Erland Jonsson
Showing 83 publications
Securing the Connected Car: A Security Enhancement Methodology
Guidance for Selecting Data Collection Mechanisms for Intrusion Detection
A First Security Analysis of a Secure Intermodal Goods Transport System
Identifying Suitable Attributes for Security and Dependability Metrication
An In-Depth Analysis of the Security of the Connected Repair Shop
A Cause and Effect Approach Towards Risk Analysis
A Framework for Assessing the Security of the Connected Car Infrastructure
Emerging and Future Cyber Threats to Critical Systems
Mapping Systems Security Research at Chalmers
Security aspects of the in-vehicle network in the connected car
A Framework for Security Metrics Based on Operational System Attributes
A Structured Approach to Selecting Data Collection Mechanisms for Intrusion Detection
Security Arena, årsrapport 2009
Forward White Book: Emerging ICT Threats
Using system call information to reveal hidden attack manifestations
Anticipating Security Threats to a Future Internet
FORWARD -- Second Workshop Report
Security Arena, årsrapport 2008
Unidirectional Auxiliary Channel Challenge-Response Authentication
An Approach to using Honeypots in In-Vehicle Networks
An Approach to Specification-based Attack Detection for In-Vehicle Networks
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Investigating the Benefits of Using Multiple Intrusion-Detection Sensors
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Decision Support for Intrusion Detection Data Collection
Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes
A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection
Auxiliary Channel Diffie-Hellman Encrypted Key-Exchange Authentication
Operator-Centric and Adaptive Intrusion Detection
Future threats to future trust
A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay
Security Recommendations for a Hierarchical Wireless Vehicular Infrastructure
Low-Cost Key Management for Hierarchical Wireless Vehicle Networks
A Multi-Sensor Model to Improve Automated Attack Detection
A General Model and Guidelines for Attack Manifestation Generation
A Comparison of Alternative Audit Sources for Web Server Attack Detection
A General Model and Guidelines for Attack Manifestation Generation
Analyzing and Securing Bluetooth-based Pico Networks
Using Common Log Information to Reveal Hidden Attack Manifestations
How to Secure Bluetooth-based Pico Networks
An intrusion detection-centric taxonomy and survey of data log mechanisms
Towards an Integrated Conceptual Model of Security and Dependability
An intrusion detection-centric taxonomy and survey of data log mechanisms
Tuning an IDS - Learning the User's Preferences
METAL - A tool for extracting attack manifestations
Reducing system call logs with selective auditing
New security issues in emerging computing environments - A reflection
Dynamic Data Protection Services for Network Transfers: Concepts and Taxonomy
Protecting Stateful Security Policies using One-Way Functions
A Content-Independent Scalable Encryption Model
Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004
Extracting attack manifestations to determine log data requirements for intrusion detection
Adding Security to QoS Architectures
Protecting Security Policies in Ubiquitous Environments Using One-Way Functions
Using Active Learning in Intrusion Detection
Implications of IDS Classification on Attack Detection
Synthesizing test data for fraud detection systems
A Protection Scheme For Security Policies In Ubiquitous Environments Using One-Way Functions
A synthetic fraud data generation methodology
Different Aspects of Security Problems in Network Operating Systems
A quantitative model of the security intrusion process based on attacker behavior
How to systematically classify computer security intrusions
Security intrusion process: an empirical model
An analysis of a secure system based on trusted components
Security Assessment Based on Attacker Behavior
An Empirical Model of the Security Intrusion Process
On the modelling of preventive security based on a PC network intrusion experiment
Security Evaluation of a PC Network based on Intrusion Experiments
A Quantitative Approach to Computer Security from a Dependability Perspective
Towards operational measures of computer security: Experimentation and modelling
An Attempt to Quantitative Modelling of Behavioural Security
Security Evaluation of a PC Network based on Intrusion Experiments
A practical dependability measure for degradable computer systems with non-exponential degradation
Security in a Dependability Perspective
On measurement of operational security
Data Collection for Security Fault Forecasting - Pilot Experiment
A practical dependability measure for embedded computer systems
Security forms for protection against vulnerabilities in computer systems
On the Integration of Security and Dependability in Computer Systems
Download publication list
You can download this list to your computer.
Filter and download publication list
As logged in user (Chalmers employee) you find more export functions in MyResearch.
You may also import these directly to Zotero or Mendeley by using a browser plugin. These are found herer:
Zotero Connector
Mendeley Web Importer
The service SwePub offers export of contents from Research in other formats, such as Harvard and Oxford in .RIS, BibTex and RefWorks format.