The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mathias Ekstedt: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mathias Ekstedt, Pontus Johnson, Åsa Lindström, Magnus Gammelgård, Erik Johansson, Leonel Plazaola, Enrique Silva, Joakim Liliesköld
    Consistent Enterprise Software System Architecture for the CIO - A Utility-Cost Based Approach. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  2. Erik Johansson, Mathias Ekstedt, Pontus Johnson
    Assessment of Enterprise Information Security - The Importance of Information Search Cost. [Citation Graph (0, 0)][DBLP]
    HICSS, 2006, pp:- [Conf]
  3. Åsa Lindström, Pontus Johnson, Erik Johansson, Mathias Ekstedt, Mårten Simonsson
    A survey on CIO concerns-do enterprise architecture frameworks support them? [Citation Graph (0, 0)][DBLP]
    Information Systems Frontiers, 2006, v:8, n:2, pp:81-90 [Journal]

  4. The IT Organization Modeling and Assessment Tool for IT Governance Decision Support. [Citation Graph (, )][DBLP]


  5. Enterprise Meta Modeling Methods - Combining a Stakeholder-Oriented and a Causality-Based Approach. [Citation Graph (, )][DBLP]


  6. A Tool for Enterprise Architecture Analysis of Maintainability. [Citation Graph (, )][DBLP]


  7. A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis. [Citation Graph (, )][DBLP]


  8. Using Enterprise Architecture Models for System Quality Analysis. [Citation Graph (, )][DBLP]


  9. Combining Defense Graphs and Enterprise Architecture Models for Security Analysis. [Citation Graph (, )][DBLP]


  10. Enterprise Architecture Analysis for Data Accuracy Assessments. [Citation Graph (, )][DBLP]


  11. Strategic Business and IT Alignment Assessment: A Case Study Applying an Enterprise Architecture-Based Metamodel. [Citation Graph (, )][DBLP]


  12. A Consolidated Strategic Business and IT Alignment Representation: A Framework Aggregated From Literature. [Citation Graph (, )][DBLP]


  13. Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models. [Citation Graph (, )][DBLP]


  14. Assessing System Availability Using an Enterprise Architecture Analysis Approach. [Citation Graph (, )][DBLP]


  15. EAF2- A Framework for Categorizing Enterprise Architecture Frameworks. [Citation Graph (, )][DBLP]


  16. In Search of a Unified Theory of Software Engineering. [Citation Graph (, )][DBLP]


  17. A probabilistic relational model for security risk analysis. [Citation Graph (, )][DBLP]


  18. Data Collection Prioritization for System Quality Analysis. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002