Author of the publication

Expressing Security Requirements: Usability of Taxonomy-Based Requirement Identification Scheme.

, , , , , and . SERVICES, page 121-128. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kannisto, Joona
add a person with the name Kannisto, Joona
 

Other publications of authors with the same name

Tailored Security: Building Non-Repudiable Security Service Level Agreements, , , , , , and . IEEE Vehicular Technology Magazine, (2013)Accountable security mechanism based on security service level agreement., , , , , , and . ISCC, page 404-410. IEEE Computer Society, (2013)Programming Model Perspective on Security and Privacy of Social Cyber-physical Systems., , , and . IEEE MS, page 87-94. IEEE Computer Society, (2016)Observing Hidden Service Directory Spying with a Private Hidden Service Honeynet., , and . AsiaJCIS, page 55-59. IEEE Computer Society, (2016)The Time Will Tell on You: Exploring Information Leaks in SSH Public Key Authentication., and . NSS, volume 10394 of Lecture Notes in Computer Science, page 301-314. Springer, (2017)Expressing Security Requirements: Usability of Taxonomy-Based Requirement Identification Scheme., , , , , and . SERVICES, page 121-128. IEEE Computer Society, (2014)Delayed Key Exchange for Constrained Smart Devices., , , and . ADHOC-NOW Workshops, volume 8629 of Lecture Notes in Computer Science, page 12-26. Springer, (2014)Implementation Experiences and Design Challenges for Resilient SDN Based Secure WAN Overlays., , and . AsiaJCIS, page 17-23. IEEE Computer Society, (2016)IPsec and IKE as Functions in SDN Controlled Network., , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 521-530. Springer, (2017)