Dennis Nilsson
Visar 38 publikationer
Using system call information to reveal hidden attack manifestations
A Model for Safe and Secure Execution of Downloaded Vehicle Applications
Online Self-Healing Support for Embedded Systems
A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure
Building a Self-Healing Embedded System in a Multi-OS Environment
Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks
Unidirectional Auxiliary Channel Challenge-Response Authentication
Key Management and Secure Software Updates in Wireless Process Control Environments
Auxiliary Channel Diffie-Hellman Encrypted Key-Exchange Authentication
A Roadmap for Securing Vehicles against Cyber Attacks
An Intrusion Detection System for Wireless Process Control Systems
Security Recommendations for a Hierarchical Wireless Vehicular Infrastructure
Secure Firmware Updates over the Air in Intelligent Vehicles
Securing Vehicles against Cyber Attacks
Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks
Security Aspects of Wireless Vehicle-to-Infrastructure Environments
A framework for self-verification of firmwareupdates over the air in vehicle ecus
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay
Vehicle ECU Classification Based on Safety-Security Characteristics
Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes
An Approach to Specification-based Attack Detection for In-Vehicle Networks
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Combining Physical and Digital Evidence in Vehicle Environments
A Step Towards Securing Vehicles against Cyber Attacks
Simulated Attacks on CAN Buses: Vehicle virus
An Approach to using Honeypots in In-Vehicle Networks
Securing the Wireless Vehicle-to-Infrastructure Environment: Diagnostics and Firmware Updates
Operator-Centric and Adaptive Intrusion Detection
Decision Support for Intrusion Detection Data Collection
A Framework for Self-Verification of Firmware Updates over the Air in Vehicle ECUs
Low-Cost Key Management for Hierarchical Wireless Vehicle Networks
A General Model and Guidelines for Attack Manifestation Generation
Analyzing and Securing Bluetooth-based Pico Networks
Using Common Log Information to Reveal Hidden Attack Manifestations
A General Model and Guidelines for Attack Manifestation Generation
How to Secure Bluetooth-based Pico Networks
Ladda ner publikationslistor
Du kan ladda ner denna lista till din dator.
Filtrera och ladda ner publikationslista
Som inloggad användare hittar du ytterligare funktioner i MyResearch.
Du kan även exportera direkt till Zotero eller Mendeley genom webbläsarplugins. Dessa hittar du här:
Zotero Connector
Mendeley Web Importer
Tjänsten SwePub erbjuder uttag av Researchs listor i andra format, till exempel kan du få uttag av publikationer enligt Harvard och Oxford i .RIS, BibTex och RefWorks-format.