Dennis Nilsson
Visar 38 publikationer
A Model for Safe and Secure Execution of Downloaded Vehicle Applications
Using system call information to reveal hidden attack manifestations
Online Self-Healing Support for Embedded Systems
Building a Self-Healing Embedded System in a Multi-OS Environment
A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure
Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks
Key Management and Secure Software Updates in Wireless Process Control Environments
Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes
Unidirectional Auxiliary Channel Challenge-Response Authentication
A Framework for Self-Verification of Firmware Updates over the Air in Vehicle ECUs
Vehicle ECU Classification Based on Safety-Security Characteristics
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Security Aspects of Wireless Vehicle-to-Infrastructure Environments
An Approach to Specification-based Attack Detection for In-Vehicle Networks
A framework for self-verification of firmwareupdates over the air in vehicle ecus
A Roadmap for Securing Vehicles against Cyber Attacks
Combining Physical and Digital Evidence in Vehicle Environments
An Approach to using Honeypots in In-Vehicle Networks
Secure Firmware Updates over the Air in Intelligent Vehicles
Decision Support for Intrusion Detection Data Collection
An Intrusion Detection System for Wireless Process Control Systems
Security Recommendations for a Hierarchical Wireless Vehicular Infrastructure
Securing the Wireless Vehicle-to-Infrastructure Environment: Diagnostics and Firmware Updates
Securing Vehicles against Cyber Attacks
Low-Cost Key Management for Hierarchical Wireless Vehicle Networks
Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks
Auxiliary Channel Diffie-Hellman Encrypted Key-Exchange Authentication
Operator-Centric and Adaptive Intrusion Detection
A Step Towards Securing Vehicles against Cyber Attacks
Simulated Attacks on CAN Buses: Vehicle virus
A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay
A General Model and Guidelines for Attack Manifestation Generation
A General Model and Guidelines for Attack Manifestation Generation
How to Secure Bluetooth-based Pico Networks
Analyzing and Securing Bluetooth-based Pico Networks
Using Common Log Information to Reveal Hidden Attack Manifestations
Ladda ner publikationslistor
Du kan ladda ner denna lista till din dator.
Filtrera och ladda ner publikationslista
Som inloggad användare hittar du ytterligare funktioner i MyResearch.
Du kan även exportera direkt till Zotero eller Mendeley genom webbläsarplugins. Dessa hittar du här:
Zotero Connector
Mendeley Web Importer
Tjänsten SwePub erbjuder uttag av Researchs listor i andra format, till exempel kan du få uttag av publikationer enligt Harvard och Oxford i .RIS, BibTex och RefWorks-format.