Follow
Ronja Addams-Moring
Title
Cited by
Cited by
Year
Public warning in the networked age: open standards to the rescue?
A Botterell, R Addams-Moring
Communications of the ACM 50 (3), 59-60, 2007
452007
Leveraging a Wiki to enhancevirtual collaboration in the emergency domain
C White, L Plotnick, R Addams-Moring, M Turoff, SR Hiltz
Proceedings of the 41st Annual Hawaii International Conference on System …, 2008
372008
Event Data Exchnage and Intrusion Alert Correlation in Heterogeneous Networks
A Hätälä, C Särs, R Addams-Moring, T Virtanen
CISSE2004: Eight Colloquium for Information Systems Security Education, West …, 2004
262004
Emergency announcements to mobile user devices in geographically defined areas
E Valtonen, R Addams-Moring, T Virtanen, A Järvinen, M Moring
Proceedings ISCRAM2004 151, 2004
172004
A simple taxonomy for mobile emergency announcement systems
R Addams-Moring, M Kekkonen, S Zhao
Proceedings of the 2nd International ISCRAM Conference 128, 2005
102005
Building mobile emergency announcement systems in 3G networks
S Zhao, R Addams-Moring, M Kekkonen
IASTED Communications and Computer Networks-CCN 2005, Marina del Rey, CA …, 2005
82005
Procuring usability: Experiences of usability testing in tender evaluation
S Riihiaho, M Nieminen, S Westman, R Addams-Moring, J Katainen
Nordic Contributions in IS Research: 6th Scandinavian Conference on …, 2015
52015
We are running What?-Why the Slapper Worm was able to Spread to Finland
A Heinonen, T Virtanen, R Addams-Moring
The 2nd European conference on information warfare and security, Reading, 30 …, 2003
32003
Tsunami self-evacuation of a group of western travelers and resulting requirements for multi-hazard early warning
R Addams-Moring
Proceedings of ISCRAM 2007 conference - Intelligent Human Computer Systems …, 2007
22007
Mobile Emergency Announcements with Really Simple Syndication (RSS 2.0)
Y Raivio, R Addams-Moring
Proceedings of the 3rd International ISCRAM Conference, 2006
22006
Identifying Unsolicited Commercial E-mail Messages by Comparing Header Fields
M Voipio, R Addams-Moring, T Virtanen
5th Australian information warfare & security conference, Perth, 25.-26.11 …, 2004
22004
A computerised examination system
T Virtanen, R Addams-Moring, S Liimatainen, L Staffans
TelE-Learning: The Challenge for the Third Millennium, 125-132, 2002
22002
Security in Globally Distributed Industrial Information Systems
P Saloma, R Addams-Moring, T Virtanen
Security and Protection in Information Processing Systems: IFIP 18 th World …, 2004
12004
Identifying unsolicited bulk e-mail messages with header field comparisons
M Voipio, R Addams-Moring
Journal of Information Warfare 6 (1), 29-40, 2007
2007
A Method for Analyzing and Evaluating PKI Products and Their Technology
G Lian, T Virtanen, R Addams-Moring
Applied Cryptography and Network Security, 16.-19.10. 2003, Kunming, Kiina …, 2003
2003
An Information Security Curriculum in Finland
T Virtanen, R Addams-Moring
Security in the Information Society: Visions and Perspectives, 183-190, 2002
2002
Peer-to-peer technologies, networks and systems, Seminar on Internetworking, Spring 2005 (2005)
A Ylä-Jääski, N Kasinskaja, R Addams-Moring, D Forsberg, S Grech, ...
A Computerized examination system (2002)
T Virtanen, R Addams-Moring, S Liimatainen, L Staffans
Identifying Unsolicited Commercial E-mail Messages by Comparing Header Fields (2004)
M Voipio, R Addams-Moring, T Virtanen
Building Mobile Emergency Announcement Systems in 3G Networks (2005)
S Zhao, R Addams-Moring, M Kekkonen
The system can't perform the operation now. Try again later.
Articles 1–20