Erland Jonsson
Visar 83 publikationer
Securing the Connected Car: A Security Enhancement Methodology
Guidance for Selecting Data Collection Mechanisms for Intrusion Detection
Identifying Suitable Attributes for Security and Dependability Metrication
A First Security Analysis of a Secure Intermodal Goods Transport System
An In-Depth Analysis of the Security of the Connected Repair Shop
Mapping Systems Security Research at Chalmers
Security aspects of the in-vehicle network in the connected car
A Cause and Effect Approach Towards Risk Analysis
Emerging and Future Cyber Threats to Critical Systems
A Framework for Assessing the Security of the Connected Car Infrastructure
A Framework for Security Metrics Based on Operational System Attributes
A Structured Approach to Selecting Data Collection Mechanisms for Intrusion Detection
Security Arena, årsrapport 2009
Forward White Book: Emerging ICT Threats
Using system call information to reveal hidden attack manifestations
Anticipating Security Threats to a Future Internet
FORWARD -- Second Workshop Report
Security Arena, årsrapport 2008
Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes
An Approach to using Honeypots in In-Vehicle Networks
Unidirectional Auxiliary Channel Challenge-Response Authentication
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Investigating the Benefits of Using Multiple Intrusion-Detection Sensors
An Approach to Specification-based Attack Detection for In-Vehicle Networks
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Decision Support for Intrusion Detection Data Collection
Operator-Centric and Adaptive Intrusion Detection
A Multi-Sensor Model to Improve Automated Attack Detection
A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay
Security Recommendations for a Hierarchical Wireless Vehicular Infrastructure
Auxiliary Channel Diffie-Hellman Encrypted Key-Exchange Authentication
A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection
Future threats to future trust
Low-Cost Key Management for Hierarchical Wireless Vehicle Networks
A Comparison of Alternative Audit Sources for Web Server Attack Detection
A General Model and Guidelines for Attack Manifestation Generation
A General Model and Guidelines for Attack Manifestation Generation
Analyzing and Securing Bluetooth-based Pico Networks
Using Common Log Information to Reveal Hidden Attack Manifestations
How to Secure Bluetooth-based Pico Networks
An intrusion detection-centric taxonomy and survey of data log mechanisms
An intrusion detection-centric taxonomy and survey of data log mechanisms
Towards an Integrated Conceptual Model of Security and Dependability
Tuning an IDS - Learning the User's Preferences
METAL - A tool for extracting attack manifestations
Reducing system call logs with selective auditing
New security issues in emerging computing environments - A reflection
Dynamic Data Protection Services for Network Transfers: Concepts and Taxonomy
Protecting Stateful Security Policies using One-Way Functions
A Content-Independent Scalable Encryption Model
Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004
Extracting attack manifestations to determine log data requirements for intrusion detection
Using Active Learning in Intrusion Detection
Adding Security to QoS Architectures
Protecting Security Policies in Ubiquitous Environments Using One-Way Functions
Implications of IDS Classification on Attack Detection
Synthesizing test data for fraud detection systems
A Protection Scheme For Security Policies In Ubiquitous Environments Using One-Way Functions
A synthetic fraud data generation methodology
Different Aspects of Security Problems in Network Operating Systems
A quantitative model of the security intrusion process based on attacker behavior
How to systematically classify computer security intrusions
Security intrusion process: an empirical model
An analysis of a secure system based on trusted components
An Empirical Model of the Security Intrusion Process
On the modelling of preventive security based on a PC network intrusion experiment
Security Evaluation of a PC Network based on Intrusion Experiments
Security Assessment Based on Attacker Behavior
A Quantitative Approach to Computer Security from a Dependability Perspective
An Attempt to Quantitative Modelling of Behavioural Security
Towards operational measures of computer security: Experimentation and modelling
Security Evaluation of a PC Network based on Intrusion Experiments
A practical dependability measure for degradable computer systems with non-exponential degradation
On measurement of operational security
Security in a Dependability Perspective
A practical dependability measure for embedded computer systems
Data Collection for Security Fault Forecasting - Pilot Experiment
A Dependability Measure for Degradable Computing Systems
Security forms for protection against vulnerabilities in computer systems
On the Integration of Security and Dependability in Computer Systems
Ladda ner publikationslistor
Du kan ladda ner denna lista till din dator.
Filtrera och ladda ner publikationslista
Som inloggad användare hittar du ytterligare funktioner i MyResearch.
Du kan även exportera direkt till Zotero eller Mendeley genom webbläsarplugins. Dessa hittar du här:
Zotero Connector
Mendeley Web Importer
Tjänsten SwePub erbjuder uttag av Researchs listor i andra format, till exempel kan du få uttag av publikationer enligt Harvard och Oxford i .RIS, BibTex och RefWorks-format.