Hoppa till huvudinnehållet
Till KTH:s startsida Till KTH:s startsida

Publikationer av Pontus Johnson

Refereegranskade

Artiklar

[1]
W. Widel et al., "The meta attack language-a formal description," Computers & security (Print), vol. 130, s. 103284, 2023.
[2]
V. Engström et al., "Automated Security Assessments of Amazon Web Service Environments," ACM Transactions on Privacy and Security, vol. 26, no. 2, s. 1-31, 2022.
[3]
S. Katsikeas et al., "Research communities in cyber security: A comprehensive literature review," Computer Science Review, vol. 42, s. 100431-100431, 2021.
[4]
P. Johnson et al., "Can the Common Vulnerability Scoring System be Trusted? : A Bayesian Analysis," IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 6, s. 1002-1015, 2018.
[5]
R. Lagerström et al., "Automated Probabilistic System Architecture Analysis in the Multi-Attribute Prediction Language (MAPL) : Iteratively Developed using Multiple Case Studies," International Journal of Complex Systems Informatics and Modeling Quarterly (CSIMQ), vol. June/July, no. 11, s. 38-68, 2017.
[6]
J. Ullberg och P. Johnson, "Empirical assessment of the accuracy of an interoperability prediction language," Information Systems Frontiers, s. 1-15, 2016.
[7]
P. Johnson och M. Ekstedt, "The Tarpit - A general theory of software engineering," Information and Software Technology, vol. 70, s. 181-203, 2016.
[8]
P. Johnson et al., "Time between vulnerability disclosures : A measure of software product vulnerability," Computers & security (Print), vol. 62, s. 278-295, 2016.
[9]
P. Narman, P. Johnson och L. Gingnell, "Using enterprise architecture to analyse how organisational structure impact motivation and learning," Enterprise Information Systems, vol. 10, no. 5, s. 523-562, 2016.
[10]
P. Johnson et al., "Towards general theories of software engineering," Science of Computer Programming, vol. 101, s. 1-5, 2015.
[11]
P. Johnson et al., "A method for predicting the probability of business network profitability," Information Systems and E-Business Management, vol. 12, no. 4, s. 567-593, 2014.
[12]
U. Franke, P. Johnson och J. König, "An architecture framework for enterprise IT service availability analysis," Software and Systems Modeling, vol. 13, no. 4, s. 1417-1445, 2014.
[13]
P. Johnson et al., "An architecture modeling framework for probabilistic prediction," Information Systems and E-Business Management, vol. 12, no. 4, s. 595-622, 2014.
[14]
J. Ullberg, P. Johnson och M. Buschle, "A language for interoperability modeling and prediction," Computers in industry (Print), vol. 63, no. 8, s. 766-774, 2012.
[15]
U. Franke et al., "Availability of enterprise IT systems : an expert-based Bayesian framework," Software quality journal, vol. 20, no. 2, s. 369-394, 2012.
[16]
Q. Lambert et al., "Business models for an aggregator," Information Management & Computer Security, 2012.
[17]
P. Närman et al., "Using enterprise architecture and technology adoption models to predict application usage," Journal of Systems and Software, vol. 85, no. 8, s. 1953-1967, 2012.
[18]
P. Johnson, M. Ekstedt och I. Jacobson, "Where's the theory for software engineering?," IEEE Software, vol. 29, no. 5, s. 94-95, 2012.
[19]
P. Närman et al., "Data accuracy assessment using enterprise architecture," Enterprise Information Systems, vol. 5, no. 1, s. 37-58, 2011.
[20]
M. Simonsson et al., "It governance decision support using the it organization modeling and assesment tool," International Journal of Innovation and Technology Management (IJITM), vol. 8, no. 2, s. 167-189, 2011.
[21]
G. Grossmann, C. -. Chi och P. Johnson, "Message from the EDOC program co-chairs and workshops chair," 15th IEEE International EDOC Enterprise Computing Conference Workshops, EDOCW 2011, 2011.
[22]
C. -. Chi och P. Johnson, "Message from the program co-chairs," 15th IEEE International EDOC Enterprise Computing Conference, EDOC 2011, s. ix-x, 2011.
[23]
T. Sommestad, M. Ekstedt och P. Johnson, "A probabilistic relational model for security risk analysis," Computers & security (Print), vol. 29, no. 6, s. 659-679, 2010.
[24]
R. Lagerström, P. Johnson och M. Ekstedt, "Architecture analysis of enterprise systems modifiability - A metamodel for software change cost estimation," Software quality journal, vol. 18, no. 4, s. 437-468, 2010.
[25]
R. Lagerström, P. Johnson och D. Höök, "Architecture analysis of enterprise systems modifiability - Models, analysis, and validation," Journal of Systems and Software, vol. 83, no. 8, s. 1387-1403, 2010.
[26]
M. Simonsson, P. Johnson och M. Ekstedt, "The Effect of IT Governance Maturity on IT Governance Performance," Information systems management, vol. 27, no. 1, s. 10-24, 2010.
[27]
R. Lagerström et al., "A method for creating entreprise architecture metamodels : applied to systems modifiability," International Journal of Computer Science and Applications, vol. 6, no. 5, s. 89-120, 2009.
[28]
M. Van Sinderen, P. Johnson och L. Kutvonen, "Report on the IFIP WG5.8 International Workshop on Enterprise Interoperability : IWEI 2008," SIGMOD record, vol. 37, no. 4, s. 112-114, 2008.
[29]
P. Johnson och E. Johansson, "Assessment of Business Process Information Security," International Journal of Business Process Integration and Management, vol. 3, no. 2, s. 118-130, 2007.
[30]
P. Johnson et al., "Enterprise architecture analysis with extended influence diagrams," Information Systems Frontiers, vol. 9, no. 2-3, s. 163-180, 2007.
[31]
P. Johnson et al., "Extended Influence Diagrams for System Quality Analysis," Journal of Software, vol. 2, no. 3, s. 30-42, 2007.
[32]
Å. Lindstrom et al., "A survey on CIO concerns - do enterprise architecture frameworks support them?," Information Systems Frontiers, vol. 8, no. 2, s. 81-90, 2006.
[33]
E. Johansson, M. Ekstedt och P. Johnson, "Assessment of Enterprise Information Security : The Importance of Information Search Cost," Proceedings of the Annual Hawaii International Conference on System Sciences, vol. 9, s. 219a, 2006.
[34]
J. Andersson och P. Johnson, "IT Infrastructure Architectures for Electric Utilities : A Comparative Analysis of Description Techniques," Proceedings of the Annual Hawaii International Conference on System Sciences, vol. 4, 2000.

Konferensbidrag

[35]
J. Nyberg, P. Johnson och A. Mehes, "Cyber threat response using reinforcement learning in graph-based attack simulations," i Proceedings of the IEEE/IFIP Network Operations and Management Symposium 2022 : Network and Service Management in the Era of Cloudification, Softwarization and Artificial Intelligence, NOMS 2022, 2022.
[36]
S. Katsikeas et al., "An Attack Simulation Language for the IT Domain," i Graphical Models for Security : 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020, Revised Selected Papers, 2020, s. 67-86.
[37]
N. Kakouros, P. Johnson och R. Lagerström, "Detecting plagiarism in penetration testing education," i Nordsec 2020, The 25th Nordic Conference on Secure IT Systems, November 23-24, Online, 2020.
[38]
S. Katsikeas et al., "Probabilistic Modeling and Simulation of Vehicular Cyber Attacks : An Application of the Meta Attack Language," i Proceedings of the 5th international conference on information systems security and privacy (ICISSP), 2019, s. 175-182.
[39]
P. Johnson, R. Lagerström och M. Ekstedt, "A Meta Language for Threat Modeling and Attack Simulations," i ACM International Conference Proceeding Series, 2018.
[40]
S. Nurcan och P. Johnson, "Message from the EDOC 2018 program chairs," i Proceedings - 2018 IEEE 22nd International Enterprise Distributed Object Computing Conference, EDOC 2018, 2018.
[41]
R. Lagerström, P. Johnson och M. Ekstedt, "Automatic Design of Secure Enterprise Architecture," i Proceedings of the 2017 IEEE 21st International Enterprise Distributed Object Computing Conference Workshops and Demonstrations (EDOCW 2017), 2017, s. 65-70.
[42]
A. Vernotte et al., "In-Depth Modeling of the UNIX Operating System for Architectural Cyber Security Analysis," i PROCEEDINGS OF THE 2017 IEEE 21ST INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS AND DEMONSTRATIONS (EDOCW 2017), 2017, s. 127-136.
[43]
P. Närman och P. Johnson, "Analyzing Coordination and Flexibility in Organizations Using Enterprise Architecture," i 2016 IEEE 20TH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING WORKSHOP (EDOCW), 2016, s. 106-113.
[44]
P. Johnson, M. Ekstedt och R. Lagerström, "Automatic Probabilistic Enterprise IT Architecture Modeling : a Dynamic Bayesian Networks Approach," i 2016 IEEE 20TH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING WORKSHOP (EDOCW), 2016, s. 122-129.
[45]
P. Johnson et al., "Modeling and analyzing systems-of-systems in the Multi-Attribute Prediction Language (MAPL)," i Proceedings - 4th International Workshop on Software Engineering for Systems-of-Systems, SESoS 2016, 2016, s. 1-7.
[46]
P. Johnson et al., "Quantitative Information Security Risk Estimation using Probabilistic Attack Graphs," i RISK: International Workshop on Risk Assessment and Risk-driven Testing : 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers, 2016, s. 37-52.
[47]
P. Johnson et al., "pwnPr3d: an Attack Graph Driven Probabilistic Threat Modeling Approach," i Availability, Reliability and Security (ARES), 2016 11th International Conference on, 2016.
[48]
P. Johnson och M. Ekstedt, "Exploring theory of cognition for general theory of software engineering : Predicting the effort of programming language comprehension," i Proceedings - 4th SEMAT Workshop on General Theory of Software Engineering, GTSE 2015, 2015, s. 15-24.
[49]
M. Välja et al., "Integrated metamodel for security analysis," i 2015 48TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2015, s. 5192-5200.
[50]
R. Lagerström, P. Johnson och M. Ekstedt, "Search-Based Design of Large Software Systems-of-Systems," i Proceedings - 3rd International Workshop on Software Engineering for Systems-of-Systems, SESoS 2015, 2015, s. 44-47.
[51]
M. Ekstedt et al., "securiCAD by foreseeti : A CAD tool for enterprise cyber security management," i Proceedings of the 2015 IEEE 19th International Enterprise Distributed Object Computing Conference Workshops and Demonstrations, EDOCW 2015, 2015.
[52]
P. Johnson et al., "2nd SEMAT workshop on a general theory of software engineering (GTSE 2013)," i 2013 35th International Conference on Software Engineering (ICSE), 2013, s. 1525-1526.
[53]
J. Ullberg et al., "Architecture Modeling for Interoperability Analysis on the Future Internet," i Enterprise Interoperability: I-ESA'12 Proceedings, 2013, s. 111-117.
[54]
P. Johnson et al., "Business model risk analysis : Predicting the probability of business network profitability," i Lecture Notes in Business Information Processing, 2013, s. 118-130.
[55]
M. Österlind et al., "Enterprise Architecture Evaluation using Utility theory," i Proceedings 17th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW), 2013, s. 347-351.
[56]
M. Välja et al., "Modeling and prediction of monetary and non-monetary business values," i 2013 17th IEEE International Enterprise Distributed Object Computing Conference (EDOC), 2013, s. 153-158.
[57]
P. Johnson et al., "P2AMF : Predictive, probabilistic architecture modeling framework," i Proceedings Enterprise Interoperability - 5th International IFIP Working Conference, IWEI 2013, 2013, s. 104-117.
[58]
L. F. Pires och P. Johnson, "Report Workshop 5," i ENTERPRISE INTEROPERABILITY : RESEARCH AND APPLICATIONS IN THE SERVICE-ORIENTED ECOSYSTEM, 2013, s. 181-183.
[59]
M. Buschle, P. Johnson och K. Shahzad, "The Enterprise Architecture Analysis Tool–Support for the Predictive, Probabilistic Architecture Modeling Framework," i 19th Americas Conference on Information Systems, AMCIS 2013 : Hyperconnected WorldAnything, Anywhere, Anytime, 2013, s. 3350-3364.
[60]
M. Van Sinderen och P. Johnson, "Lecture Notes in Business Information Processing : Preface," i Lecture Notes in Business Information Processing: Preface, 2012, s. V-VI.
[61]
J. Ullberg och P. Johnson, "Predicting Interoperability in an Environmental Assurance System," i Enterprise Interoperability V : Shaping Enterprise Interoperability in the Future Internet, 2012, s. 25-35.
[62]
M. van Sinderen et al., "Preparing the Future Internet for ad-hoc business networks support," i Architecture Modeling for the Future Internet enabled Enterprise (AMFInE) workshop, 2012.
[63]
I. Jacobson et al., "Re-founding Software Engineering : SEMAT at the Age of Three (Keynote Abstract)," i Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, 2012, s. 15-19.
[64]
J. Ullberg, P. Johnson och M. Buschle, "A Modeling Language for Interoperability Assessments," i ENTERPRISE INTEROPERABILITY, 2011, s. 61-74.
[65]
S. Buckl et al., "A meta-language for Enterprise Architecture analysis," i 12th International Conference on Business Process Modeling, Development and Support, BPMDS 2011 and 16th International Conference on Exploring Modeling Methods for Systems Analysis and Design, 2011, s. 511-525.
[66]
J. Ullberg et al., "A Tool for Interoperability Analysis of Enterprise Architecture Models using Pi-OCL," i Enterprise interoperability iv : making the internet of the future for the future of enterprise, 2010, s. 81-90.
[67]
U. Franke et al., "Availability of enterprise IT systems : an expert-based Bayesian model," i Proc. Fourth International Workshop on Software Quality and Maintainability, 2010.
[68]
P. Närman et al., "Hybrid Probabilistic Relational Models for System Quality Analysis," i Proceedings - IEEE International Enterprise Distributed Object Computing Workshop, EDOC, 2010, s. 57-66.
[69]
U. Franke et al., "A Method for Choosing Software Assessment Measures using Bayesian Networks and Diagnosis : CSMR 2009, PROCEEDINGS," i 13TH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING: CSMR 2009, PROCEEDINGS, 2009, s. 241-245.
[70]
A. Källgren, J. Ullberg och P. Johnson, "A Method for Constructing a Company Specific Enterprise Architecture Model Framework," i 10th ACIS Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2009 : In conjunction with IWEA 2009 and WEACR 2009, 2009, s. 346-351.
[71]
S. Aier et al., "A Survival Analysis of Application Life Spans based on Enterprise Architecture Models," i Proc. 3rd International Workshop on Enterprise Modelling and Information Systems Architectures, EMISA 2009, 2009, s. 141-154.
[72]
M. Ekstedt et al., "A Tool for Enterprise Architecture Analysis of Maintainability : CSMR 2009, PROCEEDINGS," i EUR CON SFTWR MTNCE REENGR, 2009, s. 327-328.
[73]
U. Franke et al., "A formal method for cost and accuracy trade-off analysis in software assessment measures," i RCIS 2009 : PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE, 2009, s. 295-302.
[74]
D. Höök et al., "An Enterprise Architecture Based Method Enabling Quantified Analysis of IT Support System's Impact on Maintenance Management," i PROCEEDINGS OF PICMET 09 : TECHNOLOGY MANAGEMENT IN THE AGE OF FUNDAMENTAL CHANGE, 2009, s. 3092-3105.
[75]
U. Franke och P. Johnson, "An Enterprise Architecture Framework for Application Consolidation in the Swedish Armed Forces," i 2009 13TH ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOCW 2009), 2009, s. 264-273.
[76]
R. Lagerström, P. Johnson och D. Höök, "An Enterprise Architecture Management Pattern for Software Change Project Cost Analysis," i Patterns in Enterprise Architecture Management (PEAM2009) workshop, 2009.
[77]
J. Ullberg, D. Chen och P. Johnson, "Barriers to Enterprise Interoperability," i ENTERPRISE INTEROPERABILITY, PROCEEDINGS, 2009, s. 13-24.
[78]
T. Sommestad, M. Ekstedt och P. Johnson, "Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models," i Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS, 2009.
[79]
P. Närman et al., "Data Collection Prioritization for System Quality Analysis," i Electronic Notes in Theoretical Computer Science, 2009, s. 29-42.
[80]
U. Franke et al., "Decision Support oriented Enterprise Architecture Metamodel Management using Classification Trees," i 2009 13TH ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOCW 2009), 2009, s. 328-335.
[81]
J. Ullberg, P. Johnson och R. Lagerström, "Education in Enterprise Architecture Analysis : Assessing interoperability of service oriented architectures," i The 5th China - Europe International Symposium on Software Industry Oriented Education (CEISIE 2009). Bordeaux, France. 25-26 May 2009, 2009.
[82]
P. Närman et al., "Enterprise Architecture Analysis for Data Accuracy Assessments," i 2009 IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, 2009, s. 24-33.
[83]
U. Franke, W. Flores Rocha och P. Johnson, "Enterprise Architecture Dependency Analysis using Fault Trees and Bayesian Networks," i Proc. 42nd Annual Simulation Symposium, 2009, s. 209-216.
[84]
U. Franke et al., "Enterprise Architecture analysis using Fault Trees and MODAF," i Proceedings of the Forum at the CAiSE 2009 Conference, 2009, s. 61-66.
[85]
P. Gustafsson, P. Johnson och L. Nordström, "Enterprise architecture : A framework supporting organizational performance analysis," i IET Conference Publications : Issue 550 CP, 2009, 2009.
[86]
U. Franke, W. R. Flores och P. Johnson, "Enterprise architecture dependency analysis using fault trees and Bayesian networks," i Spring Simulation Multiconference 2009 - Co-located with the 2009 SISO Spring Simulation Interoperability Workshop, 2009.
[87]
W. R. Flores et al., "Indicators predicting similarities in maturity between processes : An empirical Analysis with 35 European organizations," i 1st Annual Pre-ICIS Workshop on Accounting Information Systems, 2009.
[88]
P. Gustafsson et al., "Modeling the IT Impact on Organizational Structure : 2009 IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE," i EDOC: 2009 IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, 2009, s. 14-23.
[89]
R. Lagerström et al., "Software Change Project Cost Estimation - A Bayesian Network and a Method for Expert Elicitation," i Third International Workshop on Software Quality and Maintainability (SQM), 2009.
[90]
M. Simonsson, R. Lagerström och P. Johnson, "A Bayesian Network for IT Governance Performance Prediction," i Proceedings of the 10th International Con-ference on Electronic Commerce, 2008.
[91]
J. Ullberg, R. Lagerström och P. Johnson, "A Framework for Service Interoperability Analysis using Enterprise Architecture Models," i 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, VOL 2, 2008, s. 99-107.
[92]
T. Sommestad, M. Ekstedt och P. Johnson, "Combining defense graphs and enterprise architecture models for security analysis," i Proceedings - 12th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2008, 2008, s. 349-355.
[93]
U. Franke et al., "Defense graphs and Enterprise Architecture for Information Assurance analysis," i Proceedings of the 26th Army Science Conference, 2008.
[94]
J. Ullberg, R. Lagerström och P. Johnson, "Enterprise architecture - A service interoperability analysis framework," i ENTERPRISE INTEROPERABILITY III : NEW CHALLENGES AND INDUSTRIAL APPROACHES, 2008, s. 611-623.
[95]
M. Simonsson, P. Johnson och M. Ekstedt, "IT Governance Decision Support using the IT Organization Modeling and Assessment Tool," i 2008 Portland International Center for Management of Engineering and Technology, Technology Management for a Sustainable Economy, PICMET '08, 2008, s. 802-810.
[96]
P. Gustafsson et al., "Identifying IT impacts on organizational structure and business value," i Proceedings of the Third International Workshop on Business/IT Alignment and Interoperability, 2008, s. 44-57.
[97]
M. Simonsson et al., "Modeling and Evaluating the Maturity of IT Governance," i Proceedings of the International Council on Large Electrical Systems, CIGRÉ, 2008, s. 8p.
[98]
L. Nordstrom, P. Närman och P. Johnson, "Modelling and evaluating non-functional aspects of integrated protection and control systems," i Int. Conf. Large High Voltage Electr. Syst., CIGRE, 2008.
[99]
R. Lagerström och P. Johnson, "Probabilistic Metamodel Merging," i CEUR Workshop Proceedings, 2008, s. 25-28.
[100]
P. Gustafsson et al., "Quantifying IT Impacts on Organizational Structure and Business Value with Extended Influence Diagrams," i PRACTICE OF ENTERPRISE MODELING, 2008, s. 138-152.
[101]
M. Simonsson och P. Johnson, "The IT Organization Modeling and Assessment Tool : Correlating IT Governance Maturity with the Effect of IT," i Proceedings of the 41st Hawaii International Conference on System Sciences, 2008.
[102]
M. Simonsson, P. Johnson och M. Ekstedt, "The IT Organization Modeling and Assessment Tool for IT governance decision support," i ADVANCED INFORMATION SYSTEMS ENGINEERING, PROCEEDINGS, 2008, s. 258-261.
[103]
M. Simonsson, R. Lagerström och P. Johnson, "The Linear Conditional Probability Matrix Generator for IT governance performance prediction," i MSVVEIS 2008 : MODELLING, SIMULATION, VERIFICATION AND VALIDATION OF ENTERPRISE INFORMATION SYSTEMS, 2008, s. 170-179.
[104]
P. Närman et al., "Using Enterprise Architecture Models for System Quality Analysis," i EDOC 2008: 12TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING, PROCEEDINGS, 2008, s. 14-23.
[105]
R. Lagerström och P. Johnson, "Using architectural models to predict the maintainability of enterprise systems," i CSMR 2008 : 12TH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING - DEVELOPING EVOLVABLE SYSTEMS, 2008, s. 248-252.
[106]
P. Johnson et al., "A tool for enterprise architecture analysis," i 11TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2007, s. 142-153.
[107]
P. Närman, P. Johnson och L. Nordström, "Enterprise Architecture : A framework supporting system quality analysis," i 11TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2007, s. 130-141.
[108]
R. Lagerström, P. Johnson och P. Närman, "Extended influence diagram generation," i Enterprise Interoperability II : New Challenges and Approaches, 2007, s. 599-602.
[109]
M. Chenine, L. Nordström och P. Johnson, "Factors in assessing performance of wide area communication networks for distributed control of power systems," i 2007 IEEE LAUSANNE POWERTECH, VOLS 1-5, 2007, s. 1682-1687.
[110]
P. Johnson, L. Nordström och R. Lagerström, "Formalizing analysis of enterprise architecture," i Enterprise Interoperability : New Challenges and Approaches, 2007, s. 35-44.
[111]
P. Johnson och M. Ekstedt, "In Search of a Unified Theory of Software Engineering," i 2nd International Conference on Software Engineering Advances - ICSEA 2007, 2007, s. 4299884.
[112]
M. Simonsson, P. Johnson och H. Wijkström, "Model-based it governance maturity assessments with cobit," i Proceedings of the 15th European Conference on Information Systems, ECIS 2007, 2007, s. 1276-1287.
[113]
P. Johnson et al., "System Quality Analysis with Extended Influence Diagrams," i CSMR 2007 Workshop and Special Session papers, 2007.
[114]
E. Johansson, P. Johnson och T. Cegrell, "Assessment of Enterprise Information Security in Electric Utilities : The Importance of Prioritization," i Proceedings CIGRE Session 2006, 2006.
[115]
P. Johnson et al., "Extended influence diagrams for enterprise architecture analysis," i 10th IEEE International Enterprise Distributed Object Computing Conference, Proceedings, 2006, s. 3-12.
[116]
E. Johansson och P. Johnson, "Assessment of Enterprise Information Security : An Architecture Theory Diagram Definition," i Proceedings CSER 2005, 2005, s. 136-146.
[117]
E. Johansson och P. Johnson, "Assessment of Enterprise Information Security : The Importance of Prioritization," i Ninth IEEE International EDOC Enterprise Computing Conference, Proceedings, 2005, s. 207-218.
[118]
M. Simonsson et al., "Scenario-based evaluation of Enterprise Architecture : A top-down approach for chief information officer decision making," i 7th International Conference on Enterprise Information Systems, ICEIS 2005, 2005, s. 130-137.
[119]
M. Ekstedt et al., "Consistent enterprise software system architecture for the CIO : a utility-cost based approach," i Proceedings of the 37th Annual Hawaii International Conference on System Sciences, 2004, 2004.
[120]
P. Johnson et al., "Using Enterprise Architecture for CIO Decision-Making : On the Importance of Theory," i Proceedings of the Second Annual Conference on Systems Engineering Research, 2004.
[121]
M. Ekstedt et al., "Management of Enterprise Software System Architectures : Focusing on Information Economy and Model Consistency," i Proceedings of the 3rd Conference on Software Engineering Research and Practice in Sweden, 2003.
[122]
M. Ekstedt et al., "The architectural information view for the power electricity industry," i Proceedings of the CIGRE SC D2´s Colloquium, 2003.
[123]
M. Ekstedt och P. Johnson, "Exploring architectural analysis credibility from a developer perspective," i Proceedings of the Fourth Australian Workshop on Software and Systems Architecture, 2002.

Kapitel i böcker

[124]
M. Simonsson och P. Johnson, "6," i Assessment of IT Governance- A Prioritization of Cobit, Bandamutha, Ravi Kumar Jain red., : Icfai University Press, 2006, s. 69-85.

Icke refereegranskade

Artiklar

[125]
M. Van Sinderen, P. Johnson och G. Doumeingts, "Computer in industry special issue on "interoperability and future internet for next-generation enterprises" editorial and state of the art," Computers in industry (Print), vol. 64, no. 8, s. 881-886, 2013.
[126]
P. Johnson et al., "Report on the Second SEMAT Workshop on General Theory of Software Engineering : GTSE 2013," Software Engineering Notes : an Informal Newsletter of The Specia, 2013.
[127]
P. Ralph, P. Johnson och H. Jordan, "Report on the first SEMAT workshop on general theory of software engineering (GTSE 2012)," Software Engineering Notes : an Informal Newsletter of The Specia, vol. 38, no. 2, s. 26-28, 2013.

Konferensbidrag

[128]
M. Ekstedt, P. Johnson och R. Lagerström, "Enterprise Architecture Modeling and Analysis of Quality Attributes : The Multi-Attribute Prediction Language (MAPL)," i Proceedings of the 1st Scandinavian Workshop on the Engineering of Systems-of-Systems (SWESoS 2015), 2015, s. 10-12.
[129]
K. Pantazis et al., "The Enterprise Architecture Analysis Tool for Decision-Making : a case study," i 4th Nordic EASS 2013, Helsinki, Finland, 2013.
[130]
M. Simonsson och P. Johnson, "Assessement of IT governance : A prioritization of cobit," i Proceedings of the Conference on Systems Engineering Research, 2006.
[131]
E. Johansson och P. Johnson, "Assessment of Enterprise Information Security : Estimating the Credibility of the Results," i Proceedings of the Symposium on Requirements Engineering for Information Security (SREIS 05) at the 13th IEEE Requirements Engineering Conference (RE 05), 2005.
[132]
J. Andersson och P. Johnson, "Architectural integration styles for large scale enterprise software systems," i Proceedings of the 5th IEEE International Conference on Enterprise Distributed Object Computing, 2001.
[133]
J. Andersson och P. Johnson, "Extending attribute based architectural analysis to enterprise software systems," i Proceedings of the 3rd Australasian Workshop on Software and System Architectures, 2000.

Böcker

[134]
P. Johnson et al., IT Managment with Enterprise Architecture. Mathias Ekstedt, 2013.
[136]
P. Johnson och M. Ekstedt, The grand unified theory of software engineering. Stockholm : Industriella informations- och styrsystem, KTH Royal Institute of Technology, 2006.
[137]
E. Sandström et al., Enterprise Application Integration in the electric Power Industry. Electrical Engineering/Electronics, Computer, Communications and Information Technology Association, 2004.

Kapitel i böcker

[138]
P. Johnson, M. Ekstedt och J. Ullberg, "Assessing Goal Fulfillment," i Enterprise Architecture : Models and Analyses for Information Systems Decision Making, : Studentlitteratur, 2007, s. 253-269.
[139]
P. Johnson, M. Ekstedt och E. Johansson, "Collecting evidence," i Enterprise Architecture : Models and Analyses for Information Systems Decision Making, : Studentlitteratur, 2007, s. 213-252.
[140]
P. Johnson et al., "Enterprise Architecture at ACME Energy," i Enterprice Architecture : Models and Analyses for Information Systems Decision Making, : Studentlitteratur, 2007, s. 293-306.
[141]
P. Johnson, M. Ekstedt och R. Lagerström, "Enterprise Information System Management," i Enterprise Architecture : Models and Analyses for Information Systems Decision Making, : Studentlitteratur, 2007, s. 54-71.
[142]
P. Johnson et al., "Introduction," i Enterprise Architecture : Models and Analyses for Information Systems Decision Making, : Studentlitteratur, 2007, s. 11--36.
[143]
P. Johnson et al., "Organizing for Enterprise Architcture," i Enterprise Architcture : Models and Analyses for Information Systems Decision Making, : Studentlitteratur, 2007, s. 253-268.
[144]
P. Johnson et al., "Organizing for enterprise architecture," i Enterprise Architcture : Models and Analyses for Information Systems Decision Making, : Studentlitteratur, 2007, s. 270-291.
[145]
P. Johnson et al., "Selecting Enterprise Architecture Models," i Enterprise Architecture : Models and Analyses for Information Systems Decision Making, : Studentlitteratur, 2007, s. 213-239.
[146]
P. Johnson et al., "Setting the Business Goals," i Enterprise Architecture : Models and Analyses for Information Systems Decision Making, : Studentlitteratur, 2007, s. 73-91.
[147]
P. Johnson et al., "Setting the IT Organization Goals," i Enterprise Architecture : Models and Analyses for Information Systems Decision Making, : Studentlitteratur, 2007, s. 153-212.
[148]
M. Ekstedt et al., "Setting the Information Systems Goals," i Enterprise Architecture : Models and Analyses for Information Systems Decision Making, : Studentlitteratur, 2007, s. 92-152.
[149]
P. Johnson, M. Ekstedt och R. Lagerström, "The Enterprise and Its Information Systems," i Enterprise Architecture : Models and Analyses for Information Systems Decision Making, : Studentlitteratur, 2007, s. 37-52.

Avhandlingar

[150]
P. Johnson, "Enterprise Software System Integration : An Architectural Perspective," Doktorsavhandling Stockholm : KTH, Trita-ICS, 0202, 2002.

Rapporter

[151]
M. Simonsson och P. Johnson, "Defining IT governance - A consolidation of literature," KTH Royal Institute of Technology, Trita-EE, 2005:001, 2005.
[152]
P. Johnson och M. Ekstedt, "Predicting the effort of program language comprehension : The case of HLL vs. Assembly," KTH Royal Institute of Technology, 2005.
Senaste synkning med DiVA:
2024-04-21 00:42:23