default search action
Teodor Sommestad
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Teodor Sommestad, Henrik Karlzén:
The unpredictability of phishing susceptibility: results from a repeated measures experiment. J. Cybersecur. 10(1) (2024) - 2023
- [c33]Henrik Karlzén, Teodor Sommestad:
Automatic incident response solutions: a review of proposed solutions' input and output. ARES 2023: 37:1-37:9 - [c32]Teodor Sommestad, Henrik Karlzén, Hanna Kvist, Hanna Gustafsson:
Skade - A Challenge Management System for Cyber Threat Hunting. ESORICS Workshops (1) 2023: 84-103 - [p1]Stefan Varga, Teodor Sommestad, Joel Brynielsson:
Automation of Cybersecurity Work. Artificial Intelligence and Cybersecurity 2023: 67-101 - 2022
- [j20]Teodor Sommestad, Hannes Holm, Daniel Steinvall:
Variables influencing the effectiveness of signature-based network intrusion detection systems. Inf. Secur. J. A Glob. Perspect. 31(6): 711-728 (2022) - 2020
- [c31]Maria Leitner, Teodor Sommestad:
International Workshop on Cyber Range Technologies and Applications (CACOE 2020). EuroS&P Workshops 2020: 1
2010 – 2019
- 2019
- [j19]Teodor Sommestad, Henrik Karlzén, Jonas Hallberg:
The Theory of Planned Behavior and Information Security Policy Compliance. J. Comput. Inf. Syst. 59(4): 344-353 (2019) - [c30]Teodor Sommestad, Henrik Karlzén:
A meta-analysis of field experiments on phishing susceptibility. eCrime 2019: 1-14 - 2018
- [j18]Teodor Sommestad:
Work-related groups and information security policy compliance. Inf. Comput. Secur. 26(5): 533-550 (2018) - [c29]Patrik Lif, Teodor Sommestad, Dennis Granåsen:
Development and evaluation of information elements for simplified cyber-incident reports. CyberSA 2018: 1-10 - 2017
- [j17]Hannes Holm, Teodor Sommestad:
So long, and thanks for only using readily available scripts. Inf. Comput. Secur. 25(1): 47-61 (2017) - [j16]Teodor Sommestad, Hannes Holm:
Alert verification through alert correlation - An empirical test of SnIPS. Inf. Secur. J. A Glob. Perspect. 26(1): 39-48 (2017) - [c28]Patrik Lif, Magdalena Granåsen, Teodor Sommestad:
Development and validation of technique to measure cyber situation awareness. CyberSA 2017: 1-8 - 2016
- [j15]Teodor Sommestad, Henrik Karlzén, Peter Nilsson, Jonas Hallberg:
An empirical test of the perceived relationship between risk and the constituents severity and probability. Inf. Comput. Secur. 24(2): 194-204 (2016) - [c27]Hannes Holm, Teodor Sommestad:
SVED: Scanning, Vulnerabilities, Exploits and Detection. MILCOM 2016: 976-981 - 2015
- [j14]Teodor Sommestad, Henrik Karlzén, Jonas Hallberg:
A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour. Int. J. Inf. Secur. Priv. 9(1): 26-46 (2015) - [j13]Teodor Sommestad, Henrik Karlzén, Jonas Hallberg:
The sufficiency of the theory of planned behavior for explaining information security policy compliance. Inf. Comput. Secur. 23(2): 200-217 (2015) - [j12]Teodor Sommestad, Fredrik Sandström:
An empirical test of the accuracy of an attack graph analysis tool. Inf. Comput. Secur. 23(5): 516-531 (2015) - [j11]Teodor Sommestad, Ulrik Franke:
A test of intrusion alert filtering based on network information. Secur. Commun. Networks 8(13): 2291-2301 (2015) - [c26]Teodor Sommestad, Henrik Karlzén, Peter Nilsson, Jonas Hallberg:
Perceived Information Security Risk as a Function of Probability and Severity. HAISA 2015: 183-193 - [c25]Patrik Lif, Teodor Sommestad:
Human factors related to the performance of intrusion detection operators. HAISA 2015: 265-275 - [c24]Hannes Holm, Teodor Sommestad, Johan E. Bengtsson:
Requirements engineering: The quest for the dependent variable. RE 2015: 16-25 - [c23]Teodor Sommestad:
Social Groupings and Information Security Obedience Within Organizations. SEC 2015: 325-338 - 2014
- [j10]Hannes Holm, Teodor Sommestad, Mathias Ekstedt, Nicholas Honeth:
Indicators of expert judgement and their significance: an empirical investigation in the area of cyber security. Expert Syst. J. Knowl. Eng. 31(4): 299-318 (2014) - [j9]Teodor Sommestad, Jonas Hallberg, Kristoffer Lundholm, Johan E. Bengtsson:
Variables influencing information security policy compliance: A systematic review of quantitative studies. Inf. Manag. Comput. Secur. 22(1): 42-75 (2014) - [c22]Matus Korman, Teodor Sommestad, Jonas Hallberg, Johan E. Bengtsson, Mathias Ekstedt:
Overview of Enterprise Information Needs in Information Security Risk Assessment. EDOC 2014: 42-51 - 2013
- [j8]Teodor Sommestad, Amund Hunstad:
Intrusion detection and the role of the system administrator. Inf. Manag. Comput. Secur. 21(1): 30-40 (2013) - [j7]Teodor Sommestad, Mathias Ekstedt, Hannes Holm:
The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures. IEEE Syst. J. 7(3): 363-373 (2013) - [c21]Hannes Holm, Mathias Ekstedt, Teodor Sommestad:
Effort Estimates on Web Application Vulnerability Discovery. HICSS 2013: 5029-5038 - [c20]Teodor Sommestad, Jonas Hallberg:
A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance. SEC 2013: 257-271 - 2012
- [j6]Teodor Sommestad, Hannes Holm, Mathias Ekstedt:
Estimates of success rates of remote arbitrary code execution attacks. Inf. Manag. Comput. Secur. 20(2): 107-122 (2012) - [j5]Hannes Holm, Teodor Sommestad, Ulrik Franke, Mathias Ekstedt:
Success Rate of Remote Code Execution Attacks - Expert Assessments and Observations. J. Univers. Comput. Sci. 18(6): 732-749 (2012) - [c19]Teodor Sommestad, Amund Hunstad:
Intrusion detection and the role of the system administrator. HAISA 2012: 129-138 - [c18]Teodor Sommestad, Hannes Holm, Mathias Ekstedt:
Effort Estimates for Vulnerability Discovery Projects. HICSS 2012: 5564-5573 - [c17]Teodor Sommestad, Jonas Hallberg:
Cyber Security Exercises and Competitions as a Platform for Cyber Security Experiments. NordSec 2012: 47-60 - 2011
- [j4]Teodor Sommestad, Mathias Ekstedt, Hannes Holm, Muhammad Afzal:
Security mistakes in information system deployment projects. Inf. Manag. Comput. Secur. 19(2): 80-94 (2011) - [j3]Hannes Holm, Teodor Sommestad, Jonas Almroth, Mats Persson:
A quantitative evaluation of vulnerability scanning. Inf. Manag. Comput. Secur. 19(4): 231-247 (2011) - [c16]Markus Buschle, Hannes Holm, Teodor Sommestad, Mathias Ekstedt, Khurram Shahzad:
A Tool for Automatic Enterprise Architecture Modeling. CAiSE Forum (Selected Papers) 2011: 1-15 - [c15]Markus Buschle, Hannes Holm, Teodor Sommestad, Mathias Ekstedt, Khurram Shahzad:
A Tool for Automatic Enterprise Architecture Modeling. CAiSE Forum 2011: 25-32 - [c14]Robert Lagerström, Teodor Sommestad, Markus Buschle, Mathias Ekstedt:
Enterprise Architecture Management's Impact on Information Technology Success. HICSS 2011: 1-10 - [c13]Hannes Holm, Teodor Sommestad, Ulrik Franke, Mathias Ekstedt:
Expert Assessment on the Probability of Successful Remote Code Execution Attacks. WOSIS 2011: 49-58 - [c12]Teodor Sommestad, Hannes Holm, Mathias Ekstedt:
Estimates of Success Rates of Denial-of-Service Attacks. TrustCom 2011: 21-28 - 2010
- [j2]Teodor Sommestad, Mathias Ekstedt, Pontus Johnson:
A probabilistic relational model for security risk analysis. Comput. Secur. 29(6): 659-679 (2010) - [j1]Teodor Sommestad, Joakim Lilliesköld:
Development of an effort estimation model - a case study on delivery projects at a leading IT provider within the electric utility industry. Int. J. Serv. Technol. Manag. 13(1/2): 152-169 (2010) - [c11]Markus Buschle, Johan Ullberg, Ulrik Franke, Robert Lagerström, Teodor Sommestad:
A Tool for Enterprise Architecture Analysis Using the PRM Formalism. CAiSE Forum (Selected Papers) 2010: 108-121 - [c10]Markus Buschle, Johan Ullberg, Ulrik Franke, Robert Lagerström, Teodor Sommestad:
A Tool for Enterprise Architecture Analysis using the PRM formalism. CAiSE Forum 2010
2000 – 2009
- 2009
- [c9]Sabine Buckl, Ulrik Franke, Oliver Holschke, Florian Matthes, Christian M. Schweda, Teodor Sommestad, Johan Ullberg:
A Pattern-based Approach to Quantitative Enterprise Architecture Analysis. AMCIS 2009: 318 - [c8]Mathias Ekstedt, Ulrik Franke, Pontus Johnson, Robert Lagerström, Teodor Sommestad, Johan Ullberg, Markus Buschle:
A Tool for Enterprise Architecture Analysis of Maintainability. CSMR 2009: 327-328 - [c7]Ulrik Franke, Johan Ullberg, Teodor Sommestad, Robert Lagerström, Pontus Johnson:
Decision support oriented Enterprise Architecture metamodel management using classification trees. EDOCW 2009: 328-335 - [c6]Teodor Sommestad, Mathias Ekstedt, Pontus Johnson:
Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models. HICSS 2009: 1-10 - 2008
- [c5]Teodor Sommestad, Mathias Ekstedt, Pontus Johnson:
Combining Defense Graphs and Enterprise Architecture Models for Security Analysis. EDOC 2008: 349-355 - [c4]Jianxin Li, Teodor Sommestad, Patrick C. K. Hung, Xiang Li:
Web Service-Based Business Process Development, Threat Modeling and Security Assessment Tool. ICWS 2008: 13 - [c3]Xiaofeng Yu, Teodor Sommestad, Casey K. Fung, Patrick C. K. Hung:
Emergency Response Framework for Aviation XML Services on MANET. ICWS 2008: 304-311 - [c2]Jianxin Li, Teodor Sommestad, Patrick C. K. Hung, Xiang Li:
Web Service-Based Business Process Development, Threat Modeling and Security Assessment Tool. SERVICES II 2008: 16-17 - 2007
- [c1]Pontus Johnson, Erik Johansson, Teodor Sommestad, Johan Ullberg:
A Tool for Enterprise Architecture Analysis. EDOC 2007: 142-156
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 20:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint