Teodor Sommestad

1.9k total citations
64 papers, 1.2k citations indexed

About

Teodor Sommestad is a scholar working on Information Systems, Computer Networks and Communications and Artificial Intelligence. According to data from OpenAlex, Teodor Sommestad has authored 64 papers receiving a total of 1.2k indexed citations (citations by other indexed papers that have themselves been cited), including 51 papers in Information Systems, 38 papers in Computer Networks and Communications and 14 papers in Artificial Intelligence. Recurrent topics in Teodor Sommestad's work include Information and Cyber Security (40 papers), Network Security and Intrusion Detection (30 papers) and Advanced Malware Detection Techniques (13 papers). Teodor Sommestad is often cited by papers focused on Information and Cyber Security (40 papers), Network Security and Intrusion Detection (30 papers) and Advanced Malware Detection Techniques (13 papers). Teodor Sommestad collaborates with scholars based in Sweden, Canada and China. Teodor Sommestad's co-authors include Mathias Ekstedt, Jonas Hallberg, Hannes Holm, Pontus Johnson, Johan Bengtsson, Mirjam Ekstedt, Johan Ullberg, Ulrik Franke, Markus Buschle and Mats Persson and has published in prestigious journals such as Frontiers in Psychology, IEEE Transactions on Power Delivery and Journal of the Association for Information Systems.

In The Last Decade

Teodor Sommestad

58 papers receiving 1.1k citations

Peers

Teodor Sommestad
Teodor Sommestad
Citations per year, relative to Teodor Sommestad Teodor Sommestad (= 1×) peers Hannes Holm

Countries citing papers authored by Teodor Sommestad

Since Specialization
Citations

This map shows the geographic impact of Teodor Sommestad's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Teodor Sommestad with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Teodor Sommestad more than expected).

Fields of papers citing papers by Teodor Sommestad

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Teodor Sommestad. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Teodor Sommestad. The network helps show where Teodor Sommestad may publish in the future.

Co-authorship network of co-authors of Teodor Sommestad

This figure shows the co-authorship network connecting the top 25 collaborators of Teodor Sommestad. A scholar is included among the top collaborators of Teodor Sommestad based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Teodor Sommestad. Teodor Sommestad is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Sommestad, Teodor, et al.. (2024). The unpredictability of phishing susceptibility: results from a repeated measures experiment. 10(1). 1 indexed citations
2.
Sommestad, Teodor, et al.. (2022). Validation of Cyber Test for Future Soldiers: A Test Battery for the Selection of Cyber Soldiers. Frontiers in Psychology. 13. 868311–868311. 1 indexed citations
3.
Sommestad, Teodor. (2018). Work-related groups and information security policy compliance. Information and Computer Security. 26(5). 533–550. 10 indexed citations
4.
Sommestad, Teodor, et al.. (2015). Human factors related to the performance of intrusion detection operators.. 265–275. 3 indexed citations
5.
Sommestad, Teodor, et al.. (2015). A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour. International Journal of Information Security and Privacy. 9(1). 26–46. 83 indexed citations
6.
Sommestad, Teodor & Ulrik Franke. (2015). A test of intrusion alert filtering based on network information. Security and Communication Networks. 8(13). 2291–2301. 4 indexed citations
7.
Sommestad, Teodor, et al.. (2014). Quantifying the Effectivenness of Intrusion Detection Systems in Operation through Domain Experts. 10(2). 3–35. 1 indexed citations
8.
Sommestad, Teodor & Jonas Hallberg. (2013). A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance. IFIP advances in information and communication technology. 257–271. 28 indexed citations
9.
Sommestad, Teodor, Mathias Ekstedt, & Hannes Holm. (2012). The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures. IEEE Systems Journal. 7(3). 363–373. 111 indexed citations
10.
Flores, Waldo Rocha, Teodor Sommestad, Hannes Holm, & Mathias Ekstedt. (2011). Assessing Future Value of Investments in Security-Related IT Governance Control Objectives : Surveying IT Professionals. 14(2). 216–227. 7 indexed citations
11.
Sommestad, Teodor, Mathias Ekstedt, & Lars Nordström. (2010). A case study applying the cyber security modeling language. 5 indexed citations
12.
Sommestad, Teodor, Mathias Ekstedt, & Pontus Johnson. (2010). A probabilistic relational model for security risk analysis. Computers & Security. 29(6). 659–679. 62 indexed citations
13.
Sommestad, Teodor, et al.. (2010). SCADA system cyber security — A comparison of standards. 1–8. 34 indexed citations
14.
Buckl, Sabine, Ulrik Franke, Florian Matthes, et al.. (2009). A pattern-based approach to quantitative enterprise architecture analysis. Journal of the Association for Information Systems. 318. 16 indexed citations
15.
Franke, Ulrik, Johan Ullberg, Teodor Sommestad, Robert Lagerström, & Pontus Johnson. (2009). Decision support oriented Enterprise Architecture metamodel management using classification trees. 328–335. 9 indexed citations
16.
Yu, Xiaofeng, et al.. (2008). Emergency Response Framework for Aviation XML Services on MANET. 304–311. 2 indexed citations
17.
18.
Li, Jianxin, Teodor Sommestad, Patrick C. K. Hung, & Xiang Li. (2008). Web Service-Based Business Process Development, Threat Modeling and Security Assessment Tool. Swinburne Research Bank (Swinburne University of Technology). 13–13. 1 indexed citations
19.
Johnson, Pontus, et al.. (2007). A Tool for Enterprise Architecture Analysis. 9. 142–142. 53 indexed citations
20.
Johnson, Pontus, et al.. (2007). A Tool for Enterprise Architecture Analysis. 3 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026