Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Teodor Sommestad
@inproceedings{DBLP:conf/IEEEares/KarlzenS23, author = {Henrik Karlz{\'{e}}n and Teodor Sommestad}, title = {Automatic incident response solutions: a review of proposed solutions' input and output}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {37:1--37:9}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3605066}, doi = {10.1145/3600160.3605066}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KarlzenS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SommestadKKG23, author = {Teodor Sommestad and Henrik Karlz{\'{e}}n and Hanna Kvist and Hanna Gustafsson}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Costas Lambrinoudakis and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Pantaleone Nespoli and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis}, title = {Skade - {A} Challenge Management System for Cyber Threat Hunting}, booktitle = {Computer Security. {ESORICS} 2023 International Workshops - CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14398}, pages = {84--103}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-54204-6\_5}, doi = {10.1007/978-3-031-54204-6\_5}, timestamp = {Mon, 11 Mar 2024 15:20:44 +0100}, biburl = {https://dblp.org/rec/conf/esorics/SommestadKKG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/23/VargaSB23, author = {Stefan Varga and Teodor Sommestad and Joel Brynielsson}, editor = {Tuomo Sipola and Tero Kokkonen and Mika Karjalainen}, title = {Automation of Cybersecurity Work}, booktitle = {Artificial Intelligence and Cybersecurity: Theory and Applications}, pages = {67--101}, publisher = {Springer International Publishing}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-15030-2\_4}, doi = {10.1007/978-3-031-15030-2\_4}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/23/VargaSB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SommestadHS22, author = {Teodor Sommestad and Hannes Holm and Daniel Steinvall}, title = {Variables influencing the effectiveness of signature-based network intrusion detection systems}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {6}, pages = {711--728}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1975853}, doi = {10.1080/19393555.2021.1975853}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/SommestadHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/LeitnerS20, author = {Maria Leitner and Teodor Sommestad}, title = {International Workshop on Cyber Range Technologies and Applications {(CACOE} 2020)}, booktitle = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2020, Genoa, Italy, September 7-11, 2020}, pages = {1}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSPW51379.2020.00009}, doi = {10.1109/EUROSPW51379.2020.00009}, timestamp = {Thu, 29 Oct 2020 11:34:40 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/LeitnerS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/SommestadKH19, author = {Teodor Sommestad and Henrik Karlz{\'{e}}n and Jonas Hallberg}, title = {The Theory of Planned Behavior and Information Security Policy Compliance}, journal = {J. Comput. Inf. Syst.}, volume = {59}, number = {4}, pages = {344--353}, year = {2019}, url = {https://doi.org/10.1080/08874417.2017.1368421}, doi = {10.1080/08874417.2017.1368421}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/SommestadKH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/SommestadK19, author = {Teodor Sommestad and Henrik Karlz{\'{e}}n}, title = {A meta-analysis of field experiments on phishing susceptibility}, booktitle = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh, PA, USA, November 13-15, 2019}, pages = {1--14}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/eCrime47957.2019.9037502}, doi = {10.1109/ECRIME47957.2019.9037502}, timestamp = {Mon, 23 Mar 2020 18:24:06 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/SommestadK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Sommestad18, author = {Teodor Sommestad}, title = {Work-related groups and information security policy compliance}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {5}, pages = {533--550}, year = {2018}, url = {https://doi.org/10.1108/ICS-08-2017-0054}, doi = {10.1108/ICS-08-2017-0054}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/Sommestad18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/LifSG18, author = {Patrik Lif and Teodor Sommestad and Dennis Gran{\aa}sen}, title = {Development and evaluation of information elements for simplified cyber-incident reports}, booktitle = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, pages = {1--10}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSA.2018.8551402}, doi = {10.1109/CYBERSA.2018.8551402}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/LifSG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HolmS17, author = {Hannes Holm and Teodor Sommestad}, title = {So long, and thanks for only using readily available scripts}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {1}, pages = {47--61}, year = {2017}, url = {https://doi.org/10.1108/ICS-08-2016-0069}, doi = {10.1108/ICS-08-2016-0069}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HolmS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SommestadH17, author = {Teodor Sommestad and Hannes Holm}, title = {Alert verification through alert correlation - An empirical test of SnIPS}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {26}, number = {1}, pages = {39--48}, year = {2017}, url = {https://doi.org/10.1080/19393555.2016.1272727}, doi = {10.1080/19393555.2016.1272727}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/SommestadH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/LifGS17, author = {Patrik Lif and Magdalena Gran{\aa}sen and Teodor Sommestad}, title = {Development and validation of technique to measure cyber situation awareness}, booktitle = {2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), London, United Kingdom, June 19-20, 2017}, pages = {1--8}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CyberSA.2017.8073388}, doi = {10.1109/CYBERSA.2017.8073388}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/LifGS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SommestadKNH16, author = {Teodor Sommestad and Henrik Karlz{\'{e}}n and Peter Nilsson and Jonas Hallberg}, title = {An empirical test of the perceived relationship between risk and the constituents severity and probability}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {2}, pages = {194--204}, year = {2016}, url = {https://doi.org/10.1108/ICS-01-2016-0004}, doi = {10.1108/ICS-01-2016-0004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SommestadKNH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/HolmS16, author = {Hannes Holm and Teodor Sommestad}, editor = {Jerry Brand and Matthew C. Valenti and Akinwale Akinpelu and Bharat T. Doshi and Bonnie L. Gorsic}, title = {{SVED:} Scanning, Vulnerabilities, Exploits and Detection}, booktitle = {2016 {IEEE} Military Communications Conference, {MILCOM} 2016, Baltimore, MD, USA, November 1-3, 2016}, pages = {976--981}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/MILCOM.2016.7795457}, doi = {10.1109/MILCOM.2016.7795457}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/milcom/HolmS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/SommestadKH15, author = {Teodor Sommestad and Henrik Karlz{\'{e}}n and Jonas Hallberg}, title = {A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour}, journal = {Int. J. Inf. Secur. Priv.}, volume = {9}, number = {1}, pages = {26--46}, year = {2015}, url = {https://doi.org/10.4018/IJISP.2015010102}, doi = {10.4018/IJISP.2015010102}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/SommestadKH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SommestadKH15, author = {Teodor Sommestad and Henrik Karlz{\'{e}}n and Jonas Hallberg}, title = {The sufficiency of the theory of planned behavior for explaining information security policy compliance}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {2}, pages = {200--217}, year = {2015}, url = {https://doi.org/10.1108/ICS-04-2014-0025}, doi = {10.1108/ICS-04-2014-0025}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/SommestadKH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SommestadS15, author = {Teodor Sommestad and Fredrik Sandstr{\"{o}}m}, title = {An empirical test of the accuracy of an attack graph analysis tool}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {5}, pages = {516--531}, year = {2015}, url = {https://doi.org/10.1108/ICS-06-2014-0036}, doi = {10.1108/ICS-06-2014-0036}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SommestadS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SommestadF15, author = {Teodor Sommestad and Ulrik Franke}, title = {A test of intrusion alert filtering based on network information}, journal = {Secur. Commun. Networks}, volume = {8}, number = {13}, pages = {2291--2301}, year = {2015}, url = {https://doi.org/10.1002/sec.1173}, doi = {10.1002/SEC.1173}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SommestadF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haisa/SommestadKNH15, author = {Teodor Sommestad and Henrik Karlz{\'{e}}n and Peter Nilsson and Jonas Hallberg}, editor = {Steven Furnell and Nathan L. Clarke}, title = {Perceived Information Security Risk as a Function of Probability and Severity}, booktitle = {Ninth International Symposium on Human Aspects of Information Security {\&} Assurance, {HAISA} 2015 ,Lesvos, Greece, July 1-3, 2015, Proceedings}, pages = {183--193}, publisher = {University of Plymouth}, year = {2015}, url = {http://www.cscan.org/openaccess/?paperid=269}, timestamp = {Tue, 06 Jul 2021 12:22:17 +0200}, biburl = {https://dblp.org/rec/conf/haisa/SommestadKNH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haisa/LifS15, author = {Patrik Lif and Teodor Sommestad}, editor = {Steven Furnell and Nathan L. Clarke}, title = {Human factors related to the performance of intrusion detection operators}, booktitle = {Ninth International Symposium on Human Aspects of Information Security {\&} Assurance, {HAISA} 2015 ,Lesvos, Greece, July 1-3, 2015, Proceedings}, pages = {265--275}, publisher = {University of Plymouth}, year = {2015}, url = {http://www.cscan.org/openaccess/?paperid=276}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/haisa/LifS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/HolmSB15, author = {Hannes Holm and Teodor Sommestad and Johan E. Bengtsson}, editor = {Didar Zowghi and Vincenzo Gervasi and Daniel Amyot}, title = {Requirements engineering: The quest for the dependent variable}, booktitle = {23rd {IEEE} International Requirements Engineering Conference, {RE} 2015, Ottawa, ON, Canada, August 24-28, 2015}, pages = {16--25}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/RE.2015.7320404}, doi = {10.1109/RE.2015.7320404}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/HolmSB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Sommestad15, author = {Teodor Sommestad}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Social Groupings and Information Security Obedience Within Organizations}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {325--338}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_22}, doi = {10.1007/978-3-319-18467-8\_22}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/Sommestad15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/es/HolmSEH14, author = {Hannes Holm and Teodor Sommestad and Mathias Ekstedt and Nicholas Honeth}, title = {Indicators of expert judgement and their significance: an empirical investigation in the area of cyber security}, journal = {Expert Syst. J. Knowl. Eng.}, volume = {31}, number = {4}, pages = {299--318}, year = {2014}, url = {https://doi.org/10.1111/exsy.12039}, doi = {10.1111/EXSY.12039}, timestamp = {Tue, 26 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/es/HolmSEH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SommestadHLB14, author = {Teodor Sommestad and Jonas Hallberg and Kristoffer Lundholm and Johan E. Bengtsson}, title = {Variables influencing information security policy compliance: {A} systematic review of quantitative studies}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {1}, pages = {42--75}, year = {2014}, url = {https://doi.org/10.1108/IMCS-08-2012-0045}, doi = {10.1108/IMCS-08-2012-0045}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/SommestadHLB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edoc/KormanSHBE14, author = {Matus Korman and Teodor Sommestad and Jonas Hallberg and Johan E. Bengtsson and Mathias Ekstedt}, editor = {Manfred Reichert and Stefanie Rinderle{-}Ma and Georg Grossmann}, title = {Overview of Enterprise Information Needs in Information Security Risk Assessment}, booktitle = {18th {IEEE} International Enterprise Distributed Object Computing Conference, {EDOC} 2014, Ulm, Germany, September 1-5, 2014}, pages = {42--51}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/EDOC.2014.16}, doi = {10.1109/EDOC.2014.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edoc/KormanSHBE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SommestadH13, author = {Teodor Sommestad and Amund Hunstad}, title = {Intrusion detection and the role of the system administrator}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {1}, pages = {30--40}, year = {2013}, url = {https://doi.org/10.1108/09685221311314400}, doi = {10.1108/09685221311314400}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SommestadH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/SommestadEH13, author = {Teodor Sommestad and Mathias Ekstedt and Hannes Holm}, title = {The Cyber Security Modeling Language: {A} Tool for Assessing the Vulnerability of Enterprise System Architectures}, journal = {{IEEE} Syst. J.}, volume = {7}, number = {3}, pages = {363--373}, year = {2013}, url = {https://doi.org/10.1109/JSYST.2012.2221853}, doi = {10.1109/JSYST.2012.2221853}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/SommestadEH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/HolmES13, author = {Hannes Holm and Mathias Ekstedt and Teodor Sommestad}, title = {Effort Estimates on Web Application Vulnerability Discovery}, booktitle = {46th Hawaii International Conference on System Sciences, {HICSS} 2013, Wailea, HI, USA, January 7-10, 2013}, pages = {5029--5038}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/HICSS.2013.190}, doi = {10.1109/HICSS.2013.190}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/HolmES13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/SommestadH13, author = {Teodor Sommestad and Jonas Hallberg}, editor = {Lech J. Janczewski and Henry B. Wolfe and Sujeet Shenoi}, title = {A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance}, booktitle = {Security and Privacy Protection in Information Processing Systems - 28th {IFIP} {TC} 11 International Conference, {SEC} 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {405}, pages = {257--271}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39218-4\_20}, doi = {10.1007/978-3-642-39218-4\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/SommestadH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SommestadHE12, author = {Teodor Sommestad and Hannes Holm and Mathias Ekstedt}, title = {Estimates of success rates of remote arbitrary code execution attacks}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {2}, pages = {107--122}, year = {2012}, url = {https://doi.org/10.1108/09685221211235625}, doi = {10.1108/09685221211235625}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SommestadHE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/HolmSFE12, author = {Hannes Holm and Teodor Sommestad and Ulrik Franke and Mathias Ekstedt}, title = {Success Rate of Remote Code Execution Attacks - Expert Assessments and Observations}, journal = {J. Univers. Comput. Sci.}, volume = {18}, number = {6}, pages = {732--749}, year = {2012}, url = {https://doi.org/10.3217/jucs-018-06-0732}, doi = {10.3217/JUCS-018-06-0732}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/HolmSFE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haisa/SommestadH12, author = {Teodor Sommestad and Amund Hunstad}, editor = {Nathan L. Clarke and Steven Furnell}, title = {Intrusion detection and the role of the system administrator}, booktitle = {6th International Symposium on Human Aspects of Information Security and Assurance, {HAISA} 2012, Crete, Greece, June 6-8, 2012. Proceedings}, pages = {129--138}, publisher = {University of Plymouth}, year = {2012}, url = {http://www.cscan.org/openaccess/?paperid=26}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/haisa/SommestadH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/SommestadHE12, author = {Teodor Sommestad and Hannes Holm and Mathias Ekstedt}, title = {Effort Estimates for Vulnerability Discovery Projects}, booktitle = {45th Hawaii International International Conference on Systems Science {(HICSS-45} 2012), Proceedings, 4-7 January 2012, Grand Wailea, Maui, HI, {USA}}, pages = {5564--5573}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/HICSS.2012.238}, doi = {10.1109/HICSS.2012.238}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/SommestadHE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/SommestadH12, author = {Teodor Sommestad and Jonas Hallberg}, editor = {Audun J{\o}sang and Bengt Carlsson}, title = {Cyber Security Exercises and Competitions as a Platform for Cyber Security Experiments}, booktitle = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7617}, pages = {47--60}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34210-3\_4}, doi = {10.1007/978-3-642-34210-3\_4}, timestamp = {Sat, 19 Oct 2019 20:02:02 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/SommestadH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SommestadEHA11, author = {Teodor Sommestad and Mathias Ekstedt and Hannes Holm and Muhammad Afzal}, title = {Security mistakes in information system deployment projects}, journal = {Inf. Manag. Comput. Secur.}, volume = {19}, number = {2}, pages = {80--94}, year = {2011}, url = {https://doi.org/10.1108/09685221111143033}, doi = {10.1108/09685221111143033}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SommestadEHA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HolmSAP11, author = {Hannes Holm and Teodor Sommestad and Jonas Almroth and Mats Persson}, title = {A quantitative evaluation of vulnerability scanning}, journal = {Inf. Manag. Comput. Secur.}, volume = {19}, number = {4}, pages = {231--247}, year = {2011}, url = {https://doi.org/10.1108/09685221111173058}, doi = {10.1108/09685221111173058}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HolmSAP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/BuschleHSES11a, author = {Markus Buschle and Hannes Holm and Teodor Sommestad and Mathias Ekstedt and Khurram Shahzad}, editor = {Selmin Nurcan}, title = {A Tool for Automatic Enterprise Architecture Modeling}, booktitle = {{IS} Olympics: Information Systems in a Diverse World - CAiSE Forum 2011, London, UK, June 20-24, 2011, Selected Extended Papers}, series = {Lecture Notes in Business Information Processing}, volume = {107}, pages = {1--15}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29749-6\_1}, doi = {10.1007/978-3-642-29749-6\_1}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/caise/BuschleHSES11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/BuschleHSES11, author = {Markus Buschle and Hannes Holm and Teodor Sommestad and Mathias Ekstedt and Khurram Shahzad}, editor = {Selmin Nurcan}, title = {A Tool for Automatic Enterprise Architecture Modeling}, booktitle = {Proceedings of the CAiSE Forum 2011, London, UK, June 22-24, 2011}, series = {{CEUR} Workshop Proceedings}, volume = {734}, pages = {25--32}, publisher = {CEUR-WS.org}, year = {2011}, url = {https://ceur-ws.org/Vol-734/PaperDemo04.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:34 +0100}, biburl = {https://dblp.org/rec/conf/caise/BuschleHSES11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/LagerstromSBE11, author = {Robert Lagerstr{\"{o}}m and Teodor Sommestad and Markus Buschle and Mathias Ekstedt}, title = {Enterprise Architecture Management's Impact on Information Technology Success}, booktitle = {44th Hawaii International International Conference on Systems Science {(HICSS-44} 2011), Proceedings, 4-7 January 2011, Koloa, Kauai, HI, {USA}}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/HICSS.2011.187}, doi = {10.1109/HICSS.2011.187}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/LagerstromSBE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sis/HolmSFE11, author = {Hannes Holm and Teodor Sommestad and Ulrik Franke and Mathias Ekstedt}, editor = {David Garcia Rosado and Luis Enrique S{\'{a}}nchez and Jan J{\"{u}}rjens}, title = {Expert Assessment on the Probability of Successful Remote Code Execution Attacks}, booktitle = {{WOSIS} 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with {ICEIS} 2011, Beijing, China, 8-9 June, 2011}, pages = {49--58}, publisher = {SciTePress}, year = {2011}, timestamp = {Mon, 08 Apr 2024 20:41:57 +0200}, biburl = {https://dblp.org/rec/conf/sis/HolmSFE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SommestadHE11, author = {Teodor Sommestad and Hannes Holm and Mathias Ekstedt}, title = {Estimates of Success Rates of Denial-of-Service Attacks}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {21--28}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.7}, doi = {10.1109/TRUSTCOM.2011.7}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SommestadHE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SommestadEJ10, author = {Teodor Sommestad and Mathias Ekstedt and Pontus Johnson}, title = {A probabilistic relational model for security risk analysis}, journal = {Comput. Secur.}, volume = {29}, number = {6}, pages = {659--679}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.02.002}, doi = {10.1016/J.COSE.2010.02.002}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SommestadEJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijstm/SommestadL10, author = {Teodor Sommestad and Joakim Lilliesk{\"{o}}ld}, title = {Development of an effort estimation model - a case study on delivery projects at a leading {IT} provider within the electric utility industry}, journal = {Int. J. Serv. Technol. Manag.}, volume = {13}, number = {1/2}, pages = {152--169}, year = {2010}, url = {https://doi.org/10.1504/IJSTM.2010.029675}, doi = {10.1504/IJSTM.2010.029675}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijstm/SommestadL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/BuschleUFLS10, author = {Markus Buschle and Johan Ullberg and Ulrik Franke and Robert Lagerstr{\"{o}}m and Teodor Sommestad}, editor = {Pnina Soffer and Erik Proper}, title = {A Tool for Enterprise Architecture Analysis Using the {PRM} Formalism}, booktitle = {Information Systems Evolution - CAiSE Forum 2010, Hammamet, Tunisia, June 7-9, 2010, Selected Extended Papers}, series = {Lecture Notes in Business Information Processing}, volume = {72}, pages = {108--121}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17722-4\_8}, doi = {10.1007/978-3-642-17722-4\_8}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/caise/BuschleUFLS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/BuschleUFLS10a, author = {Markus Buschle and Johan Ullberg and Ulrik Franke and Robert Lagerstr{\"{o}}m and Teodor Sommestad}, editor = {Pnina Soffer and Erik Proper}, title = {A Tool for Enterprise Architecture Analysis using the {PRM} formalism}, booktitle = {Proceedings of the CAiSE Forum 2010, Hammamet, Tunisia, June 9-11, 2010}, series = {{CEUR} Workshop Proceedings}, volume = {592}, publisher = {CEUR-WS.org}, year = {2010}, url = {https://ceur-ws.org/Vol-592/PaperDemo11.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:35 +0100}, biburl = {https://dblp.org/rec/conf/caise/BuschleUFLS10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/BucklFHMSSU09, author = {Sabine Buckl and Ulrik Franke and Oliver Holschke and Florian Matthes and Christian M. Schweda and Teodor Sommestad and Johan Ullberg}, editor = {Robert C. Nickerson and Ramesh Sharda}, title = {A Pattern-based Approach to Quantitative Enterprise Architecture Analysis}, booktitle = {Proceedings of the 15th Americas Conference on Information Systems, {AMCIS} 2009, San Francisco, California, USA, August 6-9, 2009}, pages = {318}, publisher = {Association for Information Systems}, year = {2009}, url = {http://aisel.aisnet.org/amcis2009/318}, timestamp = {Mon, 02 Jan 2012 19:01:22 +0100}, biburl = {https://dblp.org/rec/conf/amcis/BucklFHMSSU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csmr/EkstedtFJLSUB09, author = {Mathias Ekstedt and Ulrik Franke and Pontus Johnson and Robert Lagerstr{\"{o}}m and Teodor Sommestad and Johan Ullberg and Markus Buschle}, editor = {Andreas Winter and Rudolf Ferenc and Jens Knodel}, title = {A Tool for Enterprise Architecture Analysis of Maintainability}, booktitle = {13th European Conference on Software Maintenance and Reengineering, {CSMR} 2009, Architecture-Centric Maintenance of Large-SCale Software Systems, Kaiserslautern, Germany, 24-27 March 2009}, pages = {327--328}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSMR.2009.44}, doi = {10.1109/CSMR.2009.44}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csmr/EkstedtFJLSUB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edoc/FrankeUSLJ09, author = {Ulrik Franke and Johan Ullberg and Teodor Sommestad and Robert Lagerstr{\"{o}}m and Pontus Johnson}, title = {Decision support oriented Enterprise Architecture metamodel management using classification trees}, booktitle = {Workshops Proceedings of the 12th {IEEE} International Enterprise Distributed Object Computing Conference, EDOCw 2009, 1-4 September 2009, Auckland, New Zealand}, pages = {328--335}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/EDOCW.2009.5331975}, doi = {10.1109/EDOCW.2009.5331975}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/edoc/FrankeUSLJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/SommestadEJ09, author = {Teodor Sommestad and Mathias Ekstedt and Pontus Johnson}, title = {Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models}, booktitle = {42st Hawaii International International Conference on Systems Science {(HICSS-42} 2009), Proceedings {(CD-ROM} and online), 5-8 January 2009, Waikoloa, Big Island, HI, {USA}}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/HICSS.2009.141}, doi = {10.1109/HICSS.2009.141}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/SommestadEJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edoc/SommestadEJ08, author = {Teodor Sommestad and Mathias Ekstedt and Pontus Johnson}, title = {Combining Defense Graphs and Enterprise Architecture Models for Security Analysis}, booktitle = {12th International {IEEE} Enterprise Distributed Object Computing Conference, {ECOC} 2008, 15-19 September 2008, Munich, Germany}, pages = {349--355}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/EDOC.2008.37}, doi = {10.1109/EDOC.2008.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edoc/SommestadEJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/LiSHL08, author = {Jianxin Li and Teodor Sommestad and Patrick C. K. Hung and Xiang Li}, title = {Web Service-Based Business Process Development, Threat Modeling and Security Assessment Tool}, booktitle = {2008 {IEEE} International Conference on Web Services {(ICWS} 2008), September 23-26, 2008, Beijing, China}, pages = {13}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICWS.2008.150}, doi = {10.1109/ICWS.2008.150}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws/LiSHL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/XiaofengSFH08, author = {Xiaofeng Yu and Teodor Sommestad and Casey K. Fung and Patrick C. K. Hung}, title = {Emergency Response Framework for Aviation {XML} Services on {MANET}}, booktitle = {2008 {IEEE} International Conference on Web Services {(ICWS} 2008), September 23-26, 2008, Beijing, China}, pages = {304--311}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICWS.2008.24}, doi = {10.1109/ICWS.2008.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws/XiaofengSFH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/services/LiSHL08, author = {Jianxin Li and Teodor Sommestad and Patrick C. K. Hung and Xiang Li}, title = {Web Service-Based Business Process Development, Threat Modeling and Security Assessment Tool}, booktitle = {2008 {IEEE} World Congress on Services, {SERVICES} II, Beijing, China, September 23-26, 2008}, pages = {16--17}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SERVICES-2.2008.56}, doi = {10.1109/SERVICES-2.2008.56}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/services/LiSHL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edoc/JohnsonJSU07, author = {Pontus Johnson and Erik Johansson and Teodor Sommestad and Johan Ullberg}, title = {A Tool for Enterprise Architecture Analysis}, booktitle = {11th {IEEE} International Enterprise Distributed Object Computing Conference {(EDOC} 2007), 15-19 October 2007, Annapolis, Maryland, {USA}}, pages = {142--156}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/EDOC.2007.25}, doi = {10.1109/EDOC.2007.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edoc/JohnsonJSU07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.