Change search
Refine search result
1 - 20 of 20
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1. Barbosa, Amanda
    et al.
    Santana, Alixandre
    Hacks, Simon
    KTH, School of Electrical Engineering and Computer Science (EECS).
    Stein, Niels von
    A Taxonomy for Enterprise Architecture Analysis Research2019Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 2. Bebensee, Björn
    et al.
    Hacks, Simon
    Software Systems Architecture and Security.
    Applying Dynamic Bayesian Networks for Automated Modeling in ArchiMate: A Realization Study2019Conference paper (Refereed)
  • 3. Borozanov, Vasil
    et al.
    Hacks, Simon
    Silva, Nuno
    Using Machine Learning Techniques for Evaluating the Similarity of Enterprise Architecture Models2019Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 4. Dohmen, Niklas
    et al.
    Koopmann, Kevin
    Hacks, Simon
    KTH, School of Electrical Engineering and Computer Science (EECS).
    Optimizing Enterprise Architecture Considering Different Budgets2019In: INFORMATIK 2019 / [ed] Claude Draude, Martin Lange, Bernhard Sick, Gesellschaft für Informatik e.V. , 2019, p. 45-58Conference paper (Refereed)
    Abstract [en]

    Enterprise Architectures (EA) are used to define the structure and operation of an organization and commonly find usage in the realization and modification of IT business strategies. We propose a technique to optimize the costs incurred between two layers of the EA, especially, considering differing departmental budgets. This is achieved through consideration of a flow problem aiming to optimize a graph consisting of different nodes, allowing budgets to be used by different departments. Additionally, we implement techniques previously published to allow operational and transitioning costs to be taken into consideration, in an effort to better reflect the organizational problems found in reality.

    Download full text (pdf)
    fulltext
  • 5.
    Hacks, Simon
    Software Systems Architecture and Security.
    Improving the Quality of Enterprise Architecture Models: - Processes and Techniques -2019Book (Other academic)
  • 6. Hacks, Simon
    et al.
    Brosius, Maximilian
    Aier, Stephan
    A Case Study of Stakeholder Concerns on EAM2017Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 7.
    Hacks, Simon
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Hacks, Alexander
    Universität Duisburg-Essen, Duisburg, Germany.
    Katsikeas, Sotirios
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Klaer, Benedikt
    Institute for High Voltage Technology, RWTH Aachen University, Aachen, Germany.
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Creating MAL Instances Using ArchiMate on the Example of Attacks on Power Plants and Power Grids2019In: Proceeding of the 2019 IEEE 23rd International Enterprise Distributed Object Computing Conference (EDOC), IEEE, 2019Conference paper (Refereed)
    Abstract [en]

    Cyber-attacks on power assets can have disastrous consequences for individuals, regions, and whole nations. In order to respond to these threats, the assessment of power grids' and plants' cyber security can foster a higher degree of safety for the whole infrastructure dependent on power. Hitherto, we propose the use of attack simulations based on system architecture models. To reduce the effort of creating new attack graphs for each system of a given type, domain-specific attack languages may be employed. They codify common attack logics of the considered domain. Previously, MAL (the Meta Attack Language) was proposed, which serves as a framework to develop domain specific attack languages. We extend the tool set of MAL by developing an approach to model security domains in ArchiMate notation. Next, those models are used to create a MAL instance, which reflects the concepts modeled in ArchiMate. These instances serve as input to simulate attacks on certain systems. To show the applicability of our approach, we conduct two case studies in the power domain. On the one hand, we model a thermal power plant and possible attacks on it. On the other hand, we use the attack on the Ukrainian power grid for our case study.

    Download full text (pdf)
    fulltext
  • 8.
    Hacks, Simon
    et al.
    Software Systems Architecture and Security.
    Höfert, Hendrik
    Salentin, Johannes
    Yeong, Yoon Chow
    Lichter, Horst
    Towards the Definition of Enterprise Architecture Debts2019In: 2019 IEEE 23rd International Enterprise Distributed Object Computing Workshop (EDOCW), IEEE , 2019, p. 9-16Conference paper (Refereed)
  • 9. Hacks, Simon
    et al.
    Lichter, Horst
    A Probabilistic Enterprise Architecture Model Evolution2018Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 10. Hacks, Simon
    et al.
    Lichter, Horst
    Optimierung von Unternehmensarchitekturen unter Berücksichtigung von Transitionskosten2018In: HMD Praxis der Wirtschaftsinformatik, ISSN 2198-2775, Vol. 55, no 5, p. 928-941Article in journal (Refereed)
  • 11. Hacks, Simon
    et al.
    Lichter, Horst
    Qualitative Comparison of Enterprise Architecture Model Maintenance Processes2020Conference paper (Refereed)
  • 12. Hacks, Simon
    et al.
    Lichter, Horst
    Towards an Enterprise Architecture Model Evolution2018Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 13. Hacks, Simon
    et al.
    Steffens, Andreas
    Hansen, Peter
    Rajashekar, Nikhitha
    A Continuous Delivery Pipeline for EA Model Evolution2019Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 14. Hacks, Simon
    et al.
    Timm, Felix
    Towards a Quality Framework for Enterprise Architecture Models (Extended Abstract)2018In: EMISA Forum, ISSN 1610-3351, Vol. 38, no 1, p. 32-33Article in journal (Refereed)
    Download full text (pdf)
    fulltext
  • 15.
    Katsikeas, Sotirios
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Network and Systems Engineering.
    Johnson, Pontus
    KTH, School of Electrical Engineering and Computer Science (EECS), Network and Systems Engineering.
    Hacks, Simon
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Network and Systems Engineering.
    Probabilistic Modeling and Simulation of Vehicular Cyber Attacks: An Application of the Meta Attack Language2019In: ICISSP 2019 - Proceedings of the 5th International Conference on Information Systems Security and Privacy, SciTePress, 2019, p. 175-182Conference paper (Refereed)
    Abstract [en]

    Attack simulations are a feasible means to assess the cyber security of systems. The simulations trace the steps taken by an attacker to compromise sensitive system assets. Moreover, they allow to estimate the time conducted by the intruder from the initial step to the compromise of assets of interest. One commonly accepted approach for such simulations are attack graphs, which model the attack steps and their dependencies in a formal way. To reduce the effort of creating new attack graphs for each system of a given type, domain-specific attack languages may be employed. They codify common attack logics of the considered domain. Consequently, they ease the reuse of models and, thus, facilitate the modeling of a specific system in the domain. Previously, MAL (the Meta Attack Language) was proposed, which serves as a framework to develop domain specific attack languages. In this article, we present vehicleLang, a Domain Specific Language (DSL) which can be used to model vehicles with respect to their IT infrastructure and to analyze their weaknesses related to known attacks. To model domain specifics in our language, we rely on existing literature and verify the language using an interview with a domain expert from the automotive industry. To evaluate our results, we perform a Systematic Literature Review (SLR) to identify possible attacks against vehicles. Those attacks serve as a blueprint for test cases checked against the vehicleLang specification.

  • 16. Mathew, Delin
    et al.
    Hacks, Simon
    Lichter, Horst
    Developing a Semantic Mapping between TOGAF and BSI-IT-Grundschutz2018Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 17. Rajashekar, Nikhitha
    et al.
    Hacks, Simon
    Silva, Nuno
    A Performance Comparison of Graph Analytic Methods for Supporting Enterprise Architecture Model Maintenance2019Conference paper (Refereed)
  • 18. Salentin, Johannes
    et al.
    Hacks, Simon
    Towards a Catalog of Enterprise Architecture Smells2020Conference paper (Other academic)
  • 19. Timm, Felix
    et al.
    Hacks, Simon
    KTH, School of Electrical Engineering and Computer Science (EECS).
    Thiede, Felix
    Hintzpeter, Daniel
    Towards a Quality Framework for Enterprise Architecture Models2017Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 20. Yeong, Yoon Chow
    et al.
    Hacks, Simon
    Lichter, Horst
    Prioritization of EA Debts Facilitating Portfolio Theory2019In: Proceedings of the 7th International Workshop on Quantitative Approaches to Software Quality co-located with 26th Asia-Pacific Software Engineering Conference (APSEC 2019), CEUR-WS.org , 2019, Vol. 2511, p. 45-52Conference paper (Refereed)
1 - 20 of 20
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf