Teodor Sommestad’s publications
Patrik Lif, Teodor Sommestad, Pär-Anders Albinsson, Christian Valassi, Daniel
Eidenskog (2022). Validation of Cyber Test for Future Soldiers: A Test
Battery for the Selection of Cyber Soldiers. Frontiers in Psychology, 13.
Teodor Sommestad, Hannes Holm, and Daniel
Steinvall (2022), Variables influencing the effectiveness of signature-based
network intrusion detection systems. Information Security Journal: A Global
Perspective 31(6), 771—728.
Teodor Sommestad, Henrik Karlzén, and Jonas
Hallberg (2019). The Theory of Planned Behavior and Information
Security Policy Compliance. Journal of Computer Information
Systems, 59(4), 344–353.
Teodor Sommestad (2018). Work-related groups and information security policy
compliance, Information &
Computer Security, 26 (5), 533–550
Teodor Sommestad and Hannes Holm (2017). Alert verification through alert correlation — An empirical test of SnIPS,
Information Security Journal: A Global
Perspective, 26(1), 39–48.
Hannes Holm, Teodor Sommestad (2017). So Long , and Thanks for Only Using Readily Available
Scripts, Information & Computer Security, Information & Computer Security, 25 (1), 47–6,
Teodor Sommestad, Henrik Karlzén, Peter Nilsson, Jonas Hallberg (2016). An empirical test of the perceived relationship
between risk and the constituents severity and probability, Information & Computer Security, 24
(2), 194–204.
Teodor Sommestad, Henrik Karlzén, Jonas Hallberg. (2015). A Meta-Analysis of Studies on Protection Motivation
Theory and Information Security Behaviour,
International Journal of Information
Security and Privacy, 9(1), 26–46.
Teodor Sommestad, Fredrik Sandström.
(2015). An Empirical Test of the Accuracy of an Attack Graph
Analysis Tool, Information and
Computer Security, 23(5), 516–31.
Teodor Sommestad, Ulrik Franke (2015). A test of intrusion alert filtering based on network
information, Security and Communication
Networks, 8(3), 2291-2301.
Teodor Sommestad, Henrik Karlzén, Jonas Hallberg (2015).The Sufficiency of the Theory of Planned Behavior for
Explaining Information Security Policy Compliance, Information
Management & Computer Security, 23(2),
200-217.
Teodor Sommestad, Jonas Hallberg, Kristoffer Lundholm, Johan Bengtsson
(2014). Variables influencing
information security policy compliance: a systematic review of quantitative
studies, Information Management
& Computer Security 22(1),
42-75.
Teodor Sommestad, Hannes Holm, Mathias Ekstedt, Nicholas Honeth (2014). Quantifying the effectiveness of intrusion detection
systems in operation through domain experts, Journal of Information
System Security, 10(2), 3–35.
Hannes Holm, Teodor Sommestad, Mathias Ekstedt, Nicholas Honeth (2013). Indicators of expert judgment and their significance:
an empirical investigation in the area of cyber security, Expert
Systems 31(4), 299-318.
Teodor Sommestad, Amund
Hunstad (2013). Intrusion detection and the
role of the system administrator, Information Management & Computer Security 21(1), 30 - 40.
Teodor Sommestad, Mathias Ekstedt, Hannes Holm (2013). The Cyber Security Modeling
Language: A Tool for Assessing the Vulnerability of Enterprise System
Architectures, IEEE Systems Journal 7(3),
363-373.
Teodor Sommestad, Hannes Holm, Mathias Ekstedt (2012). Estimates of success rates of
remote arbitrary code execution attacks, Information Management & Computer Security, 20(2), 107 - 122.
Hannes Holm, Teodor Sommestad, Ulrik Franke, Mathias Ekstedt (2012). Success rate of remote code
execution attacks – expert assessments and observations, Journal of Universal Computer Science, 18(6), 732-749.
Hannes Holm, Teodor Sommestad, Jonas Almroth, Mats Persson (2011). A quantitative evaluation of vulnerability
scanning, Information Management
& Computer Security,
19(4), 231-247.
WR Flores, Teodor Sommestad, Hannes Holm (2011). Assessing Future Value of
Investments in Security-Related IT Governance Control Objectives – Surveying IT
Professionals, The Electronic Journal of Information
Systems Evaluation, 14(2),
216-227.
Teodor Sommestad, Mathias Ekstedt, Hannes Holm, Muhammad Afzal (2011). Security mistakes in
information system deployment projects, Information Management & Computer Security, 19(2), 80-94.
Teodor Sommestad, Mathias Ekstedt, Pontus Johnson (2010). A probabilistic relational
model for security risk analysis, Computers & Security, 29(6), 659-679.
Teodor Sommestad, Joakim Lilliesköld
(2010). Development of an effort
estimation model – a case study on delivery projects at a leading IT provider
within the electric utility industry, International Journal of Services Technology and Management,
13(1), 152-169.
Teodor Sommestad, Mathias Ekstedt, Lars Nordström (2009). Modeling Security of Power
Communication Systems Using Defense Graphs and Influence Diagrams, IEEE Transactions on Power Delivery
24(4), 1801-1808.
Teodor Sommestad, Henrik Karlzén, Hanna Kvist, Hanna Gustafsson (2023). Skade – A Challenge
Management System for Cyber Threat Hunting. 9th Workshop On The Security Of Industrial
Control Systems & Of Cyber-Physical Systems. Haag, Netherlands.
Henrik Karlzén, Teodor Sommestad (2023). Automatic
incident response solutions: A review of proposed solutions’ input and output.
Proceedings of the 18th International Conference on Availability, Reliability
and Security, Benevento, Italy
Stefan Varga, Teodor Sommestad, Joel Brynielsson (2023). Automation of Cybersecurity Work. In: Artificial
Intelligence and Cybersecurity. Springer International Publishing,
Cham, pp. 67–101.
Teodor Sommestad, Henrik Karlzén. (2019). A meta-analysis of field experiments on phishing
susceptibility. eCrime
Researchers Summit, eCrime 2019. Pittsburgh, PA,
USA.
Margarita Jaitner, Teodor Sommestad. (2019). Epilogue. In M. Ristolainen & J. Nikkarila (Eds.), Game Player: Facing the structural transformation of
cyberspace (pp. 169–175). Riihimäki:
Finnish Defence Research Agency.
Patrik Lif, Teodor
Sommestad, Dennis Granåsen. (2018). Development and evaluation of information elements for
simplified cyber-incident reports. CyberSA2018. Glasgow, UK.
Jonas Hallberg, Johan Bengtsson, Niklas Hallberg, Henrik Karlzén, and Teodor
Sommestad. (2017). The Significance of Information Security Risk
Assessments Exploring the Consensus of Raters’ Perceptions of Probability and
Severity. International conference
on Security and Management. Las Vegas, USA
Patrik Lif, Magdalena Granåsen, Teodor Sommestad (2017). Development and validation of technique to measure
cyber situation awareness, International
Conference on Cyber Situational Awareness, Data Analytics and Assessment.
London, UK.
Hannes Holm, Teodor Sommestad (2016). SVED: Scanning, Vulnerabilities, Exploits and Detection,
MILCOM 2016, Baltimore, MD.
Hannes Holm, Teodor Sommestad, Johan Bengtsson
(2015). Requirements Engineering: The Quest for the Dependent
Variable, IEEE International
Requirements Engineering Conference. Ottawa, Canada.
Teodor Sommestad (2015). Experimentation on operational cyber security in CRATE,
NATO STO-MP-IST-133 Specialist Meeting,
Copenhagen, Denmark.
Patrik Lif, Teodor
Sommestad (2015). Human Factors Related to the Performance of Intrusion
Detection Operators, Human
Aspects of Information Security, Privacy, and Trust. Lesvos, Greece.
Teodor Sommestad, Henrik Karlzén, Peter Nilsson, Jonas Hallberg (2015). Perceived Information Security Risk as a Function of
Probability and Severity, Human
Aspects of Information Security, Privacy, and Trust. Lesvos, Greece.
Teodor Sommestad (2015). Social groupings and information security obedience
within organizations, International
Information Security and Privacy Conference. Hamburg.
Matus Korman,
Mathias Ekstedt, Teodor Sommestad, Jonas Hallberg, Johan Bengtsson (2014). Overview of Enterprise Information Needs in
Information Security Risk Assessment, IEEE EDOC – “Enterprise Computing Conference”.
Teodor Sommestad, Jonas Hallberg (2013). A review of the theory of
planned behaviour in the context of information security policy compliance, International Information Security and
Privacy Conference.
Mathias Ekstedt, Teodor Sommestad, Hannes Holm,
Lars Nordström (2013), CySeMoL: A tool for cyber security analysis of enterprises,
22nd International Conference and
Exhibition on Electricity Distribution (CIRED 2013),
Hannes Holm, Mathias Ekstedt, Teodor Sommestad (2013). Effort Estimates on Web
Application Vulnerability Discovery, 2013 46th Hawaii International Conference on System Sciences.
Teodor Sommestad, Jonas Hallberg (2012). Cyber security exercises and
competitions as a platform for cyber security experiments, NordSec.
Teodor Sommestad, Hannes Holm, Mathias Ekstedt (2012). Effort Estimates for Vulnerability Discovery
Projects, 5564-5573, 45th Hawaii
International Conference on System Sciences.
Teodor Sommestad, Amund
Hunstad (2012). Intrusion detection and the
role of the system administrator, Proceedings of International Symposium on Human Aspects of Information
Security & Assurance.
Markus Buschle, Hannes Holm, Teodor Sommestad,
Mathias Ekstedt, Khurram Shahzad
(2011). A Tool for automatic Enterprise Architecture
modeling, 1-15, CAISE'11 Forum.
Teodor Sommestad, Jonas Hallberg (2011). Cyber security exercises as a
platform for cyber security experiments, 33, TAMSEC.
Robert Lagerström, Teodor Sommestad, Markus Buschle,
Mathias Ekstedt (2011). Enterprise architecture
management’s impact on information technology success, Proceedings of the Hawaii International
Conference on System Sciences (HICSS-44).
Teodor Sommestad, Hannes Holm, Mathias Ekstedt (2011). Estimates of Success Rates of
Denial-of-Service Attacks, 21-28, 2011 IEEE 10th International Conference on Trust, Security and
Privacy in Computing and Communications.
Hannes Holm, Teodor Sommestad, Mathias Ekstedt, Ulrik Franke (2011). Expert assessment on the
probability of successful remote code execution attacks, Proceedings of 8th International Workshop
on Security in Information Systems - WOSIS 2011.
Markus Buschle, Hannes Holm, Teodor Sommestad,
Mathias Ekstedt, Khurram Shahzad
(2011). A Tool for automatic Enterprise Architecture
modeling, 1-15, IS Olympics:
Information Systems in a Diverse World.
Markus Buschle, Johan Ullberg, Ulrik Franke,
Robert Lagerström, Teodor Sommestad (2011). A Tool for Enterprise
Architecture Analysis Using the PRM Formalism, 108-121, Information Systems Evolution.
Teodor Sommestad, Mathias Ekstedt, Lars Nordström (2010). A case study applying the
Cyber Security Modeling Language, Proceeding of CIGRE (International Council on Large Electric Systems).
Markus Buschle, Johan Ullberg, Ulrik Franke,
Robert Lagerström, Teodor Sommestad (2010). A Tool for Enterprise
Architecture Analysis using the PRM formalism, Proc. CAiSE Forum 2010.
Fredrik Löf, Johan Stomberg, Teodor Sommestad,
Mathias Ekstedt, Jonas Hallberg, Johan Bengtsson (2010). An Approach to Network
Security Assessment based on Probabilistic Relational Models, First Workshop on Secure Control Systems
(SCS-1).
Teodor Sommestad, G Björkman, Mathias Ekstedt, L Nordström (2010). Information system architectures
in electrical distribution utilities, Proceedings of NORDAC.
Teodor Sommestad, GN Ericsson, Jakob Nordlander (2010). SCADA System Cyber Security–A Comparison of
Standards, IEEE PES General Meeting.
Per Närman, Teodor Sommestad, Sofia Sandgren,
Mathias Ekstedt (2009). A framework for assessing the cost of IT
investments, PICMET 2009 Proceedings.
Sabine Buckl, Ulrik Franke, Oliver Holschke, Florian Matthes,
Christian M Schweda, Teodor Sommestad, Johan Ullberg
(2009). A Pattern-based Approach to
Quantitative Enterprise Architecture Analysis, Proc. 15th Americas Conference on
Information Systems ({AMCIS}), San Francisco, {USA}.
Mathias Ekstedt, Ulrik Franke, Pontus Johnson, Robert Lagerström, Teodor
Sommestad, Johan Ullberg, Markus Buschle (2009). A Tool for Enterprise
Architecture Analysis of Maintainability, 327-328, Proceedings of the 2009 European Conference on Software
Maintenance and Reengineering.
Teodor Sommestad, Mathias Ekstedt, Pontus Johnson (2009). Cyber Security Risks
Assessment with Bayesian Defense Graphs and Architectural Models, 1-10, Proceedings of Hawaii International
Conference on System Sciences (HICSS).
Ulrik Franke, Johan Ullberg, Teodor Sommestad, Robert Lagerström, Pontus
Johnson (2009). Decision support oriented
Enterprise Architecture metamodel management using
classification trees, 328-335, 2009 13th Enterprise Distributed Object Computing Conference
Workshops.
Mathias Ekstedt, Teodor Sommestad (2009). Enterprise Architecture Models
for Cyber Security Analysis, IEEE PES Power Systems Conference & Exhibition (PSCE).
Waldo Rocha Flores, Teodor Sommestad, Pontus
Johnson, Mårten Simonsson (2009). Indicators predicting
similarities in maturity between processes: An empirical Analysis with 35
European organizations, 1st Annual Pre-ICIS Workshop on
Accounting Information Systems.
Erik Johansson, Teodor Sommestad, Mathias Ekstedt (2009). Issues of Cyber Security In Scada-Systems-on the Importance
of Awareness, The 20th International Conference on Electricity Distribution (CIRED).
Teodor Sommestad, Mathias Ekstedt, Pontus Johnson (2008). Combining Defense Graphs and
Enterprise Architecture Models for Security Analysis, 349-355, 2008 12th International IEEE
Enterprise Distributed Object Computing Conference.
Ulrik Franke, Teodor Sommestad, Mathias Ekstedt, Pontus Johnson (2008). Defense Graphs and Enterprise
Architecture for Information Assurance Analysis, Proceedings of the 26th Army Science
Conference.
Yu Xiaofeng, Teodor
Sommestad, Casey Fung, Patrick C. K. Hung (2008). Emergency Response Framework
for Aviation XML Services on MANET, Proceedings of the IEEE International Conference on Web Services
(ICWS).
Erik Johansson, Teodor Sommestad, Mathias Ekstedt (2008). Security Issues for SCADA
Systems within Power Distribution, Nordic Distribution and Asset Management Conference (NORDAC).
J Li, Teodor Sommestad, Patrick C. K. Hung, X Li (2008). Web Service-Based Business
Process Development, Threat Modeling and …, International Conference on Web Services (ICWS'08).
Pontus Johnson, Mathias Ekstedt, Robert Lagerström, Teodor Sommestad
(2007). Introduction, Enterprise Architcture: models and analyses
for information systems decision making.
Mathias Ekstedt, Pontus Johnson, Magnus Gammelgård, Teodor Sommestad, Pia
Gustafsson (2007). Setting the Business Goals, Enterprise Architcture: models and analyses
for information systems decision making.
Pontus Johnson, Erik Johansson, Teodor Sommestad, Johan Ullberg (2007). A tool for enterprise architecture analysis, 142–142, Proceedings of Enterprise
Distributed Object Computing Conference.
Dennis McCallam, Tracy
Braun, Bernt Akesson, David Aspinall,
Roman Faganel, Heiko Guenther, Matthew Kellet, Joseph LoPiccolo, Peeter
Lorents, Wim Mees, Juha-Pekka Nikkarila, Teodor Sommestad, and Margaret Varga
(2021). Final
Report and Recommendations of the North Atlantic Treaty Organization (NATO)
Research Task Group IST-129 on Predictive Analysis of Adversarial Cyber
Behavior.
Teodor Sommestad och Henrik Karlzén (2020). När luras personer av nätfiske? - En genomgång av
publicerade fältexperiment. Linköping, Sverige.
Jacob Löfvenberg, Teodor Sommestad, and Caroline Bildsten (2019). Automatisk attackkodsgenerering (FOI-R--4737--SE).
Linköping, Sweden.
Teodor Sommestad, Joel Brynielsson and Stefan Varga (2019). Möjligheter för automation av roller inom
cybersäkerhetsområdet. Stockholm, Sweden.
Teodor Sommestad (2017). Övning och Experiment för operativ förmåga i
cybermiljön: Slutrapport (FOI-R--4498--SE). Linköping, Sweden.
Teodor Sommestad, and Hannes Holm (2017). Publika attackkoder och intrångssignaturer:
Kvantitativa tester av träffsäkerhet (FOI-R--4499—SE).
Linköping, Sweden.
Patrik Lif, Hannes Holm, Teodor Sommestad, Magdalena Granåsen,
Erik Westring (2016). Genomförd försöksverksamhet inom logganalys för
cybersäkerhet (FOI-R--4328--SE), Linköping, Sweden.
Teodor Sommestad and Hannes Holm (2016). Test av logganalysverktyget SnIPS
(FOI-R—4323—SE). Linköping, Sweden.
Teodor Sommestad, Hannes Holm (2015). Variabler av vikt för förmågan att analysera
säkerhetsloggar (FOI-R--4126--SE). Linköping, Sweden.
Patrik Lif, Mirko Thorstensson, Teodor Sommestad (2015). Övning, träning och prövning inom logganalys -
Översikt över olika alternativ (FOI-R--4149--SE). Linköping,
Sweden.
Hannes Holm, Johan Bengtsson, Jacob Löfvenberg, Mats Persson,
Teodor Sommestad (2014). Moving
Target Defense En kartläggning av forskningsbidrag
(FOI-R--3942--SE).
Linköping, Sweden.
Johan Bengtsson., Teodor Sommestad, Hannes Holm (2014). IT-säkerhetskrav i Försvarsmakten - KSF3 och
tillkommande säkerhetskrav (FOI-R--4000--SE). Linköping, Sweden.
Jonas Hallberg, Johan Bengtsson, Teodor Sommestad (2013). Effektivare
Hot-, Risk- Och Sårbarhetsanalyser - Vad Blev Det För Resultat?
(FOI-R--3785--SE). Linköping, Sweden.
Teodor Sommestad, Johan Bengtsson, Jonas Hallberg (2013). Informationsbehov Vid Säkerhetsanalyser. En
Systematisk Genomgång Av Etablerade Metoder För IT-System
(FOI-R--3723--SE). Linköping, Sweden.
Jonas Hallberg, Mikael Wedlin, David
Lindahl, Jonas Almroth, Mats Persson, Teodor Sommestad (2013), NCS3: årsrapport 2012 (FOI-R--3638—SE).
Linköping, Sweden.
Teodor Sommestad (2012). A framework
and theory for cyber security assessments, PhD Thesis,
Industrial information and control systems, Royal Institute of Technology,
Stockholm, Sweden (ISBN 978-91-7501-511-8).
Jonas Hallberg, Mikael Wedlin, David Lindahl,
Jonas Almroth, Wiwianne Asp, Teodor Sommestad (2012).
Årsrapport 2011: Nationellt centrum för säkerhet i
styrsystem för samhällsviktig verksamhet (FOI-R--3413--SE). Linköping, Sweden.
Teodor Sommestad, Kristoffer Lundholm (2012). Detektering av IT-attacker -
Intrångsdetekteringssystem och systemadministratörens roll (FOI-R--3419--SE).
Linköping, Sweden.
Teodor Sommestad, Johan Bengtsson, Jonas Hallberg (2012). Varför följer inte användarna bestämmelser? – En
metaanalys avseende informationssäkerhetsbestämmelser (FOI-R--3524—SE). Linköping,
Sweden.
Johan Bengtsson, Jonas Hallberg, Teodor Sommestad (2012). Verktygsstöd för hot-, risk- och sårbarhetsanalyser -
realiseringsförslag (FOI-R--3552--SE).
Linköping, Sweden.
Kristoffer Lundholm, Teodor Sommestad, Mats Persson, Tommy Gustafsson, Amund Hunstad (2011). Detektion av IT-attacker Övningsuppställning och
insamlad data (FOI-R--3342—SE). Linköping,
Sweden.
Teodor Sommestad, Hannes Holm, Mathias Ekstedt (2011). Threats and vulnerabilities,
final report, Project VIKING.
Hannes Holm, Teodor Sommestad, Mathias Ekstedt (2011). Vulnerability assessment of SCADA systems. Project VIKING.
Gunnar Björkman, Teodor Sommestad, Mathias
Ekstedt, Hadeli Hadeli, Zhu
Kun, Moustafa Chenine
(2010). SCADA system architectures. Project VIKING.