Author of the publication

A Pattern-based Approach to Quantitative Enterprise Architecture Analysis.

, , , , , , and . AMCIS, page 318. Association for Information Systems, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Sommestad, Teodor
add a person with the name Sommestad, Teodor
 

Other publications of authors with the same name

Perceived Information Security Risk as a Function of Probability and Severity., , , and . HAISA, page 183-193. University of Plymouth, (2015)A quantitative evaluation of vulnerability scanning., , , and . Inf. Manag. Comput. Security, 19 (4): 231-247 (2011)SVED: Scanning, Vulnerabilities, Exploits and Detection., and . MILCOM, page 976-981. IEEE, (2016)Social Groupings and Information Security Obedience Within Organizations.. SEC, volume 455 of IFIP Advances in Information and Communication Technology, page 325-338. Springer, (2015)Development of an effort estimation model - a case study on delivery projects at a leading IT provider within the electric utility industry., and . IJSTM, 13 (1/2): 152-169 (2010)Effort Estimates for Vulnerability Discovery Projects., , and . HICSS, page 5564-5573. IEEE Computer Society, (2012)A Pattern-based Approach to Quantitative Enterprise Architecture Analysis., , , , , , and . AMCIS, page 318. Association for Information Systems, (2009)Requirements engineering: The quest for the dependent variable., , and . RE, page 16-25. IEEE Computer Society, (2015)Human factors related to the performance of intrusion detection operators., and . HAISA, page 265-275. University of Plymouth, (2015)The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures., , and . IEEE Systems Journal, 7 (3): 363-373 (2013)