Hannes Holm
Hannes Holm
Verifierad e-postadress på ics.kth.se
Citeras av
Citeras av
The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures
T Sommestad, M Ekstedt, H Holm
IEEE Systems Journal 7 (3), 363-373, 2012
Empirical analysis of system-level vulnerability metrics through actual attacks
H Holm, M Ekstedt, D Andersson
Ieee Transactions On Dependable And Secure Computing, 1-11, 2012
PCySeMoL: Predictive, Probabilistic Cyber Security Modeling Language
H Holm, K Shahzad, M Buschle, M Ekstedt
IEEE Transactions on Dependable and Secure Computing 12 (6), 626-639, 2014
A survey of industrial control system testbeds
H Holm, M Karresand, A Vidström, E Westring
Nordic Conference on Secure IT Systems, 11-26, 2015
Automatic data collection for enterprise architecture models
H Holm, M Buschle, R Lagerström, M Ekstedt
Software & Systems Modeling 13 (2), 825-841, 2014
A quantitative evaluation of vulnerability scanning
H Holm, T Sommestad, J Almroth, M Persson
Information Management & Computer Security, 2011
Signature based intrusion detection for zero-day attacks:(not) a closed chapter?
H Holm
2014 47th Hawaii international conference on system sciences, 4895-4904, 2014
A Tool for automatic Enterprise Architecture modeling
M Buschle, H Holm, T Sommestad, M Ekstedt, K Shahzad
International Conference on Advanced Information Systems Engineering, 1-15, 2011
An expert-based investigation of the common vulnerability scoring system
H Holm, KK Afridi
Computers & Security 53, 18-30, 2015
Using phishing experiments and scenario-based surveys to understand security behaviours in practice
WR Flores, H Holm, G Svensson, G Ericsson
Information Management & Computer Security, 2014
Data accuracy assessment using enterprise architecture
P Närman, H Holm, P Johnson, J König, M Chenine, M Ekstedt
Enterprise Information Systems 5 (1), 37-58, 2011
Investigating personal determinants of phishing and the effect of national culture
WR Flores, H Holm, M Nohlberg, M Ekstedt
Information & Computer Security, 2015
Using enterprise architecture and technology adoption models to predict application usage
P Närman, H Holm, D Höök, N Honeth, P Johnson
Journal of Systems and Software 85 (8), 1953-1967, 2012
Identifying factors affecting software development cost and productivity
R Lagerström, LM von Würtemberg, H Holm, O Luczak
Software Quality Journal 20 (2), 395-417, 2012
Using enterprise architecture analysis and interview data to estimate service response time
P Närman, H Holm, M Ekstedt, N Honeth
The Journal of Strategic Information Systems 22 (1), 70-85, 2013
A large-scale study of the time required to compromise a computer system
H Holm
IEEE Transactions on Dependable and Secure Computing 11 (1), 2-15, 2013
Performance of automated network vulnerability scanning at remediating security issues
H Holm
Computers & Security 31 (2), 164-175, 2012
The distribution of time to recovery of enterprise IT services
U Franke, H Holm, J König
IEEE Transactions on Reliability 63 (4), 858-867, 2014
Effort estimates for vulnerability discovery projects
T Sommestad, H Holm, M Ekstedt
2012 45th Hawaii International Conference on System Sciences, 5564-5573, 2012
CySeMoL: A tool for cyber security analysis of enterprises
H Holm, T Sommestad, M Ekstedt, L NordströM
22nd International Conference and Exhibition on Electricity Distribution …, 2013
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20