Pontus Johnson

Orcid: 0000-0002-3293-1681

According to our database1, Pontus Johnson authored at least 104 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Automated Security Assessments of Amazon Web Services Environments.
ACM Trans. Priv. Secur., May, 2023

Towards a Graph Neural Network-Based Approach for Estimating Hidden States in Cyber Attack Simulations.
CoRR, 2023

Training Automated Defense Strategies Using Graph-based Cyber Attack Simulations.
CoRR, 2023

The meta attack language - a formal description.
Comput. Secur., 2023

2022
VehicleLang: A probabilistic modeling and simulation language for modern vehicle IT infrastructures.
Comput. Secur., 2022

Cyber threat response using reinforcement learning in graph-based attack simulations.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

2021
Research communities in cyber security: A comprehensive literature review.
Comput. Sci. Rev., 2021

Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine.
CoRR, 2021

2020
An Attack Simulation Language for the IT Domain.
Proceedings of the Graphical Models for Security - 7th International Workshop, 2020

2019
Probabilistic Modeling and Simulation of Vehicular Cyber Attacks: An Application of the Meta Attack Language.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2018
Can the Common Vulnerability Scoring System be Trusted? A Bayesian Analysis.
IEEE Trans. Dependable Secur. Comput., 2018

Consensus in Software Engineering: A Cognitive Mapping Study.
CoRR, 2018

A Meta Language for Threat Modeling and Attack Simulations.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Empirical assessment of the accuracy of an interoperability prediction language.
Inf. Syst. Frontiers, 2017

Automated Probabilistic System Architecture Analysis in the Multi-Attribute Prediction Language (MAPL): Iteratively Developed using Multiple Case Studies.
Complex Syst. Informatics Model. Q., 2017

In-Depth Modeling of the UNIX Operating System for Architectural Cyber Security Analysis.
Proceedings of the 21st IEEE International Enterprise Distributed Object Computing Workshop, 2017

Automatic Design of Secure Enterprise Architecture: Work in Progress Paper.
Proceedings of the 21st IEEE International Enterprise Distributed Object Computing Workshop, 2017

2016
The Tarpit - A general theory of software engineering.
Inf. Softw. Technol., 2016

Using enterprise architecture to analyse how organisational structure impact motivation and learning.
Enterp. Inf. Syst., 2016

Time between vulnerability disclosures: A measure of software product vulnerability.
Comput. Secur., 2016

Quantitative Information Security Risk Estimation Using Probabilistic Attack Graphs.
Proceedings of the Risk Assessment and Risk-Driven Quality Assurance, 2016

Modeling and analyzing systems-of-systems in the multi-attribute prediction language (MAPL).
Proceedings of the 4th International Workshop on Software Engineering for Systems-of-Systems, 2016

Analyzing Coordination and Flexibility in Organizations Using Enterprise Architecture.
Proceedings of the 20th IEEE International Enterprise Distributed Object Computing Workshop, 2016

Automatic Probabilistic Enterprise IT Architecture Modeling: A Dynamic Bayesian Networks Approach.
Proceedings of the 20th IEEE International Enterprise Distributed Object Computing Workshop, 2016

pwnPr3d: An Attack-Graph-Driven Probabilistic Threat-Modeling Approach.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Towards general theories of software engineering.
Sci. Comput. Program., 2015

Search-Based Design of Large Software Systems-of-Systems.
Proceedings of the 3rd IEEE/ACM International Workshop on Software Engineering for Systems-of-Systems, 2015

Exploring Theory of Cognition for General Theory of Software Engineering.
Proceedings of the IEEE/ACM 4th SEMAT Workshop on a General Theory of Software Engineering, 2015

Integrated Metamodel for Security Analysis.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

Securi CAD by Foreseeti: A CAD Tool for Enterprise Cyber Security Management.
Proceedings of the 19th IEEE International Enterprise Distributed Object Computing Workshop, 2015

2014
An architecture framework for enterprise IT service availability analysis.
Softw. Syst. Model., 2014

How to Develop a General Theory of Software Engineering: Report on the GTSE 2014 Workshop.
ACM SIGSOFT Softw. Eng. Notes, 2014

An architecture modeling framework for probabilistic prediction.
Inf. Syst. E Bus. Manag., 2014

A method for predicting the probability of business network profitability.
Inf. Syst. E Bus. Manag., 2014

2013
Report on the first SEMAT workshop on general theory of software engineering (GTSE 2012).
ACM SIGSOFT Softw. Eng. Notes, 2013

Report on the Second SEMAT Workshop on General Theory of Software Engineering (GTSE 2013).
ACM SIGSOFT Softw. Eng. Notes, 2013

Computer in Industry Special Issue on "Interoperability and Future Internet for Next-Generation Enterprises" Editorial and state of the art.
Comput. Ind., 2013

P2AMF: Predictive, Probabilistic Architecture Modeling Framework.
Proceedings of the Enterprise Interoperability - 5th International IFIP Working Conference, 2013

Business Model Risk Analysis: Predicting the Probability of Business Network Profitability.
Proceedings of the Enterprise Interoperability - 5th International IFIP Working Conference, 2013

2nd SEMAT workshop on a general theory of software engineering (GTSE 2013).
Proceedings of the 35th International Conference on Software Engineering, 2013

Modeling and Prediction of Monetary and Non-monetary Business Values.
Proceedings of the 17th IEEE International Enterprise Distributed Object Computing Conference, 2013

Enterprise Architecture Evaluation Using Utility Theory.
Proceedings of the 17th IEEE International Enterprise Distributed Object Computing Conference Workshops, 2013

The Enterprise Architecture Analysis Tool - Support for the Predictive, Probabilistic Architecture Modeling Framework.
Proceedings of the 19th Americas Conference on Information Systems, 2013

2012
Availability of enterprise IT systems: an expert-based Bayesian framework.
Softw. Qual. J., 2012

Where's the Theory for Software Engineering?
IEEE Softw., 2012

Using enterprise architecture and technology adoption models to predict application usage.
J. Syst. Softw., 2012

A language for interoperability modeling and prediction.
Comput. Ind., 2012

Re-founding software engineering - SEMAT at the age of three (keynote abstract).
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

Predicting Interoperability in an Environmental Assurance System.
Proceedings of the Enterprise Interoperability V, 2012

2011
Data accuracy assessment using enterprise architecture.
Enterp. Inf. Syst., 2011

A Modeling Language for Interoperability Assessments.
Proceedings of the Enterprise Interoperability, 2011

A Meta-language for Enterprise Architecture Analysis.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2011

2010
Architecture analysis of enterprise systems modifiability: a metamodel for software change cost estimation.
Softw. Qual. J., 2010

Architecture analysis of enterprise systems modifiability - Models, analysis, and validation.
J. Syst. Softw., 2010

The Effect of IT Governance Maturity on IT Governance Performance.
Inf. Syst. Manag., 2010

A probabilistic relational model for security risk analysis.
Comput. Secur., 2010

A Tool for Interoperability Analysis of Enterprise Architecture Models using Pi-OCL.
Proceedings of the Enterprise Interoperability IV, 2010

Hybrid Probabilistic Relational Models for System Quality Analysis.
Proceedings of the 14th IEEE International Enterprise Distributed Object Computing Conference, 2010

2009
A method for creating entreprise architecture metamodels applied to systems modifiability.
Int. J. Comput. Sci. Appl., 2009

Enterprise architecture dependency analysis using fault trees and Bayesian networks.
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009

A Method for Constructing a Company Specific Enterprise Architecture Model Framework.
Proceedings of the 10th ACIS International Conference on Software Engineering, 2009

An Enterprise Architecture Management Pattern for Software Change Project Cost Analysis.
Proceedings of the Software Engineering 2009, 2009

A formal method for cost and accuracy trade-off analysis in software assessment measures.
Proceedings of the Third IEEE International Conference on Research Challenges in Information Science, 2009

Barriers to Enterprise Interoperability.
Proceedings of the Enterprise Interoperability - Second IFIP WG 5.8 International Workshop, 2009

Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

A Survival Analysis of Application Life Spans based on Enterprise Architecture Models.
Proceedings of the Enterprise Modelling and Information Systems Architectures: Proceedings of the 3rd International Workshop on Enterprise Modelling and Information Systems Architectures; Ulm, 2009

Enterprise Architecture Analysis for Data Accuracy Assessments.
Proceedings of the 13th IEEE International Enterprise Distributed Object Computing Conference, 2009

Modeling the IT Impact on Organizational Structure.
Proceedings of the 13th IEEE International Enterprise Distributed Object Computing Conference, 2009

Decision support oriented Enterprise Architecture metamodel management using classification trees.
Proceedings of the Workshops Proceedings of the 12th IEEE International Enterprise Distributed Object Computing Conference, 2009

An Enterprise Architecture framework for application consolidation in the Swedish Armed Forces.
Proceedings of the Workshops Proceedings of the 12th IEEE International Enterprise Distributed Object Computing Conference, 2009

A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis.
Proceedings of the 13th European Conference on Software Maintenance and Reengineering, 2009

A Tool for Enterprise Architecture Analysis of Maintainability.
Proceedings of the 13th European Conference on Software Maintenance and Reengineering, 2009

Enterprise Architecture Analysis using Fault Trees and MODAF.
Proceedings of the Forum at the CAiSE 2009 Conference, 2009

2008
Report on the IFIP WG5.8 international workshop on enterprise interoperability (IWEI 2008).
SIGMOD Rec., 2008

Assessment of business process information security.
Int. J. Bus. Process. Integr. Manag., 2008

Data Collection Prioritization for System Quality Analysis.
Proceedings of the International Workshop on Software Quality and Maintainability, 2008

The Linear Conditional Probability Matrix Generator for IT Governance Performance Prediction.
Proceedings of the Modelling, 2008

Quantifying IT Impacts on Organizational Structure and Business Value with Extended Influence Diagrams.
Proceedings of the Practice of Enterprise Modeling, First IFIP WG 8.1 Working Conference, 2008

Enterprise Architecture: A Service Interoperability Analysis Framework.
Proceedings of the Enterprise Interoperability III, 2008

Introduction: Third Workshop on Trends in Enterprise Architecture Research (TEAR 2008).
Proceedings of the Service-Oriented Computing - ICSOC 2008 Workshops, 2008

The IT Organization Modeling and Assessment Tool: Correlating IT Governance Maturity with the Effect of IT.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

Combining Defense Graphs and Enterprise Architecture Models for Security Analysis.
Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008

Using Enterprise Architecture Models for System Quality Analysis.
Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008

Using Architectural Models to Predict the Maintainability of Enterprise Systems.
Proceedings of the 12th European Conference on Software Maintenance and Reengineering, 2008

The IT Organization Modeling and Assessment Tool for IT Governance Decision Support.
Proceedings of the Advanced Information Systems Engineering, 20th International Conference, 2008

Probabilistic Metamodel Merging.
Proceedings of the Forum at the CAiSE'08 Conference, Montpellier, France, June 18-20, 2008, 2008

A Framework for Service Interoperability Analysis using Enterprise Architecture Models.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008

A Bayesian network for IT governance performance prediction.
Proceedings of the 10th International Conference on Electronic Commerce 2008, 2008

2007
Extended Influence Diagrams for System Quality Analysis.
J. Softw., 2007

Enterprise architecture analysis with extended influence diagrams.
Inf. Syst. Frontiers, 2007

Extended Influence Diagram Generation.
Proceedings of the Enterprise Interoperability II, 2007

In Search of a Unified Theory of Software Engineering.
Proceedings of the Second International Conference on Software Engineering Advances (ICSEA 2007), 2007

Enterprise Architecture: A Framework Supporting System Quality Analysis.
Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 2007

A Tool for Enterprise Architecture Analysis.
Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 2007

Model-Based IT Governance Maturity Assessments with Cobit.
Proceedings of the Fifteenth European Conference on Information Systems, 2007

2006
A survey on CIO concerns-do enterprise architecture frameworks support them?
Inf. Syst. Frontiers, 2006

Formalizing Analysis of Enterprise Architecture.
Proceedings of the Enterprise Interoperability, 2006

Assessment of Enterprise Information Security - The Importance of Information Search Cost.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

Extended Influence Diagrams for Enterprise Architecture Analysis.
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006

2005
Scenario-based Evaluation of Enterprise - a Top-Down Approach for Chief Information Officer Decision Making.
Proceedings of the ICEIS 2005, 2005

Assessment of Enterprise Information Security - The Importance of Prioritization.
Proceedings of the Ninth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2005), 2005

2004
Consistent Enterprise Software System Architecture for the CIO - A Utility-Cost Based Approach.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2001
Architectural Integration Styles for Large-Scale Enterprise Software Systems.
Proceedings of the 5th International Enterprise Distributed Object Computing Conference (EDOC 2001), 2001

2000
IT Infrastructure Architectures for Electric Utilities - A Comparative Analysis of Description Techniques.
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 2000


  Loading...