


default search action
Mathias Ekstedt
Person information
- affiliation: KTH Royal Institute of Technology, Sweden
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j41]Sotirios Katsikeas
, Engla Rencelj Ling, Pontus Johnsson, Mathias Ekstedt
:
Empirical evaluation of a threat modeling language as a cybersecurity assessment tool. Comput. Secur. 140: 103743 (2024) - [j40]Sotirios Katsikeas
, Andrei Buhaiu, Mathias Ekstedt
, Zeeshan Afzal, Simon Hacks
, Preetam Mukherjee
:
Development and validation of coreLang: A threat modeling language for the ICT domain. Comput. Secur. 146: 104057 (2024) - [c71]Viktor Engström
, Giuseppe Nebbione
, Mathias Ekstedt
:
A Metalanguage for Dynamic Attack Graphs and Lazy Generation. ARES 2024: 31:1-31:11 - 2023
- [j39]Wojciech Widel
, Simon Hacks
, Mathias Ekstedt
, Pontus Johnson, Robert Lagerström
:
The meta attack language - a formal description. Comput. Secur. 130: 103284 (2023) - [j38]Musard Balliu
, Benoit Baudry
, Sofia Bobadilla
, Mathias Ekstedt
, Martin Monperrus
, Javier Ron Arteaga
, Aman Sharma
, Gabriel Skoglund
, César Soto-Valero
, Martin Wittlinger
:
Challenges of Producing Software Bill of Materials for Java. IEEE Secur. Priv. 21(6): 12-23 (2023) - [j37]Engla Rencelj Ling
, Mathias Ekstedt:
A threat modeling language for generating attack graphs of substation automation systems. Int. J. Crit. Infrastructure Prot. 41: 100601 (2023) - [j36]Mathias Ekstedt, Zeeshan Afzal, Preetam Mukherjee
, Simon Hacks, Robert Lagerström:
Yet another cybersecurity risk assessment framework. Int. J. Inf. Sec. 22(6): 1713-1729 (2023) - [j35]Engla Rencelj Ling
, Mathias Ekstedt:
Estimating Time-To-Compromise for Industrial Control System Attack Techniques Through Vulnerability Data. SN Comput. Sci. 4(3): 318 (2023) - [c70]Rajendra Patil, Viktoria Fodor
, Mathias Ekstedt
:
Mean Value Analysis of Critical Attack Paths with Multiple Parameters. NordSec 2023: 126-143 - [c69]Musard Balliu
, Benoit Baudry
, Sofia Bobadilla
, Mathias Ekstedt
, Martin Monperrus
, Javier Ron
, Aman Sharma
, Gabriel Skoglund
, César Soto-Valero
, Martin Wittlinger
:
Software Bill of Materials in Java. SCORED@CCS 2023: 75-76 - [i5]Musard Balliu, Benoit Baudry, Sofia Bobadilla, Mathias Ekstedt, Martin Monperrus, Javier Ron, Aman Sharma, Gabriel Skoglund, César Soto-Valero, Martin Wittlinger:
Challenges of Producing Software Bill Of Materials for Java. CoRR abs/2303.11102 (2023) - [i4]Pontus Johnson, Mathias Ekstedt:
Towards a Graph Neural Network-Based Approach for Estimating Hidden States in Cyber Attack Simulations. CoRR abs/2312.05666 (2023) - 2022
- [j34]Wojciech Widel
, Preetam Mukherjee
, Mathias Ekstedt
:
Security Countermeasures Selection Using the Meta Attack Language and Probabilistic Attack Graphs. IEEE Access 10: 89645-89662 (2022) - [c68]Engla Rencelj Ling
, Mathias Ekstedt:
Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities. ICISSP 2022: 96-107 - [c67]Per Fahlander, Mathias Ekstedt, Preetam Mukherjee
, Ashish Kumar Dwivedi:
Containment Strategy Formalism in a Probabilistic Threat Modelling Framework. ICISSP 2022: 108-120 - [c66]Oliver Kraft
, Oliver Pohl
, Ulf Häger
, Kai Heussen, Nils Müller
, Zeeshan Afzal
, Mathias Ekstedt, Hossein Farahmand, Dmytro Ivanko, Ankit Singh, Sasiphong Leksawat, Andreas Kubis:
Development and Implementation of a Holistic Flexibility Market Architecture. ISGT 2022: 1-5 - 2021
- [j33]Sotirios Katsikeas
, Pontus Johnson, Mathias Ekstedt
, Robert Lagerström
:
Research communities in cyber security: A comprehensive literature review. Comput. Sci. Rev. 42: 100431 (2021) - [c65]Engla Rencelj Ling
, Mathias Ekstedt:
Generating Threat Models and Attack Graphs based on the IEC 61850 System Configuration description Language. SAT-CPS@CODASPY 2021: 98-103 - [c64]Andreas Gylling, Mathias Ekstedt, Zeeshan Afzal
, Per Eliasson:
Mapping Cyber Threat Intelligence to Probabilistic Attack Graphs. CSR 2021: 304-311 - [i3]Sotirios Katsikeas, Pontus Johnson, Mathias Ekstedt, Robert Lagerström:
Research Communities in cyber security: A Comprehensive Literature Review. CoRR abs/2104.13196 (2021) - [i2]Nils Müller, Zeeshan Afzal, Per Eliasson, Mathias Ekstedt, Kai Heussen:
Threat Scenarios and Monitoring Requirements for Cyber-Physical Systems of Energy Flexibility Markets. CoRR abs/2111.03300 (2021) - 2020
- [j32]Simon Hacks
, Sotirios Katsikeas, Engla Ling
, Robert Lagerström, Mathias Ekstedt:
powerLang: a probabilistic attack simulation language for the power domain. Energy Inform. 3(1) (2020) - [c63]Engla Ling
, Robert Lagerström
, Mathias Ekstedt
:
A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain. CRITIS 2020: 47-58 - [c62]Sotirios Katsikeas
, Simon Hacks
, Pontus Johnson
, Mathias Ekstedt
, Robert Lagerström
, Joar Jacobsson, Max Wällstedt, Per Eliasson:
An Attack Simulation Language for the IT Domain. GraMSec@CSF 2020: 67-86 - [c61]Robert Lagerström, Wenjun Xiong
, Mathias Ekstedt:
Threat Modeling and Attack Simulations of Smart Cities: A Literature Review and Explorative Study. ICISSP 2020: 369-376
2010 – 2019
- 2019
- [c60]Xinyue Mao, Mathias Ekstedt, Engla Ling, Erik Ringdahl, Robert Lagerström:
Conceptual Abstraction of Attack Graphs - A Use Case of securiCAD. GraMSec@CSF 2019: 186-202 - 2018
- [j31]Alexandre Vernotte
, Margus Välja, Matus Korman, Gunnar Björkman, Mathias Ekstedt, Robert Lagerström:
Load balancing of renewable energy: a cyber security analysis. Energy Inform. 1(1) (2018) - [j30]Pontus Johnson, Robert Lagerström
, Mathias Ekstedt, Ulrik Franke
:
Can the Common Vulnerability Scoring System be Trusted? A Bayesian Analysis. IEEE Trans. Dependable Secur. Comput. 15(6): 1002-1015 (2018) - [c59]Pontus Johnson, Robert Lagerström
, Mathias Ekstedt:
A Meta Language for Threat Modeling and Attack Simulations. ARES 2018: 38:1-38:8 - [c58]Asif Iqbal, Farhan Mahmood, Andrii Shalaginov, Mathias Ekstedt:
Identification of Attack-based Digital Forensic Evidences for WAMPAC Systems. IEEE BigData 2018: 3079-3087 - [c57]Magnus Almgren
, Peter Andersson, Gunnar Björkman, Mathias Ekstedt, Jonas Hallberg, Simin Nadjm-Tehrani, Erik Westring:
RICS-el: Building a National Testbed for Research and Training on SCADA Security (Short Paper). CRITIS 2018: 219-225 - [i1]Pontus Johnson, Paul Ralph, Mathias Ekstedt, Iaakov Exman, Michael Goedicke:
Consensus in Software Engineering: A Cognitive Mapping Study. CoRR abs/1802.06319 (2018) - 2017
- [j29]Robert Lagerström, Pontus Johnson, Mathias Ekstedt, Ulrik Franke, Khurram Shahzad:
Automated Probabilistic System Architecture Analysis in the Multi-Attribute Prediction Language (MAPL): Iteratively Developed using Multiple Case Studies. Complex Syst. Informatics Model. Q. 11: 38-68 (2017) - [c56]Asif Iqbal, Mathias Ekstedt, Hanan Alobaidli:
Exploratory studies into forensic logs for criminal investigation using case studies in industrial control systems in the power sector. IEEE BigData 2017: 3657-3661 - [c55]Matus Korman, Margus Välja, Gunnar Björkman, Mathias Ekstedt, Alexandre Vernotte, Robert Lagerström
:
Analyzing the Effectiveness of Attack Countermeasures in a SCADA System. SPSR-SG@CPSWeek 2017: 73-78 - [c54]Robert Lagerström
, Pontus Johnson, Mathias Ekstedt:
Automatic Design of Secure Enterprise Architecture: Work in Progress Paper. EDOC Workshops 2017: 65-70 - [c53]Alexandre Vernotte, Pontus Johnson, Mathias Ekstedt, Robert Lagerström
:
In-Depth Modeling of the UNIX Operating System for Architectural Cyber Security Analysis. EDOC Workshops 2017: 127-136 - [c52]Asif Iqbal, Mathias Ekstedt, Hanan Alobaidli:
Digital Forensic Readiness in Critical Infrastructures: A Case of Substation Automation in the Power Sector. ICDF2C 2017: 117-129 - 2016
- [j28]Waldo Rocha Flores, Mathias Ekstedt:
Shaping intention to resist social engineering through transformational leadership, information security culture and awareness. Comput. Secur. 59: 26-44 (2016) - [j27]Pontus Johnson
, Dan Gorton, Robert Lagerström
, Mathias Ekstedt:
Time between vulnerability disclosures: A measure of software product vulnerability. Comput. Secur. 62: 278-295 (2016) - [j26]Matus Korman, Robert Lagerström, Mathias Ekstedt:
Modeling Enterprise Authorization: A Unified Metamodel and Initial Validation. Complex Syst. Informatics Model. Q. 7: 1-24 (2016) - [j25]Pontus Johnson, Mathias Ekstedt:
The Tarpit - A general theory of software engineering. Inf. Softw. Technol. 70: 181-203 (2016) - [c51]Pontus Johnson, Alexandre Vernotte, Mathias Ekstedt, Robert Lagerström
:
pwnPr3d: An Attack-Graph-Driven Probabilistic Threat-Modeling Approach. ARES 2016: 278-283 - [c50]Robert Udd, Mikael Asplund, Simin Nadjm-Tehrani, Mehrdad Kazemtabrizi, Mathias Ekstedt:
Exploiting Bro for Intrusion Detection in a SCADA System. CPSS@AsiaCCS 2016: 44-51 - [c49]Pontus Johnson, Mathias Ekstedt, Robert Lagerström
:
Automatic Probabilistic Enterprise IT Architecture Modeling: A Dynamic Bayesian Networks Approach. EDOC Workshops 2016: 1-8 - [c48]Pontus Johnson, Robert Lagerström
, Mathias Ekstedt, Ulrik Franke:
Modeling and analyzing systems-of-systems in the multi-attribute prediction language (MAPL). SESoS@ICSE 2016: 1-7 - [c47]Pontus Johnson, Alexandre Vernotte, Dan Gorton, Mathias Ekstedt, Robert Lagerström
:
Quantitative Information Security Risk Estimation Using Probabilistic Attack Graphs. RISK 2016: 37-52 - [e2]Barbara Kordy, Mathias Ekstedt, Dong Seong Kim:
Graphical Models for Security - Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers. Lecture Notes in Computer Science 9987, Springer 2016, ISBN 978-3-319-46262-2 [contents] - 2015
- [j24]Waldo Rocha Flores, Hannes Holm, Marcus Nohlberg, Mathias Ekstedt:
Investigating personal determinants of phishing and the effect of national culture. Inf. Comput. Secur. 23(2): 178-199 (2015) - [j23]Hannes Holm, Matus Korman, Mathias Ekstedt:
A Bayesian network model for likelihood estimations of acquirement of critical software vulnerabilities and exploits. Inf. Softw. Technol. 58: 304-318 (2015) - [j22]Pontus Johnson, Mathias Ekstedt, Michael Goedicke, Ivar Jacobson:
Towards general theories of software engineering. Sci. Comput. Program. 101: 1-5 (2015) - [j21]Hannes Holm, Khurram Shahzad, Markus Buschle, Mathias Ekstedt:
P2CySeMoL: Predictive, Probabilistic Cyber Security Modeling Language. IEEE Trans. Dependable Secur. Comput. 12(6): 626-639 (2015) - [c46]Margus Välja, Robert Lagerström
, Mathias Ekstedt, Matus Korman:
A Requirements Based Approach for Automating Enterprise IT Architecture Modeling Using Multiple Data Sources. EDOC Workshops 2015: 79-87 - [c45]Mathias Ekstedt, Pontus Johnson, Robert Lagerström
, Dan Gorton, Joakim Nydren, Khurram Shahzad:
Securi CAD by Foreseeti: A CAD Tool for Enterprise Cyber Security Management. EDOC Workshops 2015: 152-155 - [c44]Waldo Rocha Flores, Mathias Ekstedt:
Exploring the Link Between Behavioural Information Security Governance and Employee Information Security Awareness. HAISA 2015: 82-94 - [c43]Waldo Rocha Flores, Hannes Holm, Mathias Ekstedt, Marcus Nohlberg:
Investigating the Correlation between Intention and Action in the Context of Social Engineering in Two Different National Cultures. HICSS 2015: 3508-3517 - [c42]Pontus Johnson, Mathias Ekstedt:
Exploring Theory of Cognition for General Theory of Software Engineering. GTSE@ICSE 2015: 15-24 - [c41]Robert Lagerström
, Pontus Johnson, Mathias Ekstedt:
Search-Based Design of Large Software Systems-of-Systems. SESoS@ICSE 2015: 44-47 - [c40]Matus Korman, Robert Lagerström, Mathias Ekstedt:
Modeling Authorization in Enterprise-wide Contexts. PoEM (Short Papers) 2015: 81-90 - 2014
- [j20]Waldo Rocha Flores, Egil Antonsen, Mathias Ekstedt:
Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture. Comput. Secur. 43: 90-110 (2014) - [j19]Per Närman, Ulrik Franke
, Johan König, Markus Buschle, Mathias Ekstedt:
Enterprise architecture availability analysis using fault trees and stakeholder interviews. Enterp. Inf. Syst. 8(1): 1-25 (2014) - [j18]Hannes Holm, Teodor Sommestad, Mathias Ekstedt, Nicholas Honeth
:
Indicators of expert judgement and their significance: an empirical investigation in the area of cyber security. Expert Syst. J. Knowl. Eng. 31(4): 299-318 (2014) - [j17]Hannes Holm, Markus Buschle, Robert Lagerström
, Mathias Ekstedt:
Automatic data collection for enterprise architecture models. Softw. Syst. Model. 13(2): 825-841 (2014) - [j16]Per Närman, Markus Buschle, Mathias Ekstedt:
An enterprise architecture framework for multi-attribute information systems analysis. Softw. Syst. Model. 13(3): 1085-1116 (2014) - [c39]Matus Korman, Teodor Sommestad, Jonas Hallberg, Johan E. Bengtsson, Mathias Ekstedt:
Overview of Enterprise Information Needs in Information Security Risk Assessment. EDOC 2014: 42-51 - [c38]Hannes Holm, Waldo Rocha Flores, Marcus Nohlberg, Mathias Ekstedt:
An Empirical Investigation of the Effect of Target-Related Information in Phishing Attacks. EDOC Workshops 2014: 357-363 - [c37]Robert Lagerström
, Mathias Ekstedt:
Extending a general theory of software to engineering. GTSE 2014: 36-39 - 2013
- [j15]Hannes Holm, Mathias Ekstedt:
Estimates on the effectiveness of web application firewalls against targeted attacks. Inf. Manag. Comput. Secur. 21(4): 250-265 (2013) - [j14]Per Närman, Hannes Holm, Mathias Ekstedt, Nicholas Honeth
:
Using enterprise architecture analysis and interview data to estimate service response time. J. Strateg. Inf. Syst. 22(1): 70-85 (2013) - [j13]Teodor Sommestad, Mathias Ekstedt, Hannes Holm:
The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures. IEEE Syst. J. 7(3): 363-373 (2013) - [c36]Waldo Rocha Flores, Mathias Ekstedt:
Countermeasures for Social Engineering-based Malware Installation Attacks. CONF-IRM 2013: 23 - [c35]João Paulo A. Almeida, Mathias Ekstedt, James Lapalme:
Message from the TEAR 2013 Workshop Chairs. EDOC Workshops 2013: 287-288 - [c34]Hannes Holm, Mathias Ekstedt, Teodor Sommestad:
Effort Estimates on Web Application Vulnerability Discovery. HICSS 2013: 5029-5038 - [c33]Mathias Ekstedt:
An empirical approach to a general theory of software (engineering). GTSE@ICSE 2013: 23-26 - 2012
- [j12]György Dán, Henrik Sandberg
, Mathias Ekstedt, Gunnar Björkman:
Challenges in Power System Information Security. IEEE Secur. Priv. 10(4): 62-70 (2012) - [j11]Teodor Sommestad, Hannes Holm, Mathias Ekstedt:
Estimates of success rates of remote arbitrary code execution attacks. Inf. Manag. Comput. Secur. 20(2): 107-122 (2012) - [j10]Hannes Holm, Teodor Sommestad, Ulrik Franke, Mathias Ekstedt:
Success Rate of Remote Code Execution Attacks - Expert Assessments and Observations. J. Univers. Comput. Sci. 18(6): 732-749 (2012) - [j9]Pontus Johnson
, Mathias Ekstedt, Ivar Jacobson:
Where's the Theory for Software Engineering? IEEE Softw. 29(5): 96 (2012) - [j8]Hannes Holm, Mathias Ekstedt, Dennis Andersson:
Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks. IEEE Trans. Dependable Secur. Comput. 9(6): 825-837 (2012) - [c32]Markus Buschle, Mathias Ekstedt, Sebastian Grunow, Matheus Hauder, Florian Matthes, Sascha Roth:
Automating Enterprise Architecture Documentation using an Enterprise Service Bus. AMCIS 2012 - [c31]Mats B.-O. Larsson, Gunnar Björkman, Mathias Ekstedt:
Assessment of Social Impact Costs and Social Impact Magnitude from Breakdowns in Critical Infrastructures. CRITIS 2012: 240-251 - [c30]Teodor Sommestad, Hannes Holm, Mathias Ekstedt:
Effort Estimates for Vulnerability Discovery Projects. HICSS 2012: 5564-5573 - [c29]Hannes Holm, Mathias Ekstedt:
A Metamodel for Web Application Injection Attacks and Countermeasures. TEAR/PRET 2012: 198-217 - [e1]Stephan Aier, Mathias Ekstedt, Florian Matthes, Erik Proper, Jorge L. C. Sanz:
Trends in Enterprise Architecture Research and Practice-Driven Research on Enterprise Transformation - 7th Workshop, TEAR 2012, and 5th Working Conference, PRET 2012, Held at The Open Group Conference 2012, Barcelona, Spain, October 23-24, 2012. Proceedings. Lecture Notes in Business Information Processing 131, Springer 2012, ISBN 978-3-642-34162-5 [contents] - 2011
- [j7]Per Närman, Hannes Holm, Pontus Johnson
, Johan König, Moustafa Chenine, Mathias Ekstedt:
Data accuracy assessment using enterprise architecture. Enterp. Inf. Syst. 5(1): 37-58 (2011) - [j6]Teodor Sommestad, Mathias Ekstedt, Hannes Holm, Muhammad Afzal:
Security mistakes in information system deployment projects. Inf. Manag. Comput. Secur. 19(2): 80-94 (2011) - [c28]Markus Buschle, Hannes Holm, Teodor Sommestad, Mathias Ekstedt, Khurram Shahzad:
A Tool for Automatic Enterprise Architecture Modeling. CAiSE Forum (Selected Papers) 2011: 1-15 - [c27]Markus Buschle, Hannes Holm, Teodor Sommestad, Mathias Ekstedt, Khurram Shahzad:
A Tool for Automatic Enterprise Architecture Modeling. CAiSE Forum 2011: 25-32 - [c26]Robert Lagerström
, Teodor Sommestad, Markus Buschle, Mathias Ekstedt:
Enterprise Architecture Management's Impact on Information Technology Success. HICSS 2011: 1-10 - [c25]Jan Saat, Robert Winter, Ulrik Franke
, Robert Lagerström
, Mathias Ekstedt:
Analysis of IT/Business Alignment Situations as a Precondition for the Design and Engineering of Situated IT/Business Alignment Solutions. HICSS 2011: 1-9 - [c24]Hannes Holm, Teodor Sommestad, Ulrik Franke, Mathias Ekstedt:
Expert Assessment on the Probability of Successful Remote Code Execution Attacks. WOSIS 2011: 49-58 - [c23]Waldo Rocha Flores, Mathias Ekstedt:
Information Security Governance Analysis Using Probabilistic Relational Models. WOSIS 2011: 142-150 - [c22]Teodor Sommestad, Hannes Holm, Mathias Ekstedt:
Estimates of Success Rates of Denial-of-Service Attacks. TrustCom 2011: 21-28 - 2010
- [j5]Teodor Sommestad, Mathias Ekstedt, Pontus Johnson
:
A probabilistic relational model for security risk analysis. Comput. Secur. 29(6): 659-679 (2010) - [j4]Magnus Gammelgård, Mathias Ekstedt, Per Närman:
A method for assessing the business value of information system scenarios with an estimated credibility of the result. Int. J. Serv. Technol. Manag. 13(1/2): 105-133 (2010) - [j3]Mårten Simonsson, Pontus Johnson
, Mathias Ekstedt:
The Effect of IT Governance Maturity on IT Governance Performance. Inf. Syst. Manag. 27(1): 10-24 (2010) - [j2]Robert Lagerström
, Pontus Johnson
, Mathias Ekstedt:
Architecture analysis of enterprise systems modifiability: a metamodel for software change cost estimation. Softw. Qual. J. 18(4): 437-468 (2010) - [c21]Jan Saat, Ulrik Franke
, Robert Lagerström
, Mathias Ekstedt:
Enterprise Architecture Meta Models for IT/Business Alignment Situations. EDOC 2010: 14-23 - [c20]Johan König, Kun Zhu, Lars Nordström
, Mathias Ekstedt, Robert Lagerström
:
Mapping the Substation Configuration Language of IEC 61850 to ArchiMate. EDOCW 2010: 60-68 - [c19]Ulrik Franke
, Mathias Ekstedt, Robert Lagerström
, Jan Saat, Robert Winter:
Trends in Enterprise Architecture Practice - A Survey. TEAR 2010: 16-29
2000 – 2009
- 2009
- [c18]Robert Lagerström
, Jan Saat, Ulrik Franke
, Stephan Aier, Mathias Ekstedt:
Enterprise Meta Modeling Methods - Combining a Stakeholder-Oriented and a Causality-Based Approach. BMMDS/EMMSAD 2009: 381-393 - [c17]Ulrik Franke
, Pontus Johnson
, Robert Lagerström
, Johan Ullberg, David Höök, Mathias Ekstedt, Johan König:
A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis. CSMR 2009: 241-246 - [c16]Mathias Ekstedt, Ulrik Franke
, Pontus Johnson
, Robert Lagerström
, Teodor Sommestad, Johan Ullberg, Markus Buschle:
A Tool for Enterprise Architecture Analysis of Maintainability. CSMR 2009: 327-328 - [c15]Per Närman, Pontus Johnson
, Mathias Ekstedt, Moustafa Chenine, Johan König:
Enterprise Architecture Analysis for Data Accuracy Assessments. EDOC 2009: 24-33 - [c14]Teodor Sommestad, Mathias Ekstedt, Pontus Johnson
:
Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models. HICSS 2009: 1-10 - [c13]Ulrik Franke
, Pontus Johnson
, Robert Lagerström
, Johan Ullberg, David Höök, Mathias Ekstedt, Johan König:
A formal method for cost and accuracy trade-off analysis in software assessment measures. RCIS 2009: 295-302 - [c12]Ulrik Franke
, David Höök, Johan König, Robert Lagerström
, Per Närman, Johan Ullberg, Pia Gustafsson, Mathias Ekstedt:
EAF2- A Framework for Categorizing Enterprise Architecture Frameworks. SNPD 2009: 327-332 - 2008
- [c11]Mårten Simonsson, Pontus Johnson
, Mathias Ekstedt:
The IT Organization Modeling and Assessment Tool for IT Governance Decision Support. CAiSE 2008: 258-261 - [c10]Per Närman, Marten Schönherr, Pontus Johnson
, Mathias Ekstedt, Moustafa Chenine:
Using Enterprise Architecture Models for System Quality Analysis. EDOC 2008: 14-23 - [c9]Johan Ullberg, Robert Lagerström
, Mathias Ekstedt:
A framework for interoperability analysis on the semantic web using architecture models. EDOCW 2008: 207-215 - [c8]Teodor Sommestad, Mathias Ekstedt, Pontus Johnson
:
Combining Defense Graphs and Enterprise Architecture Models for Security Analysis. EDOC 2008: 349-355 - [c7]Norman Vargas, Leonel Plazaola, Mathias Ekstedt:
A Consolidated Strategic Business and IT Alignment Representation: A Framework Aggregated From Literature. HICSS 2008: 397 - [c6]Leonel Plazaola, Johnny Flores, Norman Vargas, Mathias Ekstedt:
Strategic Business and IT Alignment Assessment: A Case Study Applying an Enterprise Architecture-Based Metamodel. HICSS 2008: 398 - [c5]Jakob Raderius, Per Närman, Mathias Ekstedt:
Assessing System Availability Using an Enterprise Architecture Analysis Approach. ICSOC Workshops 2008: 351-362 - [c4]Per Närman, Pontus Johnson
, Robert Lagerström
, Ulrik Franke
, Mathias Ekstedt:
Data Collection Prioritization for System Quality Analysis. SQM@CSMR 2008: 29-42 - 2007
- [c3]