Publications

2018

Mass Soldal Lund, Odd Sveinung Hareide, Øyvind Jøsok. An Attack on an Integrated Navigation System. Necesse, 3(2): 149-163, 2018. pdf (©2018 Sjøkrigsskolen)

Odd Sveinung Hareide, Øyvind Jøsok, Mass Soldal Lund, Runar Ostnes, Kirsi Helkala. Enhancing Navigator Competence by Demonstrating Maritime Cyber Security. Journal of Navigation, 17(5): 1025-1039, 2018. pdf (©2018 The Royal Institute of Navigation)

Mass Soldal Lund, Jørgen Emil Gulland, Odd Sveinung Hareide, Øyvind Jøsok, Karl Olav Carlsson Weum. Integrity of Integrated Navigation Systems. In 2018 IEEE Conference on Communications and Network Security (CNS), IEEE 2018. pdf (©2018 IEEE)

Mass Soldal Lund. CND-konsept for taktiske nettverk. Ledelse i Cyberdomenet, pp. 35-47, Forsvarets ingeniørhøgskole, 2018.

2017

Mass Soldal Lund. Internetthøgre frå 4chan til Trump (book review). Gnist, 46(4):140-142, 2017. link

Mass Soldal Lund. Cyber som operasjonsdomene. Norsk Militært Tidsskrift, 186(1):28-34, 2017. pdf

2016

Kirsi Helkala, Benjamin Knox, Øyvind Jøsok, Silje Knox, Mass Lund. Factors to affect improvement in cyber officer performance. Information & Computer Security, 24(2):152-163, 2016.

2015

Kirsi Helkala, Silje Knox and Mass Lund. Effect of motivation and physical fitness on cyber tasks. Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015), pages 108-119. Center for Security, Communications & Network Research, Plymouth University, 2015.

2014

Ola Flåten, Mass Soldal Lund. How Good are Attack Trees for Modelling Advanced Cyber Threats? Norsk informasjonssikkerhetskonferanse (NISK 2014). pdf

Hanne Eggen Røislien, Mass Soldal Lund, Benjamin Knox. Mapping the "Cyber Warrior": What Skill-Set Does the Cyber Warrior Need? In Proceedings of the 9th International Conference on Cyber Warfare and Security (ICCWS-2014), pages. 373-376. Academic Conferences Publishing, 2014.

Mass Soldal Lund, Benjamin Knox, Hanne Eggen Røislien. What do Cyber Soldiers Need to Know? In Proceedings of the 9th International Conference on Cyber Warfare and Security (ICCWS-2014), pages 371-372. Academic Conferences Publishing, 2014.

2013

Mass Soldal Lund, Atle Refsdal. BRIDGE Risk Analyzer: A Collaborative Tool for Enhanced Risk Analysis in Crisis Situations. In Proceedings of the Workshop on Ambient Intelligence for Crisis Management (AmI4CM 2012), CEUR Workshop Proceedings, vol. 953, 2013. pdf

Mass Soldal Lund. A Pie Menu for WPF. CodeProject, 6 January 2013. link

2011

Ida Hogganvik Grøndahl, Mass Soldal Lund, Ketil Stølen. Reducing the Effort to Comprehend Risk Models: Text Labels Are Often Preferred Over Graphical Means. Risk Analysis, 31(11): 1813-1831, 2011. pdf (©2011 Society for Risk Analysis)

Olav Skjelkvåle Ligaarden, Mass Soldal Lund, Atle Refsdal, Fredrik Seehusen, Ketil Stølen. An Architectural Pattern for Enterprise Level Monitoring Tools. In 2011 International Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems (MESOCA 2011), IEEE, 2011. pdf (©2011 IEEE)

Fabio Massacci, Fabrice Bouquet, Elizabeta Fourneret, Jan Jurjens, Mass S. Lund, Sébastien Madelénat, JanTobias Muehlberg, Frederica Paci, Stéphane Paul, Frank Piessens, Bjørnar Solhaug, Sven Wenzel. Orchestrating Security and System Engineering for Evolving Systems. In, Witold Abramowicz, Ignacio M. Llorente, Mike Surridge, Andrea Zisman, Julien Vayssière (Eds.), Towards a Service-Based Internet. 4th European Conference, ServiceWave 2011, number 6994 in Lecture Notes in Computer Science, pages 134-143, Springer, 2011. pdf (©2011 Springer)

Mass Soldal Lund, Bjørnar Solhaug and Ketil Stølen. Risk Analysis of Changing and Evolving Systems Using CORAS. In, Alessandro Aldini and Roberto Gorrieri (editors), Foundations of Security Analysis and Design VI. FOSAD Tutorial Lectures, number 6858 in Lecture Notes in Computer Science, pages 231-274, Springer, 2011. pdf (©2011 Springer)

Mass Soldal Lund. Bridging the Gap in Model-based V&V Methodology. In, Naveed Ahmed, Daniele Querica and Christian D. Jensen (editors), Workshop Proceedings of the Fifth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2011), pages 389-396, IFIF WG 11.11 on Trust Management, 2011. pdf

Mass Soldal Lund, Bjørnar Solhaug, Ketil Stølen. Model-driven risk analysis. The CORAS approach. Springer, 2011. Springer page

2010

Mass Soldal Lund, Atle Refsdal, Ketil Stølen. Semantics of UML models for dynamic behavior. A survey of different approaches. In, Holger Giese et al. (eds.), Model-based engineering of embedded real-time systems, number 6100 in Lecture Notes in Computer Science, pages 77-103, Springer, 2010. pdf (©2010 Springer)

Mass Soldal Lund, Bjørnar Solhaug, Ketil Stølen. Evolution in relation to risk and trust management. Computer, 43(5):49-55, IEEE Computer Society, May 2010.pdf (©2010 IEEE)

2009

Heidi E. I. Dahl, Mass Soldal Lund, Ketil Stølen. Risk analysis of privacy protection in social networking sites. Extended abstract in Proceedings of VALues in Decisions On Risk (VALDOR 2009), 2009. pdf

Mass Soldal Lund. Model-based testing with the Escalator tool. Telektronikk, 105(1):117-125, 2009. pdf (©2009 Telenor)

2008

Mass Soldal Lund. Operational analysis of sequence diagram specifications. ph.d. thesis, Faculty of Mathematics and Natural Sciences, University of Oslo, 2008. pdf

2007

Folker den Braber, Ida Hogganvik, Mass Soldal Lund, Ketil Stølen, Fredrik Vraalsen. Model-based security analysis in seven steps — a guided tour to the CORAS method. BT Technology Journal, 25(1):101-117, January 2007. pdf (©2007 Springer)

Folker den Braber, Mass Soldal Lund, Ketil Stølen, Fredrik Vraalsen. Integrating security in the development process with UML. In, Hamid Nemati (ed.), Information security and ethics: Concepts, methodologies, tools and applications, chapter 2.7, pages 704-712. Information Science Reference, 2007.

Fredrik Vraalsen, Tobias Mahler, Mass Soldal Lund, Ida Hogganvik, Folker den Braber, Ketil Stølen. Assessing enterprise risk level: The CORAS approach. In, Djamel Khadraoui and Francine Merrmann (eds.), Advances in Enterprise Information Technology Security, chapter XVIII, pages 311-333, Information Science Reference, 2007.

2006

Mass Soldal Lund, Ketil Stølen. A fully operational semantics for UML 2.0 Sequence diagrams with potential and mandatory choice. In 14th International Symposium on Formal Methods (FM'06), number 4085 in Lecture Notes in Computer Science, pages 380-395, Springer, 2006. pdf (©2006 Springer)

Mass Soldal Lund, Ketil Stølen. Deriving tests from UML 2.0 sequence diagrams with neg and assert. In 1st International Workshop on Automation of Software Test (AST'06), pages 22-28, ACM Press, 2006. pdf (©2006 ACM)

Judith E. Y. Rossebø, Mass Soldal Lund, Knut Eilif Husa, Atle Refsdal. A conceptual model for service availability. In Quality of Protection: Security Measurements and Metrics (QoP'05), Volume 23 of Advances in Information Security, pages 107-118, Springer 2006. pdf (©2006 Springer)

Substantial contributions to UML Profile for Modeling Quality of Service and Fault Tolerance Characteristics and mechanisms. OMG document formal/06-05-02, Object Management Group, May 2006. OMG

2005

Folker den Braber, Mass Soldal Lund, Ketil Stølen, Fredrik Vraalsen. Integrating security in the development process with UML. In Encyclopedia of Information Science and Technology, pages 1560-1566, Idea Group, 2005.

Mass Soldal Lund, Ketil Stølen. Extendable and modifiable operational semantics for UML 2.0 sequence diagrams. Extended abstract in Presentation abstracts of 17th Nordic Workshop on Programming Theory (NWPT'05), pages 86-88, DIKU, 2005. pdf

Fredrik Vraalsen, Folker den Braber, Mass Soldal Lund, Ketil Stølen. The CORAS tool for security risk analysis. Demonstration at Third Intenational Conference on Trust Management (iTrust'05), Paris, France, May 24, 2005. Published in Proc. iTrust'05, number 3477 in Lecture Notes in Computer Science, pages 402-405, Springer, 2005. pdf (©2005 Springer)

Fredrik Vraalsen, Mass Soldal Lund, Tobias Mahler, Xavier Parent, Ketil Stølen. Specifying legal risk scenarios using the CORAS threat modelling language. In Proc. Third International Conference on Trust Management (iTrust'05), number 3477 in Lecture Notes in Computer Science, pages 45-60, Springer, 2005. pdf (©2005 Springer)

2004

Folker den Braber, Mass Soldal Lund, Ketil Stølen, Fredrik Vraalsen. Reuse of security assessment results under design and maintenance of IT systems. Invited presentation at "recent Object Oriented trends (rOOts 2004)", Bergen, Norway, April 28-30, 2004. Published in the electronic proceedings of rOOts 2004. pdf

2003

Folker den Braber, Theo Dimitrakos, Bjørn Axel Gran, Mass Soldal Lund, Ketil Stølen, Jan Øyvind Aagedal. The CORAS methodology: Model-based risk assessment using UML and UP. In Lilian Favre, editor, UML and the Unified Process, chapter XVII, pages 332-357. IRM Press, 2003.

Mass Soldal Lund. Testing decomposition of component specifications based on a rule for formal verification. In Proc. Third International Conference on Quality Software (QSIC 2003), pages 154-160, IEEE Computer Society, 2003. pdf (©2003 IEEE)

Mass Soldal Lund, Folker den Braber, Ketil Stølen. A component-oriented approach to security risk assessment. In Proc. 1st International Workshop on Quality of Service in Component-Based Software Engineering (QoSCBSE 2003), pages 99-110, Cépaduès-Éditions, 2003. pdf

Mass Soldal Lund, Folker den Braber, Ketil Stølen. Maintaining results from security assessments. In Proc. Seventh European Conference on Software Maintenance and Reengineering (CSMR 2003), pages 341-350, IEEE Computer Society, 2003. pdf (©2003 IEEE)

Yannis C. Stamatiou , Eva Skipenes, Eva Henriksen, Nikos Stathiakis, Adamantios Sikianakis, Eliana Charalambous, Nikos Antonakis, Ketil Stølen, Folker den Braber, Mass Soldal Lund, Katerina Papadaki, George Valvis. The CORAS approach for model-based risk management applied to a telemedicine service. In Proc. Medical Informatics Europe (MIE 2003), pages 206-211, IOS Press, 2003. pdf

2002

Siv-Hilde Houmb, Folker den Braber, Mass Soldal Lund, Ketil Stølen. Towards a UML profile for model-based risk assessment. In Proc. UML 2002 Satellite Workshop on Critical Systems Development with UML, pages 79-91, Munich University of Technology, 2002. pdf

Mass Soldal Lund. Validation of Contract Decomposition by Testing. Cand.Scient. Thesis (comparable to MSc), Department of Informatics, University of Oslo, February 2002. pdf

Mass Soldal Lund. Validation of contract decomposition by testing. In Proc. Norsk Informatikkonferanse (NIK'02), pages 191-202, Tapir, 2002. pdf

Yannis C. Stamatiou, Eva Henriksen, Mass Soldal Lund, Eva Mantzouranis, Michalis Psarros, Eva Skipenes, Nikos Stathiakis, Ketil Stølen. Experiences from using model-based risk assessment to evaluate the security of a telemedicine application. In Proc. Telemedicine in Care Delivery — Technology and Application (TICD'02), pages 115-119, 2002. pdf

Ketil Stølen, Folker den Braber, Rune Fredriksen, Bjørn Axel Gran, Siv-Hilde Houmb, Mass Soldal Lund, Yannis C. Stamatiou, Jan Øyvind Aagedal. Model-based risk assessment – the CORAS approach. In Proc. Norsk Informatikkonferanse (NIK'02), pages 239-249, Tapir, 2002. pdf

2001

Mass Soldal Lund. Modulær testing basert på universelle lover. Elektronikk, (10):34-36, oktober 2001. pdf

Mass Soldal Lund. Modulær testing av komponent-aggregater basert på kontraktsorienterte spesifikasjoner. Poster, sesjon Yngre Forskere, det 54. Studiemøtet Elektronikk og Data, Lillehammer, juni 2001. pdf

1999

Richard Borge, Alexander Haneng, Einar Høst, Mass Soldal Lund, Stephen Parsli, Torstein Velvang. Synshemmede og informasjon på Internett. Studentrapport, Institutt for Informatikk, Univerisitet i Oslo, november 1999. Report page
"This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder."

Last updated 16 October 2018