default search action
Mathias Ekstedt
Person information
- affiliation: KTH Royal Institute of Technology, Sweden
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j41]Sotirios Katsikeas, Engla Rencelj Ling, Pontus Johnsson, Mathias Ekstedt:
Empirical evaluation of a threat modeling language as a cybersecurity assessment tool. Comput. Secur. 140: 103743 (2024) - [j40]Sotirios Katsikeas, Andrei Buhaiu, Mathias Ekstedt, Zeeshan Afzal, Simon Hacks, Preetam Mukherjee:
Development and validation of coreLang: A threat modeling language for the ICT domain. Comput. Secur. 146: 104057 (2024) - [c71]Viktor Engström, Giuseppe Nebbione, Mathias Ekstedt:
A Metalanguage for Dynamic Attack Graphs and Lazy Generation. ARES 2024: 31:1-31:11 - 2023
- [j39]Wojciech Widel, Simon Hacks, Mathias Ekstedt, Pontus Johnson, Robert Lagerström:
The meta attack language - a formal description. Comput. Secur. 130: 103284 (2023) - [j38]Musard Balliu, Benoit Baudry, Sofia Bobadilla, Mathias Ekstedt, Martin Monperrus, Javier Ron Arteaga, Aman Sharma, Gabriel Skoglund, César Soto-Valero, Martin Wittlinger:
Challenges of Producing Software Bill of Materials for Java. IEEE Secur. Priv. 21(6): 12-23 (2023) - [j37]Engla Rencelj Ling, Mathias Ekstedt:
A threat modeling language for generating attack graphs of substation automation systems. Int. J. Crit. Infrastructure Prot. 41: 100601 (2023) - [j36]Mathias Ekstedt, Zeeshan Afzal, Preetam Mukherjee, Simon Hacks, Robert Lagerström:
Yet another cybersecurity risk assessment framework. Int. J. Inf. Sec. 22(6): 1713-1729 (2023) - [j35]Engla Rencelj Ling, Mathias Ekstedt:
Estimating Time-To-Compromise for Industrial Control System Attack Techniques Through Vulnerability Data. SN Comput. Sci. 4(3): 318 (2023) - [c70]Rajendra Patil, Viktoria Fodor, Mathias Ekstedt:
Mean Value Analysis of Critical Attack Paths with Multiple Parameters. NordSec 2023: 126-143 - [c69]Musard Balliu, Benoit Baudry, Sofia Bobadilla, Mathias Ekstedt, Martin Monperrus, Javier Ron, Aman Sharma, Gabriel Skoglund, César Soto-Valero, Martin Wittlinger:
Software Bill of Materials in Java. SCORED@CCS 2023: 75-76 - [i5]Musard Balliu, Benoit Baudry, Sofia Bobadilla, Mathias Ekstedt, Martin Monperrus, Javier Ron, Aman Sharma, Gabriel Skoglund, César Soto-Valero, Martin Wittlinger:
Challenges of Producing Software Bill Of Materials for Java. CoRR abs/2303.11102 (2023) - [i4]Pontus Johnson, Mathias Ekstedt:
Towards a Graph Neural Network-Based Approach for Estimating Hidden States in Cyber Attack Simulations. CoRR abs/2312.05666 (2023) - 2022
- [j34]Wojciech Widel, Preetam Mukherjee, Mathias Ekstedt:
Security Countermeasures Selection Using the Meta Attack Language and Probabilistic Attack Graphs. IEEE Access 10: 89645-89662 (2022) - [c68]Engla Rencelj Ling, Mathias Ekstedt:
Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities. ICISSP 2022: 96-107 - [c67]Per Fahlander, Mathias Ekstedt, Preetam Mukherjee, Ashish Kumar Dwivedi:
Containment Strategy Formalism in a Probabilistic Threat Modelling Framework. ICISSP 2022: 108-120 - [c66]Oliver Kraft, Oliver Pohl, Ulf Häger, Kai Heussen, Nils Müller, Zeeshan Afzal, Mathias Ekstedt, Hossein Farahmand, Dmytro Ivanko, Ankit Singh, Sasiphong Leksawat, Andreas Kubis:
Development and Implementation of a Holistic Flexibility Market Architecture. ISGT 2022: 1-5 - 2021
- [j33]Sotirios Katsikeas, Pontus Johnson, Mathias Ekstedt, Robert Lagerström:
Research communities in cyber security: A comprehensive literature review. Comput. Sci. Rev. 42: 100431 (2021) - [c65]Engla Rencelj Ling, Mathias Ekstedt:
Generating Threat Models and Attack Graphs based on the IEC 61850 System Configuration description Language. SAT-CPS@CODASPY 2021: 98-103 - [c64]Andreas Gylling, Mathias Ekstedt, Zeeshan Afzal, Per Eliasson:
Mapping Cyber Threat Intelligence to Probabilistic Attack Graphs. CSR 2021: 304-311 - [i3]Sotirios Katsikeas, Pontus Johnson, Mathias Ekstedt, Robert Lagerström:
Research Communities in cyber security: A Comprehensive Literature Review. CoRR abs/2104.13196 (2021) - [i2]Nils Müller, Zeeshan Afzal, Per Eliasson, Mathias Ekstedt, Kai Heussen:
Threat Scenarios and Monitoring Requirements for Cyber-Physical Systems of Energy Flexibility Markets. CoRR abs/2111.03300 (2021) - 2020
- [j32]Simon Hacks, Sotirios Katsikeas, Engla Ling, Robert Lagerström, Mathias Ekstedt:
powerLang: a probabilistic attack simulation language for the power domain. Energy Inform. 3(1) (2020) - [c63]Engla Ling, Robert Lagerström, Mathias Ekstedt:
A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain. CRITIS 2020: 47-58 - [c62]Sotirios Katsikeas, Simon Hacks, Pontus Johnson, Mathias Ekstedt, Robert Lagerström, Joar Jacobsson, Max Wällstedt, Per Eliasson:
An Attack Simulation Language for the IT Domain. GraMSec@CSF 2020: 67-86 - [c61]Robert Lagerström, Wenjun Xiong, Mathias Ekstedt:
Threat Modeling and Attack Simulations of Smart Cities: A Literature Review and Explorative Study. ICISSP 2020: 369-376
2010 – 2019
- 2019
- [c60]Xinyue Mao, Mathias Ekstedt, Engla Ling, Erik Ringdahl, Robert Lagerström:
Conceptual Abstraction of Attack Graphs - A Use Case of securiCAD. GraMSec@CSF 2019: 186-202 - 2018
- [j31]Alexandre Vernotte, Margus Välja, Matus Korman, Gunnar Björkman, Mathias Ekstedt, Robert Lagerström:
Load balancing of renewable energy: a cyber security analysis. Energy Inform. 1(1) (2018) - [j30]Pontus Johnson, Robert Lagerström, Mathias Ekstedt, Ulrik Franke:
Can the Common Vulnerability Scoring System be Trusted? A Bayesian Analysis. IEEE Trans. Dependable Secur. Comput. 15(6): 1002-1015 (2018) - [c59]Pontus Johnson, Robert Lagerström, Mathias Ekstedt:
A Meta Language for Threat Modeling and Attack Simulations. ARES 2018: 38:1-38:8 - [c58]Asif Iqbal, Farhan Mahmood, Andrii Shalaginov, Mathias Ekstedt:
Identification of Attack-based Digital Forensic Evidences for WAMPAC Systems. IEEE BigData 2018: 3079-3087 - [c57]Magnus Almgren, Peter Andersson, Gunnar Björkman, Mathias Ekstedt, Jonas Hallberg, Simin Nadjm-Tehrani, Erik Westring:
RICS-el: Building a National Testbed for Research and Training on SCADA Security (Short Paper). CRITIS 2018: 219-225 - [i1]Pontus Johnson, Paul Ralph, Mathias Ekstedt, Iaakov Exman, Michael Goedicke:
Consensus in Software Engineering: A Cognitive Mapping Study. CoRR abs/1802.06319 (2018) - 2017
- [j29]Robert Lagerström, Pontus Johnson, Mathias Ekstedt, Ulrik Franke, Khurram Shahzad:
Automated Probabilistic System Architecture Analysis in the Multi-Attribute Prediction Language (MAPL): Iteratively Developed using Multiple Case Studies. Complex Syst. Informatics Model. Q. 11: 38-68 (2017) - [c56]Asif Iqbal, Mathias Ekstedt, Hanan Alobaidli:
Exploratory studies into forensic logs for criminal investigation using case studies in industrial control systems in the power sector. IEEE BigData 2017: 3657-3661 - [c55]Matus Korman, Margus Välja, Gunnar Björkman, Mathias Ekstedt, Alexandre Vernotte, Robert Lagerström:
Analyzing the Effectiveness of Attack Countermeasures in a SCADA System. SPSR-SG@CPSWeek 2017: 73-78 - [c54]Robert Lagerström, Pontus Johnson, Mathias Ekstedt:
Automatic Design of Secure Enterprise Architecture: Work in Progress Paper. EDOC Workshops 2017: 65-70 - [c53]Alexandre Vernotte, Pontus Johnson, Mathias Ekstedt, Robert Lagerström:
In-Depth Modeling of the UNIX Operating System for Architectural Cyber Security Analysis. EDOC Workshops 2017: 127-136 - [c52]Asif Iqbal, Mathias Ekstedt, Hanan Alobaidli:
Digital Forensic Readiness in Critical Infrastructures: A Case of Substation Automation in the Power Sector. ICDF2C 2017: 117-129 - 2016
- [j28]Waldo Rocha Flores, Mathias Ekstedt:
Shaping intention to resist social engineering through transformational leadership, information security culture and awareness. Comput. Secur. 59: 26-44 (2016) - [j27]Pontus Johnson, Dan Gorton, Robert Lagerström, Mathias Ekstedt:
Time between vulnerability disclosures: A measure of software product vulnerability. Comput. Secur. 62: 278-295 (2016) - [j26]Matus Korman, Robert Lagerström, Mathias Ekstedt:
Modeling Enterprise Authorization: A Unified Metamodel and Initial Validation. Complex Syst. Informatics Model. Q. 7: 1-24 (2016) - [j25]Pontus Johnson, Mathias Ekstedt:
The Tarpit - A general theory of software engineering. Inf. Softw. Technol. 70: 181-203 (2016) - [c51]Pontus Johnson, Alexandre Vernotte, Mathias Ekstedt, Robert Lagerström:
pwnPr3d: An Attack-Graph-Driven Probabilistic Threat-Modeling Approach. ARES 2016: 278-283 - [c50]Robert Udd, Mikael Asplund, Simin Nadjm-Tehrani, Mehrdad Kazemtabrizi, Mathias Ekstedt:
Exploiting Bro for Intrusion Detection in a SCADA System. CPSS@AsiaCCS 2016: 44-51 - [c49]Pontus Johnson, Mathias Ekstedt, Robert Lagerström:
Automatic Probabilistic Enterprise IT Architecture Modeling: A Dynamic Bayesian Networks Approach. EDOC Workshops 2016: 1-8 - [c48]Pontus Johnson, Robert Lagerström, Mathias Ekstedt, Ulrik Franke:
Modeling and analyzing systems-of-systems in the multi-attribute prediction language (MAPL). SESoS@ICSE 2016: 1-7 - [c47]Pontus Johnson, Alexandre Vernotte, Dan Gorton, Mathias Ekstedt, Robert Lagerström:
Quantitative Information Security Risk Estimation Using Probabilistic Attack Graphs. RISK 2016: 37-52 - [e2]Barbara Kordy, Mathias Ekstedt, Dong Seong Kim:
Graphical Models for Security - Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers. Lecture Notes in Computer Science 9987, Springer 2016, ISBN 978-3-319-46262-2 [contents] - 2015
- [j24]Waldo Rocha Flores, Hannes Holm, Marcus Nohlberg, Mathias Ekstedt:
Investigating personal determinants of phishing and the effect of national culture. Inf. Comput. Secur. 23(2): 178-199 (2015) - [j23]Hannes Holm, Matus Korman, Mathias Ekstedt:
A Bayesian network model for likelihood estimations of acquirement of critical software vulnerabilities and exploits. Inf. Softw. Technol. 58: 304-318 (2015) - [j22]Pontus Johnson, Mathias Ekstedt, Michael Goedicke, Ivar Jacobson:
Towards general theories of software engineering. Sci. Comput. Program. 101: 1-5 (2015) - [j21]Hannes Holm, Khurram Shahzad, Markus Buschle, Mathias Ekstedt:
P2CySeMoL: Predictive, Probabilistic Cyber Security Modeling Language. IEEE Trans. Dependable Secur. Comput. 12(6): 626-639 (2015) - [c46]Margus Välja, Robert Lagerström, Mathias Ekstedt, Matus Korman:
A Requirements Based Approach for Automating Enterprise IT Architecture Modeling Using Multiple Data Sources. EDOC Workshops 2015: 79-87 - [c45]Mathias Ekstedt, Pontus Johnson, Robert Lagerström, Dan Gorton, Joakim Nydren, Khurram Shahzad:
Securi CAD by Foreseeti: A CAD Tool for Enterprise Cyber Security Management. EDOC Workshops 2015: 152-155 - [c44]Waldo Rocha Flores, Mathias Ekstedt:
Exploring the Link Between Behavioural Information Security Governance and Employee Information Security Awareness. HAISA 2015: 82-94 - [c43]Waldo Rocha Flores, Hannes Holm, Mathias Ekstedt, Marcus Nohlberg:
Investigating the Correlation between Intention and Action in the Context of Social Engineering in Two Different National Cultures. HICSS 2015: 3508-3517 - [c42]Pontus Johnson, Mathias Ekstedt:
Exploring Theory of Cognition for General Theory of Software Engineering. GTSE@ICSE 2015: 15-24 - [c41]Robert Lagerström, Pontus Johnson, Mathias Ekstedt:
Search-Based Design of Large Software Systems-of-Systems. SESoS@ICSE 2015: 44-47 - [c40]Matus Korman, Robert Lagerström, Mathias Ekstedt:
Modeling Authorization in Enterprise-wide Contexts. PoEM (Short Papers) 2015: 81-90 - 2014
- [j20]Waldo Rocha Flores, Egil Antonsen, Mathias Ekstedt:
Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture. Comput. Secur. 43: 90-110 (2014) - [j19]Per Närman, Ulrik Franke, Johan König, Markus Buschle, Mathias Ekstedt:
Enterprise architecture availability analysis using fault trees and stakeholder interviews. Enterp. Inf. Syst. 8(1): 1-25 (2014) - [j18]Hannes Holm, Teodor Sommestad, Mathias Ekstedt, Nicholas Honeth:
Indicators of expert judgement and their significance: an empirical investigation in the area of cyber security. Expert Syst. J. Knowl. Eng. 31(4): 299-318 (2014) - [j17]Hannes Holm, Markus Buschle, Robert Lagerström, Mathias Ekstedt:
Automatic data collection for enterprise architecture models. Softw. Syst. Model. 13(2): 825-841 (2014) - [j16]Per Närman, Markus Buschle, Mathias Ekstedt:
An enterprise architecture framework for multi-attribute information systems analysis. Softw. Syst. Model. 13(3): 1085-1116 (2014) - [c39]Matus Korman, Teodor Sommestad, Jonas Hallberg, Johan E. Bengtsson, Mathias Ekstedt:
Overview of Enterprise Information Needs in Information Security Risk Assessment. EDOC 2014: 42-51 - [c38]Hannes Holm, Waldo Rocha Flores, Marcus Nohlberg, Mathias Ekstedt:
An Empirical Investigation of the Effect of Target-Related Information in Phishing Attacks. EDOC Workshops 2014: 357-363 - [c37]Robert Lagerström, Mathias Ekstedt:
Extending a general theory of software to engineering. GTSE 2014: 36-39 - 2013
- [j15]Hannes Holm, Mathias Ekstedt:
Estimates on the effectiveness of web application firewalls against targeted attacks. Inf. Manag. Comput. Secur. 21(4): 250-265 (2013) - [j14]Per Närman, Hannes Holm, Mathias Ekstedt, Nicholas Honeth:
Using enterprise architecture analysis and interview data to estimate service response time. J. Strateg. Inf. Syst. 22(1): 70-85 (2013) - [j13]Teodor Sommestad, Mathias Ekstedt, Hannes Holm:
The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures. IEEE Syst. J. 7(3): 363-373 (2013) - [c36]Waldo Rocha Flores, Mathias Ekstedt:
Countermeasures for Social Engineering-based Malware Installation Attacks. CONF-IRM 2013: 23 - [c35]João Paulo A. Almeida, Mathias Ekstedt, James Lapalme:
Message from the TEAR 2013 Workshop Chairs. EDOC Workshops 2013: 287-288 - [c34]Hannes Holm, Mathias Ekstedt, Teodor Sommestad:
Effort Estimates on Web Application Vulnerability Discovery. HICSS 2013: 5029-5038 - [c33]Mathias Ekstedt:
An empirical approach to a general theory of software (engineering). GTSE@ICSE 2013: 23-26 - 2012
- [j12]György Dán, Henrik Sandberg, Mathias Ekstedt, Gunnar Björkman:
Challenges in Power System Information Security. IEEE Secur. Priv. 10(4): 62-70 (2012) - [j11]Teodor Sommestad, Hannes Holm, Mathias Ekstedt:
Estimates of success rates of remote arbitrary code execution attacks. Inf. Manag. Comput. Secur. 20(2): 107-122 (2012) - [j10]Hannes Holm, Teodor Sommestad, Ulrik Franke, Mathias Ekstedt:
Success Rate of Remote Code Execution Attacks - Expert Assessments and Observations. J. Univers. Comput. Sci. 18(6): 732-749 (2012) - [j9]Pontus Johnson, Mathias Ekstedt, Ivar Jacobson:
Where's the Theory for Software Engineering? IEEE Softw. 29(5): 96 (2012) - [j8]Hannes Holm, Mathias Ekstedt, Dennis Andersson:
Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks. IEEE Trans. Dependable Secur. Comput. 9(6): 825-837 (2012) - [c32]Markus Buschle, Mathias Ekstedt, Sebastian Grunow, Matheus Hauder, Florian Matthes, Sascha Roth:
Automating Enterprise Architecture Documentation using an Enterprise Service Bus. AMCIS 2012 - [c31]Mats B.-O. Larsson, Gunnar Björkman, Mathias Ekstedt:
Assessment of Social Impact Costs and Social Impact Magnitude from Breakdowns in Critical Infrastructures. CRITIS 2012: 240-251 - [c30]Teodor Sommestad, Hannes Holm, Mathias Ekstedt:
Effort Estimates for Vulnerability Discovery Projects. HICSS 2012: 5564-5573 - [c29]Hannes Holm, Mathias Ekstedt:
A Metamodel for Web Application Injection Attacks and Countermeasures. TEAR/PRET 2012: 198-217 - [e1]Stephan Aier, Mathias Ekstedt, Florian Matthes, Erik Proper, Jorge L. C. Sanz:
Trends in Enterprise Architecture Research and Practice-Driven Research on Enterprise Transformation - 7th Workshop, TEAR 2012, and 5th Working Conference, PRET 2012, Held at The Open Group Conference 2012, Barcelona, Spain, October 23-24, 2012. Proceedings. Lecture Notes in Business Information Processing 131, Springer 2012, ISBN 978-3-642-34162-5 [contents] - 2011
- [j7]Per Närman, Hannes Holm, Pontus Johnson, Johan König, Moustafa Chenine, Mathias Ekstedt:
Data accuracy assessment using enterprise architecture. Enterp. Inf. Syst. 5(1): 37-58 (2011) - [j6]Teodor Sommestad, Mathias Ekstedt, Hannes Holm, Muhammad Afzal:
Security mistakes in information system deployment projects. Inf. Manag. Comput. Secur. 19(2): 80-94 (2011) - [c28]Markus Buschle, Hannes Holm, Teodor Sommestad, Mathias Ekstedt, Khurram Shahzad:
A Tool for Automatic Enterprise Architecture Modeling. CAiSE Forum (Selected Papers) 2011: 1-15 - [c27]Markus Buschle, Hannes Holm, Teodor Sommestad, Mathias Ekstedt, Khurram Shahzad:
A Tool for Automatic Enterprise Architecture Modeling. CAiSE Forum 2011: 25-32 - [c26]Robert Lagerström, Teodor Sommestad, Markus Buschle, Mathias Ekstedt:
Enterprise Architecture Management's Impact on Information Technology Success. HICSS 2011: 1-10 - [c25]Jan Saat, Robert Winter, Ulrik Franke, Robert Lagerström, Mathias Ekstedt:
Analysis of IT/Business Alignment Situations as a Precondition for the Design and Engineering of Situated IT/Business Alignment Solutions. HICSS 2011: 1-9 - [c24]Hannes Holm, Teodor Sommestad, Ulrik Franke, Mathias Ekstedt:
Expert Assessment on the Probability of Successful Remote Code Execution Attacks. WOSIS 2011: 49-58 - [c23]Waldo Rocha Flores, Mathias Ekstedt:
Information Security Governance Analysis Using Probabilistic Relational Models. WOSIS 2011: 142-150 - [c22]Teodor Sommestad, Hannes Holm, Mathias Ekstedt:
Estimates of Success Rates of Denial-of-Service Attacks. TrustCom 2011: 21-28 - 2010
- [j5]Teodor Sommestad, Mathias Ekstedt, Pontus Johnson:
A probabilistic relational model for security risk analysis. Comput. Secur. 29(6): 659-679 (2010) - [j4]Magnus Gammelgård, Mathias Ekstedt, Per Närman:
A method for assessing the business value of information system scenarios with an estimated credibility of the result. Int. J. Serv. Technol. Manag. 13(1/2): 105-133 (2010) - [j3]Mårten Simonsson, Pontus Johnson, Mathias Ekstedt:
The Effect of IT Governance Maturity on IT Governance Performance. Inf. Syst. Manag. 27(1): 10-24 (2010) - [j2]Robert Lagerström, Pontus Johnson, Mathias Ekstedt:
Architecture analysis of enterprise systems modifiability: a metamodel for software change cost estimation. Softw. Qual. J. 18(4): 437-468 (2010) - [c21]Jan Saat, Ulrik Franke, Robert Lagerström, Mathias Ekstedt:
Enterprise Architecture Meta Models for IT/Business Alignment Situations. EDOC 2010: 14-23 - [c20]Johan König, Kun Zhu, Lars Nordström, Mathias Ekstedt, Robert Lagerström:
Mapping the Substation Configuration Language of IEC 61850 to ArchiMate. EDOCW 2010: 60-68 - [c19]Ulrik Franke, Mathias Ekstedt, Robert Lagerström, Jan Saat, Robert Winter:
Trends in Enterprise Architecture Practice - A Survey. TEAR 2010: 16-29
2000 – 2009
- 2009
- [c18]Robert Lagerström, Jan Saat, Ulrik Franke, Stephan Aier, Mathias Ekstedt:
Enterprise Meta Modeling Methods - Combining a Stakeholder-Oriented and a Causality-Based Approach. BMMDS/EMMSAD 2009: 381-393 - [c17]Ulrik Franke, Pontus Johnson, Robert Lagerström, Johan Ullberg, David Höök, Mathias Ekstedt, Johan König:
A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis. CSMR 2009: 241-246 - [c16]Mathias Ekstedt, Ulrik Franke, Pontus Johnson, Robert Lagerström, Teodor Sommestad, Johan Ullberg, Markus Buschle:
A Tool for Enterprise Architecture Analysis of Maintainability. CSMR 2009: 327-328 - [c15]Per Närman, Pontus Johnson, Mathias Ekstedt, Moustafa Chenine, Johan König:
Enterprise Architecture Analysis for Data Accuracy Assessments. EDOC 2009: 24-33 - [c14]Teodor Sommestad, Mathias Ekstedt, Pontus Johnson:
Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models. HICSS 2009: 1-10 - [c13]Ulrik Franke, Pontus Johnson, Robert Lagerström, Johan Ullberg, David Höök, Mathias Ekstedt, Johan König:
A formal method for cost and accuracy trade-off analysis in software assessment measures. RCIS 2009: 295-302 - [c12]Ulrik Franke, David Höök, Johan König, Robert Lagerström, Per Närman, Johan Ullberg, Pia Gustafsson, Mathias Ekstedt:
EAF2- A Framework for Categorizing Enterprise Architecture Frameworks. SNPD 2009: 327-332 - 2008
- [c11]Mårten Simonsson, Pontus Johnson, Mathias Ekstedt:
The IT Organization Modeling and Assessment Tool for IT Governance Decision Support. CAiSE 2008: 258-261 - [c10]Per Närman, Marten Schönherr, Pontus Johnson, Mathias Ekstedt, Moustafa Chenine:
Using Enterprise Architecture Models for System Quality Analysis. EDOC 2008: 14-23 - [c9]Johan Ullberg, Robert Lagerström, Mathias Ekstedt:
A framework for interoperability analysis on the semantic web using architecture models. EDOCW 2008: 207-215 - [c8]Teodor Sommestad, Mathias Ekstedt, Pontus Johnson:
Combining Defense Graphs and Enterprise Architecture Models for Security Analysis. EDOC 2008: 349-355 - [c7]Norman Vargas, Leonel Plazaola, Mathias Ekstedt:
A Consolidated Strategic Business and IT Alignment Representation: A Framework Aggregated From Literature. HICSS 2008: 397 - [c6]Leonel Plazaola, Johnny Flores, Norman Vargas, Mathias Ekstedt:
Strategic Business and IT Alignment Assessment: A Case Study Applying an Enterprise Architecture-Based Metamodel. HICSS 2008: 398 - [c5]Jakob Raderius, Per Närman, Mathias Ekstedt:
Assessing System Availability Using an Enterprise Architecture Analysis Approach. ICSOC Workshops 2008: 351-362 - [c4]Per Närman, Pontus Johnson, Robert Lagerström, Ulrik Franke, Mathias Ekstedt:
Data Collection Prioritization for System Quality Analysis. SQM@CSMR 2008: 29-42 - 2007
- [c3]Pontus Johnson, Mathias Ekstedt:
In Search of a Unified Theory of Software Engineering. ICSEA 2007: 1 - 2006
- [j1]Åsa Lindström, Pontus Johnson, Erik Johansson, Mathias Ekstedt, Mårten Simonsson:
A survey on CIO concerns-do enterprise architecture frameworks support them? Inf. Syst. Frontiers 8(2): 81-90 (2006) - [c2]Erik Johansson, Mathias Ekstedt, Pontus Johnson:
Assessment of Enterprise Information Security - The Importance of Information Search Cost. HICSS 2006 - 2004
- [c1]Mathias Ekstedt, Pontus Johnson, Åsa Lindström, Magnus Gammelgård, Erik Johansson, Leonel Plazaola, Enrique Silva, Joakim Liliesköld:
Consistent Enterprise Software System Architecture for the CIO - A Utility-Cost Based Approach. HICSS 2004
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint