Erland Jonsson

Showing 83 publications

2018

Securing the Connected Car: A Security Enhancement Methodology

Kim Strandberg, Tomas Olovsson, Erland Jonsson
IEEE Vehicular Technology Magazine. Vol. 13 (1), p. 56-65
Journal article
2014

Guidance for Selecting Data Collection Mechanisms for Intrusion Detection

Ulf Larson, Erland Jonsson, Stefan Lindskog
Handbook of Research on Emerging Developments in Data Privacy, p. 340-370
Book chapter
2013

A First Security Analysis of a Secure Intermodal Goods Transport System

JONAS ANGHOLT, Mikael Wackerberg, Tomas Olovsson et al
Report
2013

Identifying Suitable Attributes for Security and Dependability Metrication

Erland Jonsson, Laleh Pirzadeh Irannezhad
SECURWARE 2013, The Seventh International Conference on Emerging Security Information, Systems and Technologies - August 25 - 31, 2013 - Barcelona, Spain, p. 1-7
Paper in proceeding
2012

An In-Depth Analysis of the Security of the Connected Repair Shop

Pierre Kleberger, Tomas Olovsson, Erland Jonsson
The Seventh International Conference on Systems and Networks Communications (ICSNC), Proceedings. Lisbon, 18-23 November, 2012. IARIA., p. 99-107
Paper in proceeding
2011

A Cause and Effect Approach Towards Risk Analysis

Laleh Pirzadeh Irannezhad, Erland Jonsson
International workshop on Security Measurements and Metrics - MetriSec2011, Banff, Alberta, Canada, 2011-09-21, p. 80-83
Paper in proceeding
2011

A Framework for Assessing the Security of the Connected Car Infrastructure

Pierre Kleberger, ASRIN JAVAHERI, Tomas Olovsson et al
The Sixth International Conference on Systems and Networks Communications (ICSNC), Proceedings. Barcelona, 23-29 October 2011. IARIA., p. 236-241
Paper in proceeding
2011

Emerging and Future Cyber Threats to Critical Systems

Edita Djambazova, Magnus Almgren, Kiril Dimitrov et al
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6555, p. 29-46
Paper in proceeding
2011

Mapping Systems Security Research at Chalmers

Magnus Almgren, Zhang Fu, Erland Jonsson et al
First SysSec Workshop (SysSec 2011), p. 67-70
Paper in proceeding
2011

Security aspects of the in-vehicle network in the connected car

Pierre Kleberger, Tomas Olovsson, Erland Jonsson
IEEE Intelligent Vehicles Symposium, Proceedings. Baden-Baden, 5-9 June 2011, p. 528-533
Paper in proceeding
2011

A Framework for Security Metrics Based on Operational System Attributes

Erland Jonsson, Laleh Pirzadeh Irannezhad
International workshop on Security Measurements and Metrics - MetriSec2011, Banff, Alberta, Canada, 2011-09-21., p. 58-65
Paper in proceeding
2011

A Structured Approach to Selecting Data Collection Mechanisms for Intrusion Detection

Ulf Larson, Erland Jonsson, Stefan Lindskog
Privacy, Intrusion Detection, and Response: Technologies for Protecting Networks, p. 1-39
Book chapter
2010

Security Arena, årsrapport 2009

Bosse Norrhem, Magnus Almgren, Torbjörn Andreasson et al
Report
2010

Forward White Book: Emerging ICT Threats

Christoffer Kruegel, Magnus Almgren, Herbert Bos et al
Book
2010

Using system call information to reveal hidden attack manifestations

Ulf Larson, Dennis Nilsson, Erland Jonsson et al
Proceedings of the 1st International Workshop on Security and Communication Networks, IWSCN 2009
Other conference contribution
2009

FORWARD Threat Report

Christoffer Kruegel, Magnus Almgren, Herbert Bos et al
Book
2009

Anticipating Security Threats to a Future Internet

Herbert Bos, Erland Jonsson, Edita Djambazova et al
EU/FP7 FORWARD
Other conference contribution
2009

FORWARD -- Second Workshop Report

Christoffer Kruegel, Magnus Almgren, Herbert Bos et al
Report
2009

Security Arena, årsrapport 2008

Bosse Norrhem, Magnus Almgren, Torbjörn Andreasson et al
Report
2008

Unidirectional Auxiliary Channel Challenge-Response Authentication

Dennis Nilsson, Ulf Larson, Erland Jonsson
7th Annual Wireless Telecommunications Symposium, WTS 2008; Ponoma, CA; United States; 24 April 2008 through 26 April 2008, p. 84-91
Paper in proceeding
2008

An Approach to using Honeypots in In-Vehicle Networks

Vilhelm Verendel, Dennis Nilsson, Ulf Larson et al
68th Semi-Annual IEEE Vehicular Technology, VTC 2008-Fall, Conference; Calgary, AB; Canada; 21 September 2008 through 24 September 2008
Paper in proceeding
2008

An Approach to Specification-based Attack Detection for In-Vehicle Networks

Ulf Larson, Dennis Nilsson, Erland Jonsson
Proceedings of the IEEE Intelligent Vehicles Symposium, June 4-6, 2008, Eindhoven, The Netherlands
Journal article
2008

Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles

Dennis Nilsson, Ulf Larson, Erland Jonsson
Proceedings of the 27th International Conference on Computer Safety, Reliability, and Security (SAFECOMP), September 22-25, 2008, Newcastle, UK, p. 207-220
Paper in proceeding
2008

Investigating the Benefits of Using Multiple Intrusion-Detection Sensors

Magnus Almgren, Erland Jonsson
The 13th Nordic Workshop on Secure IT-systems. Published by the Technical University of Denmark., p. 13-26
Paper in proceeding
2008

Decision Support for Intrusion Detection Data Collection

Ulf Larson, Stefan Lindskog, Dennis Nilsson et al
Proceedings of the 13th Nordic Workshop on Secure IT-systems (NordSec 2008), October 9-10, 2008, Copenhagen, Denmark
Paper in proceeding
2008

Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes

Dennis Nilsson, Ulf Larson, Erland Jonsson
IEEE Vehicular Technology Conference
Paper in proceeding
2008

A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection

Ulf Larson, Stefan Lindskog, Erland Jonsson
Proceedings of the Third IEEE International Conference on Availability, Reliability and Security (ARES 2008), p. 624-629
Paper in proceeding
2008

Auxiliary Channel Diffie-Hellman Encrypted Key-Exchange Authentication

Dennis Nilsson, Ulf Larson, Erland Jonsson
5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2008; Hong Kong; Hong Kong; 28 July 2008 through 31 July 2008
Paper in proceeding
2008

Operator-Centric and Adaptive Intrusion Detection

Ulf Larson, Stefan Lindskog, Dennis Nilsson et al
Proceedings of the Fourth International Conference on Information Assurance and Security (IAS 2008), September 8-10, 2008, Naples, Italy, p. 161-166
Paper in proceeding
2008

Future threats to future trust

Herbert Bos, Erland Jonsson, Sotiris Ioannidis et al
Future of Trust in Computing: Proceedings of the First International Conference Future of Trust in Computing 2008: With 58 Illustrations, p. 49-54
Book chapter
2008

A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay

Dennis Nilsson, Ulf Larson, Francesco Picasso et al
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems (CISIS), October 23-24, 2008, Genova, Italy, p. 84-91
Paper in proceeding
2008

Security Recommendations for a Hierarchical Wireless Vehicular Infrastructure

Dennis Nilsson, Ulf Larson, Erland Jonsson
Report
2008

Low-Cost Key Management for Hierarchical Wireless Vehicle Networks

Dennis Nilsson, Ulf Larson, Erland Jonsson
Proceedings of the IEEE Intelligent Vehicles Symposium, June 4-6, 2008, Eindhoven, The Netherlands, p. 476-481
Paper in proceeding
2008

A Multi-Sensor Model to Improve Automated Attack Detection

Magnus Almgren, Ulf Lindqvist, Erland Jonsson
11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Lecture Notes in Computer Science. Vol. 5230/2008, p. 291-310
Paper in proceeding
2007

A General Model and Guidelines for Attack Manifestation Generation

Ulf Larson, Dennis Nilsson, Erland Jonsson
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5141, p. 274-286
Paper in proceeding
2007

A Comparison of Alternative Audit Sources for Web Server Attack Detection

Magnus Almgren, Erland Jonsson, Ulf Lindqvist
The 12th Nordic Workshop on Secure IT-systems
Paper in proceeding
2007

A General Model and Guidelines for Attack Manifestation Generation

Dennis Nilsson, Ulf Larson, Erland Jonsson
Report
2007

Analyzing and Securing Bluetooth-based Pico Networks

Dennis Nilsson, Phillip A. Porras, Erland Jonsson
Report
2007

Using Common Log Information to Reveal Hidden Attack Manifestations

Ulf Larson, Dennis Nilsson, Erland Jonsson
Report
2007

How to Secure Bluetooth-based Pico Networks

Dennis Nilsson, Phillip A. Porras, Erland Jonsson
Proceedings of the 26th International Conference on Computer Safety, Reliability, and Security (SAFECOMP), September 18-21, 2007, Nuremberg, Germany., p. 209-223
Paper in proceeding
2006

An intrusion detection-centric taxonomy and survey of data log mechanisms

Ulf Larson, Erland Jonsson
The 11th Nordic Workshop on Secure IT-systems
Journal article
2006

Towards an Integrated Conceptual Model of Security and Dependability

Erland Jonsson
The First IEEE International Conference on Availability, Reliability and Security (ARES 2006), p. 646-653
Paper in proceeding
2006

Tuning an IDS - Learning the User's Preferences

Magnus Almgren, Erland Jonsson
The 11th Nordic Workshop on Secure IT-systems
Paper in proceeding
2005

METAL - A tool for extracting attack manifestations

Ulf Larson, Emilie Lundin Barse, Erland Jonsson
Detection of Intrusions and Malware, and Vulnerability Assessment, Second International Conference, DIMVA 2005, p. 85-102
Paper in proceeding
2005

Reducing system call logs with selective auditing

Ulf Larson, Erland Jonsson
Nordic Workshop on Secure IT Systems (NordSec), p. 122-131
Paper in proceeding
2004

New security issues in emerging computing environments - A reflection

Håkan Kvarnström, Ulf Larson, Erland Jonsson
Report
2004

Dynamic Data Protection Services for Network Transfers: Concepts and Taxonomy

Stefan Lindskog, Anna Brunstrom, Erland Jonsson
Proceedings of the 4th Annual Information Security South Africa Conference
Paper in proceeding
2004

Protecting Stateful Security Policies using One-Way Functions

Håkan Kvarnström, Hans Hedbom, Erland Jonsson
Proceedings of the Asia Pacific Information Technology Security Conference (AusCERT 2004)
Journal article
2004

A Content-Independent Scalable Encryption Model

Stefan Lindskog, Johan Strandbergh, Mikael Hackman et al
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3043 (1), p. 821-830
Journal article
2004

Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004

Erland Jonsson, Alfonso Valdes, Magnus Almgren
Edited book
2004

Extracting attack manifestations to determine log data requirements for intrusion detection

Emilie Lundin Barse, Erland Jonsson
20th Annual Computer Security Applications Conference (ACSAC 2004)
Paper in proceeding
2004

Adding Security to QoS Architectures

Stefan Lindskog, Erland Jonsson
Perspectives on Multimedia: Communication, Media and Information Technology, p. 145-158
Book chapter
2004

Setting the Scene for Intrusion Detection

Emilie Lundin Barse, Erland Jonsson
Report
2004

Protecting Security Policies in Ubiquitous Environments Using One-Way Functions

Håkan Kvarnström, Hans Hedbom, Erland Jonsson
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 2802, p. 71-85
Paper in proceeding
2004

Using Active Learning in Intrusion Detection

Magnus Almgren, Erland Jonsson
Computer Security Foundations Workshop, p. 88--98-
Paper in proceeding
2003

Implications of IDS Classification on Attack Detection

Magnus Almgren, Emilie Lundin, Erland Jonsson
Nordic Workshop on Secure IT Systems (NordSec), p. 57--70-
Paper in proceeding
2003

Synthesizing test data for fraud detection systems

Emilie Lundin Barse, Håkan Kvarnström, Erland Jonsson
19th Annual Computer Security Conference, LAS VEGAS, NV, DEC 08-12, 2003. Vol. 2003-January, p. 384-394
Paper in proceeding
2002

A Protection Scheme For Security Policies In Ubiquitous Environments Using One-Way Functions

Håkan Kvarnström, Hans Hedbom, Erland Jonsson
UBICOMP2002 - Workshop on Security in Ubiquitous Computing, Göteborg, 29 September 2002
Paper in proceeding
2002

A synthetic fraud data generation methodology

Emilie Lundin, Håkan Kvarnström, Erland Jonsson
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 2513, p. 265-277
Paper in proceeding
2002

Survey of Intrusion Detection Research

Emilie Lundin, Erland Jonsson
Report
2002

Different Aspects of Security Problems in Network Operating Systems

Stefan Lindskog, Erland Jonsson
Proceedings of the Third Annual International Systems Security Engineering Association Conference (2002 ISSEA Conference), Orlando, 13-15 Mars 2002
Paper in proceeding
1997

A quantitative model of the security intrusion process based on attacker behavior

Erland Jonsson, Tomas Olovsson
IEEE Transactions on Software Engineering. Vol. 23 (4), p. 235-245
Journal article
1997

How to systematically classify computer security intrusions

Ulf Lindqvist, Erland Jonsson
IEEE Symposium on Security and Privacy, 1997. Proceedings.
Paper in proceeding
1997

Security intrusion process: an empirical model

Erland Jonsson, Tomas Olovsson
IEEE Aerospace and Electronic Systems Magazine. Vol. 12 (4), p. 7-17
Journal article
1996

An analysis of a secure system based on trusted components

Ulf Lindqvist, Tomas Olovsson, Erland Jonsson
IEEE Proceedings of the Eleventh Annual Conference on Computer Assurance, COMPASS '96, p. 213-223
Paper in proceeding
1996

Security Assessment Based on Attacker Behavior

Erland Jonsson, Tomas Olovsson
Nordic Workshop on Secure Computer Systems, NORDSEC '96
Paper in proceeding
1996

An Empirical Model of the Security Intrusion Process

Erland Jonsson, Tomas Olovsson
Proceedings of the Eleventh Annual Conference on Computer Assurance, 1996. COMPASS 1996., p. 176-186
Journal article
1996

On the modelling of preventive security based on a PC network intrusion experiment

Ulf Gustafson, Erland Jonsson, Tomas Olovsson
ACISP '96 Proceedings of the First Australasian Conference on Information Security and Privacy. Vol. 1172, p. 242-252
Paper in proceeding
1996

Security Evaluation of a PC Network based on Intrusion Experiments

Ulf Gustafson, Erland Jonsson, Tomas Olovsson
SECURICOM 1996 - 14th Worldwide Congress on Computer and Communications Security Protection
Journal article
1995

Towards operational measures of computer security: Experimentation and modelling

Tomas Olovsson, Erland Jonsson, Sarah Brocklehurst et al
Predictably Secure Computing Systems, p. 555-572
Book chapter
1995

An Attempt to Quantitative Modelling of Behavioural Security

Erland Jonsson, Mikael Andersson, Søren Asmussen
Proceedings of the 11th International Information Security Conference - IFIP/SEC 1995. Vol. addendum, p. 44-57
Journal article
1995

Security Evaluation of a PC Network based on Intrusion Experiments

Ulf Gustafson, Erland Jonsson, Tomas Olovsson
Proc. 14th Int'l Congress on Computer and Communications Security, SECURICOM '96, Paris, France, p. 187-203
Paper in proceeding
1994

A practical dependability measure for degradable computer systems with non-exponential degradation

Erland Jonsson, Mikael Andersson, Sören Asmussen
IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processe - SAFEPROCESS 1994. Vol. Vol. 1, p. 231-237
Journal article
1994

Security in a Dependability Perspective

Erland Jonsson, Tomas Olovsson
Nordic Seminar on Dependable Computing Systems 1994 (NSDCS '94), Lyngby, Denmark, p. 175-186
Paper in proceeding
1994

On measurement of operational security

Sarah Brocklehurst, Bev Littlewood, Tomas Olovsson et al
IEEE Aerospace and Electronic Systems Magazine. Vol. 9 (10), p. 7-16
Journal article
1993

Data Collection for Security Fault Forecasting - Pilot Experiment

Tomas Olovsson, Erland Jonsson, Sarah Brocklehurst et al
Predictably Dependable Computing Systems (PDCS) First Year Report, p. 515-560
Journal article
1993

A practical dependability measure for embedded computer systems

Erland Jonsson, Søren Assmussen
Proceedings of the IFAC 12th World Congress. Vol. Vol. 3, p. 267-272
Journal article
1992

A Dependability Measure for Degradable Computing Systems

Erland Jonsson, Søren Asmussen
Report
1992

Security forms for protection against vulnerabilities in computer systems

Tomas Olovsson, Erland Jonsson
IASTED International conference on Reliability, Quality control and Risk Assessment, Washington DC, USA., p. 138-143
Paper in proceeding
1992

On the Integration of Security and Dependability in Computer Systems

Erland Jonsson, Tomas Olovsson
IASTED International Conference on Reliability, Quality Control and Risk Assessment Washington DC, USA, 1992, ISBN 0-88986-171-4, p. 93-97
Paper in proceeding

Download publication list

You can download this list to your computer.

Filter and download publication list

As logged in user (Chalmers employee) you find more export functions in MyResearch.

You may also import these directly to Zotero or Mendeley by using a browser plugin. These are found herer:

Zotero Connector
Mendeley Web Importer

The service SwePub offers export of contents from Research in other formats, such as Harvard and Oxford in .RIS, BibTex and RefWorks format.

There are no projects.
There might be more projects where Erland Jonsson participates, but you have to be logged in as a Chalmers employee to see them.