Skip to main content

Publications by Robert Lagerström

Refereegranskade

Artiklar

[1]
W. Xiong, S. Hacks and R. Lagerström, "A Method for Assigning Probability Distributions in Attack Simulation Languages," Complex Systems Informatics and Modeling Quarterly, no. 26, pp. 55-77, 2021.
[2]
W. Xiong et al., "Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix," Software and Systems Modeling, 2021.
[4]
S. Hacks et al., "powerLang : a probabilistic attack simulation language for the power domain," Energy Informatics, vol. 3, no. 1, 2020.
[5]
M. Välja et al., "A Framework for Automatic IT Architecture Modeling : Applying Truth Discovery," Complex Systems Informatics and Modeling Quarterly, no. 20, 2019.
[6]
R. Lagerström et al., "A Methodology for Operationalizing Enterprise IT Architecture and Evaluating its Modifiability," International Journal of Complex Systems Informatics and Modeling Quarterly (CSIMQ), vol. 19, pp. 75-98, 2019.
[7]
W. Xiong and R. Lagerström, "Threat modeling – A systematic literature review," Computers & security (Print), vol. 84, pp. 53-69, 2019.
[8]
P. Johnson et al., "Can the Common Vulnerability Scoring System be Trusted? : A Bayesian Analysis," IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 6, pp. 1002-1015, 2018.
[9]
A. Vernotte et al., "Load Balancing of Renewable Energy : A Cyber Security Analysis," Energy Informatics, vol. 1, 2018.
[10]
R. Lagerström, "Message from the EDOC 2018 general chair," 22nd IEEE International Enterprise Distributed Object Computing Conference, EDOC 2018, pp. VIII-IX, 2018.
[11]
R. Lagerström et al., "Automated Probabilistic System Architecture Analysis in the Multi-Attribute Prediction Language (MAPL) : Iteratively Developed using Multiple Case Studies," International Journal of Complex Systems Informatics and Modeling Quarterly (CSIMQ), vol. June/July, no. 11, pp. 38-68, 2017.
[12]
M. Korman, R. Lagerström and M. Ekstedt, "Modeling Enterprise Authorization : A Unified Metamodel and Initial Validation," Complex Systems Informatics and Modeling Quarterly, no. 7, pp. 1-24, 2016.
[13]
P. Johnson et al., "Time between vulnerability disclosures : A measure of software product vulnerability," Computers & security (Print), vol. 62, pp. 278-295, 2016.
[14]
R. Lagerström, C. Baldwin and A. MacCormack, "Visualizing and Measuring Software Portfolio Architecture : A Power Utility Case," Journal of Modern Project Management, vol. 3, no. 2, pp. 114-121, 2015.
[15]
H. Holm et al., "Automatic data collection for enterprise architecture models," Software and Systems Modeling, vol. 13, no. 2, pp. 825-841, 2014.
[16]
L. Gingnell et al., "Quantifying Success Factors for IT Projects-An Expert-Based Bayesian Model," Information systems management, vol. 31, no. 1, pp. 21-36, 2014.
[17]
R. Lagerström, U. Sporrong and A. Wall, "Increasing software development efficiency and maintainability for complex industrial systems - A case study," Journal of Software Maintenance and Evolution : Research and Practice, vol. 25, no. 3, pp. 285-301, 2013.
[18]
R. Lagerström et al., "Identifying factors affecting software development cost and productivity," Software Quality Journal, vol. 20, no. 2, pp. 395-417, 2012.
[19]
M. Lankhorst, P. Boekhoudt and R. Lagerström, "A Lifecycle Approach to Portfolio Management," Journal of Enterprise Architecture, vol. 7, no. 3, pp. 29-40, 2011.
[20]
R. Lagerström, P. Johnson and M. Ekstedt, "Architecture analysis of enterprise systems modifiability - A metamodel for software change cost estimation," Software quality journal, vol. 18, no. 4, pp. 437-468, 2010.
[21]
R. Lagerström, P. Johnson and D. Höök, "Architecture analysis of enterprise systems modifiability - Models, analysis, and validation," Journal of Systems and Software, vol. 83, no. 8, pp. 1387-1403, 2010.
[22]
R. Lagerström et al., "A method for creating entreprise architecture metamodels : applied to systems modifiability," International Journal of Computer Science and Applications, vol. 6, no. 5, pp. 89-120, 2009.
[23]
R. Lagerström, "Analyzing System Maintainability using Enterprise Architecture Models," Journal of Enterprise Architecture, vol. 3, no. 4, pp. 33-41, 2007.
[24]
P. Johnson et al., "Enterprise architecture analysis with extended influence diagrams," Information Systems Frontiers, vol. 9, no. 2-3, pp. 163-180, 2007.
[25]
P. Johnson et al., "Extended Influence Diagrams for System Quality Analysis," Journal of Software, vol. 2, no. 3, pp. 30-42, 2007.

Konferensbidrag

[26]
J. Loxdal et al., "Why Phishing Works on Smartphones : A Preliminary Study," in 54th Hawaii International Conference on System Sciences, HICSS 2021, Kauai, Hawaii, USA, January 5, 2021, 2021, pp. 1-10.
[27]
E. Ling, R. Lagerström and M. Ekstedt, "A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain," in Critical Information Infrastructures Security, CRITIS. 15th International Conference, CRITIS 2020, Bristol, UK, September 2–3, 2020, Proceedings, 2020, pp. 47-58.
[28]
S. Katsikeas et al., "An Attack Simulation Language for the IT Domain," in Graphical Models for Security : 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020, Revised Selected Papers, 2020, pp. 67-86.
[29]
S. Andrén et al., "Assessing Alignment Between Business and IT Strategy : A Case Study," in Proceedings of the Forum at Practice of Enterprise Modeling 2020 co-located with the 13th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling (PoEM 2020), 2020, pp. 1-12.
[30]
N. Kakouros, P. Johnson and R. Lagerström, "Detecting plagiarism in penetration testing education," in Nordsec 2020, The 25th Nordic Conference on Secure IT Systems, November 23-24, Online, 2020.
[31]
S. Kavosi, S. Hacks and R. Lagerström, "Divergence Between Conceptual Business Process Management and its Practical Business Improvement Implementation : A Comparative Study," in 2020 IEEE 22ND CONFERENCE ON BUSINESS INFORMATICS (CBI 2020), VOL 2 : RESEARCH-IN-PROGRESS AND WORKSHOP PAPERS, 2020, pp. 65-70.
[32]
F. Heiding and R. Lagerström, "Ethical Principles for Designing Responsible Offensive Cyber Security Training," in Privacy and Identity 2020, 2020, pp. 21-39.
[33]
B. Shafabakhsh, R. Lagerström and S. Hacks, "Evaluating the Impact of Inter Process Communication in Microservice Architectures," in 8th International Workshop on Quantitative Approaches to Software Quality, 2020, pp. 55-63.
[34]
F. Heiding et al., "Securing IoT Devices using Geographic and Continuous Login Blocking: A Honeypot Study," in Proceedings of the 6th International Conference on Information Systems Security and Privacy 2020, 2020, pp. 424-431.
[35]
R. Lagerström, W. Xiong and M. Ekstedt, "Threat modeling and attack simulations of smart cities : A literature review and explorative study," in ICISSP 2020 - Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020, pp. 369-376.
[36]
W. Xiong et al., "A Study of Security Vulnerabilities and Software Weaknesses in Vehicles," in Nordic Conference on Secure IT Systems, 2019, pp. 204-218.
[37]
X. Mao et al., "Conceptual Abstraction of Attack Graphs : a Use Case of securiCAD," in Graphical Models for Security. GraMSec 2019., 2019, pp. 186-202.
[38]
S. Hacks et al., "Creating Meta Attack Language Instances using ArchiMate : Applied to Electric Power and Energy System Cases," in Proceeding of the 2019 IEEE 23rd International Enterprise Distributed Object Computing Conference (EDOC), 2019.
[39]
D. Elsner et al., "Multivariate Unsupervised Machine Learning for Anomaly Detection in Enterprise Applications," in Hawaii International Conference on System Sciences (HICSS), 2019.
[40]
S. Katsikeas et al., "Probabilistic Modeling and Simulation of Vehicular Cyber Attacks : An Application of the Meta Attack Language," in Proceedings of the 5th international conference on information systems security and privacy (ICISSP), 2019, pp. 175-182.
[41]
W. Xiong, P. Carlsson and R. Lagerström, "Re-using Enterprise Architecture Repositories for Agile Threat Modeling," in 2019 IEEE 23rd International Enterprise Distributed Object Computing Workshop (EDOCW), 2019.
[42]
W. Xiong, F. Krantz and R. Lagerström, "Threat Modeling and Attack Simulations of Connected Vehicles : A Research Outlook," in Proceedings of the 5th international conference on information systems security and privacy (ICISSP), 2019, pp. 479-486.
[43]
W. Xiong, F. Krantz and R. Lagerström, "Threat Modeling and Attack Simulations of Connected Vehicles : Proof of Concept," in International Conference on Information Systems Security and Privacy, 2019, pp. 272-287.
[44]
W. Xiong and R. Lagerström, "Threat Modeling of Connected Vehicles : A privacy analysis and extension of vehicleLang," in 2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 2019.
[45]
P. Johnson, R. Lagerström and M. Ekstedt, "A Meta Language for Threat Modeling and Attack Simulations," in ACM International Conference Proceeding Series, 2018.
[46]
M. Canat et al., "Enterprise Architecture and Agile Development : Friends or Foes?," in Trends in Enterprise Architecture Research (TEAR) workshop, in conjunction with the IEEE EDOC conference, 2018.
[47]
S. Guerreiro et al., "A Meta Model for interoperability of Secure Business Transaction using BlockChain and DEMO," in the 9th International Conference on Knowledge Engineering and Ontology Development (KEOD), 2017.
[48]
M. Välja, M. Korman and R. Lagerström, "A study on software vulnerabilities and weaknesses of embedded systems in power networks," in Proceedings - 2017 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, CPSR-SG 2017 (part of CPS Week), 2017, pp. 47-52.
[49]
M. Korman et al., "Analyzing the effectiveness of attack countermeasures in a SCADA system," in Proceedings - 2017 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, CPSR-SG 2017 (part of CPS Week), 2017, pp. 73-78.
[50]
R. Lagerström, P. Johnson and M. Ekstedt, "Automatic Design of Secure Enterprise Architecture," in Proceedings of the 2017 IEEE 21st International Enterprise Distributed Object Computing Conference Workshops and Demonstrations (EDOCW 2017), 2017, pp. 65-70.
[51]
A. MacCormack and R. Lagerström, "Designing an agile software portfolio architecture : The impact of coupling on performance," in 2017 Annual Meeting of the Academy of Management, AOM 2017, 2017.
[52]
R. Lagerström et al., "Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities," in 9th International Symposium on Engineering Secure Software and Systems, ESSoS 2017, 2017, pp. 53-69.
[53]
A. Vernotte et al., "In-Depth Modeling of the UNIX Operating System for Architectural Cyber Security Analysis," in PROCEEDINGS OF THE 2017 IEEE 21ST INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS AND DEMONSTRATIONS (EDOCW 2017), 2017, pp. 127-136.
[54]
O. Bjuhr et al., "Software architecture decoupling at ericsson," in Proceedings - 2017 IEEE International Conference on Software Architecture Workshops, ICSAW 2017 : Side Track Proceedings, 2017, pp. 259-262.
[55]
R. Blom et al., "Analyzing attack resilience of an advanced meter infrastructure reference model," in Joint Workshop on Cyber-Physical Security and Resilience in Smart Grids (CPSR-SG), 2016.
[56]
M. Välja et al., "Automated Architecture Modeling for Enterprise Technology Management Using Principles from Data Fusion : A Security Analysis Case," in PORTLAND INTERNATIONAL CONFERENCE ON MANAGEMENT OF ENGINEERING AND TECHNOLOGY (PICMET 2016) : TECHNOLOGY MANAGEMENT FOR SOCIAL INNOVATION, 2016, pp. 14-22.
[57]
P. Johnson, M. Ekstedt and R. Lagerström, "Automatic Probabilistic Enterprise IT Architecture Modeling : a Dynamic Bayesian Networks Approach," in 2016 IEEE 20TH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING WORKSHOP (EDOCW), 2016, pp. 122-129.
[58]
M. Välja et al., "Bridging the gap between business and technology in strategic decision-making for cyber security management," in Proceedings of 2016 Portland International Conference on Management of Engineering and Technology, 2016, pp. 32-42.
[59]
P. Johnson et al., "Modeling and analyzing systems-of-systems in the Multi-Attribute Prediction Language (MAPL)," in Proceedings - 4th International Workshop on Software Engineering for Systems-of-Systems, SESoS 2016, 2016, pp. 1-7.
[60]
R. Lagerström, M. Addibpour and F. Heiser, "Product Feature Prioritization using the Hidden Structure Method : A Practical Case at Ericsson," in Portland International Center for Management of Engineering and Technology (PICMET) conference, 2016, pp. 2308-2315.
[61]
P. Johnson et al., "Quantitative Information Security Risk Estimation using Probabilistic Attack Graphs," in RISK: International Workshop on Risk Assessment and Risk-driven Testing : 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers, 2016, pp. 37-52.
[62]
M. Korman et al., "Technology Management through Architecture Reference Models : A Smart Metering Case," in PORTLAND INTERNATIONAL CONFERENCE ON MANAGEMENT OF ENGINEERING AND TECHNOLOGY (PICMET 2016) : TECHNOLOGY MANAGEMENT FOR SOCIAL INNOVATION, 2016, pp. 2338-2350.
[63]
P. Johnson et al., "pwnPr3d: an Attack Graph Driven Probabilistic Threat Modeling Approach," in Availability, Reliability and Security (ARES), 2016 11th International Conference on, 2016.
[64]
M. Välja et al., "A Requirements Based Approach for Automating Enterprise IT Architecture Modeling Using Multiple Data Sources," in 2015 IEEE 19th International Enterprise Distributed Object Computing Workshop (EDOCW), 2015, pp. 79-87.
[65]
M. Korman, R. Lagerström and M. Ekstedt, "Modeling Authorization in Enterprise-wide Contexts," in PoEM-SDC 2015: Short and Doctoral Consortium Papers at PoEM 2015 : Proceedings of Short and Doctoral Consortium Papers Presented at the 8th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modelling (PoEM 2015) Valencia, Spain, November 10-12, 2015., 2015, pp. 81-90.
[66]
F. Heiser, R. Lagerström and M. Addibpour, "Revealing Hidden Structures in Organizational Transformation : A Case Study," in In Proc. of the Trends in Enterprise Architecture Research (TEAR) workshop, at CAiSE, Stockholm, Sweden, June 2015, 2015.
[67]
R. Lagerström, P. Johnson and M. Ekstedt, "Search-Based Design of Large Software Systems-of-Systems," in Proceedings - 3rd International Workshop on Software Engineering for Systems-of-Systems, SESoS 2015, 2015, pp. 44-47.
[68]
M. Ekstedt et al., "securiCAD by foreseeti : A CAD tool for enterprise cyber security management," in Proceedings of the 2015 IEEE 19th International Enterprise Distributed Object Computing Conference Workshops and Demonstrations, EDOCW 2015, 2015.
[69]
M. Välja et al., "An Archimate based analysis of Microgrid Control Systems Architectures," in 2014 International Conference on Embedded Systems, ICES 2014, Coimbatore, India, 3-5 July 2014, 2014, pp. 297-301.
[70]
R. Lagerström and M. Mihaescu, "Critical Success Factors in E-Learning for Project-Based Courses," in EDULEARN14: 6th International Conference on Education and New Learning Technologies, 2014, pp. 6125-6134.
[71]
S. Nithin et al., "Development of a Real Time Data Collection Unit for distribution network in a smart grid environment," in Towards Sustainable Energy, 2014 Power and Energy Systems Conference, 2014, p. 6805323.
[72]
S. Nithin, S. Kottayil and R. Lagerström, "Direct Load Control on Smart Micro Grid supported by Wireless Communication and Real Time Computation," in Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing, 2014.
[73]
R. Lagerström and M. Ekstedt, "Extending a General Theory of Software to Engineering," in Proceedings of the 3rd SEMAT Workshop on General Theories of Software Engineering, 2014, pp. 36-39.
[74]
R. Lagerström et al., "Visualizing and Measuring Enterprise Application Architecture : An Exploratory Telecom Case," in 2014 47th Hawaii International Conference on System Sciences, HICSS, 2014, pp. 3847-3856.
[75]
R. Lagerström et al., "Visualizing and Measuring Software Portfolio Architecture : A Flexibility Analysis," in 16th International Dependency and Structure Modelling Conference, DSM 2014, 2014, pp. 65-74.
[76]
J. Ullberg et al., "Architecture Modeling for Interoperability Analysis on the Future Internet," in Enterprise Interoperability: I-ESA'12 Proceedings, 2013, pp. 111-117.
[77]
M. Österlind et al., "Enterprise Architecture Evaluation using Utility theory," in Proceedings 17th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW), 2013, pp. 347-351.
[78]
A. Hjalmarsson, M. Korman and R. Lagerström, "Software Migration Project Cost Estimation using COCOMO II and Enterprise Architecture Modeling," in CEUR Workshop Proceedings, 2013, pp. 39-48.
[79]
R. Lagerström et al., "Visualizing and Measuring Enterprise Architecture : An Exploratory BioPharma Case," in The 6th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling (PoEM), 2013, pp. 9-23.
[80]
L. Gingnell et al., "A Case Study on Product Development Performance Measurement," in Proceedings of The 2012 International Conference on Innovation, Management and Technology, 2012.
[81]
N. Honeth et al., "An Extended ArchiMate Metamodel for Microgrid Control System Architectures," in The 9th IET International Conference on Advances in Power System Control, Operation and Management,Hong Kong, China,18-21 Nov. 2012, 2012.
[82]
M. Österlind, R. Lagerström and P. Rosell, "Assessing modifiability in application services using enterprise architecture models - A case study," in Trends in Enterprise Architecture Research and Practice-Driven Research on Enterprise Transformation, 2012, pp. 162-181.
[83]
M. van Sinderen et al., "Preparing the Future Internet for ad-hoc business networks support," in Architecture Modeling for the Future Internet enabled Enterprise (AMFInE) workshop, 2012.
[84]
L. Gingnell et al., "STRATEGIC PERFORMANCE MEASUREMENT IN PRODUCT DEVELOPMENT : A case study on a Swedish company," in PMA 2012 Conference, Cambridge UK 11-13 July 2012, 2012.
[85]
M. Buschle et al., "A Tool for Enterprise Architecture Analysis Using the PRM Formalism," in INFORMATION SYSTEMS EVOLUTION, 2011, pp. 108-121.
[86]
J. Saat et al., "Analysis of IT/Business Alignment Situations as a Precondition for the Design and Engineering of Situated IT/Business Alignment Solutions," in Proceedings of the Hawaii International Conference on System Sciences (HICSS-44), 2011, pp. 1-9.
[87]
R. Lagerström et al., "Enterprise architecture managements impact on information technology success," in Proceedings of the Hawaii International Conference on System Sciences (HICSS-44), 2011, pp. 1-10.
[88]
L. M. Von Würtemberg et al., "IT project success factors : An experience report," in Portland International Center for Management of Engineering and Technology : Technology Management in the Energy-Smart World, 2011.
[89]
M. Buschle et al., "A tool for enterprise architecture analysis using the PRM formalism," in CEUR Workshop Proceedings, 2010.
[90]
J. Saat et al., "Enterprise Architecture Meta Models for IT/Business Alignment Situations," in 14th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2010, 2010, pp. 14-23.
[91]
R. Lagerström et al., "Identifying Factors Affecting Software Development Cost," in Proc. of the Fourth International Workshop on Software Quality and Maintainability (SQM), 2010.
[92]
J. König et al., "Mapping the Substation Configuration Language of IEC 61850 to ArchiMate," in Proceedings - IEEE International Enterprise Distributed Object Computing Workshop, EDOC, 2010, pp. 60-68.
[93]
U. Franke et al., "Trends in Enterprise Architecture Practice : A Survey," in Lecture Notes in Business Information Processing, 2010, pp. 16-29.
[94]
U. Franke et al., "A Method for Choosing Software Assessment Measures using Bayesian Networks and Diagnosis : CSMR 2009, PROCEEDINGS," in 13TH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING: CSMR 2009, PROCEEDINGS, 2009, pp. 241-245.
[95]
M. Ekstedt et al., "A Tool for Enterprise Architecture Analysis of Maintainability : CSMR 2009, PROCEEDINGS," in EUR CON SFTWR MTNCE REENGR, 2009, pp. 327-328.
[96]
U. Franke et al., "A formal method for cost and accuracy trade-off analysis in software assessment measures," in RCIS 2009 : PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE, 2009, pp. 295-302.
[97]
R. Lagerström, P. Johnson and D. Höök, "An Enterprise Architecture Management Pattern for Software Change Project Cost Analysis," in Patterns in Enterprise Architecture Management (PEAM2009) workshop, 2009.
[98]
P. Närman et al., "Data Collection Prioritization for System Quality Analysis," in Electronic Notes in Theoretical Computer Science, 2009, pp. 29-42.
[99]
U. Franke et al., "Decision Support oriented Enterprise Architecture Metamodel Management using Classification Trees," in 2009 13TH ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOCW 2009), 2009, pp. 328-335.
[100]
U. Franke et al., "EAF(2) - A Framework for Categorizing Enterprise Architecture Frameworks," in SNPD 2009 : 10TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCES, NETWORKING AND PARALLEL DISTRIBUTED COMPUTING, PROCEEDINGS, 2009, pp. 327-332.
[101]
J. Ullberg, P. Johnson and R. Lagerström, "Education in Enterprise Architecture Analysis : Assessing interoperability of service oriented architectures," in The 5th China - Europe International Symposium on Software Industry Oriented Education (CEISIE 2009). Bordeaux, France. 25-26 May 2009, 2009.
[102]
R. Lagerström et al., "Enterprise Meta Modeling Methods - Combining a Stakeholder-Oriented and a Causality-Based Approach," in ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, 2009, pp. 381-393.
[103]
R. Lagerström et al., "Software Change Project Cost Estimation - A Bayesian Network and a Method for Expert Elicitation," in Third International Workshop on Software Quality and Maintainability (SQM), 2009.
[104]
M. Simonsson, R. Lagerström and P. Johnson, "A Bayesian Network for IT Governance Performance Prediction," in Proceedings of the 10th International Con-ference on Electronic Commerce, 2008.
[105]
J. Ullberg, R. Lagerström and P. Johnson, "A Framework for Service Interoperability Analysis using Enterprise Architecture Models," in 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, VOL 2, 2008, pp. 99-107.
[106]
J. Ullberg, R. Lagerström and M. Ekstedt, "A Framework for interoperability analysis on the semantic web using architecture models," in Proceedings of the Workshop on Enterprise Interoperability (IWEI 2008), 2008, pp. 207-215.
[107]
J. Ullberg, R. Lagerström and P. Johnson, "Enterprise architecture - A service interoperability analysis framework," in ENTERPRISE INTEROPERABILITY III : NEW CHALLENGES AND INDUSTRIAL APPROACHES, 2008, pp. 611-623.
[108]
R. Lagerström and P. Johnson, "Probabilistic Metamodel Merging," in CEUR Workshop Proceedings, 2008, pp. 25-28.
[109]
M. Simonsson, R. Lagerström and P. Johnson, "The Linear Conditional Probability Matrix Generator for IT governance performance prediction," in MSVVEIS 2008 : MODELLING, SIMULATION, VERIFICATION AND VALIDATION OF ENTERPRISE INFORMATION SYSTEMS, 2008, pp. 170-179.
[110]
R. Lagerström and P. Johnson, "Using architectural models to predict the maintainability of enterprise systems," in CSMR 2008 : 12TH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING - DEVELOPING EVOLVABLE SYSTEMS, 2008, pp. 248-252.
[111]
R. Lagerström and J. Öhrström, "A framework for assessing business value of service oriented architectures," in 2007 IEEE International Conference on Services Computing, SCC 2007, 2007, pp. 670-671.
[112]
R. Lagerström, "Analyzing System Maintainability using Enterprise Architecture Models," in Proceedings of the Second Workshop on Trends in Enterprise Architecture Research (TEAR 2007), 2007, pp. 31-39.
[113]
R. Lagerström, P. Johnson and P. Närman, "Extended influence diagram generation," in Enterprise Interoperability II : New Challenges and Approaches, 2007, pp. 599-602.
[114]
P. Johnson, L. Nordström and R. Lagerström, "Formalizing analysis of enterprise architecture," in Enterprise Interoperability : New Challenges and Approaches, 2007, pp. 35-44.
[115]
P. Johnson et al., "System Quality Analysis with Extended Influence Diagrams," in CSMR 2007 Workshop and Special Session papers, 2007.
[116]
P. Johnson et al., "Extended influence diagrams for enterprise architecture analysis," in 10th IEEE International Enterprise Distributed Object Computing Conference, Proceedings, 2006, pp. 3-12.

Icke refereegranskade

Artiklar

[117]
R. Lagerström, G. Grossmann and S. Nurcan, "Preface to the EDOC 2017/2018 Special Issue," Information Systems, vol. 101, pp. 101802, 2021.

Konferensbidrag

[118]
D. Petterson, S. Hacks and R. Lagerström, "Using EA Debts to Steer Digitalization in Agile Environments," in Digitalize in Stockholm, 26 - 27 NOVEMBER KISTAMÄSSAN - STOCKHOLM, SWEDEN, 2019.
Senaste synkning med DiVA:
2021-08-01 00:25:26