Enterprise architecture analysis with extended influence diagrams P Johnson, R Lagerström, P Närman, M Simonsson Information Systems Frontiers 9, 163-180, 2007 | 237 | 2007 |
The effect of IT governance maturity on IT governance performance M Simonsson, P Johnson, M Ekstedt Information systems management 27 (1), 10-24, 2010 | 201 | 2010 |
Enterprise architecture: models and analyses for information systems decision making P Johnson, M Ekstedt Studentlitteratur, 2007 | 176 | 2007 |
A survey on CIO concerns-do enterprise architecture frameworks support them? Å Lindström, P Johnson, E Johansson, M Ekstedt, M Simonsson Information Systems Frontiers 8, 81-90, 2006 | 174 | 2006 |
Where's the theory for software engineering? P Johnson, M Ekstedt, I Jacobson IEEE software 29 (5), 96-96, 2012 | 156 | 2012 |
Defining IT governance-a consolidation of literature M Simonsson, P Johnson The 18th conference on advanced information systems engineering 6, 2006 | 152 | 2006 |
A meta language for threat modeling and attack simulations P Johnson, R Lagerström, M Ekstedt Proceedings of the 13th international conference on availability …, 2018 | 150 | 2018 |
A probabilistic relational model for security risk analysis T Sommestad, M Ekstedt, P Johnson Computers & security 29 (6), 659-679, 2010 | 134 | 2010 |
Using enterprise architecture for cio decision-making: On the importance of theory P Johnson, M Ekstedt, E Silva, L Plazaola Second Annual Conference on Systems Engineering Research, 2004 | 134 | 2004 |
A tool for enterprise architecture analysis P Johnson, E Johansson, T Sommestad, J Ullberg 11th IEEE International Enterprise Distributed Object Computing Conference …, 2007 | 125 | 2007 |
Can the common vulnerability scoring system be trusted? a bayesian analysis P Johnson, R Lagerström, M Ekstedt, U Franke IEEE Transactions on Dependable and Secure Computing 15 (6), 1002-1015, 2016 | 117 | 2016 |
Cyber security risks assessment with bayesian defense graphs and architectural models T Sommestad, M Ekstedt, P Johnson 2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009 | 101 | 2009 |
Model-based IT governance maturity assessments with COBIT M Simonsson, P Johnson, H Wijkström | 99 | 2007 |
Enterprise architecture: A framework supporting system quality analysis P Narman, P Johnson, L Nordstrom 11th IEEE International Enterprise Distributed Object Computing Conference …, 2007 | 84 | 2007 |
Securi cad by foreseeti: A cad tool for enterprise cyber security management M Ekstedt, P Johnson, R Lagerström, D Gorton, J Nydrén, K Shahzad 2015 IEEE 19th international enterprise distributed object computing …, 2015 | 82 | 2015 |
Architecture analysis of enterprise systems modifiability–models, analysis, and validation R Lagerström, P Johnson, D Höök Journal of Systems and Software 83 (8), 1387-1403, 2010 | 77 | 2010 |
The IT organization modeling and assessment tool: Correlating IT governance maturity with the effect of IT M Simonsson, P Johnson Proceedings of the 41st Annual Hawaii International Conference on System …, 2008 | 77 | 2008 |
Assessment of IT Governance-A prioritization of Cobit M Simonsson, P Johnson Proceedings of the Conference on Systems Engineering Research, 1-10, 2006 | 73 | 2006 |
pwnpr3d: an attack-graph-driven probabilistic threat-modeling approach P Johnson, A Vernotte, M Ekstedt, R Lagerström 2016 11th international conference on availability, reliability and security …, 2016 | 71 | 2016 |
A method for creating entreprise architecture metamodels: applied to systems modifiability R Lagerström, U Franke, P Johnson, J Ullberg International Journal of Computer Science and Applications 6 (5), 89-120, 2009 | 71 | 2009 |