Mathias Ekstedt

Orcid: 0000-0003-3922-9606

Affiliations:
  • KTH Royal Institute of Technology, Sweden


According to our database1, Mathias Ekstedt authored at least 114 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Empirical evaluation of a threat modeling language as a cybersecurity assessment tool.
Comput. Secur., 2024

Development and validation of coreLang: A threat modeling language for the ICT domain.
Comput. Secur., 2024

A Metalanguage for Dynamic Attack Graphs and Lazy Generation.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Yet another cybersecurity risk assessment framework.
Int. J. Inf. Sec., December, 2023

A threat modeling language for generating attack graphs of substation automation systems.
Int. J. Crit. Infrastructure Prot., July, 2023

Estimating Time-To-Compromise for Industrial Control System Attack Techniques Through Vulnerability Data.
SN Comput. Sci., May, 2023

Challenges of Producing Software Bill of Materials for Java.
IEEE Secur. Priv., 2023

Towards a Graph Neural Network-Based Approach for Estimating Hidden States in Cyber Attack Simulations.
CoRR, 2023

The meta attack language - a formal description.
Comput. Secur., 2023

Software Bill of Materials in Java.
Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2023

Mean Value Analysis of Critical Attack Paths with Multiple Parameters.
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023

2022
Security Countermeasures Selection Using the Meta Attack Language and Probabilistic Attack Graphs.
IEEE Access, 2022

Development and Implementation of a Holistic Flexibility Market Architecture.
Proceedings of the 2022 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2022

Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Containment Strategy Formalism in a Probabilistic Threat Modelling Framework.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

2021
Research communities in cyber security: A comprehensive literature review.
Comput. Sci. Rev., 2021

Threat Scenarios and Monitoring Requirements for Cyber-Physical Systems of Energy Flexibility Markets.
CoRR, 2021

Mapping Cyber Threat Intelligence to Probabilistic Attack Graphs.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

Generating Threat Models and Attack Graphs based on the IEC 61850 System Configuration description Language.
Proceedings of the SAT-CPS@CODASPY 2021, 2021

2020
powerLang: a probabilistic attack simulation language for the power domain.
Energy Inform., 2020

Threat Modeling and Attack Simulations of Smart Cities: A Literature Review and Explorative Study.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

An Attack Simulation Language for the IT Domain.
Proceedings of the Graphical Models for Security - 7th International Workshop, 2020

A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain.
Proceedings of the Critical Information Infrastructures Security, 2020

2019
Conceptual Abstraction of Attack Graphs - A Use Case of securiCAD.
Proceedings of the Graphical Models for Security - 6th International Workshop, 2019

2018
Can the Common Vulnerability Scoring System be Trusted? A Bayesian Analysis.
IEEE Trans. Dependable Secur. Comput., 2018

Load balancing of renewable energy: a cyber security analysis.
Energy Inform., 2018

Consensus in Software Engineering: A Cognitive Mapping Study.
CoRR, 2018

RICS-el: Building a National Testbed for Research and Training on SCADA Security (Short Paper).
Proceedings of the Critical Information Infrastructures Security, 2018

Identification of Attack-based Digital Forensic Evidences for WAMPAC Systems.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

A Meta Language for Threat Modeling and Attack Simulations.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Automated Probabilistic System Architecture Analysis in the Multi-Attribute Prediction Language (MAPL): Iteratively Developed using Multiple Case Studies.
Complex Syst. Informatics Model. Q., 2017

Digital Forensic Readiness in Critical Infrastructures: A Case of Substation Automation in the Power Sector.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

In-Depth Modeling of the UNIX Operating System for Architectural Cyber Security Analysis.
Proceedings of the 21st IEEE International Enterprise Distributed Object Computing Workshop, 2017

Automatic Design of Secure Enterprise Architecture: Work in Progress Paper.
Proceedings of the 21st IEEE International Enterprise Distributed Object Computing Workshop, 2017

Analyzing the Effectiveness of Attack Countermeasures in a SCADA System.
Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, 2017

Exploratory studies into forensic logs for criminal investigation using case studies in industrial control systems in the power sector.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
The Tarpit - A general theory of software engineering.
Inf. Softw. Technol., 2016

Modeling Enterprise Authorization: A Unified Metamodel and Initial Validation.
Complex Syst. Informatics Model. Q., 2016

Time between vulnerability disclosures: A measure of software product vulnerability.
Comput. Secur., 2016

Shaping intention to resist social engineering through transformational leadership, information security culture and awareness.
Comput. Secur., 2016

Quantitative Information Security Risk Estimation Using Probabilistic Attack Graphs.
Proceedings of the Risk Assessment and Risk-Driven Quality Assurance, 2016

Modeling and analyzing systems-of-systems in the multi-attribute prediction language (MAPL).
Proceedings of the 4th International Workshop on Software Engineering for Systems-of-Systems, 2016

Automatic Probabilistic Enterprise IT Architecture Modeling: A Dynamic Bayesian Networks Approach.
Proceedings of the 20th IEEE International Enterprise Distributed Object Computing Workshop, 2016

Exploiting Bro for Intrusion Detection in a SCADA System.
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, 2016

pwnPr3d: An Attack-Graph-Driven Probabilistic Threat-Modeling Approach.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
P<sup>2</sup>CySeMoL: Predictive, Probabilistic Cyber Security Modeling Language.
IEEE Trans. Dependable Secur. Comput., 2015

Towards general theories of software engineering.
Sci. Comput. Program., 2015

A Bayesian network model for likelihood estimations of acquirement of critical software vulnerabilities and exploits.
Inf. Softw. Technol., 2015

Investigating personal determinants of phishing and the effect of national culture.
Inf. Comput. Secur., 2015

Modeling Authorization in Enterprise-wide Contexts.
Proceedings of Short and Doctoral Consortium Papers Presented at the 8th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modelling (PoEM 2015), 2015

Search-Based Design of Large Software Systems-of-Systems.
Proceedings of the 3rd IEEE/ACM International Workshop on Software Engineering for Systems-of-Systems, 2015

Exploring Theory of Cognition for General Theory of Software Engineering.
Proceedings of the IEEE/ACM 4th SEMAT Workshop on a General Theory of Software Engineering, 2015

Investigating the Correlation between Intention and Action in the Context of Social Engineering in Two Different National Cultures.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

Exploring the Link Between Behavioural Information Security Governance and Employee Information Security Awareness.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015

A Requirements Based Approach for Automating Enterprise IT Architecture Modeling Using Multiple Data Sources.
Proceedings of the 19th IEEE International Enterprise Distributed Object Computing Workshop, 2015

Securi CAD by Foreseeti: A CAD Tool for Enterprise Cyber Security Management.
Proceedings of the 19th IEEE International Enterprise Distributed Object Computing Workshop, 2015

2014
An enterprise architecture framework for multi-attribute information systems analysis.
Softw. Syst. Model., 2014

Automatic data collection for enterprise architecture models.
Softw. Syst. Model., 2014

Indicators of expert judgement and their significance: an empirical investigation in the area of cyber security.
Expert Syst. J. Knowl. Eng., 2014

Enterprise architecture availability analysis using fault trees and stakeholder interviews.
Enterp. Inf. Syst., 2014

Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture.
Comput. Secur., 2014

Extending a general theory of software to engineering.
Proceedings of the 3rd SEMAT Workshop on General Theories of Software Engineering, 2014

Overview of Enterprise Information Needs in Information Security Risk Assessment.
Proceedings of the 18th IEEE International Enterprise Distributed Object Computing Conference, 2014

An Empirical Investigation of the Effect of Target-Related Information in Phishing Attacks.
Proceedings of the 18th IEEE International Enterprise Distributed Object Computing Conference Workshops and Demonstrations, 2014

2013
The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures.
IEEE Syst. J., 2013

Using enterprise architecture analysis and interview data to estimate service response time.
J. Strateg. Inf. Syst., 2013

Estimates on the effectiveness of web application firewalls against targeted attacks.
Inf. Manag. Comput. Secur., 2013

An empirical approach to a general theory of software (engineering).
Proceedings of the 2nd SEMAT Workshop on a General Theory of Software Engineering, 2013

Effort Estimates on Web Application Vulnerability Discovery.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Message from the TEAR 2013 Workshop Chairs.
Proceedings of the 17th IEEE International Enterprise Distributed Object Computing Conference Workshops, 2013

Countermeasures for Social Engineering-based Malware Installation Attacks.
Proceedings of the CONF-IRM 2013, 2013

2012
Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks.
IEEE Trans. Dependable Secur. Comput., 2012

Where's the Theory for Software Engineering?
IEEE Softw., 2012

Success Rate of Remote Code Execution Attacks - Expert Assessments and Observations.
J. Univers. Comput. Sci., 2012

Estimates of success rates of remote arbitrary code execution attacks.
Inf. Manag. Comput. Secur., 2012

Challenges in Power System Information Security.
IEEE Secur. Priv., 2012

A Metamodel for Web Application Injection Attacks and Countermeasures.
Proceedings of the Trends in Enterprise Architecture Research and Practice-Driven Research on Enterprise Transformation, 2012

Effort Estimates for Vulnerability Discovery Projects.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

Assessment of Social Impact Costs and Social Impact Magnitude from Breakdowns in Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2012

Automating Enterprise Architecture Documentation using an Enterprise Service Bus.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
Security mistakes in information system deployment projects.
Inf. Manag. Comput. Secur., 2011

Data accuracy assessment using enterprise architecture.
Enterp. Inf. Syst., 2011

Estimates of Success Rates of Denial-of-Service Attacks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Expert Assessment on the Probability of Successful Remote Code Execution Attacks.
Proceedings of the WOSIS 2011, 2011

Information Security Governance Analysis Using Probabilistic Relational Models.
Proceedings of the WOSIS 2011, 2011

Analysis of IT/Business Alignment Situations as a Precondition for the Design and Engineering of Situated IT/Business Alignment Solutions.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Enterprise Architecture Management's Impact on Information Technology Success.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

A Tool for Automatic Enterprise Architecture Modeling.
Proceedings of the CAiSE Forum 2011, London, UK, June 22-24, 2011, 2011

2010
Architecture analysis of enterprise systems modifiability: a metamodel for software change cost estimation.
Softw. Qual. J., 2010

The Effect of IT Governance Maturity on IT Governance Performance.
Inf. Syst. Manag., 2010

A method for assessing the business value of information system scenarios with an estimated credibility of the result.
Int. J. Serv. Technol. Manag., 2010

A probabilistic relational model for security risk analysis.
Comput. Secur., 2010

Trends in Enterprise Architecture Practice - A Survey.
Proceedings of the Trends in Enterprise Architecture Research - 5th International Workshop, 2010

Enterprise Architecture Meta Models for IT/Business Alignment Situations.
Proceedings of the 14th IEEE International Enterprise Distributed Object Computing Conference, 2010

Mapping the Substation Configuration Language of IEC 61850 to ArchiMate.
Proceedings of the Workshops Proceedings of the 14th IEEE International Enterprise Distributed Object Computing Conference, 2010

2009
EAF2- A Framework for Categorizing Enterprise Architecture Frameworks.
Proceedings of the 10th ACIS International Conference on Software Engineering, 2009

A formal method for cost and accuracy trade-off analysis in software assessment measures.
Proceedings of the Third IEEE International Conference on Research Challenges in Information Science, 2009

Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Enterprise Architecture Analysis for Data Accuracy Assessments.
Proceedings of the 13th IEEE International Enterprise Distributed Object Computing Conference, 2009

A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis.
Proceedings of the 13th European Conference on Software Maintenance and Reengineering, 2009

A Tool for Enterprise Architecture Analysis of Maintainability.
Proceedings of the 13th European Conference on Software Maintenance and Reengineering, 2009

Enterprise Meta Modeling Methods - Combining a Stakeholder-Oriented and a Causality-Based Approach.
Proceedings of the Enterprise, 2009

2008
Data Collection Prioritization for System Quality Analysis.
Proceedings of the International Workshop on Software Quality and Maintainability, 2008

Assessing System Availability Using an Enterprise Architecture Analysis Approach.
Proceedings of the Service-Oriented Computing - ICSOC 2008 Workshops, 2008

A Consolidated Strategic Business and IT Alignment Representation: A Framework Aggregated From Literature.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

Strategic Business and IT Alignment Assessment: A Case Study Applying an Enterprise Architecture-Based Metamodel.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

A framework for interoperability analysis on the semantic web using architecture models.
Proceedings of the Workshops Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008

Combining Defense Graphs and Enterprise Architecture Models for Security Analysis.
Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008

Using Enterprise Architecture Models for System Quality Analysis.
Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008

The IT Organization Modeling and Assessment Tool for IT Governance Decision Support.
Proceedings of the Advanced Information Systems Engineering, 20th International Conference, 2008

2007
In Search of a Unified Theory of Software Engineering.
Proceedings of the Second International Conference on Software Engineering Advances (ICSEA 2007), 2007

2006
A survey on CIO concerns-do enterprise architecture frameworks support them?
Inf. Syst. Frontiers, 2006

Assessment of Enterprise Information Security - The Importance of Information Search Cost.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

2004
Consistent Enterprise Software System Architecture for the CIO - A Utility-Cost Based Approach.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004


  Loading...