Mathias Ekstedt
Kungliga Tekniska högskolan
H-index: 40
Europe-Sweden
Top articles of Mathias Ekstedt
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Empirical evaluation of a threat modeling language as a cybersecurity assessment tool | Computers & Security | Sotirios Katsikeas Engla Rencelj Ling Pontus Johnsson Mathias Ekstedt | 2024/5/1 |
Development and Validation of Corelang: A Threat Modeling Language for the ICT Domain | Available at SSRN 4727006 | Sotirios Katsikeas Andrei Buhaiu Mathias Ekstedt Zeeshan Afzal Simon Hacks | 2024/2/8 |
Challenges of producing software bill of materials for java | IEEE Security & Privacy | Musard Balliu Benoit Baudry Sofia Bobadilla Mathias Ekstedt Martin Monperrus | 2023/8/31 |
Towards a Graph Neural Network-Based Approach for Estimating Hidden States in Cyber Attack Simulations | arXiv preprint arXiv:2312.05666 | Pontus Johnson Mathias Ekstedt | 2023/12/9 |
Evaluating the Correctness of Domain-Specific Threat Modeling Languages | Pontus and Ekstedt, Mathias, Evaluating the Correctness of Domain-Specific Threat Modeling Languages | Sotirios Katsikeas Engla Rencelj Ling Pontus Johnson Mathias Ekstedt | 2023/8/14 |
Yet another cybersecurity risk assessment framework | International Journal of Information Security | Mathias Ekstedt Zeeshan Afzal Preetam Mukherjee Simon Hacks Robert Lagerström | 2023/12 |
The meta attack language-a formal description | Computers & Security | Wojciech Wideł Simon Hacks Mathias Ekstedt Pontus Johnson Robert Lagerström | 2023/7/1 |
Software Bill of Materials in Java | Musard Balliu Benoit Baudry Sofia Bobadilla Mathias Ekstedt Martin Monperrus | 2023/11/30 | |
A threat modeling language for generating attack graphs of substation automation systems | International journal of critical infrastructure protection | Engla Rencelj Ling Mathias Ekstedt | 2023/7/1 |
Mean Value Analysis of Critical Attack Paths with Multiple Parameters | Rajendra Shivaji Patil Viktoria Fodor Mathias Ekstedt | 2023/11/8 | |
Estimating Time-To-Compromise for Industrial Control System Attack Techniques Through Vulnerability Data | SN Computer Science | Engla Rencelj Ling Mathias Ekstedt | 2023/4/8 |
Check for updates Mean Value Analysis of Critical Attack Paths with Multiple Parameters | Secure IT Systems: 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16–17, 2023, Proceedings | Rajendra Shivaji Patil Viktoria Fodor D iD Mathias Ekstedt | 2023/11/8 |
Threat Scenarios and Monitoring Requirements for Cyber-Physical Systems of Flexibility Markets | Nils Müller Kai Heussen Zeeshan Afzal Mathias Ekstedt Per Eliasson | 2022/10/20 | |
Security countermeasures selection using the meta attack language and probabilistic attack graphs | IEEE Access | Wojciech Wideł Preetam Mukherjee Mathias Ekstedt | 2022/8/22 |
Development and implementation of a holistic flexibility market architecture | Oliver Kraft Oliver Pohl Ulf Häger Kai Heussen Nils Müller | 2022/4/24 | |
Containment Strategy Formalism in a Probabilistic Threat Modelling Framework. | Per Fahlander Mathias Ekstedt Preetam Mukherjee Ashish Kumar Dwivedi | 2022 | |
Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities. | Engla Rencelj Ling Mathias Ekstedt | 2022 | |
Mapping cyber threat intelligence to probabilistic attack graphs | Andreas Gylling Mathias Ekstedt Zeeshan Afzal Per Eliasson | 2021/7/26 | |
Generating threat models and attack graphs based on the IEC 61850 system configuration description language | Engla Rencelj Ling Mathias Ekstedt | 2021/4/28 | |
Research communities in cyber security: A comprehensive literature review | Sotirios Katsikeas Pontus Johnson Mathias Ekstedt Robert Lagerström | 2021/11/1 |