Find Research Outputs

Search concepts
Selected filters

Publication Year

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011

Author

  • Reijo Savola
2018

Cybersecurity for Wireless Nuclear Applications

Savola, R., 2018. 17 p.

Research output: Contribution to conferenceOther conference contributionScientific

Open Access

Introduction: 5th International Workshop on Measurability of Security in Software Architectures (MeSSa 2018)

Savola, R., Kanstrén, T. & Abie, H., 24 Sep 2018, ECSA '18: Proceedings of the 12th European Conference on Software Architecture. Association for Computing Machinery ACM, 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsProfessional

Risk-driven security metrics development for software-defined networking

Savola, R. M. & Savolainen, P., 24 Sep 2018, ECSA '18: Proceedings of the 12th European Conference on Software Architecture. Association for Computing Machinery ACM, a56

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

2017

Current level of cybersecurity competence and future development - Case Finland

Savola, R. M., 2017, Companion Proceedings - 11th European Conference on Software Architecture, ECSA 2017. Association for Computing Machinery ACM, Vol. Part F130530. p. 121-124 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

3 Citations (Scopus)

Workshop session: Fourth international workshop on measurability of security in software architectures (MeSSa 2017)

Savola, R. (ed.), Abie, H. (ed.) & Kanstren, T. (ed.), 2017, Proceedings of the 11th European Conference on Software Architecture: Companion Proceedings . Association for Computing Machinery ACM

Research output: Chapter in Book/Report/Conference proceedingOther book partScientific

2016

Kyberosaaminen Suomessa: Nykytila ja tiekartta tulevaisuuteen

Translated title of the contribution: Cyber security competencies in Finland: Current state and roadmap for the futurePelkonen, A., Ahlqvist, T., Leinonen, A., Nieminen, M., Salonen, J., Savola, R., Savolainen, P., Suominen, A., Toivanen, H., Kyheröinen, J. & Remes, J., 2016, 90 p. (Valtioneuvoston selvitys- ja tutkimustoiminnan julkaisusarja, Vol. 9/2015).

Research output: Book/ReportReport

Mitigating IoT security threats with a trusted Network element

Kuusijarvi, J., Savola, R., Savolainen, P. & Evesti, A., 16 Feb 2016, Internet Technology and Secured Transactions (ICITST), 2016 11th International Conference for . IEEE Institute of Electrical and Electronic Engineers , p. 260-265

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

12 Citations (Scopus)

Race on talented people - Case Finland: What kinds of skills are needed?

Pelkonen, A., Limnéll, J., Savola, R. & Salonen, J., 2016, In : European Cybersecurity Journal. 2, 2, p. 28-36

Research output: Contribution to journalArticleProfessional

Towards Security Metrics-Supported IP Traceback

Savola, R., Savolainen, P. & Salonen, J., 2016, ECSAW '16 Proccedings of the 10th European Conference on Software Architecture Workshops. Association for Computing Machinery ACM, 32

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

2015

Architecture for high confidence cloud security monitoring

Kanstrén, T., Lehtonen, S., Savola, R., Kukkohovi, H. & Hätönen, K., 23 Apr 2015, Cloud Engineering (IC2E), 2015 IEEE International Conference on. IEEE Institute of Electrical and Electronic Engineers , p. 195 - 200

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

5 Citations (Scopus)

Risk-driven security metrics development for an e-health IoT application

Savola, R. M., Savolainen, P., Evesti, A., Abie, H. & Sihvonen, M., 23 Nov 2015, Information Security for South Africa (ISSA), 2015. IEEE Institute of Electrical and Electronic Engineers , p. 1 - 6

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

12 Citations (Scopus)
2014

Security measuring for self-adaptive security

Evesti, A., Abie, H. & Savola, R., 2014, Proceedings of the 2014 European Conference on Software Architecture Workshops: ECSAW '14. Austria: Association for Computing Machinery ACM, 7 p. 5

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Security objectives, controls and metrics development for an Android smartphone application

Savola, R. & Kylänpää, M., 2014, Conference Proceedings: Information Security for South Africa 2014. IEEE Institute of Electrical and Electronic Engineers , 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Towards integration of risk-driven and evidence driven information security measurement

Savola, R., 2014, Proceedings: IEEE 8th International Conference on Application of Information and Communication Technologies, AICT 2014. IEEE Institute of Electrical and Electronic Engineers , 6 p. 7035903

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

2013

A risk-driven security analysis and metrics development for WSN-MCN router

Frantti, T., Savola, R. & Hietalahti, H., 2013, Proceedings: International Conference on ICT Convergence, ICTC 2013. IEEE Institute of Electrical and Electronic Engineers , p. 22-25

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

3 Citations (Scopus)

Critical to cloud services: Security, privacy and trust

Savola, R., Juhola, A. & Uusitalo, I., 2013, Value-driven business in the cloud. Espoo: VTT Technical Research Centre of Finland, p. 44-45 (VTT Research Highlights; No. 9).

Research output: Chapter in Book/Report/Conference proceedingChapter or book articleProfessional

Open Access

Metrics-driven security objective decomposition for an E-health application with adaptive security management

Savola, R. & Abie, H., 2013, ASPI '13 Proceedings of the International Workshop on Adaptive Security. New York: Association for Computing Machinery ACM, 6

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

18 Citations (Scopus)

Productivity leap with ioT: Visions of the Internet of Things with a special focus on Global Asset Management and Smart Lighting

Jurvansuu, M. (ed.), Belloni, K. (ed.), Ailisto, H., Sihvonen, S., Tukeva, P., Aikio, J., Virkkunen, R., Kortelainen, H., Heilala, J., Rauma, T., Roine, M., van Gils, M., Ventä, O., Jantunen, E., Katainen, T., Lehtonen, M., Heinonen, R., Merilahti, J., Ketomäki, J., Hast, J. & 17 others, Peltola, J., Mäkelä, S-M., Könönen, V., Ahola, J., Juntunen, E., Katasonov, A., Hiltunen, J., Kaartinen, J., Savola, R., Savolainen, P., Soininen, J-P., Kiljander, J., Huusko, J., Airaksinen, M., Mäki, K., Strömmer, E. & Rönkä, K., 2013, Espoo: VTT Technical Research Centre of Finland. 99 p. (VTT Visions; No. 3).

Research output: Book/ReportBook (editor)

Open Access

Quality of security metrics and measurements

Savola, R., 2013, In : Computers and Security. 37, p. 78-90 12 p.

Research output: Contribution to journalArticle

28 Citations (Scopus)

Requirements of secure WSN-MCN edge router

Frantti, T., Hietalahti, H. & Savola, R., 2013, Proceedings: The International Conference on Information Networking 2013, ICOIN 2013. IEEE Institute of Electrical and Electronic Engineers , p. 210-215

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

5 Citations (Scopus)

Security risks in the short-range communication of ubiquitous application

Evesti, A., Suomalainen, J. & Savola, R., 2013, Proceedings: 8th International Conference for Internet Technology and Secured Transactions, ICITST-2013. UK: IEEE Institute of Electrical and Electronic Engineers , p. 612-617

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

1 Citation (Scopus)

SR307 Tietoturvallisuuden hallinta ISO/IEC 27000

Savola, R., 2013.

Research output: Contribution to conferenceOther conference contributionProfessional

Taxonomy of quality metrics for assessing assurance of security correctness

Ouedraogo, M., Savola, R., Mouratidis, H., Preston, D., Khadraoui, D. & Dubois, E., 2013, In : Software Quality Journal. 21, 1, p. 67-97 31 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)

Toward risk-driven security measurement for android smartphone platforms

Savola, R., Väisänen, T., Evesti, A., Savolainen, P., Kemppainen, J. & Kokemäki, M., 2013, Proceedings of the ISSA 2013 Conference. IEEE Institute of Electrical and Electronic Engineers , 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

1 Citation (Scopus)
2012

Metrics driven security management framework for ehealth digital ecosystem focusing on chronic diseases

Savola, R. & Sihvonen, M., 2012, Proceedings of the International Conference on Management of Emergent Digital EcoSystems, MEDES 2012. New York, NY, USA: Association for Computing Machinery ACM, p. 75-79

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

2 Citations (Scopus)

Proceedings of the eight international conference on networking and services

Nguyen, T. (ed.), Šulc, V. (ed.) & Savola, R., 2012, International Academy, Research, and Industry Association IARIA. (International Conference on Networking and Services; No. ICNS 2012).

Research output: Book/ReportBook (editor)

Open Access

Risk-driven security metrics in agile software development: An industrial pilot study

Savola, R., Frühwirth, C. & Pietikäinen, A., 2012, In : Journal of Universal Computer Science. 18, 12, p. 1679-1702 23 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)

Security metrics: How and where they can be used?

Savola, R., 2012.

Research output: Contribution to conferenceOther conference contributionScientific

Security metrics for IoT

Savola, R., 2012.

Research output: Contribution to conferenceOther conference contributionScientific

Strategies for security measurement objective decomposition

Savola, R., 2012, Proceedings of the 2012 Information Security for South Africa, ISSA 2012. IEEE Institute of Electrical and Electronic Engineers , 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

5 Citations (Scopus)

Towards metrics-driven adaptive security management in E-health IoT applications

Savola, R., Abie, H. & Sihvonen, M., 2012, Proceedings of the 7th International Conference on Body Area Networks. BodyNets 2012. p. 276-281

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Towards remote security monitoring in cloud services utilizing security metrics

Savola, R. & Ahola, J., 2012, Proceedings of the 6th International Conference on Application of Information and Communication Technologies, AICT 2013. IEEE Institute of Electrical and Electronic Engineers , p. 21-27

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

2 Citations (Scopus)

Utilizing a risk-driven operational security assurance methodology and measurement architecture: Experiences from a case study

Savola, R., Kanstren, T., Pentikäinen, H., Jurmu, P., Myllyaho, M. & Hätönen, K., 2012, Proceedings of the 8th International Conference on Networking and Services, ICNS 2012. Nguyen, T. (ed.). International Academy, Research, and Industry Association IARIA, p. 134-142

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientific

Open Access
2011

An adaptive and dependable distributed monitoring framework

Kanstrén, T., Savola, R., Haddad, S. & Hecker, A., 2011, In : International Journal on Advances in Security. 4, 1-2, p. 80-94 15 p.

Research output: Contribution to journalArticle

Open Access

A security and privacy metrics management and visualization framework for cloud services

Savola, R., 2011. 8 p.

Research output: Contribution to conferenceConference articleScientific

A visualization and modeling tool for security metrics and measurements management

Savola, R. & Heinonen, P., 2011, Proceedings of the ISSA 2011 Conference: Information Security for South Africa. IEEE Institute of Electrical and Electronic Engineers , 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

19 Citations (Scopus)
Open Access

Operational security assurance evaluation in open infrastructures

Haddad, S., Dubus, S., Hecker, A., Kanstrén, T., Marquet, B. & Savola, R., 2011, Proceedings of the 6th International Conference on Risks and Security of Internet and Systems, CRiSIS 2011. IEEE Institute of Electrical and Electronic Engineers , p. 100-105

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

10 Citations (Scopus)

Suomi tietoturvan suunnannäyttäjäksi. Suomalaisen tietoturvaosaamisen levittäminen ja aktiivinen osallistuminen standardien kansainväliseen kehittämiseen: Kansallisen tietoturvastrategian toimenpideohjelman hankkeen 5 loppuraportti

Translated title of the contribution: Finland: Towards a leading light in information security. Dissemination of Finnish information security competence and active participation towards the development of global standardsSavola, R. (ed.), 2011, 31 p. (Liikenne- ja viestintäministeriön julkaisuja; No. 17/2011).

Research output: Book/ReportReport

Open Access

The design, instantiation, and usage of information security measuring ontology

Evesti, A., Savola, R., Ovaska, E. & Kuusijärvi, J., 2011, Proceedings: The Second International Conference on Models and Ontology-based Design of Protocols, Architectures and Services, MOPAS 2011 . Diaz, M. & Exposito, E. (eds.). International Academy, Research, and Industry Association IARIA, p. 1-9

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Open Access

Tietoturvallisuuden mittaamisen nykytilanne ja tulevaisuuden haasteet

Translated title of the contribution: State-of-the-Art and Future Challenges of Measuring Information SecuritySavola, R., 2011.

Research output: Contribution to conferenceOther conference contributionProfessional

Tietoturvametriikat ja -mittaukset: Nykytilanne ja tulevaisuus

Translated title of the contribution: Security Metrics and Measurements: State of the Art and FutureSavola, R., 2011.

Research output: Contribution to conferenceOther conference contributionProfessional