Hannes Holm
Orcid: 0000-0001-8572-2704
According to our database1,
Hannes Holm
authored at least 43 papers
between 2010 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Proceedings of the ICT Systems Security and Privacy Protection, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
2022
Variables influencing the effectiveness of signature-based network intrusion detection systems.
Inf. Secur. J. A Glob. Perspect., 2022
2020
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
2017
Inf. Secur. J. A Glob. Perspect., 2017
Inf. Comput. Secur., 2017
2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
2015
IEEE Trans. Dependable Secur. Comput., 2015
A Bayesian network model for likelihood estimations of acquirement of critical software vulnerabilities and exploits.
Inf. Softw. Technol., 2015
Inf. Comput. Secur., 2015
Comput. Secur., 2015
Proceedings of the 23rd IEEE International Requirements Engineering Conference, 2015
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015
Investigating the Correlation between Intention and Action in the Context of Social Engineering in Two Different National Cultures.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015
2014
A Framework and Calculation Engine for Modeling and Predicting the Cyber Security of Enterprise Architectures.
PhD thesis, 2014
IEEE Trans. Reliab., 2014
IEEE Trans. Dependable Secur. Comput., 2014
Softw. Syst. Model., 2014
Using phishing experiments and scenario-based surveys to understand security behaviours in practice.
Inf. Manag. Comput. Secur., 2014
Indicators of expert judgement and their significance: an empirical investigation in the area of cyber security.
Expert Syst. J. Knowl. Eng., 2014
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014
An Empirical Investigation of the Effect of Target-Related Information in Phishing Attacks.
Proceedings of the 18th IEEE International Enterprise Distributed Object Computing Conference Workshops and Demonstrations, 2014
2013
The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures.
IEEE Syst. J., 2013
Using enterprise architecture analysis and interview data to estimate service response time.
J. Strateg. Inf. Syst., 2013
Estimates on the effectiveness of web application firewalls against targeted attacks.
Inf. Manag. Comput. Secur., 2013
Proceedings of the 4th IEEE PES Innovative Smart Grid Technologies Europe, 2013
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
Softw. Qual. J., 2012
J. Univers. Comput. Sci., 2012
Using enterprise architecture and technology adoption models to predict application usage.
J. Syst. Softw., 2012
Inf. Manag. Comput. Secur., 2012
Performance of automated network vulnerability scanning at remediating security issues.
Comput. Secur., 2012
Proceedings of the Trends in Enterprise Architecture Research and Practice-Driven Research on Enterprise Transformation, 2012
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
2011
Inf. Manag. Comput. Secur., 2011
Inf. Manag. Comput. Secur., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Expert Assessment on the Probability of Successful Remote Code Execution Attacks.
Proceedings of the WOSIS 2011, 2011
Proceedings of the CAiSE Forum 2011, London, UK, June 22-24, 2011, 2011
2010
Proceedings of the IEEE PES Conference on Innovative Smart Grid Technologies, 2010