Erland Jonsson
Visar 83 publikationer
Securing the Connected Car: A Security Enhancement Methodology
Guidance for Selecting Data Collection Mechanisms for Intrusion Detection
A First Security Analysis of a Secure Intermodal Goods Transport System
Identifying Suitable Attributes for Security and Dependability Metrication
An In-Depth Analysis of the Security of the Connected Repair Shop
Security aspects of the in-vehicle network in the connected car
Mapping Systems Security Research at Chalmers
A Structured Approach to Selecting Data Collection Mechanisms for Intrusion Detection
A Cause and Effect Approach Towards Risk Analysis
A Framework for Assessing the Security of the Connected Car Infrastructure
A Framework for Security Metrics Based on Operational System Attributes
Emerging and Future Cyber Threats to Critical Systems
Forward White Book: Emerging ICT Threats
Security Arena, årsrapport 2009
Using system call information to reveal hidden attack manifestations
Anticipating Security Threats to a Future Internet
Security Arena, årsrapport 2008
FORWARD -- Second Workshop Report
Unidirectional Auxiliary Channel Challenge-Response Authentication
A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay
A Multi-Sensor Model to Improve Automated Attack Detection
Low-Cost Key Management for Hierarchical Wireless Vehicle Networks
Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes
Operator-Centric and Adaptive Intrusion Detection
Investigating the Benefits of Using Multiple Intrusion-Detection Sensors
Auxiliary Channel Diffie-Hellman Encrypted Key-Exchange Authentication
Decision Support for Intrusion Detection Data Collection
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Future threats to future trust
An Approach to using Honeypots in In-Vehicle Networks
An Approach to Specification-based Attack Detection for In-Vehicle Networks
A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Security Recommendations for a Hierarchical Wireless Vehicular Infrastructure
A General Model and Guidelines for Attack Manifestation Generation
A Comparison of Alternative Audit Sources for Web Server Attack Detection
Using Common Log Information to Reveal Hidden Attack Manifestations
How to Secure Bluetooth-based Pico Networks
A General Model and Guidelines for Attack Manifestation Generation
Analyzing and Securing Bluetooth-based Pico Networks
An intrusion detection-centric taxonomy and survey of data log mechanisms
Tuning an IDS - Learning the User's Preferences
Towards an Integrated Conceptual Model of Security and Dependability
An intrusion detection-centric taxonomy and survey of data log mechanisms
METAL - A tool for extracting attack manifestations
Reducing system call logs with selective auditing
Using Active Learning in Intrusion Detection
A Content-Independent Scalable Encryption Model
Protecting Security Policies in Ubiquitous Environments Using One-Way Functions
New security issues in emerging computing environments - A reflection
Dynamic Data Protection Services for Network Transfers: Concepts and Taxonomy
Extracting attack manifestations to determine log data requirements for intrusion detection
Protecting Stateful Security Policies using One-Way Functions
Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004
Adding Security to QoS Architectures
Synthesizing test data for fraud detection systems
Implications of IDS Classification on Attack Detection
A Protection Scheme For Security Policies In Ubiquitous Environments Using One-Way Functions
Different Aspects of Security Problems in Network Operating Systems
A synthetic fraud data generation methodology
A quantitative model of the security intrusion process based on attacker behavior
Security intrusion process: an empirical model
How to systematically classify computer security intrusions
Security Evaluation of a PC Network based on Intrusion Experiments
A Quantitative Approach to Computer Security from a Dependability Perspective
An analysis of a secure system based on trusted components
Security Assessment Based on Attacker Behavior
An Empirical Model of the Security Intrusion Process
On the modelling of preventive security based on a PC network intrusion experiment
Security Evaluation of a PC Network based on Intrusion Experiments
An Attempt to Quantitative Modelling of Behavioural Security
Towards operational measures of computer security: Experimentation and modelling
On measurement of operational security
Security in a Dependability Perspective
A practical dependability measure for degradable computer systems with non-exponential degradation
Data Collection for Security Fault Forecasting - Pilot Experiment
A practical dependability measure for embedded computer systems
On the Integration of Security and Dependability in Computer Systems
Security forms for protection against vulnerabilities in computer systems
A Dependability Measure for Degradable Computing Systems
Ladda ner publikationslistor
Du kan ladda ner denna lista till din dator.
Filtrera och ladda ner publikationslista
Som inloggad användare hittar du ytterligare funktioner i MyResearch.
Du kan även exportera direkt till Zotero eller Mendeley genom webbläsarplugins. Dessa hittar du här:
Zotero Connector
Mendeley Web Importer
Tjänsten SwePub erbjuder uttag av Researchs listor i andra format, till exempel kan du få uttag av publikationer enligt Harvard och Oxford i .RIS, BibTex och RefWorks-format.