Houmb, Siv Hilde.
International Journal of Information Security.  23 (2024)  4 - p. 2739-2758 , 2024
 
?
3

Workshop on Cybersecurity of Critical Infrastructures:

, In: IFIP Advances in Information and Communication Technology; Privacy and Identity Management. Sharing in a Digital World,
 
?
6

Building a hardware-in-the-loop (HiL) digital energy statio..:

, In: Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems,
 
?
7

Attacking Power Grid Substations: An Experiment Demonstrati..:

, In: Proceedings of the 17th International Conference on Availability, Reliability and Security,
 
?
8

Building a Hardware-in-the-Loop (HiL) Digital Energy Statio..:

, In: 2022 IEEE/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS),
 
?
9

Saving Nine Without Stitching in Time: Integrity Check Afte..:

, In: 2020 2nd International Conference on Societal Automation (SA),
 
?
10

Cyber-Security Gaps in a Digital Substation: From Sensors t..:

, In: 2020 9th Mediterranean Conference on Embedded Computing (MECO),
 
?
12

Introduction to Special Issue on Risk and Trust in Embedded..:

Rossebø, Judith E. Y. ; Houmb, Siv Hilde ; Georg, Geri..
ACM Transactions on Embedded Computing Systems (TECS).  13 (2014)  5s - p. 1 ff. , 2014
 
?
13

Introduction to Special Issue on Risk and Trust in Embedded..:

Rossebø, Judith E. Y. ; Houmb, Siv Hilde ; Georg, Geri..
ACM Transactions on Embedded Computing Systems.  13 (2014)  5s - p. 1-1 , 2014
 
?
15

An aspect-oriented methodology for designing secure applica..:

Georg, Geri ; Ray, Indrakshi ; Anastasakis, Kyriakos...
Information and Software Technology.  51 (2009)  5 - p. 846-864 , 2009
 
1-15