Find Research Outputs

Search concepts
Selected filters
2018

Cybersecurity for Wireless Nuclear Applications

Savola, R., 2018. 17 p.

Research output: Contribution to conferenceOther conference contributionScientific

Open Access

Introduction: 5th International Workshop on Measurability of Security in Software Architectures (MeSSa 2018)

Savola, R., Kanstrén, T. & Abie, H., 24 Sep 2018, ECSA '18: Proceedings of the 12th European Conference on Software Architecture. Association for Computing Machinery ACM, 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsProfessional

Risk-driven security metrics development for software-defined networking

Savola, R. M. & Savolainen, P., 24 Sep 2018, ECSA '18: Proceedings of the 12th European Conference on Software Architecture. Association for Computing Machinery ACM, a56

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Network management
Quality of service
Decision making
Software defined networking
Monitoring
2017
1 Citation (Scopus)

Current level of cybersecurity competence and future development - Case Finland

Savola, R. M., 2017, Companion Proceedings - 11th European Conference on Software Architecture, ECSA 2017. Association for Computing Machinery ACM, Vol. Part F130530. p. 121-124 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Industry

Workshop session: Fourth international workshop on measurability of security in software architectures (MeSSa 2017)

Savola, R. (ed.), Abie, H. (ed.) & Kanstren, T. (ed.), 2017, Proceedings of the 11th European Conference on Software Architecture: Companion Proceedings . Association for Computing Machinery ACM

Research output: Chapter in Book/Report/Conference proceedingOther book partScientific

Software architecture
Computer systems
Monitoring
Costs
2016

Kyberosaaminen Suomessa: Nykytila ja tiekartta tulevaisuuteen

Translated title of the contribution: Cyber security competencies in Finland: Current state and roadmap for the futurePelkonen, A., Ahlqvist, T., Leinonen, A., Nieminen, M., Salonen, J., Savola, R., Savolainen, P., Suominen, A., Toivanen, H., Kyheröinen, J. & Remes, J., 2016, 90 p. (Valtioneuvoston selvitys- ja tutkimustoiminnan julkaisusarja, Vol. 9/2015).

Research output: Book/ReportReport

Israel
Finland
11 Citations (Scopus)

Mitigating IoT security threats with a trusted Network element

Kuusijarvi, J., Savola, R., Savolainen, P. & Evesti, A., 16 Feb 2016, Internet Technology and Secured Transactions (ICITST), 2016 11th International Conference for . IEEE Institute of Electrical and Electronic Engineers , p. 260-265

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Gateways (computer networks)
Interfaces (computer)
Internet of things
Internet
Industry

Race on talented people - Case Finland: What kinds of skills are needed?

Pelkonen, A., Limnéll, J., Savola, R. & Salonen, J., 2016, In : European Cybersecurity Journal. 2, 2, p. 28-36

Research output: Contribution to journalArticleProfessional

Towards Security Metrics-Supported IP Traceback

Savola, R., Savolainen, P. & Salonen, J., 2016, ECSAW '16 Proccedings of the 10th European Conference on Software Architecture Workshops. Association for Computing Machinery ACM, 32

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Critical infrastructures
Internet protocols
2015
4 Citations (Scopus)

Architecture for high confidence cloud security monitoring

Kanstrén, T., Lehtonen, S., Savola, R., Kukkohovi, H. & Hätönen, K., 23 Apr 2015, Cloud Engineering (IC2E), 2015 IEEE International Conference on. IEEE Institute of Electrical and Electronic Engineers , p. 195 - 200

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Monitoring
Hardware security
Virtual machine
11 Citations (Scopus)

Risk-driven security metrics development for an e-health IoT application

Savola, R. M., Savolainen, P., Evesti, A., Abie, H. & Sihvonen, M., 23 Nov 2015, Information Security for South Africa (ISSA), 2015. IEEE Institute of Electrical and Electronic Engineers , p. 1 - 6

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Health
Decision making
Decomposition
Internet of things