Dennis Nilsson
Showing 38 publications
A Model for Safe and Secure Execution of Downloaded Vehicle Applications
Using system call information to reveal hidden attack manifestations
Online Self-Healing Support for Embedded Systems
Building a Self-Healing Embedded System in a Multi-OS Environment
A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure
Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks
Unidirectional Auxiliary Channel Challenge-Response Authentication
An Approach to using Honeypots in In-Vehicle Networks
Security Aspects of Wireless Vehicle-to-Infrastructure Environments
An Approach to Specification-based Attack Detection for In-Vehicle Networks
A framework for self-verification of firmwareupdates over the air in vehicle ecus
Key Management and Secure Software Updates in Wireless Process Control Environments
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Combining Physical and Digital Evidence in Vehicle Environments
A Roadmap for Securing Vehicles against Cyber Attacks
Secure Firmware Updates over the Air in Intelligent Vehicles
Decision Support for Intrusion Detection Data Collection
A Framework for Self-Verification of Firmware Updates over the Air in Vehicle ECUs
Vehicle ECU Classification Based on Safety-Security Characteristics
Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes
Securing the Wireless Vehicle-to-Infrastructure Environment: Diagnostics and Firmware Updates
Auxiliary Channel Diffie-Hellman Encrypted Key-Exchange Authentication
Operator-Centric and Adaptive Intrusion Detection
A Step Towards Securing Vehicles against Cyber Attacks
Simulated Attacks on CAN Buses: Vehicle virus
A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay
An Intrusion Detection System for Wireless Process Control Systems
Security Recommendations for a Hierarchical Wireless Vehicular Infrastructure
Securing Vehicles against Cyber Attacks
Low-Cost Key Management for Hierarchical Wireless Vehicle Networks
Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks
A General Model and Guidelines for Attack Manifestation Generation
A General Model and Guidelines for Attack Manifestation Generation
Analyzing and Securing Bluetooth-based Pico Networks
Using Common Log Information to Reveal Hidden Attack Manifestations
How to Secure Bluetooth-based Pico Networks
Download publication list
You can download this list to your computer.
Filter and download publication list
As logged in user (Chalmers employee) you find more export functions in MyResearch.
You may also import these directly to Zotero or Mendeley by using a browser plugin. These are found herer:
Zotero Connector
Mendeley Web Importer
The service SwePub offers export of contents from Research in other formats, such as Harvard and Oxford in .RIS, BibTex and RefWorks format.