Name
Papers
Collaborators
HANNES HOLM
28
24
Citations 
PageRank 
Referers 
191
14.59
372
Referees 
References 
801
481
Search Limit
100801
Title
Citations
PageRank
Year
Investigating Personal Determinants Of Phishing And The Effect Of National Culture50.412015
Investigating the Correlation between Intention and Action in the Context of Social Engineering in Two Different National Cultures10.352015
Requirements engineering: The quest for the dependent variable10.362015
P2CySeMoL: Predictive, Probabilistic Cyber Security Modeling Language.00.342015
Automatic data collection for enterprise architecture models130.692014
The Distribution of Time to Recovery of Enterprise IT Services80.722014
An Empirical Investigation of the Effect of Target-Related Information in Phishing Attacks00.342014
Indicators of expert judgement and their significance: an empirical investigation in the area of cyber security10.372014
A Large-Scale Study of the Time Required to Compromise a Computer System80.452014
Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter?90.542014
Using phishing experiments and scenario-based surveys to understand security behaviours in practice.80.462013
Using enterprise architecture analysis and interview data to estimate service response time100.532013
Effort Estimates on Web Application Vulnerability Discovery30.422013
Estimates on the effectiveness of web application firewalls against targeted attacks.00.342013
Using enterprise architecture and technology adoption models to predict application usage100.502012
Success Rate of Remote Code Execution Attacks - Expert Assessments and Observations.50.532012
Performance of automated network vulnerability scanning at remediating security issues70.662012
Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks200.942012
Identifying factors affecting software development cost and productivity90.472012
A Metamodel for Web Application Injection Attacks and Countermeasures.40.422012
Effort Estimates for Vulnerability Discovery Projects30.402012
Estimates of success rates of remote arbitrary code execution attacks.30.442012
Expert Assessment On The Probability Of Successful Remote Code Execution Attacks20.402011
Security mistakes in information system deployment projects40.512011
A quantitative evaluation of vulnerability scanning.150.872011
Estimates of Success Rates of Denial-of-Service Attacks10.362011
A Tool for Automatic Enterprise Architecture Modeling.201.052011
Data accuracy assessment using enterprise architecture210.722011