Johan Sigholm

Ph.D. student

Address Dept. of Computer and Information Science
Linköping University
SE-58183 Linköping, SWEDEN
E-mail E-mail:

For contact details at the Swedish Defence
University, please see this page.
NB: I defended my Ph.D. thesis Nov. 11, 2016. The information on this page is thus slightly outdated -- I will update things soon (hopefully)!


I am a guest Ph.D. student at the Real-Time Systems Laboratory since September 2008. My co-supervisor is professor Simin Nadjm-Tehrani.

My formal Ph.D. assignment is at the School of Informatics, at the University of Skövde, Sweden.

I am currently on leave of absence from my position at the Swedish Armed Forces Head Quarters, where I hold the rank of Captain (Air Force). During this time I am employed by the Swedish Defence University (SEDU), where my research is funded under the Swedish Armed Forces Joint Program for Doctoral Studies.

My main supervisor is professor Martin Norsell, professor of Military Technology at SEDU in Stockholm.

I graduated from the Commissioned Officer Program at the Military Academy of Östersund in 2001, and received my M.Sc. degree in Computer Science and Engineering from Linköping University in 2007.


My main field of research lies within the academic subject of Military Technology. At the Swedish Defence University (SEDU), the subject is defined in the following way:

“Military technology is the science which describes and explains how technology influences military activity at all levels and how the profession of an officer affects and is affected by technology. Military technology is based on several different subject areas from different disciplines and combines understanding of the military profession deriving from social science with the foundations of natural science and with a superstructure and dynamics supplied by engineering.” (Axberg, 2006)
As can be understood by the definition above, the subject of Military Technology, as perceived at the SEDU is, heavily interdisciplinary and deals with broad ranges of research questions revolving around technology and its relation to the military profession. In order to benefit from expertise within traditional disciplines, Ph.D. students at the SEDU commonly have subject co-supervisors at external high-ranking universities. My main collaboration has thus been with RTSLAB at Linköping University.

More in detail, my research is mainly focused on studying operative applications of Information and Communication Technology (ICT). One of the greatest research challenges in this area is finding methods where advanced communication technology can be used for inter-organizational collaboration, to share information and resources of mutual interest, while simultaneously safeguarding highly valuable, possibly classified information, also residing in the systems. Failure to achieve any of these goals will inevitably preclude effective use of any proposed platform, due either to lack of trust in overall system security or due to inefficiency as a result of extensive system limitations or complexity.

Another challenging research task within this area is designing military-grade ICT systems which, on the one hand are effective and secure, but on the other hand also provide ethically sound mechanisms for information management. Privacy issues have recently become a political hot topic across Europe, sparked by both common EU legislation, such as the IPRED EU directive, and national initiatives, such as the Swedish “FRA” signals intelligence law. Thus, finding solutions which are able to uphold user privacy during peacetime scenarios, while allowing for fully efficient operation during conflicts or warlike peace-enforcement operations, is subsequently becoming increasingly desirable.

During 2008-2010 I took part in an interdisciplinary research project called Hastily Formed Networks with Heterogeneous Users, financed by the Swedish Civil Contingencies Agency (MSB). The project studied the issues associated with multi-organizational collaboration in post-disaster emergency response scenarios, where the involved stakeholders have heterogeneous backgrounds. We try to identify the necessary conditions for ensuring effective, pervasive and sustainable information exchange within and between organizations participating in hastily formed networks. The project also studied several aspects of critical information infrastructure protection (CIIP), such as achieving security and reliability in disasters. The project report can be downloaded here: [PDF]

During 2010-2011 I focused on studying security solutions for military-grade mobile ad-hoc networks (MANETs). I used the Common Tactical Radio System (GTRS) as a baseline, which is a MANET-based communications platform being developed by the Swedish Armed Forces and the Swedish Defence Materiel Administration (FMV). I investigated the conditions for implementing a mechanism for anomaly detection, based on algorithms and protocols previously developed at RTSLAB. The results are presented in the paper “Best-Effort Data Leakage Prevention in Inter-Organizational Tactical MANETs” found below.


  • Franke, U., Cohen, M. and Sigholm, J. (2016) “What can we learn from enterprise architecture models? An experiment comparing models and documents for capability development”, Software & Systems Modeling, Springer Nature, May. [PDF]
  • Larsson, E. and Sigholm, J. (2016) “Papering Over the Cracks: The Effects of Introducing Best Practices on the Web Security Ecosystem”, in Proc. 30th KIISE/IEEE International Conference on Information Networking (ICOIN), Kota Kinabalu, Malaysia, January. [PDF]
  • Sigholm, J. and Larsson, E. (2014) “Determining the Utility of Cyber Vulnerability Implantation: The Heartbleed Bug as a Cyber Operation”, in Proc. IEEE Military Communications Conference (MILCOM 2014), Baltimore, MD, U.S.A., October. [PDF]
  • Sigholm, J. (2014) “Cyber Security in Tactical Network Infrastructure for Command and Control”, in Grant, T.J., Janssen, R.H.P., and Monsuur, H. (eds.) Network Topology in Command and Control: Organization, Operation, and Evolution. Hershey, PA: IGI Global. Pages 241-269. [Sample PDF]
  • Sigholm, J. and Bang, M. (2013) “Towards Offensive Cyber Counterintelligence: Adopting a Target-Centric View on Advanced Persistent Threats”, in Proc. IEEE European Conference in Intelligence Security Informatics (EISIC 2013), Uppsala, Sweden, August. [PDF] (Chair for session on Information Systems Security)
  • Sigholm, J. (2013) “Non-State Actors in Cyberspace Operations”, Journal of Military Studies, vol. 4, no. 1, March. [PDF]
  • Sigholm, J. and Raciti, M. (2012) “Best-Effort Data Leakage Prevention in Inter-Organizational Tactical MANETs”, in Proc. IEEE Military Communications Conference (MILCOM 2012), Orlando, FL, U.S.A., November. [PDF]
  • Sigholm, J. (2012) “Kanalsamverkan för en mer robust trådlös kriskommunikation” (Multi-channel collaboration for a more robust crisis communication), presented at Åre Risk Event 2012 (ÅRE2012), Åre, Sweden, March. [Abstract (in Swedish): PDF]
  • Sigholm, J. and Andersson, D. (2011) “Privacy on the Battlefield? Ethical Issues of Emerging Military ICTs”, in Proc. 9th International Conference of Computer Ethics: Philosophical Enquiry (CEPE 2011), Milwaukee, WI, U.S.A., June. [PDF]
  • Sigholm, J. (2011) “Increasing Robustness in the Network Society: A Comprehensive Approach to Cyber Security in Sweden”, in Proc. 17th International Conference of the Society for Philosophy and Technology (SPT 2011), Denton, TX, U.S.A., May. [PDF]
  • Sigholm, J. (2010) “Collection and Distribution of Disaster Field Data”, extended abstract and academic poster, in Proc. First National Symposium on Technology and Methodology for Security and Crisis Management (TAMSEC 2010), Linköping, Sweden, October. [Abstract: PDF Poster: PDF]
  • Sigholm, J. (2010) “Reconfigurable Radio Systems: Towards Secure Collaboration for Peace Support and Public Safety”, in Proc. 9th European Conference on Information Warfare and Security (ECIW 2010), Thessaloniki, Greece, July. [PDF]
  • Löfgren, L. and Sigholm, J. (2010) “Military Technology for Resource-Limited Time-Sensitive Targeting”, presented at the 2010 Symposium on Military Sciences, Helsinki, Finland, May.
  • Sigholm, J. (2010) “Towards Secure Collaboration Through Emerging ICT: A Distributed IDS for Tactical MANETs”, in Jormakka, J. and Oksa, S. (eds.) Collaboration Tools in the Military Environment, Finnish National Defence University, Dept. of Military Technology, series 3, no. 10.
  • Törnqvist, E., Sigholm, J. and Nadjm-Tehrani, S. (2009) “Hastily Formed Networks for Disaster Response: Technical Heterogeneity and Virtual Pockets of Local Order”, in Proc. 6th International Conference on Information Systems for Crisis Response and Management (ISCRAM2009), Gothenburg, Sweden, May. [PDF]
  • Asplund, M., Nadjm-Tehrani, S. and Sigholm, J. (2009) “Emerging Information Infrastructures: Cooperation in Disasters”, in Setola, R. and Geretshuber, S. (eds.) Critical Information Infrastructures Security, Lecture Notes in Computer Science (LNCS) 5508, Springer-Verlag Berlin Heidelberg. [PDF]
  • Sigholm, J. and Nadjm-Tehrani, S. (2007) “Enterprise Network Node Discovery and Topology Analysis: An Experience Report”, in Preproc. 2nd Benelux Workshop on Information and System Security (WISSec2007), Luxembourg, September. [PDF]
  • Sigholm, J. (2007) “Automated Network Node Discovery and Topology Analysis”, in Linköping Studies in Science and Technology, Master's Thesis No. 061, ISRN LITH-IDA-EX--07/061--SE. [PDF]

Graduate school

I am a member of the graduate school Forum Securitatis, organized by Linköping University and the Swedish Defence Research Agency (FOI). Forum Securitatis is financed by the Swedish Governmental Agency for Innovation Systems (VINNOVA).

Graduate courses

  • Ledningssystemsutveckling för krishantering (C2 System Development for Crisis Management) (5.0 ECTS), Forum Securitatis, spring 2011.
  • LH201V Lärande och undervisning (Learning and Teaching) (7.5 ECTS), KTH, spring 2011.
  • Robust wireless communication systems for safety and security (4.0 ECTS), Forum Securitatis, fall 2010.
  • DD3001 Forskning: teori, metod, praktik (Research: Theory, Method, Practice) (7.5 ECTS), KTH, fall 2010.
  • Svensk krishantering: krisledning och samverkan (Swedish crisis management: command and coordination) (7.5 ECTS), Forum Securitatis, spring 2010.
  • Etik, säkerhetsteknik och integritet (Ethics, security technology and integrity) (5.0 ECTS), Forum Securitatis, spring 2009.
  • High-Performance Networks (4.5 ECTS), Swedish National Graduate School in Computer Science (CUGS), fall 2008.

Military courses

  • Utvecklande ledarskap (Transformational leadership) (7.5 ECTS), Militärhögskolan i Halmstad (Military Academy of Halmstad, Sweden), spring 2009.
  • Krigsvetenskaplig grundkurs (Introductory course on War Studies) (7.5 ECTS), Militärhögskolan i Halmstad (Military Academy of Halmstad, Sweden), summer 2008.

Doctoral seminars

  • Cyber Warfare (5.0 ECTS), Dept. of Military Technology, FNDU, January 2013.
  • Various ICT subjects (4.0 ECTS), Dept. of Military Technology, FNDU, June 2010.
  • Collaboration tools (4.0 ECTS), Dept. of Military Technology, FNDU, December 2009.


  • Informationssäkerhet i utveckling och anskaffning av militära materielsystem (Information security in development and acquisition of military systems), SEDU, February 2011, October 2011.
  • Datateknik och tekniska ledningssystem (Computer Science and C2 Systems) (3.0 ECTS), SEDU, March 2011.
  • Fördjupningskurs informationssäkerhet (Information security, adv. course), SEDU, May 2010, November 2010, December 2011/February 2012.
  • Kurs i informationssäkerhet för chefer (Information security management course), SEDU, March 2010, October 2010, April 2011, October 2011.
  • Information technology (intro lectures), Concept, Development and Experimentation (CD&E), SEDU, January 2010.

Public outreach

  • Integriteten på nätet måste säkras med signalspaning (Internet privacy must be reinforced through signals intelligence), debate essay, Ny Teknik, December 11 2013. [In Swedish: html / PDF]
  • FRA måste få skydda oss mot spionage (FRA must be allowed to protect us against espionage), debate essay, Ny Teknik, May 2 2013. [In Swedish: html / PDF]
  • Elektronisk kommunikation som alltid fungerar: Har vi råd med det, eller har vi råd att inte ha det? (Electronic communications that always works: Can we afford it, or can we afford not having it?), public seminar/debate, Försvarspolitisk arena, Almedalen, July 5 2012. [In Swedish: PDF]
  • Nationell strategi mot cyberattacker förbereds (Towards a National Strategy Against Cyber Attacks), essay, Folk och Försvar (Society and Defence), January 16 2011. [In Swedish: PDF]
  • Nya hot kräver samarbete mellan Försvarsmakten, SÄPO och FRA (Emerging Threats Require Inter-Agency Collaboration), debate essay, Sveriges Television Debatt (Swedish Television, Debate), December 18 2010. [In Swedish: PDF]
  • Sverige sårbart för nätburna IT-attacker (Sweden Vulnerable to IT-based Attacks), debate essay, Svenska Dagbladet, October 5 2010. [In Swedish: PDF]
  • Towards Efficient and Secure Communication and Collaboration for Disaster Response and Peace Support, Guest lecture, Naval Postgraduate School, Monterey, CA, April 10 2010. [PDF]


  • Development of a new Computer Network Operations laboratory, Swedish Defence University, January-December 2011.


  • Fältövning Nordkalotten 2012, Sub-Arctic Military Operations Exercise (scenario-driven/seminar-based), Swedish Defence University, Cap of the North (Sweden, Finland, Norway), September 2-7 2012.
  • Ledningsdagarna 2011, Disaster Management/C2 exercise, Swedish Civil Contingencies Agency, Revinge, Sweden, November 1-2 2011.
  • Pacific Endeavor 2010, Disaster Response/C2 Interoperability, U.S. Navy, Singapore, August 16-26 2010.
  • Baltic Cyber Shield, Cyber Defense Exercise (CDX), SEDU/NATO CCDCOE, Stockholm/Tallinn, May 10-11 2010.

Honors and Awards


Axberg, S., “Military Technology as Science”, in S. Axberg and J. Foghelin (eds.) Perspectives on Military Technology, The Royal Swedish Academy of War Sciences, Department of Military Technology, 2006. ISBN 91-975807-2-4. [PDF]

Page responsible: Johan Sigholm
Last updated: 2016-12-12