The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures T Sommestad, M Ekstedt, H Holm IEEE Systems Journal 7 (3), 363-373, 2012 | 201 | 2012 |
A survey of industrial control system testbeds H Holm, M Karresand, A Vidström, E Westring Secure IT Systems: 20th Nordic Conference, NordSec 2015, Stockholm, Sweden …, 2015 | 138 | 2015 |
PCySeMoL: Predictive, Probabilistic Cyber Security Modeling Language H Holm, K Shahzad, M Buschle, M Ekstedt IEEE Transactions on Dependable and Secure Computing 12 (6), 626-639, 2014 | 124 | 2014 |
A quantitative evaluation of vulnerability scanning H Holm, T Sommestad, J Almroth, M Persson Information Management & Computer Security 19 (4), 231-247, 2011 | 118 | 2011 |
Empirical analysis of system-level vulnerability metrics through actual attacks H Holm, M Ekstedt, D Andersson Ieee Transactions On Dependable And Secure Computing, 1-11, 2012 | 114 | 2012 |
Signature based intrusion detection for zero-day attacks:(not) a closed chapter? H Holm 2014 47th Hawaii international conference on system sciences, 4895-4904, 2014 | 101 | 2014 |
Automatic data collection for enterprise architecture models H Holm, M Buschle, R Lagerström, M Ekstedt Software & Systems Modeling 13, 825-841, 2014 | 98 | 2014 |
Investigating personal determinants of phishing and the effect of national culture W Rocha Flores, H Holm, M Nohlberg, M Ekstedt Information & Computer Security 23 (2), 178-199, 2015 | 93 | 2015 |
Using phishing experiments and scenario-based surveys to understand security behaviours in practice W Rocha Flores, H Holm, G Svensson, G Ericsson Information Management & Computer Security 22 (4), 393-406, 2014 | 93 | 2014 |
An expert-based investigation of the common vulnerability scoring system H Holm, KK Afridi Computers & Security 53, 18-30, 2015 | 91 | 2015 |
A Tool for automatic Enterprise Architecture modeling M Buschle, H Holm, T Sommestad, M Ekstedt, K Shahzad IS Olympics: Information Systems in a Diverse World: CAiSE Forum 2011 …, 2012 | 60 | 2012 |
Using enterprise architecture and technology adoption models to predict application usage P Närman, H Holm, D Höök, N Honeth, P Johnson Journal of Systems and Software 85 (8), 1953-1967, 2012 | 58 | 2012 |
Identifying factors affecting software development cost and productivity R Lagerström, LM von Würtemberg, H Holm, O Luczak Software Quality Journal 20, 395-417, 2012 | 58 | 2012 |
Data accuracy assessment using enterprise architecture P Närman, H Holm, P Johnson, J König, M Chenine, M Ekstedt Enterprise Information Systems 5 (1), 37-58, 2011 | 56 | 2011 |
A large-scale study of the time required to compromise a computer system H Holm IEEE Transactions on Dependable and Secure Computing 11 (1), 2-15, 2013 | 51 | 2013 |
Performance of automated network vulnerability scanning at remediating security issues H Holm Computers & Security 31 (2), 164-175, 2012 | 45 | 2012 |
Using enterprise architecture analysis and interview data to estimate service response time P Närman, H Holm, M Ekstedt, N Honeth The Journal of Strategic Information Systems 22 (1), 70-85, 2013 | 44 | 2013 |
CySeMoL: A tool for cyber security analysis of enterprises H Holm, T Sommestad, M Ekstedt, L NordströM 22nd International Conference and Exhibition on Electricity Distribution …, 2013 | 42 | 2013 |
Sved: Scanning, vulnerabilities, exploits and detection H Holm, T Sommestad MILCOM 2016-2016 IEEE Military Communications Conference, 976-981, 2016 | 39 | 2016 |
Cyber security for a smart grid-what about phishing? H Holm, WR Flores, G Ericsson IEEE PES ISGT Europe 2013, 1-5, 2013 | 39 | 2013 |