Threat modeling–A systematic literature review W Xiong, R Lagerström Computers & security 84, 53-69, 2019 | 309 | 2019 |
Enterprise architecture analysis with extended influence diagrams P Johnson, R Lagerström, P Närman, M Simonsson Information Systems Frontiers 9, 163-180, 2007 | 235 | 2007 |
Enterprise architecture: models and analyses for information systems decision making et al. P Johnson, M Ekstedt, R Lagerström Studentlitteratur, 2007 | 178 | 2007 |
Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix W Xiong, E Legrand, O Åberg, R Lagerström Software and Systems Modeling 21 (1), 157-177, 2022 | 170 | 2022 |
A meta language for threat modeling and attack simulations P Johnson, R Lagerström, M Ekstedt Proceedings of the 13th international conference on availability …, 2018 | 161 | 2018 |
Can the common vulnerability scoring system be trusted? a bayesian analysis P Johnson, R Lagerström, M Ekstedt, U Franke IEEE Transactions on Dependable and Secure Computing 15 (6), 1002-1015, 2016 | 122 | 2016 |
Enterprise architecture meta models for IT/business alignment situations J Saat, U Franke, R Lagerström, M Ekstedt 2010 14th IEEE International Enterprise Distributed Object Computing …, 2010 | 122 | 2010 |
Quantifying success factors for IT projects—an expert-based Bayesian model L Gingnell, U Franke, R Lagerström, E Ericsson, J Lilliesköld Information systems management 31 (1), 21-36, 2014 | 106 | 2014 |
Automatic data collection for enterprise architecture models H Holm, M Buschle, R Lagerström, M Ekstedt Software & Systems Modeling 13, 825-841, 2014 | 98 | 2014 |
EAF2-A framework for categorizing enterprise architecture frameworks U Franke, D Hook, J Konig, R Lagerstrom, P Narman, J Ullberg, ... 2009 10th ACIS International Conference on Software Engineering, Artificial …, 2009 | 87 | 2009 |
securiCAD by foreseeti: A CAD tool for enterprise cyber security management M Ekstedt, P Johnson, R Lagerström, D Gorton, J Nydrén, K Shahzad 2015 IEEE 19th International Enterprise Distributed Object Computing …, 2015 | 84 | 2015 |
A tool for enterprise architecture analysis using the PRM formalism M Buschle, J Ullberg, U Franke, R Lagerström, T Sommestad Information Systems Evolution: CAiSE Forum 2010, Hammamet, Tunisia, June 7-9 …, 2011 | 82 | 2011 |
Enterprise Architecture Management's Impact on Information Technology Success R Lagerstrom, T Sommestad, M Buschle, M Ekstedt System Sciences (HICSS), 2011 44th Hawaii International Conference on, 1-10, 2011 | 77 | 2011 |
Architecture analysis of enterprise systems modifiability–models, analysis, and validation R Lagerström, P Johnson, D Höök Journal of Systems and Software 83 (8), 1387-1403, 2010 | 77 | 2010 |
pwnpr3d: an attack-graph-driven probabilistic threat-modeling approach P Johnson, A Vernotte, M Ekstedt, R Lagerström 2016 11th international conference on availability, reliability and security …, 2016 | 71 | 2016 |
A method for creating entreprise architecture metamodels: applied to systems modifiability R Lagerström, U Franke, P Johnson, J Ullberg International Journal of Computer Science and Applications 6 (5), 89-120, 2009 | 71 | 2009 |
Identifying factors affecting software development cost and productivity R Lagerström, LM von Würtemberg, H Holm, O Luczak Software Quality Journal 20, 395-417, 2012 | 60 | 2012 |
Time between vulnerability disclosures: A measure of software product vulnerability P Johnson, D Gorton, R Lagerström, M Ekstedt Computers & Security 62, 278-295, 2016 | 54 | 2016 |
Formalizing analysis of enterprise architecture P Johnson, L Nordström, R Lagerström Enterprise Interoperability: New Challenges and Approaches, 35-44, 2007 | 54 | 2007 |
Analyzing system maintainability using enterprise architecture models R Lagerström Workshop on Trends in Enterprise Architecture Research (TEAR 2007), St …, 2007 | 54 | 2007 |