Dennis Nilsson
Visar 38 publikationer
A Model for Safe and Secure Execution of Downloaded Vehicle Applications
Using system call information to reveal hidden attack manifestations
Online Self-Healing Support for Embedded Systems
Building a Self-Healing Embedded System in a Multi-OS Environment
A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure
Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks
Key Management and Secure Software Updates in Wireless Process Control Environments
Unidirectional Auxiliary Channel Challenge-Response Authentication
A Roadmap for Securing Vehicles against Cyber Attacks
A Framework for Self-Verification of Firmware Updates over the Air in Vehicle ECUs
Vehicle ECU Classification Based on Safety-Security Characteristics
An Approach to Specification-based Attack Detection for In-Vehicle Networks
A framework for self-verification of firmwareupdates over the air in vehicle ecus
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Combining Physical and Digital Evidence in Vehicle Environments
Secure Firmware Updates over the Air in Intelligent Vehicles
Decision Support for Intrusion Detection Data Collection
An Approach to using Honeypots in In-Vehicle Networks
Security Aspects of Wireless Vehicle-to-Infrastructure Environments
Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes
Operator-Centric and Adaptive Intrusion Detection
Auxiliary Channel Diffie-Hellman Encrypted Key-Exchange Authentication
Securing the Wireless Vehicle-to-Infrastructure Environment: Diagnostics and Firmware Updates
Simulated Attacks on CAN Buses: Vehicle virus
A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay
An Intrusion Detection System for Wireless Process Control Systems
Security Recommendations for a Hierarchical Wireless Vehicular Infrastructure
Securing Vehicles against Cyber Attacks
Low-Cost Key Management for Hierarchical Wireless Vehicle Networks
A Step Towards Securing Vehicles against Cyber Attacks
Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks
A General Model and Guidelines for Attack Manifestation Generation
Using Common Log Information to Reveal Hidden Attack Manifestations
A General Model and Guidelines for Attack Manifestation Generation
How to Secure Bluetooth-based Pico Networks
Analyzing and Securing Bluetooth-based Pico Networks
Ladda ner publikationslistor
Du kan ladda ner denna lista till din dator.
Filtrera och ladda ner publikationslista
Som inloggad användare hittar du ytterligare funktioner i MyResearch.
Du kan även exportera direkt till Zotero eller Mendeley genom webbläsarplugins. Dessa hittar du här:
Zotero Connector
Mendeley Web Importer
Tjänsten SwePub erbjuder uttag av Researchs listor i andra format, till exempel kan du få uttag av publikationer enligt Harvard och Oxford i .RIS, BibTex och RefWorks-format.