Teodor Sommestad
Orcid: 0000-0002-2606-4139
According to our database1,
Teodor Sommestad
authored at least 50 papers
between 2007 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
Automatic incident response solutions: a review of proposed solutions' input and output.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Proceedings of the Artificial Intelligence and Cybersecurity: Theory and Applications, 2023
2022
Variables influencing the effectiveness of signature-based network intrusion detection systems.
Inf. Secur. J. A Glob. Perspect., 2022
2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
2019
J. Comput. Inf. Syst., 2019
Proceedings of the 2019 APWG Symposium on Electronic Crime Research, 2019
2018
Inf. Comput. Secur., 2018
Development and evaluation of information elements for simplified cyber-incident reports.
Proceedings of the International Conference On Cyber Situational Awareness, 2018
2017
Inf. Secur. J. A Glob. Perspect., 2017
Inf. Comput. Secur., 2017
Proceedings of the 2017 International Conference On Cyber Situational Awareness, 2017
2016
An empirical test of the perceived relationship between risk and the constituents severity and probability.
Inf. Comput. Secur., 2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
2015
Secur. Commun. Networks, 2015
Inf. Comput. Secur., 2015
The sufficiency of the theory of planned behavior for explaining information security policy compliance.
Inf. Comput. Secur., 2015
A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour.
Int. J. Inf. Secur. Priv., 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the 23rd IEEE International Requirements Engineering Conference, 2015
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015
2014
Variables influencing information security policy compliance: A systematic review of quantitative studies.
Inf. Manag. Comput. Secur., 2014
Indicators of expert judgement and their significance: an empirical investigation in the area of cyber security.
Expert Syst. J. Knowl. Eng., 2014
Proceedings of the 18th IEEE International Enterprise Distributed Object Computing Conference, 2014
2013
The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures.
IEEE Syst. J., 2013
Inf. Manag. Comput. Secur., 2013
A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
2012
J. Univers. Comput. Sci., 2012
Inf. Manag. Comput. Secur., 2012
Cyber Security Exercises and Competitions as a Platform for Cyber Security Experiments.
Proceedings of the Secure IT Systems - 17th Nordic Conference, 2012
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
2011
Inf. Manag. Comput. Secur., 2011
Inf. Manag. Comput. Secur., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Expert Assessment on the Probability of Successful Remote Code Execution Attacks.
Proceedings of the WOSIS 2011, 2011
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011
Proceedings of the CAiSE Forum 2011, London, UK, June 22-24, 2011, 2011
2010
Development of an effort estimation model - a case study on delivery projects at a leading IT provider within the electric utility industry.
Int. J. Serv. Technol. Manag., 2010
Proceedings of the Information Systems Evolution, 2010
2009
Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009
Decision support oriented Enterprise Architecture metamodel management using classification trees.
Proceedings of the Workshops Proceedings of the 12th IEEE International Enterprise Distributed Object Computing Conference, 2009
Proceedings of the 13th European Conference on Software Maintenance and Reengineering, 2009
Proceedings of the 15th Americas Conference on Information Systems, 2009
2008
Web Service-Based Business Process Development, Threat Modeling and Security Assessment Tool.
Proceedings of the 2008 IEEE World Congress on Services, 2008
Proceedings of the 2008 IEEE International Conference on Web Services (ICWS 2008), 2008
Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008
2007
Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 2007