Dennis Nilsson
Showing 38 publications
Using system call information to reveal hidden attack manifestations
A Model for Safe and Secure Execution of Downloaded Vehicle Applications
Online Self-Healing Support for Embedded Systems
A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure
Building a Self-Healing Embedded System in a Multi-OS Environment
Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks
Unidirectional Auxiliary Channel Challenge-Response Authentication
Key Management and Secure Software Updates in Wireless Process Control Environments
Auxiliary Channel Diffie-Hellman Encrypted Key-Exchange Authentication
A Roadmap for Securing Vehicles against Cyber Attacks
An Intrusion Detection System for Wireless Process Control Systems
Security Recommendations for a Hierarchical Wireless Vehicular Infrastructure
Secure Firmware Updates over the Air in Intelligent Vehicles
Securing Vehicles against Cyber Attacks
Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks
Security Aspects of Wireless Vehicle-to-Infrastructure Environments
A framework for self-verification of firmwareupdates over the air in vehicle ecus
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay
Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes
Vehicle ECU Classification Based on Safety-Security Characteristics
An Approach to Specification-based Attack Detection for In-Vehicle Networks
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Combining Physical and Digital Evidence in Vehicle Environments
A Step Towards Securing Vehicles against Cyber Attacks
Simulated Attacks on CAN Buses: Vehicle virus
An Approach to using Honeypots in In-Vehicle Networks
Operator-Centric and Adaptive Intrusion Detection
Securing the Wireless Vehicle-to-Infrastructure Environment: Diagnostics and Firmware Updates
Decision Support for Intrusion Detection Data Collection
Low-Cost Key Management for Hierarchical Wireless Vehicle Networks
A Framework for Self-Verification of Firmware Updates over the Air in Vehicle ECUs
A General Model and Guidelines for Attack Manifestation Generation
Analyzing and Securing Bluetooth-based Pico Networks
Using Common Log Information to Reveal Hidden Attack Manifestations
A General Model and Guidelines for Attack Manifestation Generation
How to Secure Bluetooth-based Pico Networks
Download publication list
You can download this list to your computer.
Filter and download publication list
As logged in user (Chalmers employee) you find more export functions in MyResearch.
You may also import these directly to Zotero or Mendeley by using a browser plugin. These are found herer:
Zotero Connector
Mendeley Web Importer
The service SwePub offers export of contents from Research in other formats, such as Harvard and Oxford in .RIS, BibTex and RefWorks format.