Skip to main navigation
Skip to search
Skip to main content
VTT's Research Information Portal Home
Home
Profiles
Research output
Projects
Datasets
Research units
Research Infrastructures
Activities
Prizes
Press/Media
Impacts
Search by expertise, name or affiliation
Towards Requirement Driven Evaluation of Information Security
Reijo Savola
Research output
:
Contribution to conference
›
Conference article
›
Scientific
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Towards Requirement Driven Evaluation of Information Security'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Information Security
100%
Information Security Assessment
100%
Information Evaluation
100%
Requirement-driven
100%
Security Evaluation
66%
Information Communication Technology
33%
Risk Analysis
33%
Decision Process
33%
Telecommunication Systems
33%
Process Evaluation
33%
Software-intensive Systems
33%
Industrial Automation
33%
Technology Solutions
33%
Security Level
33%
Evaluation Approach
33%
Threat Analysis
33%
Behavioral Modeling
33%
Security Requirements
33%
Vulnerability Analysis
33%
Traditional Fields
33%
Security Performance
33%
Information Risk
33%
Technical Information
33%
Iterative Process
33%
Validation Approach
33%
Testing Approaches
33%
Requirements Definition
33%
Digital Convergence
33%
Evidence Collection
33%
Security Professionals
33%
Information Security Requirements
33%
Behavioral Evidence
33%
Information Diffusion
33%
Security Testing
33%
Architectural Information
33%
Digital Diffusion
33%
Security Validation
33%
INIS
information
100%
evaluation
100%
security
100%
iterative methods
18%
solutions
9%
performance
9%
assessments
9%
levels
9%
risks
9%
convergence
9%
computer codes
9%
modeling
9%
diffusion
9%
validation
9%
automation
9%
testing
9%
investigations
9%
vulnerability
9%
Computer Science
Information Security
100%
Security Evaluation
57%
Security Requirements
28%
Information and Communication Technologies
14%
Telecommunication System
14%
Intensive System
14%
Industrial Automation
14%
Vulnerability Assessment
14%
Threat Analysis
14%
Technology Solution
14%
Iterative Process
14%
Information Security Threat
14%
Evidence Collection
14%
Security Professional
14%
security level
14%
Decision Process
14%
Technical Information
14%