Tomas Olovsson
Showing 72 publications
A SURVEY OF RECENT AUTOMOTIVE SOFTWARE SECURITY VULNERABILITIES: TRENDS AND ATTACK VECTORS
Gap analysis of ISO/SAE 21434 – Improving the automotive cybersecurity engineering life cycle
The Automotive BlackBox: Towards a Standardization of Automotive Digital Forensics
Secure Vehicle Software Updates: Requirements for a Reference Architecture
Future connected vehicles: Communications demands, privacy and cyber-security
Proposing HEAVENS 2.0 – an automotive risk assessment model
Security of In-Vehicle Communication Systems
V2C: A Trust-Based Vehicle to Cloud Anomaly Detection Framework for Automotive Systems
Resilient Shield: Reinforcing the Resilience of Vehicles Against Security Threats
Spectra: Detecting Attacks on In-Vehicle Networks through Spectral Analysis of CAN-Message Payloads
REMIND: A Framework for the Resilient Design of Automotive Systems
A Preliminary Security Assessment of 5G V2X
Extending AUTOSAR's Counter-based Solution for Freshness of Authenticated Messages in Vehicles
Understanding Common Automotive Security Issues and Their Implications
CASAD: CAN-Aware Stealthy-Attack Detection for In-Vehicle Networks
What the Stack? On Memory Exploitation and Protection in Resource Constrained Automotive Systems
Towards a Standardized Mapping from Automotive Security Levels to Security Mechanisms
Open Problems when Mapping Automotive Security Levels to System Requirements
Securing the Connected Car: A Security Enhancement Methodology
Introducing Differential Privacy to the Automotive Domain: Opportunities and Challenges
Joint Subjective and Objective Data Capture and Analytics for Automotive Applications
In-vehicle CAN message authentication: An evaluation based on industrial criteria
A risk assessment framework for automotive embedded systems
Security and Privacy for Big Data: A Systematic Literature Review
Improving In-Vehicle Network Architectures Using Automated Partitioning Algorithms
Towards designing secure in-vehicle network architectures using community detection algorithms
A Graph-Based Analysis of Medical Queries of a Swedish Health Care Portal
Experiences from Implementing the ETSI ITS SecuredMessage Service
A Local Seed Selection Algorithm for Overlapping Community Detection
Overlapping Communities for Identifying Misbehavior in Network Communications
Securing Vehicle Diagnostics in Repair Shops
A First Security Analysis of a Secure Intermodal Goods Transport System
Protecting Vehicles Against Unauthorised Diagnostics Sessions Using Trusted Third Parties
Assessing the Quality of Packet-Level Traces Collected on Internet Backbone Links
Towards Modeling Legitimate and Unsolicited Email Traffic Using Social Network Properties
Mining Network-Level Communication Patterns of Email Traffic for Spotting Unsolicited Email
An Evaluation of Community Detection Algorithms on Large-Scale Email Traffic
The anti-social behavior of spam
An In-Depth Analysis of the Security of the Connected Repair Shop
Mapping Systems Security Research at Chalmers
A Framework for Assessing the Security of the Connected Car Infrastructure
Security aspects of the in-vehicle network in the connected car
Structural and Temporal Properties of Email and Spam Networks
On Collection of Large-Scale Multi-Purpose Datasets on Internet Backbone Links
Passive Internet Measurement: Overview and Guidelines based on Experiences
Analyzing the Social Structure and Dynamics of E-mail and Spam in Massive Backbone Internet Traffic
An Analysis of the Robustness and Stability of the Network Stack in Symbian-based Smartphones
Access management evolves over 20 years
Detection of malicious Traffic on Backbone links via Packet Header Analysis
Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic
A Practical Analysis of the Robustness and Stability of the Network Stack in Smartphones
De-perimeterization: How to make it a reality in a cost-effective way
The Jericho Forum: De-perimeterisation of network resources
A quantitative model of the security intrusion process based on attacker behavior
Security intrusion process: an empirical model
Security Assessment Based on Attacker Behavior
Security Evaluation of a PC Network based on Intrusion Experiments
An analysis of a secure system based on trusted components
An Empirical Model of the Security Intrusion Process
On the modelling of preventive security based on a PC network intrusion experiment
Towards operational measures of computer security: Experimentation and modelling
Practical Experimentation as a Tool for Vulnerability Analysis and Security Evaluation
Security Evaluation of a PC Network based on Intrusion Experiments
On measurement of operational security
Security in a Dependability Perspective
Security and Dependability - A Comparison of Concepts
Data Collection for Security Fault Forecasting - Pilot Experiment
Security forms for protection against vulnerabilities in computer systems
On the Integration of Security and Dependability in Computer Systems
Download publication list
You can download this list to your computer.
Filter and download publication list
As logged in user (Chalmers employee) you find more export functions in MyResearch.
You may also import these directly to Zotero or Mendeley by using a browser plugin. These are found herer:
Zotero Connector
Mendeley Web Importer
The service SwePub offers export of contents from Research in other formats, such as Harvard and Oxford in .RIS, BibTex and RefWorks format.
Showing 12 research projects
Privacy-Protected Machine Learning for Transport Systems
Automotive 5G Integrated Security and Communications
Holistiskt angreppssätt att förbättra datasäkerhet (HoliSec)
BAuD II: Storskalig insamling och analys av data för kunskapsdriven produktutveckling
HEAling Vulnerabilities to ENhance Software Security and Safety (HEAVENS)
SECURIT - Security Culture and Information Technology
Security framework for vehicle communication (SeFram)