Follow
Christian Frøystad
Christian Frøystad
twoday
Verified email at twoday.com
Title
Cited by
Cited by
Year
Visualizing Cyber Security Risks with Bow-Tie Diagrams
K Bernsmed, C Frøystad, PH Meland, DA Nesheim, ØJ Rødseth
International Workshop on Graphical Models for Security, 38-56, 2017
342017
Protecting Future Maritime Communication
C Frøystad, K Bernsmed, PH Meland
Proceedings of the 12th International Conference on Availability …, 2017
142017
The need for a public key infrastructure for automated and autonomous ships
ØJ Rødseth, C Frøystad, PH Meland, K Bernsmed, DA Nesheim
IOP Conference Series: Materials Science and Engineering 929 (1), 012017, 2020
132020
An experimental evaluation of bow-tie analysis for security
PH Meland, K Bernsmed, C Frøystad, J Li, G Sindre
Information & Computer Security, 2019
112019
Security requirements for SATCOM datalink systems for future air traffic management
K Bernsmed, C Frøystad, PH Meland, TA Myrvoll
2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC), 1-10, 2017
102017
Is a Smarter Grid Also Riskier?
K Bernsmed, MG Jaatun, C Frøystad
International Workshop on Security and Trust Management, 36-52, 2019
62019
An Experimental Evaluation of Bow-Tie Analysis for Cybersecurity Requirements
PH Meland, K Bernsmed, C Frøystad, J Li, G Sindre
Computer Security, 173-191, 2018
62018
Security Incident Information Exchange for Cloud Services.
C Frøystad, EA Gjære, IA Tøndel, MG Jaatun
IoTBD, 391-398, 2016
52016
Hunting Dependencies: Using Bow-Tie for Combined Analysis of Power and Cyber Security
H Vefsnmo, F Johannessen, C Fr
2020 2nd International Conference on Societal Automation (SA), 1-8, 2021
42021
Five Things You Should Not Use Blockchain For
MG Jaatun, PH Haro, C Frøystad
2020 IEEE Cloud Summit, 167-169, 2020
42020
PKI vs. Blockchain when Securing Maritime Operations
ØJ Rødseth, PH Meland, C Frøystad, OV Drugan
European Journal of Navigation, 2019
32019
Exchange of Security Incident Information in the context of Cloud Services
C Frøystad
NTNU, 2015
32015
Risiko-og sårbarhetsanalyse for økt integrasjon av AMS-DMS-SCADA
C Frøystad, MG Jaatun, K Bernsmed, M Moe
22018
D: A4. 1 Socio-economic impact assessment
M Niezen, D van Woensel, D Nunez, C Fernandez-Gago, S Adams, ...
TILT, Tilburg University, 2016
22016
What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios
IA Tøndel, R Borgaonkar, MG Jaatun, C Frøystad
2020 International Conference on Cyber Security and Protection of Digital …, 2020
12020
Security Incident Information Exchange for Cloud Service Provisioning Chains
C Frøystad, IA Tøndel, MG Jaatun
Cryptography 2 (4), 16, 2018
12018
An Incident Management Tool for Cloud Provider Chains
MG Jaatun, C Froystad, IA Tondel
ERCIM NEWS, 46-47, 2016
2016
Essay on Pervasive Computing
C Frøystad
D2. 2 Using digital signatures in the maritime domain
C Frøystad, K Bernsmed, PH Meland, ØJ Rødseth, D Atle
D: D-5.1 User Interface Prototypes V1
SFH KAU, K Bernsmed, JA KAU, C Frøystad, EA Gjære, EW KAU, ...
The system can't perform the operation now. Try again later.
Articles 1–20