Dennis Nilsson
Visar 38 publikationer
A Model for Safe and Secure Execution of Downloaded Vehicle Applications
Using system call information to reveal hidden attack manifestations
Online Self-Healing Support for Embedded Systems
Building a Self-Healing Embedded System in a Multi-OS Environment
A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure
Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks
Unidirectional Auxiliary Channel Challenge-Response Authentication
Key Management and Secure Software Updates in Wireless Process Control Environments
An Approach to Specification-based Attack Detection for In-Vehicle Networks
A framework for self-verification of firmwareupdates over the air in vehicle ecus
A Roadmap for Securing Vehicles against Cyber Attacks
Decision Support for Intrusion Detection Data Collection
A Framework for Self-Verification of Firmware Updates over the Air in Vehicle ECUs
Vehicle ECU Classification Based on Safety-Security Characteristics
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Combining Physical and Digital Evidence in Vehicle Environments
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes
Secure Firmware Updates over the Air in Intelligent Vehicles
An Approach to using Honeypots in In-Vehicle Networks
Security Aspects of Wireless Vehicle-to-Infrastructure Environments
Auxiliary Channel Diffie-Hellman Encrypted Key-Exchange Authentication
Operator-Centric and Adaptive Intrusion Detection
Simulated Attacks on CAN Buses: Vehicle virus
A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay
An Intrusion Detection System for Wireless Process Control Systems
Security Recommendations for a Hierarchical Wireless Vehicular Infrastructure
Securing the Wireless Vehicle-to-Infrastructure Environment: Diagnostics and Firmware Updates
A Step Towards Securing Vehicles against Cyber Attacks
Securing Vehicles against Cyber Attacks
Low-Cost Key Management for Hierarchical Wireless Vehicle Networks
Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks
A General Model and Guidelines for Attack Manifestation Generation
A General Model and Guidelines for Attack Manifestation Generation
Using Common Log Information to Reveal Hidden Attack Manifestations
Analyzing and Securing Bluetooth-based Pico Networks
How to Secure Bluetooth-based Pico Networks
Ladda ner publikationslistor
Du kan ladda ner denna lista till din dator.
Filtrera och ladda ner publikationslista
Som inloggad användare hittar du ytterligare funktioner i MyResearch.
Du kan även exportera direkt till Zotero eller Mendeley genom webbläsarplugins. Dessa hittar du här:
Zotero Connector
Mendeley Web Importer
Tjänsten SwePub erbjuder uttag av Researchs listor i andra format, till exempel kan du få uttag av publikationer enligt Harvard och Oxford i .RIS, BibTex och RefWorks-format.