Robert Lagerström

Orcid: 0000-0003-3089-3885

According to our database1, Robert Lagerström authored at least 105 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Yet another cybersecurity risk assessment framework.
Int. J. Inf. Sec., December, 2023

Automated Security Assessments of Amazon Web Services Environments.
ACM Trans. Priv. Secur., May, 2023

Research communities in cyber security vulnerability assessments: A comprehensive literature review.
Comput. Sci. Rev., May, 2023

Penetration testing of connected households.
Comput. Secur., March, 2023

PatrIoT: practical and agile threat research for IoT.
Int. J. Inf. Sec., 2023

The meta attack language - a formal description.
Comput. Secur., 2023

2022
Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix.
Softw. Syst. Model., 2022

Enhancing Cyber Security of LoRaWAN Gateways under Adversarial Attacks.
Sensors, 2022

VehicleLang: A probabilistic modeling and simulation language for modern vehicle IT infrastructures.
Comput. Secur., 2022

Two decades of cyberattack simulations: A systematic literature review.
Comput. Secur., 2022

Securing Communication and Identifying Threats in RTUs: A Vulnerability Analysis.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Preface to the EDOC 2017/2018 Special Issue.
Inf. Syst., 2021

Research communities in cyber security: A comprehensive literature review.
Comput. Sci. Rev., 2021

A Method for Assigning Probability Distributions in Attack Simulation Languages.
Complex Syst. Informatics Model. Q., 2021

A Method for Quality Assessment of Threat Modeling Languages: The Case of enterpriseLang.
Proceedings of the Forum at Practice of Enterprise Modeling 2021 (PoEM-Forum 2021) (PoEM 2021), 2021

Why Phishing Works on Smartphones: A Preliminary Study.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Anomaly-based Intrusion Detection using Tree Augmented Naive Bayes.
Proceedings of the 25th International Enterprise Distributed Object Computing Workshop, 2021

Towards Automated Attack Simulations of BPMN-based Processes.
Proceedings of the 25th IEEE International Enterprise Distributed Object Computing Conference, 2021

Attacking Websites Using HTTP Request Smuggling: Empirical Testing of Servers and Proxies.
Proceedings of the 25th IEEE International Enterprise Distributed Object Computing Conference, 2021

Integrating Security Behavior into Attack Simulations.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
powerLang: a probabilistic attack simulation language for the power domain.
Energy Inform., 2020

Automating threat modeling using an ontology framework.
Cybersecur., 2020

Divergence Between Conceptual Business Process Management and its Practical Business Improvement Implementation: A Comparative Study.
Proceedings of the 22nd IEEE Conference on Business Informatics, 2020

Ethical Principles for Designing Responsible Offensive Cyber Security Training.
Proceedings of the Privacy and Identity Management: 15th IFIP WG 9.2, 2020

Assessing Alignment Between Business and IT Strategy: A Case Study.
Proceedings of the Forum at Practice of Enterprise Modeling 2020 co-located with the 13th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling (PoEM 2020), 2020

Threat Modeling and Attack Simulations of Smart Cities: A Literature Review and Explorative Study.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Securing IoT Devices using Geographic and Continuous Login Blocking: A Honeypot Study.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

An Attack Simulation Language for the IT Domain.
Proceedings of the Graphical Models for Security - 7th International Workshop, 2020

A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain.
Proceedings of the Critical Information Infrastructures Security, 2020

Evaluating the Impact of Inter Process Communication in Microservice Architectures.
Proceedings of the 8th International Workshop on Quantitative Approaches to Software Quality co-located with 27th Asia-Pacific Software Engineering Conference (APSEC 2020), 2020

2019
A Framework for Automatic IT Architecture Modeling: Applying Truth Discovery.
Complex Syst. Informatics Model. Q., 2019

A Methodology for Operationalizing Enterprise IT Architecture and Evaluating its Modifiability.
Complex Syst. Informatics Model. Q., 2019

Threat modeling - A systematic literature review.
Comput. Secur., 2019

A Study of Security Vulnerabilities and Software Weaknesses in Vehicles.
Proceedings of the Secure IT Systems, 2019

Threat Modeling and Attack Simulations of Connected Vehicles: Proof of Concept.
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019

Threat Modeling and Attack Simulations of Connected Vehicles: A Research Outlook.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Probabilistic Modeling and Simulation of Vehicular Cyber Attacks: An Application of the Meta Attack Language.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Multivariate Unsupervised Machine Learning for Anomaly Detection in Enterprise Applications.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Conceptual Abstraction of Attack Graphs - A Use Case of securiCAD.
Proceedings of the Graphical Models for Security - 6th International Workshop, 2019

Re-using Enterprise Architecture Repositories for Agile Threat Modeling.
Proceedings of the 23rd IEEE International Enterprise Distributed Object Computing Workshop, 2019

Creating Meta Attack Language Instances using ArchiMate: Applied to Electric Power and Energy System Cases.
Proceedings of the 23rd IEEE International Enterprise Distributed Object Computing Conference, 2019

Threat Modeling of Connected Vehicles: A privacy analysis and extension of vehicleLang.
Proceedings of the International Conference on Cyber Situational Awareness, 2019

2018
Can the Common Vulnerability Scoring System be Trusted? A Bayesian Analysis.
IEEE Trans. Dependable Secur. Comput., 2018

Load balancing of renewable energy: a cyber security analysis.
Energy Inform., 2018

Enterprise Architecture and Agile Development: Friends or Foes?
Proceedings of the 22nd IEEE International Enterprise Distributed Object Computing Workshop, 2018

A Meta Language for Threat Modeling and Attack Simulations.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Automated Probabilistic System Architecture Analysis in the Multi-Attribute Prediction Language (MAPL): Iteratively Developed using Multiple Case Studies.
Complex Syst. Informatics Model. Q., 2017

Software Architecture Decoupling at Ericsson.
Proceedings of the 2017 IEEE International Conference on Software Architecture Workshops, 2017

A Meta Model for Interoperability of Secure Business Transactions - Using BlockChain and DEMO.
Proceedings of the 9th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, 2017

Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

In-Depth Modeling of the UNIX Operating System for Architectural Cyber Security Analysis.
Proceedings of the 21st IEEE International Enterprise Distributed Object Computing Workshop, 2017

Automatic Design of Secure Enterprise Architecture: Work in Progress Paper.
Proceedings of the 21st IEEE International Enterprise Distributed Object Computing Workshop, 2017

A Study on Software Vulnerabilities and Weaknesses of Embedded Systems in Power Networks.
Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, 2017

Analyzing the Effectiveness of Attack Countermeasures in a SCADA System.
Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, 2017

2016
Modeling Enterprise Authorization: A Unified Metamodel and Initial Validation.
Complex Syst. Informatics Model. Q., 2016

Time between vulnerability disclosures: A measure of software product vulnerability.
Comput. Secur., 2016

Quantitative Information Security Risk Estimation Using Probabilistic Attack Graphs.
Proceedings of the Risk Assessment and Risk-Driven Quality Assurance, 2016

Modeling and analyzing systems-of-systems in the multi-attribute prediction language (MAPL).
Proceedings of the 4th International Workshop on Software Engineering for Systems-of-Systems, 2016

Automatic Probabilistic Enterprise IT Architecture Modeling: A Dynamic Bayesian Networks Approach.
Proceedings of the 20th IEEE International Enterprise Distributed Object Computing Workshop, 2016

pwnPr3d: An Attack-Graph-Driven Probabilistic Threat-Modeling Approach.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Modeling Authorization in Enterprise-wide Contexts.
Proceedings of Short and Doctoral Consortium Papers Presented at the 8th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modelling (PoEM 2015), 2015

Search-Based Design of Large Software Systems-of-Systems.
Proceedings of the 3rd IEEE/ACM International Workshop on Software Engineering for Systems-of-Systems, 2015

A Requirements Based Approach for Automating Enterprise IT Architecture Modeling Using Multiple Data Sources.
Proceedings of the 19th IEEE International Enterprise Distributed Object Computing Workshop, 2015

Securi CAD by Foreseeti: A CAD Tool for Enterprise Cyber Security Management.
Proceedings of the 19th IEEE International Enterprise Distributed Object Computing Workshop, 2015

Revealing Hidden Structures in Organizational Transformation - A Case Study.
Proceedings of the Advanced Information Systems Engineering Workshops, 2015

2014
Automatic data collection for enterprise architecture models.
Softw. Syst. Model., 2014

Quantifying Success Factors for IT Projects - An Expert-Based Bayesian Model.
Inf. Syst. Manag., 2014

Extending a general theory of software to engineering.
Proceedings of the 3rd SEMAT Workshop on General Theories of Software Engineering, 2014

Visualizing and Measuring Enterprise Application Architecture: An Exploratory Telecom Case.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2013
Increasing software development efficiency and maintainability for complex industrial systems - A case study.
J. Softw. Evol. Process., 2013

Visualizing and Measuring Enterprise Architecture: An Exploratory BioPharma Case.
Proceedings of the Practice of Enterprise Modeling, 2013

Software Migration Project Cost Estimation using COCOMO II and Enterprise Architecture Modeling.
Proceedings of the Short Paper Proceedings of the 6th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling (PoEM 2013), 2013

Enterprise Architecture Evaluation Using Utility Theory.
Proceedings of the 17th IEEE International Enterprise Distributed Object Computing Conference Workshops, 2013

2012
Identifying factors affecting software development cost and productivity.
Softw. Qual. J., 2012

Assessing Modifiability in Application Services Using Enterprise Architecture Models - A Case Study.
Proceedings of the Trends in Enterprise Architecture Research and Practice-Driven Research on Enterprise Transformation, 2012

2011
Analysis of IT/Business Alignment Situations as a Precondition for the Design and Engineering of Situated IT/Business Alignment Solutions.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Enterprise Architecture Management's Impact on Information Technology Success.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

2010
Architecture analysis of enterprise systems modifiability: a metamodel for software change cost estimation.
Softw. Qual. J., 2010

Architecture analysis of enterprise systems modifiability - Models, analysis, and validation.
J. Syst. Softw., 2010

Trends in Enterprise Architecture Practice - A Survey.
Proceedings of the Trends in Enterprise Architecture Research - 5th International Workshop, 2010

Enterprise Architecture Meta Models for IT/Business Alignment Situations.
Proceedings of the 14th IEEE International Enterprise Distributed Object Computing Conference, 2010

Mapping the Substation Configuration Language of IEC 61850 to ArchiMate.
Proceedings of the Workshops Proceedings of the 14th IEEE International Enterprise Distributed Object Computing Conference, 2010

A Tool for Enterprise Architecture Analysis Using the PRM Formalism.
Proceedings of the Information Systems Evolution, 2010

2009
A method for creating entreprise architecture metamodels applied to systems modifiability.
Int. J. Comput. Sci. Appl., 2009

EAF2- A Framework for Categorizing Enterprise Architecture Frameworks.
Proceedings of the 10th ACIS International Conference on Software Engineering, 2009

An Enterprise Architecture Management Pattern for Software Change Project Cost Analysis.
Proceedings of the Software Engineering 2009, 2009

A formal method for cost and accuracy trade-off analysis in software assessment measures.
Proceedings of the Third IEEE International Conference on Research Challenges in Information Science, 2009

Decision support oriented Enterprise Architecture metamodel management using classification trees.
Proceedings of the Workshops Proceedings of the 12th IEEE International Enterprise Distributed Object Computing Conference, 2009

A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis.
Proceedings of the 13th European Conference on Software Maintenance and Reengineering, 2009

A Tool for Enterprise Architecture Analysis of Maintainability.
Proceedings of the 13th European Conference on Software Maintenance and Reengineering, 2009

Enterprise Meta Modeling Methods - Combining a Stakeholder-Oriented and a Causality-Based Approach.
Proceedings of the Enterprise, 2009

2008
Data Collection Prioritization for System Quality Analysis.
Proceedings of the International Workshop on Software Quality and Maintainability, 2008

The Linear Conditional Probability Matrix Generator for IT Governance Performance Prediction.
Proceedings of the Modelling, 2008

Enterprise Architecture: A Service Interoperability Analysis Framework.
Proceedings of the Enterprise Interoperability III, 2008

A framework for interoperability analysis on the semantic web using architecture models.
Proceedings of the Workshops Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008

Using Architectural Models to Predict the Maintainability of Enterprise Systems.
Proceedings of the 12th European Conference on Software Maintenance and Reengineering, 2008

Probabilistic Metamodel Merging.
Proceedings of the Forum at the CAiSE'08 Conference, Montpellier, France, June 18-20, 2008, 2008

A Framework for Service Interoperability Analysis using Enterprise Architecture Models.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008

A Bayesian network for IT governance performance prediction.
Proceedings of the 10th International Conference on Electronic Commerce 2008, 2008

2007
Extended Influence Diagrams for System Quality Analysis.
J. Softw., 2007

Enterprise architecture analysis with extended influence diagrams.
Inf. Syst. Frontiers, 2007

Extended Influence Diagram Generation.
Proceedings of the Enterprise Interoperability II, 2007

A Framework for Assessing Business Value of Service Oriented Architectures.
Proceedings of the 2007 IEEE International Conference on Services Computing (SCC 2007), 2007

2006
Formalizing Analysis of Enterprise Architecture.
Proceedings of the Enterprise Interoperability, 2006

Extended Influence Diagrams for Enterprise Architecture Analysis.
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006


  Loading...