BibTeX records: Teodor Sommestad

download as .bib file

@inproceedings{DBLP:conf/IEEEares/KarlzenS23,
  author       = {Henrik Karlz{\'{e}}n and
                  Teodor Sommestad},
  title        = {Automatic incident response solutions: a review of proposed solutions'
                  input and output},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {37:1--37:9},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3605066},
  doi          = {10.1145/3600160.3605066},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KarlzenS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SommestadKKG23,
  author       = {Teodor Sommestad and
                  Henrik Karlz{\'{e}}n and
                  Hanna Kvist and
                  Hanna Gustafsson},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Costas Lambrinoudakis and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Pantaleone Nespoli and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis},
  title        = {Skade - {A} Challenge Management System for Cyber Threat Hunting},
  booktitle    = {Computer Security. {ESORICS} 2023 International Workshops - CyberICS,
                  DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29,
                  2023, Revised Selected Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14398},
  pages        = {84--103},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-54204-6\_5},
  doi          = {10.1007/978-3-031-54204-6\_5},
  timestamp    = {Mon, 11 Mar 2024 15:20:44 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/SommestadKKG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/23/VargaSB23,
  author       = {Stefan Varga and
                  Teodor Sommestad and
                  Joel Brynielsson},
  editor       = {Tuomo Sipola and
                  Tero Kokkonen and
                  Mika Karjalainen},
  title        = {Automation of Cybersecurity Work},
  booktitle    = {Artificial Intelligence and Cybersecurity: Theory and Applications},
  pages        = {67--101},
  publisher    = {Springer International Publishing},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-15030-2\_4},
  doi          = {10.1007/978-3-031-15030-2\_4},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/23/VargaSB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SommestadHS22,
  author       = {Teodor Sommestad and
                  Hannes Holm and
                  Daniel Steinvall},
  title        = {Variables influencing the effectiveness of signature-based network
                  intrusion detection systems},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {6},
  pages        = {711--728},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1975853},
  doi          = {10.1080/19393555.2021.1975853},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/SommestadHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/LeitnerS20,
  author       = {Maria Leitner and
                  Teodor Sommestad},
  title        = {International Workshop on Cyber Range Technologies and Applications
                  {(CACOE} 2020)},
  booktitle    = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P
                  Workshops 2020, Genoa, Italy, September 7-11, 2020},
  pages        = {1},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSPW51379.2020.00009},
  doi          = {10.1109/EUROSPW51379.2020.00009},
  timestamp    = {Thu, 29 Oct 2020 11:34:40 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/LeitnerS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/SommestadKH19,
  author       = {Teodor Sommestad and
                  Henrik Karlz{\'{e}}n and
                  Jonas Hallberg},
  title        = {The Theory of Planned Behavior and Information Security Policy Compliance},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {59},
  number       = {4},
  pages        = {344--353},
  year         = {2019},
  url          = {https://doi.org/10.1080/08874417.2017.1368421},
  doi          = {10.1080/08874417.2017.1368421},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/SommestadKH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/SommestadK19,
  author       = {Teodor Sommestad and
                  Henrik Karlz{\'{e}}n},
  title        = {A meta-analysis of field experiments on phishing susceptibility},
  booktitle    = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh,
                  PA, USA, November 13-15, 2019},
  pages        = {1--14},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/eCrime47957.2019.9037502},
  doi          = {10.1109/ECRIME47957.2019.9037502},
  timestamp    = {Mon, 23 Mar 2020 18:24:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/SommestadK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Sommestad18,
  author       = {Teodor Sommestad},
  title        = {Work-related groups and information security policy compliance},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {5},
  pages        = {533--550},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-08-2017-0054},
  doi          = {10.1108/ICS-08-2017-0054},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/Sommestad18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/LifSG18,
  author       = {Patrik Lif and
                  Teodor Sommestad and
                  Dennis Gran{\aa}sen},
  title        = {Development and evaluation of information elements for simplified
                  cyber-incident reports},
  booktitle    = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSA.2018.8551402},
  doi          = {10.1109/CYBERSA.2018.8551402},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/LifSG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HolmS17,
  author       = {Hannes Holm and
                  Teodor Sommestad},
  title        = {So long, and thanks for only using readily available scripts},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {1},
  pages        = {47--61},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-08-2016-0069},
  doi          = {10.1108/ICS-08-2016-0069},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HolmS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SommestadH17,
  author       = {Teodor Sommestad and
                  Hannes Holm},
  title        = {Alert verification through alert correlation - An empirical test of
                  SnIPS},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {26},
  number       = {1},
  pages        = {39--48},
  year         = {2017},
  url          = {https://doi.org/10.1080/19393555.2016.1272727},
  doi          = {10.1080/19393555.2016.1272727},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/SommestadH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/LifGS17,
  author       = {Patrik Lif and
                  Magdalena Gran{\aa}sen and
                  Teodor Sommestad},
  title        = {Development and validation of technique to measure cyber situation
                  awareness},
  booktitle    = {2017 International Conference On Cyber Situational Awareness, Data
                  Analytics And Assessment (Cyber SA), London, United Kingdom, June
                  19-20, 2017},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CyberSA.2017.8073388},
  doi          = {10.1109/CYBERSA.2017.8073388},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/LifGS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SommestadKNH16,
  author       = {Teodor Sommestad and
                  Henrik Karlz{\'{e}}n and
                  Peter Nilsson and
                  Jonas Hallberg},
  title        = {An empirical test of the perceived relationship between risk and the
                  constituents severity and probability},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {2},
  pages        = {194--204},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-01-2016-0004},
  doi          = {10.1108/ICS-01-2016-0004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SommestadKNH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/HolmS16,
  author       = {Hannes Holm and
                  Teodor Sommestad},
  editor       = {Jerry Brand and
                  Matthew C. Valenti and
                  Akinwale Akinpelu and
                  Bharat T. Doshi and
                  Bonnie L. Gorsic},
  title        = {{SVED:} Scanning, Vulnerabilities, Exploits and Detection},
  booktitle    = {2016 {IEEE} Military Communications Conference, {MILCOM} 2016, Baltimore,
                  MD, USA, November 1-3, 2016},
  pages        = {976--981},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/MILCOM.2016.7795457},
  doi          = {10.1109/MILCOM.2016.7795457},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/HolmS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/SommestadKH15,
  author       = {Teodor Sommestad and
                  Henrik Karlz{\'{e}}n and
                  Jonas Hallberg},
  title        = {A Meta-Analysis of Studies on Protection Motivation Theory and Information
                  Security Behaviour},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {9},
  number       = {1},
  pages        = {26--46},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJISP.2015010102},
  doi          = {10.4018/IJISP.2015010102},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/SommestadKH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SommestadKH15,
  author       = {Teodor Sommestad and
                  Henrik Karlz{\'{e}}n and
                  Jonas Hallberg},
  title        = {The sufficiency of the theory of planned behavior for explaining information
                  security policy compliance},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {200--217},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-04-2014-0025},
  doi          = {10.1108/ICS-04-2014-0025},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/SommestadKH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SommestadS15,
  author       = {Teodor Sommestad and
                  Fredrik Sandstr{\"{o}}m},
  title        = {An empirical test of the accuracy of an attack graph analysis tool},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {5},
  pages        = {516--531},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-06-2014-0036},
  doi          = {10.1108/ICS-06-2014-0036},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SommestadS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SommestadF15,
  author       = {Teodor Sommestad and
                  Ulrik Franke},
  title        = {A test of intrusion alert filtering based on network information},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {13},
  pages        = {2291--2301},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1173},
  doi          = {10.1002/SEC.1173},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SommestadF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haisa/SommestadKNH15,
  author       = {Teodor Sommestad and
                  Henrik Karlz{\'{e}}n and
                  Peter Nilsson and
                  Jonas Hallberg},
  editor       = {Steven Furnell and
                  Nathan L. Clarke},
  title        = {Perceived Information Security Risk as a Function of Probability and
                  Severity},
  booktitle    = {Ninth International Symposium on Human Aspects of Information Security
                  {\&} Assurance, {HAISA} 2015 ,Lesvos, Greece, July 1-3, 2015,
                  Proceedings},
  pages        = {183--193},
  publisher    = {University of Plymouth},
  year         = {2015},
  url          = {http://www.cscan.org/openaccess/?paperid=269},
  timestamp    = {Tue, 06 Jul 2021 12:22:17 +0200},
  biburl       = {https://dblp.org/rec/conf/haisa/SommestadKNH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haisa/LifS15,
  author       = {Patrik Lif and
                  Teodor Sommestad},
  editor       = {Steven Furnell and
                  Nathan L. Clarke},
  title        = {Human factors related to the performance of intrusion detection operators},
  booktitle    = {Ninth International Symposium on Human Aspects of Information Security
                  {\&} Assurance, {HAISA} 2015 ,Lesvos, Greece, July 1-3, 2015,
                  Proceedings},
  pages        = {265--275},
  publisher    = {University of Plymouth},
  year         = {2015},
  url          = {http://www.cscan.org/openaccess/?paperid=276},
  timestamp    = {Tue, 06 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/haisa/LifS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/HolmSB15,
  author       = {Hannes Holm and
                  Teodor Sommestad and
                  Johan E. Bengtsson},
  editor       = {Didar Zowghi and
                  Vincenzo Gervasi and
                  Daniel Amyot},
  title        = {Requirements engineering: The quest for the dependent variable},
  booktitle    = {23rd {IEEE} International Requirements Engineering Conference, {RE}
                  2015, Ottawa, ON, Canada, August 24-28, 2015},
  pages        = {16--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/RE.2015.7320404},
  doi          = {10.1109/RE.2015.7320404},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/HolmSB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Sommestad15,
  author       = {Teodor Sommestad},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Social Groupings and Information Security Obedience Within Organizations},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {325--338},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_22},
  doi          = {10.1007/978-3-319-18467-8\_22},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/Sommestad15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/es/HolmSEH14,
  author       = {Hannes Holm and
                  Teodor Sommestad and
                  Mathias Ekstedt and
                  Nicholas Honeth},
  title        = {Indicators of expert judgement and their significance: an empirical
                  investigation in the area of cyber security},
  journal      = {Expert Syst. J. Knowl. Eng.},
  volume       = {31},
  number       = {4},
  pages        = {299--318},
  year         = {2014},
  url          = {https://doi.org/10.1111/exsy.12039},
  doi          = {10.1111/EXSY.12039},
  timestamp    = {Tue, 26 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/es/HolmSEH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SommestadHLB14,
  author       = {Teodor Sommestad and
                  Jonas Hallberg and
                  Kristoffer Lundholm and
                  Johan E. Bengtsson},
  title        = {Variables influencing information security policy compliance: {A}
                  systematic review of quantitative studies},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {42--75},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-08-2012-0045},
  doi          = {10.1108/IMCS-08-2012-0045},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/SommestadHLB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/KormanSHBE14,
  author       = {Matus Korman and
                  Teodor Sommestad and
                  Jonas Hallberg and
                  Johan E. Bengtsson and
                  Mathias Ekstedt},
  editor       = {Manfred Reichert and
                  Stefanie Rinderle{-}Ma and
                  Georg Grossmann},
  title        = {Overview of Enterprise Information Needs in Information Security Risk
                  Assessment},
  booktitle    = {18th {IEEE} International Enterprise Distributed Object Computing
                  Conference, {EDOC} 2014, Ulm, Germany, September 1-5, 2014},
  pages        = {42--51},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/EDOC.2014.16},
  doi          = {10.1109/EDOC.2014.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edoc/KormanSHBE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SommestadH13,
  author       = {Teodor Sommestad and
                  Amund Hunstad},
  title        = {Intrusion detection and the role of the system administrator},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {1},
  pages        = {30--40},
  year         = {2013},
  url          = {https://doi.org/10.1108/09685221311314400},
  doi          = {10.1108/09685221311314400},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SommestadH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/SommestadEH13,
  author       = {Teodor Sommestad and
                  Mathias Ekstedt and
                  Hannes Holm},
  title        = {The Cyber Security Modeling Language: {A} Tool for Assessing the Vulnerability
                  of Enterprise System Architectures},
  journal      = {{IEEE} Syst. J.},
  volume       = {7},
  number       = {3},
  pages        = {363--373},
  year         = {2013},
  url          = {https://doi.org/10.1109/JSYST.2012.2221853},
  doi          = {10.1109/JSYST.2012.2221853},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/SommestadEH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/HolmES13,
  author       = {Hannes Holm and
                  Mathias Ekstedt and
                  Teodor Sommestad},
  title        = {Effort Estimates on Web Application Vulnerability Discovery},
  booktitle    = {46th Hawaii International Conference on System Sciences, {HICSS} 2013,
                  Wailea, HI, USA, January 7-10, 2013},
  pages        = {5029--5038},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/HICSS.2013.190},
  doi          = {10.1109/HICSS.2013.190},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/HolmES13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/SommestadH13,
  author       = {Teodor Sommestad and
                  Jonas Hallberg},
  editor       = {Lech J. Janczewski and
                  Henry B. Wolfe and
                  Sujeet Shenoi},
  title        = {A Review of the Theory of Planned Behaviour in the Context of Information
                  Security Policy Compliance},
  booktitle    = {Security and Privacy Protection in Information Processing Systems
                  - 28th {IFIP} {TC} 11 International Conference, {SEC} 2013, Auckland,
                  New Zealand, July 8-10, 2013. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {405},
  pages        = {257--271},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39218-4\_20},
  doi          = {10.1007/978-3-642-39218-4\_20},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/SommestadH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SommestadHE12,
  author       = {Teodor Sommestad and
                  Hannes Holm and
                  Mathias Ekstedt},
  title        = {Estimates of success rates of remote arbitrary code execution attacks},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {107--122},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211235625},
  doi          = {10.1108/09685221211235625},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SommestadHE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/HolmSFE12,
  author       = {Hannes Holm and
                  Teodor Sommestad and
                  Ulrik Franke and
                  Mathias Ekstedt},
  title        = {Success Rate of Remote Code Execution Attacks - Expert Assessments
                  and Observations},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {18},
  number       = {6},
  pages        = {732--749},
  year         = {2012},
  url          = {https://doi.org/10.3217/jucs-018-06-0732},
  doi          = {10.3217/JUCS-018-06-0732},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/HolmSFE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haisa/SommestadH12,
  author       = {Teodor Sommestad and
                  Amund Hunstad},
  editor       = {Nathan L. Clarke and
                  Steven Furnell},
  title        = {Intrusion detection and the role of the system administrator},
  booktitle    = {6th International Symposium on Human Aspects of Information Security
                  and Assurance, {HAISA} 2012, Crete, Greece, June 6-8, 2012. Proceedings},
  pages        = {129--138},
  publisher    = {University of Plymouth},
  year         = {2012},
  url          = {http://www.cscan.org/openaccess/?paperid=26},
  timestamp    = {Tue, 06 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/haisa/SommestadH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/SommestadHE12,
  author       = {Teodor Sommestad and
                  Hannes Holm and
                  Mathias Ekstedt},
  title        = {Effort Estimates for Vulnerability Discovery Projects},
  booktitle    = {45th Hawaii International International Conference on Systems Science
                  {(HICSS-45} 2012), Proceedings, 4-7 January 2012, Grand Wailea, Maui,
                  HI, {USA}},
  pages        = {5564--5573},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/HICSS.2012.238},
  doi          = {10.1109/HICSS.2012.238},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/SommestadHE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/SommestadH12,
  author       = {Teodor Sommestad and
                  Jonas Hallberg},
  editor       = {Audun J{\o}sang and
                  Bengt Carlsson},
  title        = {Cyber Security Exercises and Competitions as a Platform for Cyber
                  Security Experiments},
  booktitle    = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona,
                  Sweden, October 31 - November 2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7617},
  pages        = {47--60},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34210-3\_4},
  doi          = {10.1007/978-3-642-34210-3\_4},
  timestamp    = {Sat, 19 Oct 2019 20:02:02 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/SommestadH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SommestadEHA11,
  author       = {Teodor Sommestad and
                  Mathias Ekstedt and
                  Hannes Holm and
                  Muhammad Afzal},
  title        = {Security mistakes in information system deployment projects},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {80--94},
  year         = {2011},
  url          = {https://doi.org/10.1108/09685221111143033},
  doi          = {10.1108/09685221111143033},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SommestadEHA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HolmSAP11,
  author       = {Hannes Holm and
                  Teodor Sommestad and
                  Jonas Almroth and
                  Mats Persson},
  title        = {A quantitative evaluation of vulnerability scanning},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {231--247},
  year         = {2011},
  url          = {https://doi.org/10.1108/09685221111173058},
  doi          = {10.1108/09685221111173058},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HolmSAP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/BuschleHSES11a,
  author       = {Markus Buschle and
                  Hannes Holm and
                  Teodor Sommestad and
                  Mathias Ekstedt and
                  Khurram Shahzad},
  editor       = {Selmin Nurcan},
  title        = {A Tool for Automatic Enterprise Architecture Modeling},
  booktitle    = {{IS} Olympics: Information Systems in a Diverse World - CAiSE Forum
                  2011, London, UK, June 20-24, 2011, Selected Extended Papers},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {107},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29749-6\_1},
  doi          = {10.1007/978-3-642-29749-6\_1},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/caise/BuschleHSES11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/BuschleHSES11,
  author       = {Markus Buschle and
                  Hannes Holm and
                  Teodor Sommestad and
                  Mathias Ekstedt and
                  Khurram Shahzad},
  editor       = {Selmin Nurcan},
  title        = {A Tool for Automatic Enterprise Architecture Modeling},
  booktitle    = {Proceedings of the CAiSE Forum 2011, London, UK, June 22-24, 2011},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {734},
  pages        = {25--32},
  publisher    = {CEUR-WS.org},
  year         = {2011},
  url          = {https://ceur-ws.org/Vol-734/PaperDemo04.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:34 +0100},
  biburl       = {https://dblp.org/rec/conf/caise/BuschleHSES11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/LagerstromSBE11,
  author       = {Robert Lagerstr{\"{o}}m and
                  Teodor Sommestad and
                  Markus Buschle and
                  Mathias Ekstedt},
  title        = {Enterprise Architecture Management's Impact on Information Technology
                  Success},
  booktitle    = {44th Hawaii International International Conference on Systems Science
                  {(HICSS-44} 2011), Proceedings, 4-7 January 2011, Koloa, Kauai, HI,
                  {USA}},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/HICSS.2011.187},
  doi          = {10.1109/HICSS.2011.187},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/LagerstromSBE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sis/HolmSFE11,
  author       = {Hannes Holm and
                  Teodor Sommestad and
                  Ulrik Franke and
                  Mathias Ekstedt},
  editor       = {David Garcia Rosado and
                  Luis Enrique S{\'{a}}nchez and
                  Jan J{\"{u}}rjens},
  title        = {Expert Assessment on the Probability of Successful Remote Code Execution
                  Attacks},
  booktitle    = {{WOSIS} 2011 - Proceedings of the 8th International Workshop on Security
                  in Information Systems, In conjunction with {ICEIS} 2011, Beijing,
                  China, 8-9 June, 2011},
  pages        = {49--58},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Mon, 08 Apr 2024 20:41:57 +0200},
  biburl       = {https://dblp.org/rec/conf/sis/HolmSFE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SommestadHE11,
  author       = {Teodor Sommestad and
                  Hannes Holm and
                  Mathias Ekstedt},
  title        = {Estimates of Success Rates of Denial-of-Service Attacks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {21--28},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.7},
  doi          = {10.1109/TRUSTCOM.2011.7},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SommestadHE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SommestadEJ10,
  author       = {Teodor Sommestad and
                  Mathias Ekstedt and
                  Pontus Johnson},
  title        = {A probabilistic relational model for security risk analysis},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {6},
  pages        = {659--679},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.02.002},
  doi          = {10.1016/J.COSE.2010.02.002},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SommestadEJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijstm/SommestadL10,
  author       = {Teodor Sommestad and
                  Joakim Lilliesk{\"{o}}ld},
  title        = {Development of an effort estimation model - a case study on delivery
                  projects at a leading {IT} provider within the electric utility industry},
  journal      = {Int. J. Serv. Technol. Manag.},
  volume       = {13},
  number       = {1/2},
  pages        = {152--169},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSTM.2010.029675},
  doi          = {10.1504/IJSTM.2010.029675},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijstm/SommestadL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/BuschleUFLS10,
  author       = {Markus Buschle and
                  Johan Ullberg and
                  Ulrik Franke and
                  Robert Lagerstr{\"{o}}m and
                  Teodor Sommestad},
  editor       = {Pnina Soffer and
                  Erik Proper},
  title        = {A Tool for Enterprise Architecture Analysis Using the {PRM} Formalism},
  booktitle    = {Information Systems Evolution - CAiSE Forum 2010, Hammamet, Tunisia,
                  June 7-9, 2010, Selected Extended Papers},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {72},
  pages        = {108--121},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17722-4\_8},
  doi          = {10.1007/978-3-642-17722-4\_8},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/caise/BuschleUFLS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/BuschleUFLS10a,
  author       = {Markus Buschle and
                  Johan Ullberg and
                  Ulrik Franke and
                  Robert Lagerstr{\"{o}}m and
                  Teodor Sommestad},
  editor       = {Pnina Soffer and
                  Erik Proper},
  title        = {A Tool for Enterprise Architecture Analysis using the {PRM} formalism},
  booktitle    = {Proceedings of the CAiSE Forum 2010, Hammamet, Tunisia, June 9-11,
                  2010},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {592},
  publisher    = {CEUR-WS.org},
  year         = {2010},
  url          = {https://ceur-ws.org/Vol-592/PaperDemo11.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:35 +0100},
  biburl       = {https://dblp.org/rec/conf/caise/BuschleUFLS10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/BucklFHMSSU09,
  author       = {Sabine Buckl and
                  Ulrik Franke and
                  Oliver Holschke and
                  Florian Matthes and
                  Christian M. Schweda and
                  Teodor Sommestad and
                  Johan Ullberg},
  editor       = {Robert C. Nickerson and
                  Ramesh Sharda},
  title        = {A Pattern-based Approach to Quantitative Enterprise Architecture Analysis},
  booktitle    = {Proceedings of the 15th Americas Conference on Information Systems,
                  {AMCIS} 2009, San Francisco, California, USA, August 6-9, 2009},
  pages        = {318},
  publisher    = {Association for Information Systems},
  year         = {2009},
  url          = {http://aisel.aisnet.org/amcis2009/318},
  timestamp    = {Mon, 02 Jan 2012 19:01:22 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/BucklFHMSSU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csmr/EkstedtFJLSUB09,
  author       = {Mathias Ekstedt and
                  Ulrik Franke and
                  Pontus Johnson and
                  Robert Lagerstr{\"{o}}m and
                  Teodor Sommestad and
                  Johan Ullberg and
                  Markus Buschle},
  editor       = {Andreas Winter and
                  Rudolf Ferenc and
                  Jens Knodel},
  title        = {A Tool for Enterprise Architecture Analysis of Maintainability},
  booktitle    = {13th European Conference on Software Maintenance and Reengineering,
                  {CSMR} 2009, Architecture-Centric Maintenance of Large-SCale Software
                  Systems, Kaiserslautern, Germany, 24-27 March 2009},
  pages        = {327--328},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSMR.2009.44},
  doi          = {10.1109/CSMR.2009.44},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csmr/EkstedtFJLSUB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/FrankeUSLJ09,
  author       = {Ulrik Franke and
                  Johan Ullberg and
                  Teodor Sommestad and
                  Robert Lagerstr{\"{o}}m and
                  Pontus Johnson},
  title        = {Decision support oriented Enterprise Architecture metamodel management
                  using classification trees},
  booktitle    = {Workshops Proceedings of the 12th {IEEE} International Enterprise
                  Distributed Object Computing Conference, EDOCw 2009, 1-4 September
                  2009, Auckland, New Zealand},
  pages        = {328--335},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/EDOCW.2009.5331975},
  doi          = {10.1109/EDOCW.2009.5331975},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/edoc/FrankeUSLJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/SommestadEJ09,
  author       = {Teodor Sommestad and
                  Mathias Ekstedt and
                  Pontus Johnson},
  title        = {Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural
                  Models},
  booktitle    = {42st Hawaii International International Conference on Systems Science
                  {(HICSS-42} 2009), Proceedings {(CD-ROM} and online), 5-8 January
                  2009, Waikoloa, Big Island, HI, {USA}},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/HICSS.2009.141},
  doi          = {10.1109/HICSS.2009.141},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/SommestadEJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/SommestadEJ08,
  author       = {Teodor Sommestad and
                  Mathias Ekstedt and
                  Pontus Johnson},
  title        = {Combining Defense Graphs and Enterprise Architecture Models for Security
                  Analysis},
  booktitle    = {12th International {IEEE} Enterprise Distributed Object Computing
                  Conference, {ECOC} 2008, 15-19 September 2008, Munich, Germany},
  pages        = {349--355},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/EDOC.2008.37},
  doi          = {10.1109/EDOC.2008.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edoc/SommestadEJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/LiSHL08,
  author       = {Jianxin Li and
                  Teodor Sommestad and
                  Patrick C. K. Hung and
                  Xiang Li},
  title        = {Web Service-Based Business Process Development, Threat Modeling and
                  Security Assessment Tool},
  booktitle    = {2008 {IEEE} International Conference on Web Services {(ICWS} 2008),
                  September 23-26, 2008, Beijing, China},
  pages        = {13},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICWS.2008.150},
  doi          = {10.1109/ICWS.2008.150},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icws/LiSHL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/XiaofengSFH08,
  author       = {Xiaofeng Yu and
                  Teodor Sommestad and
                  Casey K. Fung and
                  Patrick C. K. Hung},
  title        = {Emergency Response Framework for Aviation {XML} Services on {MANET}},
  booktitle    = {2008 {IEEE} International Conference on Web Services {(ICWS} 2008),
                  September 23-26, 2008, Beijing, China},
  pages        = {304--311},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICWS.2008.24},
  doi          = {10.1109/ICWS.2008.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icws/XiaofengSFH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/services/LiSHL08,
  author       = {Jianxin Li and
                  Teodor Sommestad and
                  Patrick C. K. Hung and
                  Xiang Li},
  title        = {Web Service-Based Business Process Development, Threat Modeling and
                  Security Assessment Tool},
  booktitle    = {2008 {IEEE} World Congress on Services, {SERVICES} II, Beijing, China,
                  September 23-26, 2008},
  pages        = {16--17},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SERVICES-2.2008.56},
  doi          = {10.1109/SERVICES-2.2008.56},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/services/LiSHL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/JohnsonJSU07,
  author       = {Pontus Johnson and
                  Erik Johansson and
                  Teodor Sommestad and
                  Johan Ullberg},
  title        = {A Tool for Enterprise Architecture Analysis},
  booktitle    = {11th {IEEE} International Enterprise Distributed Object Computing
                  Conference {(EDOC} 2007), 15-19 October 2007, Annapolis, Maryland,
                  {USA}},
  pages        = {142--156},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/EDOC.2007.25},
  doi          = {10.1109/EDOC.2007.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edoc/JohnsonJSU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics