Erland Jonsson
Showing 83 publications
Securing the Connected Car: A Security Enhancement Methodology
Guidance for Selecting Data Collection Mechanisms for Intrusion Detection
A First Security Analysis of a Secure Intermodal Goods Transport System
Identifying Suitable Attributes for Security and Dependability Metrication
An In-Depth Analysis of the Security of the Connected Repair Shop
Security aspects of the in-vehicle network in the connected car
Mapping Systems Security Research at Chalmers
A Structured Approach to Selecting Data Collection Mechanisms for Intrusion Detection
A Cause and Effect Approach Towards Risk Analysis
A Framework for Assessing the Security of the Connected Car Infrastructure
A Framework for Security Metrics Based on Operational System Attributes
Emerging and Future Cyber Threats to Critical Systems
Forward White Book: Emerging ICT Threats
Security Arena, årsrapport 2009
Using system call information to reveal hidden attack manifestations
Anticipating Security Threats to a Future Internet
Security Arena, årsrapport 2008
FORWARD -- Second Workshop Report
Unidirectional Auxiliary Channel Challenge-Response Authentication
A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay
A Multi-Sensor Model to Improve Automated Attack Detection
Low-Cost Key Management for Hierarchical Wireless Vehicle Networks
Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes
Operator-Centric and Adaptive Intrusion Detection
Investigating the Benefits of Using Multiple Intrusion-Detection Sensors
Auxiliary Channel Diffie-Hellman Encrypted Key-Exchange Authentication
Decision Support for Intrusion Detection Data Collection
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Future threats to future trust
An Approach to using Honeypots in In-Vehicle Networks
An Approach to Specification-based Attack Detection for In-Vehicle Networks
A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Security Recommendations for a Hierarchical Wireless Vehicular Infrastructure
A General Model and Guidelines for Attack Manifestation Generation
A Comparison of Alternative Audit Sources for Web Server Attack Detection
Using Common Log Information to Reveal Hidden Attack Manifestations
How to Secure Bluetooth-based Pico Networks
A General Model and Guidelines for Attack Manifestation Generation
Analyzing and Securing Bluetooth-based Pico Networks
An intrusion detection-centric taxonomy and survey of data log mechanisms
Tuning an IDS - Learning the User's Preferences
Towards an Integrated Conceptual Model of Security and Dependability
An intrusion detection-centric taxonomy and survey of data log mechanisms
METAL - A tool for extracting attack manifestations
Reducing system call logs with selective auditing
Using Active Learning in Intrusion Detection
A Content-Independent Scalable Encryption Model
Protecting Security Policies in Ubiquitous Environments Using One-Way Functions
New security issues in emerging computing environments - A reflection
Dynamic Data Protection Services for Network Transfers: Concepts and Taxonomy
Extracting attack manifestations to determine log data requirements for intrusion detection
Protecting Stateful Security Policies using One-Way Functions
Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004
Adding Security to QoS Architectures
Synthesizing test data for fraud detection systems
Implications of IDS Classification on Attack Detection
A Protection Scheme For Security Policies In Ubiquitous Environments Using One-Way Functions
Different Aspects of Security Problems in Network Operating Systems
A synthetic fraud data generation methodology
A quantitative model of the security intrusion process based on attacker behavior
Security intrusion process: an empirical model
How to systematically classify computer security intrusions
Security Evaluation of a PC Network based on Intrusion Experiments
A Quantitative Approach to Computer Security from a Dependability Perspective
An analysis of a secure system based on trusted components
Security Assessment Based on Attacker Behavior
An Empirical Model of the Security Intrusion Process
On the modelling of preventive security based on a PC network intrusion experiment
Security Evaluation of a PC Network based on Intrusion Experiments
An Attempt to Quantitative Modelling of Behavioural Security
Towards operational measures of computer security: Experimentation and modelling
On measurement of operational security
Security in a Dependability Perspective
A practical dependability measure for degradable computer systems with non-exponential degradation
Data Collection for Security Fault Forecasting - Pilot Experiment
A practical dependability measure for embedded computer systems
On the Integration of Security and Dependability in Computer Systems
Security forms for protection against vulnerabilities in computer systems
Download publication list
You can download this list to your computer.
Filter and download publication list
As logged in user (Chalmers employee) you find more export functions in MyResearch.
You may also import these directly to Zotero or Mendeley by using a browser plugin. These are found herer:
Zotero Connector
Mendeley Web Importer
The service SwePub offers export of contents from Research in other formats, such as Harvard and Oxford in .RIS, BibTex and RefWorks format.