80 results on '"Lagerström, A."'
Search Results
2. A Method for Quality Assessment of Threat Modeling Languages: The Case of enterpriseLang.
3. Towards Automated Attack Simulations of BPMN-based Processes.
4. Anomaly-based Intrusion Detection using Tree Augmented Naive Bayes.
5. Attacking Websites Using HTTP Request Smuggling: Empirical Testing of Servers and Proxies.
6. Why Phishing Works on Smartphones: A Preliminary Study.
7. Integrating Security Behavior into Attack Simulations.
8. Assessing Alignment Between Business and IT Strategy: A Case Study.
9. A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain.
10. Divergence Between Conceptual Business Process Management and its Practical Business Improvement Implementation: A Comparative Study.
11. Ethical Principles for Designing Responsible Offensive Cyber Security Training.
12. Securing IoT Devices using Geographic and Continuous Login Blocking: A Honeypot Study.
13. Threat Modeling and Attack Simulations of Smart Cities: A Literature Review and Explorative Study.
14. Evaluating the Impact of Inter Process Communication in Microservice Architectures.
15. An Attack Simulation Language for the IT Domain.
16. A Study of Security Vulnerabilities and Software Weaknesses in Vehicles.
17. Creating Meta Attack Language Instances using ArchiMate: Applied to Electric Power and Energy System Cases.
18. Re-using Enterprise Architecture Repositories for Agile Threat Modeling.
19. Multivariate Unsupervised Machine Learning for Anomaly Detection in Enterprise Applications.
20. Threat Modeling of Connected Vehicles: A privacy analysis and extension of vehicleLang.
21. Threat Modeling and Attack Simulations of Connected Vehicles: A Research Outlook.
22. Threat Modeling and Attack Simulations of Connected Vehicles: Proof of Concept.
23. Probabilistic Modeling and Simulation of Vehicular Cyber Attacks: An Application of the Meta Attack Language.
24. Conceptual Abstraction of Attack Graphs - A Use Case of securiCAD.
25. Enterprise Architecture and Agile Development: Friends or Foes?
26. A Meta Language for Threat Modeling and Attack Simulations.
27. Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities.
28. A Meta Model for Interoperability of Secure Business Transactions - Using BlockChain and DEMO.
29. Analyzing the Effectiveness of Attack Countermeasures in a SCADA System.
30. A Study on Software Vulnerabilities and Weaknesses of Embedded Systems in Power Networks.
31. Transform Your Kids Into Self Sustainable Power Plants: Teaching Sustainable Behaviour to Young Users.
32. Composting as Interior Design: Encouraging Sustainability throughout a Participatory Design Process.
33. Automatic Design of Secure Enterprise Architecture: Work in Progress Paper.
34. In-Depth Modeling of the UNIX Operating System for Architectural Cyber Security Analysis.
35. Software Architecture Decoupling at Ericsson.
36. Modeling and analyzing systems-of-systems in the multi-attribute prediction language (MAPL).
37. Quantitative Information Security Risk Estimation Using Probabilistic Attack Graphs.
38. Automatic Probabilistic Enterprise IT Architecture Modeling: A Dynamic Bayesian Networks Approach.
39. pwnPr3d: An Attack-Graph-Driven Probabilistic Threat-Modeling Approach.
40. Search-Based Design of Large Software Systems-of-Systems.
41. Modeling Authorization in Enterprise-wide Contexts.
42. Revealing Hidden Structures in Organizational Transformation - A Case Study.
43. Securi CAD by Foreseeti: A CAD Tool for Enterprise Cyber Security Management.
44. A Requirements Based Approach for Automating Enterprise IT Architecture Modeling Using Multiple Data Sources.
45. Extending a general theory of software to engineering.
46. Metadesigning interactive outdoor games for children: a case study.
47. Visualizing and Measuring Enterprise Application Architecture: An Exploratory Telecom Case.
48. Software Migration Project Cost Estimation using COCOMO II and Enterprise Architecture Modeling.
49. Visualizing and Measuring Enterprise Architecture: An Exploratory BioPharma Case.
50. Rapid prototyping of outdoor games for children in an iterative design process.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.