关注
Pontus Johnson
Pontus Johnson
在 kth.se 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Enterprise architecture analysis with extended influence diagrams
P Johnson, R Lagerström, P Närman, M Simonsson
Information Systems Frontiers 9, 163-180, 2007
2372007
The effect of IT governance maturity on IT governance performance
M Simonsson, P Johnson, M Ekstedt
Information systems management 27 (1), 10-24, 2010
2012010
Enterprise architecture: models and analyses for information systems decision making
P Johnson, M Ekstedt
Studentlitteratur, 2007
1762007
A survey on CIO concerns-do enterprise architecture frameworks support them?
Å Lindström, P Johnson, E Johansson, M Ekstedt, M Simonsson
Information Systems Frontiers 8, 81-90, 2006
1742006
Where's the theory for software engineering?
P Johnson, M Ekstedt, I Jacobson
IEEE software 29 (5), 96-96, 2012
1562012
Defining IT governance-a consolidation of literature
M Simonsson, P Johnson
The 18th conference on advanced information systems engineering 6, 2006
1522006
A meta language for threat modeling and attack simulations
P Johnson, R Lagerström, M Ekstedt
Proceedings of the 13th international conference on availability …, 2018
1502018
A probabilistic relational model for security risk analysis
T Sommestad, M Ekstedt, P Johnson
Computers & security 29 (6), 659-679, 2010
1342010
Using enterprise architecture for cio decision-making: On the importance of theory
P Johnson, M Ekstedt, E Silva, L Plazaola
Second Annual Conference on Systems Engineering Research, 2004
1342004
A tool for enterprise architecture analysis
P Johnson, E Johansson, T Sommestad, J Ullberg
11th IEEE International Enterprise Distributed Object Computing Conference …, 2007
1252007
Can the common vulnerability scoring system be trusted? a bayesian analysis
P Johnson, R Lagerström, M Ekstedt, U Franke
IEEE Transactions on Dependable and Secure Computing 15 (6), 1002-1015, 2016
1172016
Cyber security risks assessment with bayesian defense graphs and architectural models
T Sommestad, M Ekstedt, P Johnson
2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009
1012009
Model-based IT governance maturity assessments with COBIT
M Simonsson, P Johnson, H Wijkström
992007
Enterprise architecture: A framework supporting system quality analysis
P Narman, P Johnson, L Nordstrom
11th IEEE International Enterprise Distributed Object Computing Conference …, 2007
842007
Securi cad by foreseeti: A cad tool for enterprise cyber security management
M Ekstedt, P Johnson, R Lagerström, D Gorton, J Nydrén, K Shahzad
2015 IEEE 19th international enterprise distributed object computing …, 2015
822015
Architecture analysis of enterprise systems modifiability–models, analysis, and validation
R Lagerström, P Johnson, D Höök
Journal of Systems and Software 83 (8), 1387-1403, 2010
772010
The IT organization modeling and assessment tool: Correlating IT governance maturity with the effect of IT
M Simonsson, P Johnson
Proceedings of the 41st Annual Hawaii International Conference on System …, 2008
772008
Assessment of IT Governance-A prioritization of Cobit
M Simonsson, P Johnson
Proceedings of the Conference on Systems Engineering Research, 1-10, 2006
732006
pwnpr3d: an attack-graph-driven probabilistic threat-modeling approach
P Johnson, A Vernotte, M Ekstedt, R Lagerström
2016 11th international conference on availability, reliability and security …, 2016
712016
A method for creating entreprise architecture metamodels: applied to systems modifiability
R Lagerström, U Franke, P Johnson, J Ullberg
International Journal of Computer Science and Applications 6 (5), 89-120, 2009
712009
系统目前无法执行此操作,请稍后再试。
文章 1–20