Tomas Olovsson

Showing 61 publications
Spectra: Detecting Attacks on In-Vehicle Networks through Spectral Analysis of CAN-Message Payloads
REMIND: A Framework for the Resilient Design of Automotive Systems
Extending AUTOSAR's Counter-based Solution for Freshness of Authenticated Messages in Vehicles
CASAD: CAN-Aware Stealthy-Attack Detection for In-Vehicle Networks
Understanding Common Automotive Security Issues and Their Implications
A Preliminary Security Assessment of 5G V2X
In-vehicle CAN message authentication: An evaluation based on industrial criteria
What the Stack? On Memory Exploitation and Protection in Resource Constrained Automotive Systems
Open Problems when Mapping Automotive Security Levels to System Requirements
Towards a Standardized Mapping from Automotive Security Levels to Security Mechanisms
Joint Subjective and Objective Data Capture and Analytics for Automotive Applications
Introducing Differential Privacy to the Automotive Domain: Opportunities and Challenges
Improving In-Vehicle Network Architectures Using Automated Partitioning Algorithms
Security and Privacy for Big Data: A Systematic Literature Review
A risk assessment framework for automotive embedded systems
Towards designing secure in-vehicle network architectures using community detection algorithms
A Graph-Based Analysis of Medical Queries of a Swedish Health Care Portal
Overlapping Communities for Identifying Misbehavior in Network Communications
Securing Vehicle Diagnostics in Repair Shops
A Local Seed Selection Algorithm for Overlapping Community Detection
Experiences from Implementing the ETSI ITS SecuredMessage Service
Protecting Vehicles Against Unauthorised Diagnostics Sessions Using Trusted Third Parties
A First Security Analysis of a Secure Intermodal Goods Transport System
An Evaluation of Community Detection Algorithms on Large-Scale Email Traffic
Assessing the Quality of Packet-Level Traces Collected on Internet Backbone Links
An In-Depth Analysis of the Security of the Connected Repair Shop
Towards Modeling Legitimate and Unsolicited Email Traffic Using Social Network Properties
Mining Network-Level Communication Patterns of Email Traffic for Spotting Unsolicited Email
The anti-social behavior of spam
A Framework for Assessing the Security of the Connected Car Infrastructure
Structural and Temporal Properties of Email and Spam Networks
Security aspects of the in-vehicle network in the connected car
On Collection of Large-Scale Multi-Purpose Datasets on Internet Backbone Links
Mapping Systems Security Research at Chalmers
Analyzing the Social Structure and Dynamics of E-mail and Spam in Massive Backbone Internet Traffic
Passive Internet Measurement: Overview and Guidelines based on Experiences
Access management evolves over 20 years
An Analysis of the Robustness and Stability of the Network Stack in Symbian-based Smartphones
De-perimeterization: How to make it a reality in a cost-effective way
Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic
A Practical Analysis of the Robustness and Stability of the Network Stack in Smartphones
Detection of malicious Traffic on Backbone links via Packet Header Analysis
The Jericho Forum: De-perimeterisation of network resources
A quantitative model of the security intrusion process based on attacker behavior
Security intrusion process: an empirical model
On the modelling of preventive security based on a PC network intrusion experiment
An analysis of a secure system based on trusted components
Security Evaluation of a PC Network based on Intrusion Experiments
Security Assessment Based on Attacker Behavior
An Empirical Model of the Security Intrusion Process
Towards operational measures of computer security: Experimentation and modelling
Security Evaluation of a PC Network based on Intrusion Experiments
Practical Experimentation as a Tool for Vulnerability Analysis and Security Evaluation
Security in a Dependability Perspective
On measurement of operational security
Security and Dependability - A Comparison of Concepts
Data Collection for Security Fault Forecasting - Pilot Experiment
On the Integration of Security and Dependability in Computer Systems
Security forms for protection against vulnerabilities in computer systems
Download publication list
You can download this list to your computer.
Filter and download publication list
As logged in user (Chalmers employee) you find more export functions in MyResearch.
You may also import these directly to Zotero or Mendeley by using a browser plugin. These are found herer:
Showing 11 research projects
Privacy-Protected Machine Learning for Transport Systems
Automotive 5G Integrated Security and Communications
Holistiskt angreppssätt att förbättra datasäkerhet (HoliSec)
BAuD II: Storskalig insamling och analys av data för kunskapsdriven produktutveckling
HEAling Vulnerabilities to ENhance Software Security and Safety (HEAVENS)
SECURIT - Security Culture and Information Technology
Security framework for vehicle communication (SeFram)