Hannes Holm

Orcid: 0000-0001-8572-2704

According to our database1, Hannes Holm authored at least 43 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Lore a Red Team Emulation Tool.
IEEE Trans. Dependable Secur. Comput., 2023

Evaluation of a Red Team Automation Tool in Live Cyber Defence Exercises.
Proceedings of the ICT Systems Security and Privacy Protection, 2023

Hide My Payload: An Empirical Study of Antimalware Evasion Tools.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Variables influencing the effectiveness of signature-based network intrusion detection systems.
Inf. Secur. J. A Glob. Perspect., 2022

2020
A Model for Predicting the Likelihood of Successful Exploitation.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

2017
Alert verification through alert correlation - An empirical test of SnIPS.
Inf. Secur. J. A Glob. Perspect., 2017

So long, and thanks for only using readily available scripts.
Inf. Comput. Secur., 2017

2016
SVED: Scanning, Vulnerabilities, Exploits and Detection.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

2015
P<sup>2</sup>CySeMoL: Predictive, Probabilistic Cyber Security Modeling Language.
IEEE Trans. Dependable Secur. Comput., 2015

A Bayesian network model for likelihood estimations of acquirement of critical software vulnerabilities and exploits.
Inf. Softw. Technol., 2015

Investigating personal determinants of phishing and the effect of national culture.
Inf. Comput. Secur., 2015

An expert-based investigation of the Common Vulnerability Scoring System.
Comput. Secur., 2015

Requirements engineering: The quest for the dependent variable.
Proceedings of the 23rd IEEE International Requirements Engineering Conference, 2015

A Survey of Industrial Control System Testbeds.
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015

Investigating the Correlation between Intention and Action in the Context of Social Engineering in Two Different National Cultures.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

2014
A Framework and Calculation Engine for Modeling and Predicting the Cyber Security of Enterprise Architectures.
PhD thesis, 2014

The Distribution of Time to Recovery of Enterprise IT Services.
IEEE Trans. Reliab., 2014

A Large-Scale Study of the Time Required to Compromise a Computer System.
IEEE Trans. Dependable Secur. Comput., 2014

Automatic data collection for enterprise architecture models.
Softw. Syst. Model., 2014

Using phishing experiments and scenario-based surveys to understand security behaviours in practice.
Inf. Manag. Comput. Secur., 2014

Indicators of expert judgement and their significance: an empirical investigation in the area of cyber security.
Expert Syst. J. Knowl. Eng., 2014

Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter?
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

An Empirical Investigation of the Effect of Target-Related Information in Phishing Attacks.
Proceedings of the 18th IEEE International Enterprise Distributed Object Computing Conference Workshops and Demonstrations, 2014

2013
The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures.
IEEE Syst. J., 2013

Using enterprise architecture analysis and interview data to estimate service response time.
J. Strateg. Inf. Syst., 2013

Estimates on the effectiveness of web application firewalls against targeted attacks.
Inf. Manag. Comput. Secur., 2013

Cyber security for a Smart Grid - What about phishing?
Proceedings of the 4th IEEE PES Innovative Smart Grid Technologies Europe, 2013

Effort Estimates on Web Application Vulnerability Discovery.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2012
Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks.
IEEE Trans. Dependable Secur. Comput., 2012

Identifying factors affecting software development cost and productivity.
Softw. Qual. J., 2012

Success Rate of Remote Code Execution Attacks - Expert Assessments and Observations.
J. Univers. Comput. Sci., 2012

Using enterprise architecture and technology adoption models to predict application usage.
J. Syst. Softw., 2012

Estimates of success rates of remote arbitrary code execution attacks.
Inf. Manag. Comput. Secur., 2012

Performance of automated network vulnerability scanning at remediating security issues.
Comput. Secur., 2012

A Metamodel for Web Application Injection Attacks and Countermeasures.
Proceedings of the Trends in Enterprise Architecture Research and Practice-Driven Research on Enterprise Transformation, 2012

Effort Estimates for Vulnerability Discovery Projects.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
Security mistakes in information system deployment projects.
Inf. Manag. Comput. Secur., 2011

A quantitative evaluation of vulnerability scanning.
Inf. Manag. Comput. Secur., 2011

Data accuracy assessment using enterprise architecture.
Enterp. Inf. Syst., 2011

Estimates of Success Rates of Denial-of-Service Attacks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Expert Assessment on the Probability of Successful Remote Code Execution Attacks.
Proceedings of the WOSIS 2011, 2011

A Tool for Automatic Enterprise Architecture Modeling.
Proceedings of the CAiSE Forum 2011, London, UK, June 22-24, 2011, 2011

2010
Availability of a SCADA/OMS/DMS system - A case study.
Proceedings of the IEEE PES Conference on Innovative Smart Grid Technologies, 2010


  Loading...