default search action
Maria B. Line
Person information
- affiliation: Norwegian University of Science and Technology, Department of Telematics, Trondheim, Norway
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c20]Vahiny Gnanasekaran, Maria Bartnes, Tor Olav Grøtan, Poul Einar Heegaard:
Cyber-incident Response in Industrial Control Systems: Practices and Challenges in the Petroleum Industry. EnCyCriS/SVM 2024: 53-60
2010 – 2019
- 2017
- [j9]Maria Bartnes, Nils Brede Moe:
Challenges in IT security preparedness exercises: A case study. Comput. Secur. 67: 280-290 (2017) - [c19]Eyvind Garder B. Gjertsen, Erlend Andreas Gjære, Maria Bartnes, Waldo Rocha Flores:
Gamification of Information Security Awareness and Training. ICISSP 2017: 59-70 - 2016
- [j8]Maria Bartnes, Nils Brede Moe, Poul E. Heegaard:
The future of information security incident management training: A case study of electrical power companies. Comput. Secur. 61: 32-45 (2016) - [j7]Maria Bartnes Line, Inger Anne Tøndel, Martin Gilje Jaatun:
Current practices and challenges in industrial control organizations regarding information security incident management - Does size matter? Information security incident management in large and small industrial control organizations. Int. J. Crit. Infrastructure Prot. 12: 12-26 (2016) - [j6]Maria Bartnes Line, Eirik Albrechtsen:
Examining the suitability of industrial safety management approaches for information security incident management. Inf. Comput. Secur. 24(1): 20-37 (2016) - [c18]Martin Gilje Jaatun, Maria Bartnes, Inger Anne Tøndel:
Zebras and Lions: Better Incident Handling Through Improved Cooperation. I4CS 2016: 129-139 - 2015
- [c17]Inger Anne Tøndel, Maria B. Line, Gorm Johansen:
Assessing Information Security Risks of AMI - What Makes it so Difficult?. ICISSP 2015: 56-63 - [c16]Maria B. Line, Nils Brede Moe:
Understanding Collaborative Challenges in IT Security Preparedness Exercises. SEC 2015: 311-324 - [i2]Maria Bartnes Line, Nils Brede Moe:
Cross-functional Teams Needed for Managing Information Security Incidents in Complex Systems. ERCIM News 2015(102) (2015) - 2014
- [j5]Inger Anne Tøndel, Maria B. Line, Martin Gilje Jaatun:
Information security incident management: Current practice as reported in the literature. Comput. Secur. 45: 42-57 (2014) - [j4]Maria B. Line:
Why securing smart grids is not just a straightforward consultancy exercise. Secur. Commun. Networks 7(1): 160-174 (2014) - [c15]Maria B. Line, Ali Zand, Gianluca Stringhini, Richard A. Kemmerer:
Targeted Attacks against Industrial Control Systems: Is the Power Industry Prepared? SEGS@CCS 2014: 13-22 - [c14]Cathrine Hove, Marte Tarnes, Maria B. Line, Karin Bernsmed:
Information Security Incident Management: Identified Practice in Large Organizations. IMF 2014: 27-46 - [c13]Maria B. Line, Inger Anne Tøndel, Martin Gilje Jaatun:
Information Security Incident Management: Planning for Failure. IMF 2014: 47-61 - 2013
- [c12]Maria B. Line:
A study of resilience within information security in the power industry. AFRICON 2013: 1-6 - [c11]Maria B. Line:
A Case Study: Preparing for the Smart Grids - Identifying Current Practice for Information Security Incident Management in the Power Industry. IMF 2013: 26-32 - [i1]Maria Bartnes Line:
Preparing for the Smart Grids: Improving Information Security Management in the Power Industry. ERCIM News 2013(92) (2013) - 2012
- [c10]Inger Anne Tøndel, Martin Gilje Jaatun, Maria Bartnes Line:
Threat Modeling of AMI. CRITIS 2012: 264-275 - 2011
- [c9]Maria B. Line, Inger Anne Tøndel, Erlend Andreas Gjære:
A Risk-Based Evaluation of Group Access Control Approaches in a Healthcare Setting. ARES 2011: 26-37 - [c8]Maria B. Line, Inger Anne Tøndel, Martin Gilje Jaatun:
Cyber security challenges in Smart Grids. ISGT Europe 2011: 1-8 - [c7]Erlend Andreas Gjære, Inger Anne Tøndel, Maria B. Line, Herbjørn Andresen, Pieter J. Toussaint:
Personal Health Information on Display: Balancing Needs, Usability and Legislative Requirements. MIE 2011: 606-610 - 2010
- [j3]Torstein Nicolaysen, Richard Sasson, Maria B. Line, Martin Gilje Jaatun:
Agile Software Development: The Straight and Narrow Path to Secure Software? Int. J. Secur. Softw. Eng. 1(3): 71-85 (2010)
2000 – 2009
- 2009
- [j2]Martin Gilje Jaatun, Maria B. Line, Tor Olav Grøtan:
Secure remote access to autonomous safety systems: A good practice approach. Int. J. Auton. Adapt. Commun. Syst. 2(3): 297-312 (2009) - [j1]Martin Gilje Jaatun, Eirik Albrechtsen, Maria B. Line, Inger Anne Tøndel, Odd Helge Longva:
A framework for incident response management in the petroleum industry. Int. J. Crit. Infrastructure Prot. 2(1-2): 26-37 (2009) - 2008
- [c6]Martin Gilje Jaatun, Tor Olav Grøtan, Maria B. Line:
Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installations. ATC 2008: 121-133 - [c5]Martin Gilje Jaatun, Eirik Albrechtsen, Maria B. Line, Stig Ole Johnsen, Irene Wærø, Odd Helge Longva, Inger Anne Tøndel:
A Study of Information Security Practice in a Critical Infrastructure Application. ATC 2008: 527-539 - [c4]Maria B. Line, Eirik Albrechtsen, Martin Gilje Jaatun, Inger Anne Tøndel, Stig Ole Johnsen, Odd Helge Longva, Irene Wærø:
A Structured Approach to Incident Response Management in the Oil and Gas Industry. CRITIS 2008: 235-246 - [c3]Maria B. Line, Martin Gilje Jaatun, Zi Bin Cheah, A. B. M. Omar Faruk, Håvard Husevåg Garnes, Petter Wedum:
Penetration Testing of OPC as Part of Process Control Systems. UIC 2008: 271-283 - 2006
- [c2]Maria B. Line, Lillian Røstad:
Establishing a Centre for Information Security: Experiences from the Trial Period and Recommendations to Similar Initiatives. IMF 2006: 43-54 - [c1]Maria B. Line, Eirik Albrechtsen, Stig Ole Johnsen, Odd Helge Longva, Stefanie A. Hillen:
Monitoring of Incident Response Management Performance. IMF 2006: 128-143
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint