Остановите войну!
for scientists:
default search action
Robert Lagerström
- > Home > Persons > Robert Lagerström
Publications
- 2023
- [j31]Wojciech Widel, Simon Hacks, Mathias Ekstedt, Pontus Johnson, Robert Lagerström:
The meta attack language - a formal description. Comput. Secur. 130: 103284 (2023) - [j28]Mathias Ekstedt, Zeeshan Afzal, Preetam Mukherjee, Simon Hacks, Robert Lagerström:
Yet another cybersecurity risk assessment framework. Int. J. Inf. Sec. 22(6): 1713-1729 (2023) - 2021
- [j21]Sotirios Katsikeas, Pontus Johnson, Mathias Ekstedt, Robert Lagerström:
Research communities in cyber security: A comprehensive literature review. Comput. Sci. Rev. 42: 100431 (2021) - [i2]Sotirios Katsikeas, Pontus Johnson, Mathias Ekstedt, Robert Lagerström:
Research Communities in cyber security: A Comprehensive Literature Review. CoRR abs/2104.13196 (2021) - 2020
- [j18]Simon Hacks, Sotirios Katsikeas, Engla Ling, Robert Lagerström, Mathias Ekstedt:
powerLang: a probabilistic attack simulation language for the power domain. Energy Inform. 3(1) (2020) - [c66]Engla Ling, Robert Lagerström, Mathias Ekstedt:
A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain. CRITIS 2020: 47-58 - [c65]Sotirios Katsikeas, Simon Hacks, Pontus Johnson, Mathias Ekstedt, Robert Lagerström, Joar Jacobsson, Max Wällstedt, Per Eliasson:
An Attack Simulation Language for the IT Domain. GraMSec@CSF 2020: 67-86 - [c64]Robert Lagerström, Wenjun Xiong, Mathias Ekstedt:
Threat Modeling and Attack Simulations of Smart Cities: A Literature Review and Explorative Study. ICISSP 2020: 369-376 - 2019
- [c56]Xinyue Mao, Mathias Ekstedt, Engla Ling, Erik Ringdahl, Robert Lagerström:
Conceptual Abstraction of Attack Graphs - A Use Case of securiCAD. GraMSec@CSF 2019: 186-202 - 2018
- [j14]Alexandre Vernotte, Margus Välja, Matus Korman, Gunnar Björkman, Mathias Ekstedt, Robert Lagerström:
Load balancing of renewable energy: a cyber security analysis. Energy Inform. 1(1) (2018) - [j13]Pontus Johnson, Robert Lagerström, Mathias Ekstedt, Ulrik Franke:
Can the Common Vulnerability Scoring System be Trusted? A Bayesian Analysis. IEEE Trans. Dependable Secur. Comput. 15(6): 1002-1015 (2018) - [c50]Pontus Johnson, Robert Lagerström, Mathias Ekstedt:
A Meta Language for Threat Modeling and Attack Simulations. ARES 2018: 38:1-38:8 - 2017
- [j12]Robert Lagerström, Pontus Johnson, Mathias Ekstedt, Ulrik Franke, Khurram Shahzad:
Automated Probabilistic System Architecture Analysis in the Multi-Attribute Prediction Language (MAPL): Iteratively Developed using Multiple Case Studies. Complex Syst. Informatics Model. Q. 11: 38-68 (2017) - [c47]Matus Korman, Margus Välja, Gunnar Björkman, Mathias Ekstedt, Alexandre Vernotte, Robert Lagerström:
Analyzing the Effectiveness of Attack Countermeasures in a SCADA System. SPSR-SG@CPSWeek 2017: 73-78 - [c46]Robert Lagerström, Pontus Johnson, Mathias Ekstedt:
Automatic Design of Secure Enterprise Architecture: Work in Progress Paper. EDOC Workshops 2017: 65-70 - [c45]Alexandre Vernotte, Pontus Johnson, Mathias Ekstedt, Robert Lagerström:
In-Depth Modeling of the UNIX Operating System for Architectural Cyber Security Analysis. EDOC Workshops 2017: 127-136 - 2016
- [j11]Pontus Johnson, Dan Gorton, Robert Lagerström, Mathias Ekstedt:
Time between vulnerability disclosures: A measure of software product vulnerability. Comput. Secur. 62: 278-295 (2016) - [j10]Matus Korman, Robert Lagerström, Mathias Ekstedt:
Modeling Enterprise Authorization: A Unified Metamodel and Initial Validation. Complex Syst. Informatics Model. Q. 7: 1-24 (2016) - [c41]Pontus Johnson, Alexandre Vernotte, Mathias Ekstedt, Robert Lagerström:
pwnPr3d: An Attack-Graph-Driven Probabilistic Threat-Modeling Approach. ARES 2016: 278-283 - [c40]Pontus Johnson, Mathias Ekstedt, Robert Lagerström:
Automatic Probabilistic Enterprise IT Architecture Modeling: A Dynamic Bayesian Networks Approach. EDOC Workshops 2016: 1-8 - [c39]Pontus Johnson, Robert Lagerström, Mathias Ekstedt, Ulrik Franke:
Modeling and analyzing systems-of-systems in the multi-attribute prediction language (MAPL). SESoS@ICSE 2016: 1-7 - [c38]Pontus Johnson, Alexandre Vernotte, Dan Gorton, Mathias Ekstedt, Robert Lagerström:
Quantitative Information Security Risk Estimation Using Probabilistic Attack Graphs. RISK 2016: 37-52 - 2015
- [c36]Margus Välja, Robert Lagerström, Mathias Ekstedt, Matus Korman:
A Requirements Based Approach for Automating Enterprise IT Architecture Modeling Using Multiple Data Sources. EDOC Workshops 2015: 79-87 - [c35]Mathias Ekstedt, Pontus Johnson, Robert Lagerström, Dan Gorton, Joakim Nydren, Khurram Shahzad:
Securi CAD by Foreseeti: A CAD Tool for Enterprise Cyber Security Management. EDOC Workshops 2015: 152-155 - [c34]Robert Lagerström, Pontus Johnson, Mathias Ekstedt:
Search-Based Design of Large Software Systems-of-Systems. SESoS@ICSE 2015: 44-47 - [c33]Matus Korman, Robert Lagerström, Mathias Ekstedt:
Modeling Authorization in Enterprise-wide Contexts. PoEM (Short Papers) 2015: 81-90 - 2014
- [j8]Hannes Holm, Markus Buschle, Robert Lagerström, Mathias Ekstedt:
Automatic data collection for enterprise architecture models. Softw. Syst. Model. 13(2): 825-841 (2014) - [c31]Robert Lagerström, Mathias Ekstedt:
Extending a general theory of software to engineering. GTSE 2014: 36-39 - 2011
- [c26]Robert Lagerström, Teodor Sommestad, Markus Buschle, Mathias Ekstedt:
Enterprise Architecture Management's Impact on Information Technology Success. HICSS 2011: 1-10 - [c25]Jan Saat, Robert Winter, Ulrik Franke, Robert Lagerström, Mathias Ekstedt:
Analysis of IT/Business Alignment Situations as a Precondition for the Design and Engineering of Situated IT/Business Alignment Solutions. HICSS 2011: 1-9 - 2010
- [j4]Robert Lagerström, Pontus Johnson, Mathias Ekstedt:
Architecture analysis of enterprise systems modifiability: a metamodel for software change cost estimation. Softw. Qual. J. 18(4): 437-468 (2010) - [c22]Jan Saat, Ulrik Franke, Robert Lagerström, Mathias Ekstedt:
Enterprise Architecture Meta Models for IT/Business Alignment Situations. EDOC 2010: 14-23 - [c21]Johan König, Kun Zhu, Lars Nordström, Mathias Ekstedt, Robert Lagerström:
Mapping the Substation Configuration Language of IEC 61850 to ArchiMate. EDOCW 2010: 60-68 - [c20]Ulrik Franke, Mathias Ekstedt, Robert Lagerström, Jan Saat, Robert Winter:
Trends in Enterprise Architecture Practice - A Survey. TEAR 2010: 16-29 - 2009
- [c19]Robert Lagerström, Jan Saat, Ulrik Franke, Stephan Aier, Mathias Ekstedt:
Enterprise Meta Modeling Methods - Combining a Stakeholder-Oriented and a Causality-Based Approach. BMMDS/EMMSAD 2009: 381-393 - [c18]Ulrik Franke, Pontus Johnson, Robert Lagerström, Johan Ullberg, David Höök, Mathias Ekstedt, Johan König:
A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis. CSMR 2009: 241-246 - [c17]Mathias Ekstedt, Ulrik Franke, Pontus Johnson, Robert Lagerström, Teodor Sommestad, Johan Ullberg, Markus Buschle:
A Tool for Enterprise Architecture Analysis of Maintainability. CSMR 2009: 327-328 - [c15]Ulrik Franke, Pontus Johnson, Robert Lagerström, Johan Ullberg, David Höök, Mathias Ekstedt, Johan König:
A formal method for cost and accuracy trade-off analysis in software assessment measures. RCIS 2009: 295-302 - [c13]Ulrik Franke, David Höök, Johan König, Robert Lagerström, Per Närman, Johan Ullberg, Pia Gustafsson, Mathias Ekstedt:
EAF2- A Framework for Categorizing Enterprise Architecture Frameworks. SNPD 2009: 327-332 - 2008
- [c8]Johan Ullberg, Robert Lagerström, Mathias Ekstedt:
A framework for interoperability analysis on the semantic web using architecture models. EDOCW 2008: 207-215 - [c5]Per Närman, Pontus Johnson, Robert Lagerström, Ulrik Franke, Mathias Ekstedt:
Data Collection Prioritization for System Quality Analysis. SQM@CSMR 2008: 29-42
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 17:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint