Follow
Johan Sigholm
Johan Sigholm
Swedish Defence University
Verified email at fhs.se
Title
Cited by
Cited by
Year
Non-State Actors in Cyberspace Operations
J Sigholm
Journal of Military Studies 4 (1), 2013
802013
Emerging information infrastructures: Cooperation in disasters
M Asplund, S Nadjm-Tehrani, J Sigholm
Lecture Notes in Computer Science: Critical Information Infrastructure …, 2009
612009
Emerging information infrastructures: Cooperation in disasters
M Asplund, S Nadjm-Tehrani, J Sigholm
International Workshop on Critical Information Infrastructures Security, 258-270, 2008
612008
Towards Offensive Cyber Counterintelligence: Adopting a Target-Centric View on Advanced Persistent Threats
J Sigholm, M Bang
2013 European Intelligence and Security Informatics Conference (EISIC 2013 …, 2013
342013
Hastily formed networks for disaster response: Technical heterogeneity and virtual pockets of local order
E Törnqvist, J Sigholm, S Nadjm-Tehrani
6th International Conference on Information Systems for Crisis Response and …, 2009
272009
Best-effort Data Leakage Prevention in inter-organizational tactical MANETs
J Sigholm, M Raciti
Military Communications Conference (MILCOM 2012), 2012 IEEE, 1143-1149, 2012
192012
What can we learn from enterprise architecture models? An experiment comparing models and documents for capability development
U Franke, M Cohen, J Sigholm
Software & Systems Modeling 17 (2), 695-711, 2018
102018
Secure Tactical Communications for Inter-Organizational Collaboration: The Role of Emerging Information and Communications Technology, Privacy Issues, and Cyber Threats on the …
J Sigholm
University of Skövde, 2016
82016
Determining the Utility of Cyber Vulnerability Implantation: The Heartbleed Bug as a Cyber Operation
J Sigholm, E Larsson
Military Communications Conference (MILCOM 2014), 2014 IEEE, 110-116, 2014
82014
Privacy on the Battlefield? Ethical Issues of Emerging Military ICTs
J Sigholm, D Andersson
9th International Conference of Computer Ethics: Philosophical Enquiry (CEPE …, 2011
82011
Enhancing Cybersecurity Education through High-Fidelity Live Exercises (HiFLiX)
J Sigholm, G Falco, A Viswanathan
52nd Hawaii International Conference on System Sciences, 2019
72019
Papering over the cracks: The effects of introducing best practices on the web security ecosystem
E Larsson, J Sigholm
2016 International Conference on Information Networking (ICOIN), 1-6, 2016
62016
Reconfigurable radio systems: Towards secure collaboration for peace support and public safety
J Sigholm
9th European Conference on Information Warfare and Security (ECIW 2010), 268-274, 2010
52010
What is Spyware?
D Jonasson, J Sigholm
3*
Technology Forecast 2017-Military Utility of Future Technologies: A Report from Seminars at the Swedish Defence University’s (SEDU) Military-Technology Division
S Silfverskiöld, H Liwång, G Hult, Å Sivertun, P Bull, J Sigholm, ...
Försvarshögskolan (FHS), 2017
22017
Collection and Distribution of Disaster Field Data
J Sigholm
First National Symposium on Technology and Methodology for Security and …, 2010
22010
Technology Forecast 2016: The Military Utility of Future Technologies: a Report from seminars at the Swedish Defence University’s Military-Technology Division
S Silfverskiöld, H Liwång, G Hult, P Bull, B Persson, O Thunqvist, ...
Försvarshögskolan (FHS), 2016
12016
Technology Forecast 2015, Military Utility of Five Technologies: a report from seminars at the Department of Military-Technology at the Swedish Defence University
S Silvferskiöld, P Bull, G Hult, M Hagenbo, K Andersson, B Persson, ...
Försvarshögskolan (FHS), 2015
12015
Technology Forecast 2014 Military Utility of Four Technologies: A Report from Seminars at the SNDC Department of Military-Technology
S Silfverskiöld, P Bull, G Hult, Å Sivertun, M Hagenbo, K Andersson, ...
Försvarshögskolan (FHS), 2014
12014
Military Technology for Resource-Limited Time-Sensitive Targeting
L Löfgren, J Sigholm
The 2010 Symposium on Military Sciences, 2010
12010
The system can't perform the operation now. Try again later.
Articles 1–20