default search action
Ulrik Franke
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Annika Andreasson, Henrik Artman, Joel Brynielsson, Ulrik Franke:
Cybersecurity work at Swedish administrative authorities: taking action or waiting for approval. Cogn. Technol. Work. 26(4): 709-731 (2024) - 2023
- [j26]Carlos A. Barreto, Olof Reinert, Tobias Wiesinger, Ulrik Franke:
Duopoly insurers' incentives for data quality under a mandatory cyber data sharing regime. Comput. Secur. 131: 103292 (2023) - [c55]Terese Besker, Ulrik Franke, Jakob Axelsson:
Navigating the Cyber-Security Risks and Economics of System-of-Systems. SoSE 2023: 1-8 - [i6]Carlos A. Barreto, Olof Reinert, Tobias Wiesinger, Ulrik Franke:
Duopoly insurers' incentives for data quality under a mandatory cyber data sharing regime. CoRR abs/2308.00795 (2023) - 2022
- [j25]Ulrik Franke, Even Langfeldt Friberg, Hayretdin Bahsi:
Maritime cyber-insurance: the Norwegian case. Int. J. Crit. Infrastructures 18(3): 267-286 (2022) - 2021
- [j24]Stefan Varga, Joel Brynielsson, Ulrik Franke:
Cyber-threat perception and risk management in the Swedish financial sector. Comput. Secur. 105: 102239 (2021) - [c54]Ulrik Franke, Johan Turell, Ivar Johansson:
The Cost of Incidents in Essential Services - Data from Swedish NIS Reporting. CRITIS 2021: 116-129 - [c53]Annika Andreasson, Henrik Artman, Joel Brynielsson, Ulrik Franke:
A Census of Swedish Public Sector Employee Communication on Cybersecurity during the COVID-19 Pandemic. CyberSA 2021: 1-8 - 2020
- [j23]Margus Välja, Fredrik Heiding, Ulrik Franke, Robert Lagerström:
Automating threat modeling using an ontology framework. Cybersecur. 3(1): 19 (2020) - [j22]Marianela García Lozano, Joel Brynielsson, Ulrik Franke, Magnus Rosell, Edward Tjörnhammar, Stefan Varga, Vladimir Vlassov:
Veracity assessment of online data. Decis. Support Syst. 129 (2020) - [j21]Hayretdin Bahsi, Ulrik Franke, Even Langfeldt Friberg:
The cyber-insurance market in Norway. Inf. Comput. Secur. 28(1): 54-67 (2020) - [c52]Annika Andreasson, Henrik Artman, Joel Brynielsson, Ulrik Franke:
A Census of Swedish Government Administrative Authority Employee Communications on Cybersecurity during the COVID-19 Pandemic. ASONAM 2020: 727-733 - [c51]Ulrik Franke, Joakim Wernberg:
A survey of cyber security in the Swedish manufacturing industry. CyberSA 2020: 1-8 - [c50]Jacob Dexe, Ulrik Franke, Anneli Avatare Nöu, Alexander Rad:
Towards Increased Transparency with Value Sensitive Design. HCI (37) 2020: 3-15 - [c49]Markus Borg, Joakim Wernberg, Thomas Olsson, Ulrik Franke, Martin Andersson:
Illuminating a Blind Spot in Digitalization - Software Development in Sweden's Private and Public Sector. ICSE (Workshops) 2020: 299-302 - [c48]Jacob Dexe, Jonas Ledendal, Ulrik Franke:
An Empirical Investigation of the Right to Explanation Under GDPR in Insurance. TrustBus 2020: 125-139 - [i5]Markus Borg, Joakim Wernberg, Thomas Olsson, Ulrik Franke, Martin Andersson:
Illuminating a Blind Spot in Digitalization - Software Development in Sweden's Private and Public Sector. CoRR abs/2005.12607 (2020)
2010 – 2019
- 2019
- [j20]Margus Välja, Robert Lagerström, Ulrik Franke, Göran Ericsson:
A Framework for Automatic IT Architecture Modeling: Applying Truth Discovery. Complex Syst. Informatics Model. Q. 20: 20-56 (2019) - [c47]Ulrik Franke, Joachim Draeger:
Two simple models of business interruption accumulation risk in cyber insurance. CyberSA 2019: 1-7 - [c46]Ulrik Franke, Per Håkon Meland:
Demand side expectations of cyber insurance. CyberSA 2019: 1-8 - [c45]Thomas Olsson, Martin Hell, Martin Höst, Ulrik Franke, Markus Borg:
Sharing of Vulnerability Information Among Companies - A Survey of Swedish Companies. SEAA 2019: 284-291 - [c44]Thomas Olsson, Ulrik Franke:
Risks and assets: a qualitative study of a software ecosystem in the mining industry. ESEC/SIGSOFT FSE 2019: 895-904 - [i4]Thomas Olsson, Martin Hell, Martin Höst, Ulrik Franke, Markus Borg:
Sharing of vulnerability information among companies - a survey of Swedish companies. CoRR abs/1906.04424 (2019) - [i3]Thomas Olsson, Ulrik Franke:
Risks and Assets: A Qualitative Study of a Software Ecosystem in the Mining Industry. CoRR abs/1907.08412 (2019) - [i2]Ulrik Franke:
Towards Increased Transparency in Digital Insurance. ERCIM News 2019(116) (2019) - 2018
- [j19]Ulrik Franke, Federico Ciccozzi:
Characterization of trade-off preferences between non-functional properties. Inf. Syst. 74(Part): 86-102 (2018) - [j18]Deepika Badampudi, Krzysztof Wnuk, Claes Wohlin, Ulrik Franke, Darja Smite, Antonio Cicchetti:
A decision-making process-line for selection of software asset origins and components. J. Syst. Softw. 135: 88-104 (2018) - [j17]Ulrik Franke, Mika Cohen, Johan Sigholm:
What can we learn from enterprise architecture models? An experiment comparing models and documents for capability development. Softw. Syst. Model. 17(2): 695-711 (2018) - [j16]Pontus Johnson, Robert Lagerström, Mathias Ekstedt, Ulrik Franke:
Can the Common Vulnerability Scoring System be Trusted? A Bayesian Analysis. IEEE Trans. Dependable Secur. Comput. 15(6): 1002-1015 (2018) - [c43]Stefan Varga, Joel Brynielsson, Ulrik Franke:
Information Requirements for National Level Cyber Situational Awareness. ASONAM 2018: 774-781 - [c42]Markus Borg, Thomas Olsson, Ulrik Franke, Saïd Assar:
Digitalization of swedish government agencies: a perspective through the lens of a software development census. ICSE-SEIS 2018: 37-46 - [c41]Ulrik Franke:
Cyber Insurance Against Electronic Payment Service Outages - A Document Study of Terms and Conditions from Electronic Payment Service Providers and Insurance Companies. STM 2018: 73-84 - [i1]Markus Borg, Thomas Olsson, Ulrik Franke, Saïd Assar:
Digitalization of Swedish Government Agencies - A Perspective Through the Lens of a Software Development Census. CoRR abs/1802.00312 (2018) - 2017
- [j15]Ulrik Franke:
The cyber insurance market in Sweden. Comput. Secur. 68: 130-144 (2017) - [j14]Robert Lagerström, Pontus Johnson, Mathias Ekstedt, Ulrik Franke, Khurram Shahzad:
Automated Probabilistic System Architecture Analysis in the Multi-Attribute Prediction Language (MAPL): Iteratively Developed using Multiple Case Studies. Complex Syst. Informatics Model. Q. 11: 38-68 (2017) - [c40]Stephan Aier, Ulrik Franke, Martin Mocker:
Message from the TEAR 2017 Workshop Chairs. EDOC Workshops 2017: 39-40 - [c39]Jakob Axelsson, Ulrik Franke, Jan Carlson, Séverine Sentilles, Antonio Cicchetti:
Towards the architecture of a decision support ecosystem for system component selection. SysCon 2017: 1-7 - 2016
- [j13]Ulrik Franke, Markus Buschle:
Experimental Evidence on Decision-Making in Availability Service Level Agreements. IEEE Trans. Netw. Serv. Manag. 13(1): 58-70 (2016) - [c38]Sérgio Guerreiro, Khaled Gaaloul, Ulrik Franke:
Analysis of Enterprise Architecture Evolution Using Markov Decision Processes. EOMAS@CAiSE 2016: 37-51 - [c37]Marcus Birgersson, Gustav Hansson, Ulrik Franke:
Data Integration Using Machine Learning. EDOC Workshops 2016: 1-10 - [c36]Ulrik Franke:
Towards Preference Elicitation for Trade-Offs between Non-Functional Properties. EDOC 2016: 1-10 - [c35]Pontus Johnson, Robert Lagerström, Mathias Ekstedt, Ulrik Franke:
Modeling and analyzing systems-of-systems in the multi-attribute prediction language (MAPL). SESoS@ICSE 2016: 1-7 - [c34]Claes Wohlin, Krzysztof Wnuk, Darja Smite, Ulrik Franke, Deepika Badampudi, Antonio Cicchetti:
Supporting Strategic Decision-Making for Selection of Software Assets. ICSOB 2016: 1-15 - [c33]Joel Brynielsson, Ulrik Franke, Muhammad Adnan Tariq, Stefan Varga:
Using cyber defense exercises to obtain additional data for attacker profiling. ISI 2016: 37-42 - [c32]Efi Papatheocharous, Ulrik Franke:
Decision-Making in Automotive Software Development - An Observational Study. SoMeT 2016: 59-68 - 2015
- [j12]Mika Cohen, Ulrik Franke:
An experiment in ontology use for command and control interoperability. Autom. Softw. Eng. 22(2): 145-157 (2015) - [j11]Teodor Sommestad, Ulrik Franke:
A test of intrusion alert filtering based on network information. Secur. Commun. Networks 8(13): 2291-2301 (2015) - [c31]Marianela García Lozano, Ulrik Franke, Magnus Rosell, Vladimir Vlassov:
Towards Automatic Veracity Assessment of Open Source Information. BigData Congress 2015: 199-206 - 2014
- [j10]Ulrik Franke, Joel Brynielsson:
Cyber situational awareness - A systematic review of the literature. Comput. Secur. 46: 18-31 (2014) - [j9]Per Närman, Ulrik Franke, Johan König, Markus Buschle, Mathias Ekstedt:
Enterprise architecture availability analysis using fault trees and stakeholder interviews. Enterp. Inf. Syst. 8(1): 1-25 (2014) - [j8]Pontus Johnson, Johan Ullberg, Markus Buschle, Ulrik Franke, Khurram Shahzad:
An architecture modeling framework for probabilistic prediction. Inf. Syst. E Bus. Manag. 12(4): 595-622 (2014) - [j7]Liv Gingnell, Ulrik Franke, Robert Lagerström, Evelina Ericsson, Joakim Lilliesköld:
Quantifying Success Factors for IT Projects - An Expert-Based Bayesian Model. Inf. Syst. Manag. 31(1): 21-36 (2014) - [j6]Ulrik Franke, Pontus Johnson, Johan König:
An architecture framework for enterprise IT service availability analysis. Softw. Syst. Model. 13(4): 1417-1445 (2014) - [j5]Ulrik Franke, Hannes Holm, Johan König:
The Distribution of Time to Recovery of Enterprise IT Services. IEEE Trans. Reliab. 63(4): 858-867 (2014) - [c30]Ulrik Franke:
Enterprise Architecture Analysis with Production Functions. EDOC 2014: 52-60 - [c29]Ulrik Franke, Magnus Rosell:
Prospects for Detecting Deception on Twitter. FiCloud 2014: 528-533 - 2013
- [c28]Ulrik Franke, Markus Buschle, Magnus Österlind:
An Experiment in SLA Decision-Making. GECON 2013: 256-267 - [c27]Pontus Johnson, Johan Ullberg, Markus Buschle, Ulrik Franke, Khurram Shahzad:
P2AMF: Predictive, Probabilistic Architecture Modeling Framework. IWEI 2013: 104-117 - 2012
- [b1]Ulrik Franke:
Analysis of enterprise IT service availability: Enterprise architecture modeling for assessment, prediction, and decision-making. KTH Royal Institute of Technology, Sweden, 2012 - [j4]Hannes Holm, Teodor Sommestad, Ulrik Franke, Mathias Ekstedt:
Success Rate of Remote Code Execution Attacks - Expert Assessments and Observations. J. Univers. Comput. Sci. 18(6): 732-749 (2012) - [j3]Ulrik Franke, Pontus Johnson, Johan König, Liv Marcks von Würtemberg:
Availability of enterprise IT systems: an expert-based Bayesian framework. Softw. Qual. J. 20(2): 369-394 (2012) - [j2]Ulrik Franke:
Optimal IT Service Availability: Shorter Outages, or Fewer? IEEE Trans. Netw. Serv. Manag. 9(1): 22-33 (2012) - [c26]Ariyan Fazlollahi, Ulrik Franke, Johan Ullberg:
Benefits of Enterprise Integration: Review, Classification, and Suggestions for Future Research. IWEI 2012: 34-45 - 2011
- [c25]Jan Saat, Robert Winter, Ulrik Franke, Robert Lagerström, Mathias Ekstedt:
Analysis of IT/Business Alignment Situations as a Precondition for the Design and Engineering of Situated IT/Business Alignment Solutions. HICSS 2011: 1-9 - [c24]Hannes Holm, Teodor Sommestad, Ulrik Franke, Mathias Ekstedt:
Expert Assessment on the Probability of Successful Remote Code Execution Attacks. WOSIS 2011: 49-58 - 2010
- [c23]Markus Buschle, Johan Ullberg, Ulrik Franke, Robert Lagerström, Teodor Sommestad:
A Tool for Enterprise Architecture Analysis Using the PRM Formalism. CAiSE Forum (Selected Papers) 2010: 108-121 - [c22]Markus Buschle, Johan Ullberg, Ulrik Franke, Robert Lagerström, Teodor Sommestad:
A Tool for Enterprise Architecture Analysis using the PRM formalism. CAiSE Forum 2010 - [c21]Jan Saat, Ulrik Franke, Robert Lagerström, Mathias Ekstedt:
Enterprise Architecture Meta Models for IT/Business Alignment Situations. EDOC 2010: 14-23 - [c20]Ulrik Franke, Oliver Holschke, Markus Buschle, Per Närman, Jannis Rake-Revelant:
IT Consolidation: An Optimization Approach. EDOCW 2010: 21-26 - [c19]Johan Ullberg, Ulrik Franke, Markus Buschle, Pontus Johnson:
A Tool for Interoperability Analysis of Enterprise Architecture Models using Pi-OCL. I-ESA 2010: 81-90 - [c18]Martin Jensen, Cumhur Sel, Ulrik Franke, Hannes Holm, Lars Nordström:
Availability of a SCADA/OMS/DMS system - A case study. ISGT Europe 2010: 1-8 - [c17]Claes Sandels, Ulrik Franke, Niklas Ingvar, Lars Nordström, Roberth Hamren:
Vehicle to grid - Reference architectures for the control markets in Sweden and Germany. ISGT Europe 2010: 1-8 - [c16]Ulrik Franke, Mathias Ekstedt, Robert Lagerström, Jan Saat, Robert Winter:
Trends in Enterprise Architecture Practice - A Survey. TEAR 2010: 16-29
2000 – 2009
- 2009
- [j1]Robert Lagerström, Ulrik Franke, Pontus Johnson, Johan Ullberg:
A method for creating entreprise architecture metamodels applied to systems modifiability. Int. J. Comput. Sci. Appl. 6(5): 89-120 (2009) - [c15]Sabine Buckl, Ulrik Franke, Oliver Holschke, Florian Matthes, Christian M. Schweda, Teodor Sommestad, Johan Ullberg:
A Pattern-based Approach to Quantitative Enterprise Architecture Analysis. AMCIS 2009: 318 - [c14]Ulrik Franke, Pontus Johnson, Evelina Ericsson, Waldo Rocha Flores, Kun Zhu:
Enterprise Architecture Analysis using Fault Trees and MODAF. CAiSE Forum 2009 - [c13]Robert Lagerström, Jan Saat, Ulrik Franke, Stephan Aier, Mathias Ekstedt:
Enterprise Meta Modeling Methods - Combining a Stakeholder-Oriented and a Causality-Based Approach. BMMDS/EMMSAD 2009: 381-393 - [c12]Ulrik Franke, Pontus Johnson, Robert Lagerström, Johan Ullberg, David Höök, Mathias Ekstedt, Johan König:
A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis. CSMR 2009: 241-246 - [c11]Mathias Ekstedt, Ulrik Franke, Pontus Johnson, Robert Lagerström, Teodor Sommestad, Johan Ullberg, Markus Buschle:
A Tool for Enterprise Architecture Analysis of Maintainability. CSMR 2009: 327-328 - [c10]Pia Gustafsson, David Höök, Ulrik Franke, Pontus Johnson:
Modeling the IT Impact on Organizational Structure. EDOC 2009: 14-23 - [c9]Ulrik Franke, Pontus Johnson:
An Enterprise Architecture framework for application consolidation in the Swedish Armed Forces. EDOCW 2009: 264-273 - [c8]Ulrik Franke, Johan Ullberg, Teodor Sommestad, Robert Lagerström, Pontus Johnson:
Decision support oriented Enterprise Architecture metamodel management using classification trees. EDOCW 2009: 328-335 - [c7]Stephan Aier, Sabine Buckl, Ulrik Franke, Bettina Gleichauf, Pontus Johnson, Per Närman, Christian M. Schweda, Johan Ullberg:
A Survival Analysis of Application Life Spans based on Enterprise Architecture Models. EMISA 2009: 141-154 - [c6]Ulrik Franke, Pontus Johnson, Robert Lagerström, Johan Ullberg, David Höök, Mathias Ekstedt, Johan König:
A formal method for cost and accuracy trade-off analysis in software assessment measures. RCIS 2009: 295-302 - [c5]Ulrik Franke, David Höök, Johan König, Robert Lagerström, Per Närman, Johan Ullberg, Pia Gustafsson, Mathias Ekstedt:
EAF2- A Framework for Categorizing Enterprise Architecture Frameworks. SNPD 2009: 327-332 - [c4]Ulrik Franke, Waldo Rocha Flores, Pontus Johnson:
Enterprise architecture dependency analysis using fault trees and Bayesian networks. SpringSim 2009 - 2008
- [c3]Robert Lagerström, Moustafa Chenine, Pontus Johnson, Ulrik Franke:
Probabilistic Metamodel Merging. CAiSE Forum 2008: 25-28 - [c2]Pia Gustafsson, Ulrik Franke, David Höök, Pontus Johnson:
Quantifying IT Impacts on Organizational Structure and Business Value with Extended Influence Diagrams. PoEM 2008: 138-152 - [c1]Per Närman, Pontus Johnson, Robert Lagerström, Ulrik Franke, Mathias Ekstedt:
Data Collection Prioritization for System Quality Analysis. SQM@CSMR 2008: 29-42
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-01 00:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint