default search action
Antti Evesti
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [c23]Antti Evesti, Teemu Kanstrén, Tapio Frantti:
Cybersecurity situational awareness taxonomy. CyberSA 2017: 1-8 - 2016
- [c22]Outi-Marja Latvala, Jyri Toivonen, Antti Evesti, Markus Sihvonen, Vesa Jordan:
Security Risk Visualization with Semantic Risk Model. ANT/SEIT 2016: 1194-1199 - [c21]Antti Evesti, Christian Wieser, Tiandu Zhao:
Improved information security situational awareness by manifold visualisation. ECSA Workshops 2016: 33 - [c20]Jarkko Kuusijärvi, Reijo Savola, Pekka Savolainen, Antti Evesti:
Mitigating IoT security threats with a trusted Network element. ICITST 2016: 260-265 - [c19]Tiandu Zhao, Antti Evesti, Teemu Kanstrén:
A Tool for Security Measuring and Probe Management. QRS Companion 2016: 1-6 - [c18]Teemu Kanstrén, Antti Evesti:
A Study on the State of Practice in Security Situational Awareness. QRS Companion 2016: 69-76 - 2015
- [c17]Antti Evesti, Tapio Frantti:
Situational Awareness for security adaptation in Industrial Control Systems. ICUFN 2015: 1-6 - [c16]Reijo M. Savola, Pekka Savolainen, Antti Evesti, Habtamu Abie, Markus Sihvonen:
Risk-driven security metrics development for an e-health IoT application. ISSA 2015: 1-6 - [c15]Teemu Kanstrén, Antti Evesti:
Security Metrics, Secure Elements, and Operational Measurement Trust in Cloud Environments. STM 2015: 37-51 - 2014
- [c14]Outi-Marja Latvala, Jyri Toivonen, Jarkko Kuusijärvi, Antti Evesti:
A tool for security metrics modeling and visualization. ECSA Workshops 2014: 3:1-3:7 - [c13]Antti Evesti, Habtamu Abie, Reijo Savola:
Security Measuring for Self-adaptive Security. ECSA Workshops 2014: 5:1-5:7 - [c12]Jani Suomalainen, Antti Evesti, Adrian Kotelba:
Security pairings using physical layer properties of wireless communications. PRISMS 2014: 1-8 - 2013
- [j4]Antti Evesti, Jani Suomalainen, Eila Ovaska:
Architecture and Knowledge-Driven Self-Adaptive Security in Smart Space. Comput. 2(1): 34-66 (2013) - [c11]Antti Evesti, Jani Suomalainen, Reijo Savola:
Security risks in the short-range communication of ubiquitous application. ICITST 2013: 612-617 - [c10]Reijo M. Savola, Teemu Väisänen, Antti Evesti, Pekka Savolainen, Juha Kemppainen, Marko Kokemaki:
Toward risk-driven security measurement for Android smartphone platforms. ISSA 2013: 1-8 - 2012
- [j3]Susanna Pantsar-Syväniemi, Anu Purhonen, Eila Ovaska, Jarkko Kuusijärvi, Antti Evesti:
Situation-based and self-adaptive applications for the smart environment. J. Ambient Intell. Smart Environ. 4(6): 491-516 (2012) - [e1]Mika Rautiainen, Timo Korhonen, Edward Mutafungwa, Eila Ovaska, Artem Katasonov, Antti Evesti, Heikki Ailisto, Aaron J. Quigley, Jonna Häkkilä, Natasa Milic-Frayling, Jukka Riekki:
Grid and Pervasive Computing Workshops - International Workshops, S3E, HWTS, Doctoral Colloquium, Held in Conjunction with GPC 2011, Oulu, Finland, May 11-13, 2011. Revised Selected Papers. Lecture Notes in Computer Science 7096, Springer 2012, ISBN 978-3-642-27915-7 [contents] - 2011
- [j2]Marko Palviainen, Antti Evesti, Eila Ovaska:
The reliability estimation, prediction and measuring of component-based software. J. Syst. Softw. 84(6): 1054-1070 (2011) - 2010
- [j1]Eila Ovaska, Antti Evesti, Katja Henttonen, Marko Palviainen, Pekka Aho:
Knowledge based quality-driven architecture design and evaluation. Inf. Softw. Technol. 52(6): 577-601 (2010) - [c9]Reijo Savola, Teemu Kanstrén, Antti Evesti:
First International Workshop on Measurability of Security in Software Architectures -- MeSSa 2010. ECSA Companion Volume 2010: 151-154 - [c8]Antti Evesti, Susanna Pantsar-Syväniemi:
Towards micro architecture for security adaptation. ECSA Companion Volume 2010: 181-188 - [c7]Teemu Kanstrén, Reijo Savola, Antti Evesti, Heimo Pentikäinen, Artur Hecker, Moussa Ouedraogo, Kimmo Hätönen, Perttu Halonen, Christophe Blad, Óscar López, Saioa Ros:
Towards an abstraction layer for security assurance measurements: (invited paper). ECSA Companion Volume 2010: 189-196 - [c6]Jarkko Kuusijärvi, Antti Evesti, Eila Ovaska:
Visualizing structure and quality properties of Smart Spaces. ISCC 2010: 1-3 - [c5]Antti Evesti, Eila Ovaska:
Ontology-Based Security Adaptation at Run-Time. SASO 2010: 204-212
2000 – 2009
- 2008
- [c4]Jiehan Zhou, Eila Niemelä, Antti Evesti, Anne Immonen, Pekka Savolainen:
OntoArch Approach for Reliability-Aware Software Architecture Development. COMPSAC 2008: 1228-1233 - [c3]Eila Niemelä, Antti Evesti, Pekka Savolainen:
Modeling Quality Attribute Variability. ENASE 2008: 169-176 - [c2]Anne Immonen, Antti Evesti:
Validation of the Reliability Analysis Method and Tool. SPLC (2) 2008: 163-168 - [c1]Antti Evesti, Eila Niemelä, Katja Henttonen, Marko Palviainen:
A Tool Chain for Quality-Driven Software Architecting. SPLC 2008: 360
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint