Mathias Ekstedt
Orcid: 0000-0003-3922-9606Affiliations:
- KTH Royal Institute of Technology, Sweden
According to our database1,
Mathias Ekstedt
authored at least 114 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Empirical evaluation of a threat modeling language as a cybersecurity assessment tool.
Comput. Secur., 2024
Development and validation of coreLang: A threat modeling language for the ICT domain.
Comput. Secur., 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Int. J. Inf. Sec., December, 2023
A threat modeling language for generating attack graphs of substation automation systems.
Int. J. Crit. Infrastructure Prot., July, 2023
Estimating Time-To-Compromise for Industrial Control System Attack Techniques Through Vulnerability Data.
SN Comput. Sci., May, 2023
Towards a Graph Neural Network-Based Approach for Estimating Hidden States in Cyber Attack Simulations.
CoRR, 2023
Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2023
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023
2022
Security Countermeasures Selection Using the Meta Attack Language and Probabilistic Attack Graphs.
IEEE Access, 2022
Proceedings of the 2022 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2022
Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
2021
Comput. Sci. Rev., 2021
Threat Scenarios and Monitoring Requirements for Cyber-Physical Systems of Energy Flexibility Markets.
CoRR, 2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
Generating Threat Models and Attack Graphs based on the IEC 61850 System Configuration description Language.
Proceedings of the SAT-CPS@CODASPY 2021, 2021
2020
Energy Inform., 2020
Threat Modeling and Attack Simulations of Smart Cities: A Literature Review and Explorative Study.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the Graphical Models for Security - 7th International Workshop, 2020
A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain.
Proceedings of the Critical Information Infrastructures Security, 2020
2019
Proceedings of the Graphical Models for Security - 6th International Workshop, 2019
2018
IEEE Trans. Dependable Secur. Comput., 2018
RICS-el: Building a National Testbed for Research and Training on SCADA Security (Short Paper).
Proceedings of the Critical Information Infrastructures Security, 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Automated Probabilistic System Architecture Analysis in the Multi-Attribute Prediction Language (MAPL): Iteratively Developed using Multiple Case Studies.
Complex Syst. Informatics Model. Q., 2017
Digital Forensic Readiness in Critical Infrastructures: A Case of Substation Automation in the Power Sector.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017
In-Depth Modeling of the UNIX Operating System for Architectural Cyber Security Analysis.
Proceedings of the 21st IEEE International Enterprise Distributed Object Computing Workshop, 2017
Proceedings of the 21st IEEE International Enterprise Distributed Object Computing Workshop, 2017
Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, 2017
Exploratory studies into forensic logs for criminal investigation using case studies in industrial control systems in the power sector.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
2016
Complex Syst. Informatics Model. Q., 2016
Comput. Secur., 2016
Shaping intention to resist social engineering through transformational leadership, information security culture and awareness.
Comput. Secur., 2016
Proceedings of the Risk Assessment and Risk-Driven Quality Assurance, 2016
Modeling and analyzing systems-of-systems in the multi-attribute prediction language (MAPL).
Proceedings of the 4th International Workshop on Software Engineering for Systems-of-Systems, 2016
Automatic Probabilistic Enterprise IT Architecture Modeling: A Dynamic Bayesian Networks Approach.
Proceedings of the 20th IEEE International Enterprise Distributed Object Computing Workshop, 2016
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
IEEE Trans. Dependable Secur. Comput., 2015
A Bayesian network model for likelihood estimations of acquirement of critical software vulnerabilities and exploits.
Inf. Softw. Technol., 2015
Inf. Comput. Secur., 2015
Proceedings of Short and Doctoral Consortium Papers Presented at the 8th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modelling (PoEM 2015), 2015
Proceedings of the 3rd IEEE/ACM International Workshop on Software Engineering for Systems-of-Systems, 2015
Proceedings of the IEEE/ACM 4th SEMAT Workshop on a General Theory of Software Engineering, 2015
Investigating the Correlation between Intention and Action in the Context of Social Engineering in Two Different National Cultures.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015
Exploring the Link Between Behavioural Information Security Governance and Employee Information Security Awareness.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015
A Requirements Based Approach for Automating Enterprise IT Architecture Modeling Using Multiple Data Sources.
Proceedings of the 19th IEEE International Enterprise Distributed Object Computing Workshop, 2015
Proceedings of the 19th IEEE International Enterprise Distributed Object Computing Workshop, 2015
2014
An enterprise architecture framework for multi-attribute information systems analysis.
Softw. Syst. Model., 2014
Softw. Syst. Model., 2014
Indicators of expert judgement and their significance: an empirical investigation in the area of cyber security.
Expert Syst. J. Knowl. Eng., 2014
Enterprise architecture availability analysis using fault trees and stakeholder interviews.
Enterp. Inf. Syst., 2014
Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture.
Comput. Secur., 2014
Proceedings of the 3rd SEMAT Workshop on General Theories of Software Engineering, 2014
Proceedings of the 18th IEEE International Enterprise Distributed Object Computing Conference, 2014
An Empirical Investigation of the Effect of Target-Related Information in Phishing Attacks.
Proceedings of the 18th IEEE International Enterprise Distributed Object Computing Conference Workshops and Demonstrations, 2014
2013
The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures.
IEEE Syst. J., 2013
Using enterprise architecture analysis and interview data to estimate service response time.
J. Strateg. Inf. Syst., 2013
Estimates on the effectiveness of web application firewalls against targeted attacks.
Inf. Manag. Comput. Secur., 2013
Proceedings of the 2nd SEMAT Workshop on a General Theory of Software Engineering, 2013
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
Proceedings of the 17th IEEE International Enterprise Distributed Object Computing Conference Workshops, 2013
Proceedings of the CONF-IRM 2013, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
J. Univers. Comput. Sci., 2012
Inf. Manag. Comput. Secur., 2012
Proceedings of the Trends in Enterprise Architecture Research and Practice-Driven Research on Enterprise Transformation, 2012
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
Assessment of Social Impact Costs and Social Impact Magnitude from Breakdowns in Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2012
Proceedings of the 18th Americas Conference on Information Systems, 2012
2011
Inf. Manag. Comput. Secur., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Expert Assessment on the Probability of Successful Remote Code Execution Attacks.
Proceedings of the WOSIS 2011, 2011
Information Security Governance Analysis Using Probabilistic Relational Models.
Proceedings of the WOSIS 2011, 2011
Analysis of IT/Business Alignment Situations as a Precondition for the Design and Engineering of Situated IT/Business Alignment Solutions.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011
Proceedings of the CAiSE Forum 2011, London, UK, June 22-24, 2011, 2011
2010
Architecture analysis of enterprise systems modifiability: a metamodel for software change cost estimation.
Softw. Qual. J., 2010
Inf. Syst. Manag., 2010
A method for assessing the business value of information system scenarios with an estimated credibility of the result.
Int. J. Serv. Technol. Manag., 2010
Proceedings of the Trends in Enterprise Architecture Research - 5th International Workshop, 2010
Proceedings of the 14th IEEE International Enterprise Distributed Object Computing Conference, 2010
Proceedings of the Workshops Proceedings of the 14th IEEE International Enterprise Distributed Object Computing Conference, 2010
2009
Proceedings of the 10th ACIS International Conference on Software Engineering, 2009
A formal method for cost and accuracy trade-off analysis in software assessment measures.
Proceedings of the Third IEEE International Conference on Research Challenges in Information Science, 2009
Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009
Proceedings of the 13th IEEE International Enterprise Distributed Object Computing Conference, 2009
A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis.
Proceedings of the 13th European Conference on Software Maintenance and Reengineering, 2009
Proceedings of the 13th European Conference on Software Maintenance and Reengineering, 2009
Enterprise Meta Modeling Methods - Combining a Stakeholder-Oriented and a Causality-Based Approach.
Proceedings of the Enterprise, 2009
2008
Proceedings of the International Workshop on Software Quality and Maintainability, 2008
Proceedings of the Service-Oriented Computing - ICSOC 2008 Workshops, 2008
A Consolidated Strategic Business and IT Alignment Representation: A Framework Aggregated From Literature.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008
Strategic Business and IT Alignment Assessment: A Case Study Applying an Enterprise Architecture-Based Metamodel.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008
A framework for interoperability analysis on the semantic web using architecture models.
Proceedings of the Workshops Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008
Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008
Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008
Proceedings of the Advanced Information Systems Engineering, 20th International Conference, 2008
2007
Proceedings of the Second International Conference on Software Engineering Advances (ICSEA 2007), 2007
2006
Inf. Syst. Frontiers, 2006
Assessment of Enterprise Information Security - The Importance of Information Search Cost.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006
2004
Consistent Enterprise Software System Architecture for the CIO - A Utility-Cost Based Approach.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004