Erland Jonsson

Visar 83 publikationer

2018

Securing the Connected Car: A Security Enhancement Methodology

Kim Strandberg, Tomas Olovsson, Erland Jonsson
IEEE Vehicular Technology Magazine. Vol. 13 (1), p. 56-65
Artikel i vetenskaplig tidskrift
2014

Guidance for Selecting Data Collection Mechanisms for Intrusion Detection

Ulf Larson, Erland Jonsson, Stefan Lindskog
Handbook of Research on Emerging Developments in Data Privacy, p. 340-370
Kapitel i bok
2013

A First Security Analysis of a Secure Intermodal Goods Transport System

JONAS ANGHOLT, Mikael Wackerberg, Tomas Olovsson et al
Rapport
2013

Identifying Suitable Attributes for Security and Dependability Metrication

Erland Jonsson, Laleh Pirzadeh Irannezhad
SECURWARE 2013, The Seventh International Conference on Emerging Security Information, Systems and Technologies - August 25 - 31, 2013 - Barcelona, Spain, p. 1-7
Paper i proceeding
2012

An In-Depth Analysis of the Security of the Connected Repair Shop

Pierre Kleberger, Tomas Olovsson, Erland Jonsson
The Seventh International Conference on Systems and Networks Communications (ICSNC), Proceedings. Lisbon, 18-23 November, 2012. IARIA., p. 99-107
Paper i proceeding
2011

A Cause and Effect Approach Towards Risk Analysis

Laleh Pirzadeh Irannezhad, Erland Jonsson
International workshop on Security Measurements and Metrics - MetriSec2011, Banff, Alberta, Canada, 2011-09-21, p. 80-83
Paper i proceeding
2011

A Framework for Assessing the Security of the Connected Car Infrastructure

Pierre Kleberger, ASRIN JAVAHERI, Tomas Olovsson et al
The Sixth International Conference on Systems and Networks Communications (ICSNC), Proceedings. Barcelona, 23-29 October 2011. IARIA., p. 236-241
Paper i proceeding
2011

Emerging and Future Cyber Threats to Critical Systems

Edita Djambazova, Magnus Almgren, Kiril Dimitrov et al
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6555, p. 29-46
Paper i proceeding
2011

Mapping Systems Security Research at Chalmers

Magnus Almgren, Zhang Fu, Erland Jonsson et al
First SysSec Workshop (SysSec 2011), p. 67-70
Paper i proceeding
2011

Security aspects of the in-vehicle network in the connected car

Pierre Kleberger, Tomas Olovsson, Erland Jonsson
IEEE Intelligent Vehicles Symposium, Proceedings. Baden-Baden, 5-9 June 2011, p. 528-533
Paper i proceeding
2011

A Framework for Security Metrics Based on Operational System Attributes

Erland Jonsson, Laleh Pirzadeh Irannezhad
International workshop on Security Measurements and Metrics - MetriSec2011, Banff, Alberta, Canada, 2011-09-21., p. 58-65
Paper i proceeding
2011

A Structured Approach to Selecting Data Collection Mechanisms for Intrusion Detection

Ulf Larson, Erland Jonsson, Stefan Lindskog
Privacy, Intrusion Detection, and Response: Technologies for Protecting Networks, p. 1-39
Kapitel i bok
2010

Security Arena, årsrapport 2009

Bosse Norrhem, Magnus Almgren, Torbjörn Andreasson et al
Rapport
2010

Forward White Book: Emerging ICT Threats

Christoffer Kruegel, Magnus Almgren, Herbert Bos et al
Bok
2010

Using system call information to reveal hidden attack manifestations

Ulf Larson, Dennis Nilsson, Erland Jonsson et al
Proceedings of the 1st International Workshop on Security and Communication Networks, IWSCN 2009
Övrigt konferensbidrag
2009

FORWARD Threat Report

Christoffer Kruegel, Magnus Almgren, Herbert Bos et al
Bok
2009

Anticipating Security Threats to a Future Internet

Herbert Bos, Erland Jonsson, Edita Djambazova et al
EU/FP7 FORWARD
Övrigt konferensbidrag
2009

FORWARD -- Second Workshop Report

Christoffer Kruegel, Magnus Almgren, Herbert Bos et al
Rapport
2009

Security Arena, årsrapport 2008

Bosse Norrhem, Magnus Almgren, Torbjörn Andreasson et al
Rapport
2008

Unidirectional Auxiliary Channel Challenge-Response Authentication

Dennis Nilsson, Ulf Larson, Erland Jonsson
7th Annual Wireless Telecommunications Symposium, WTS 2008; Ponoma, CA; United States; 24 April 2008 through 26 April 2008, p. 84-91
Paper i proceeding
2008

An Approach to using Honeypots in In-Vehicle Networks

Vilhelm Verendel, Dennis Nilsson, Ulf Larson et al
68th Semi-Annual IEEE Vehicular Technology, VTC 2008-Fall, Conference; Calgary, AB; Canada; 21 September 2008 through 24 September 2008
Paper i proceeding
2008

An Approach to Specification-based Attack Detection for In-Vehicle Networks

Ulf Larson, Dennis Nilsson, Erland Jonsson
Proceedings of the IEEE Intelligent Vehicles Symposium, June 4-6, 2008, Eindhoven, The Netherlands
Artikel i vetenskaplig tidskrift
2008

Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles

Dennis Nilsson, Ulf Larson, Erland Jonsson
Proceedings of the 27th International Conference on Computer Safety, Reliability, and Security (SAFECOMP), September 22-25, 2008, Newcastle, UK, p. 207-220
Paper i proceeding
2008

Investigating the Benefits of Using Multiple Intrusion-Detection Sensors

Magnus Almgren, Erland Jonsson
The 13th Nordic Workshop on Secure IT-systems. Published by the Technical University of Denmark., p. 13-26
Paper i proceeding
2008

Decision Support for Intrusion Detection Data Collection

Ulf Larson, Stefan Lindskog, Dennis Nilsson et al
Proceedings of the 13th Nordic Workshop on Secure IT-systems (NordSec 2008), October 9-10, 2008, Copenhagen, Denmark
Paper i proceeding
2008

Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes

Dennis Nilsson, Ulf Larson, Erland Jonsson
IEEE Vehicular Technology Conference
Paper i proceeding
2008

A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection

Ulf Larson, Stefan Lindskog, Erland Jonsson
Proceedings of the Third IEEE International Conference on Availability, Reliability and Security (ARES 2008), p. 624-629
Paper i proceeding
2008

Auxiliary Channel Diffie-Hellman Encrypted Key-Exchange Authentication

Dennis Nilsson, Ulf Larson, Erland Jonsson
5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2008; Hong Kong; Hong Kong; 28 July 2008 through 31 July 2008
Paper i proceeding
2008

Operator-Centric and Adaptive Intrusion Detection

Ulf Larson, Stefan Lindskog, Dennis Nilsson et al
Proceedings of the Fourth International Conference on Information Assurance and Security (IAS 2008), September 8-10, 2008, Naples, Italy, p. 161-166
Paper i proceeding
2008

Future threats to future trust

Herbert Bos, Erland Jonsson, Sotiris Ioannidis et al
Future of Trust in Computing: Proceedings of the First International Conference Future of Trust in Computing 2008: With 58 Illustrations, p. 49-54
Kapitel i bok
2008

A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay

Dennis Nilsson, Ulf Larson, Francesco Picasso et al
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems (CISIS), October 23-24, 2008, Genova, Italy, p. 84-91
Paper i proceeding
2008

Security Recommendations for a Hierarchical Wireless Vehicular Infrastructure

Dennis Nilsson, Ulf Larson, Erland Jonsson
Rapport
2008

Low-Cost Key Management for Hierarchical Wireless Vehicle Networks

Dennis Nilsson, Ulf Larson, Erland Jonsson
Proceedings of the IEEE Intelligent Vehicles Symposium, June 4-6, 2008, Eindhoven, The Netherlands, p. 476-481
Paper i proceeding
2008

A Multi-Sensor Model to Improve Automated Attack Detection

Magnus Almgren, Ulf Lindqvist, Erland Jonsson
11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Lecture Notes in Computer Science. Vol. 5230/2008, p. 291-310
Paper i proceeding
2007

A General Model and Guidelines for Attack Manifestation Generation

Ulf Larson, Dennis Nilsson, Erland Jonsson
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5141, p. 274-286
Paper i proceeding
2007

A Comparison of Alternative Audit Sources for Web Server Attack Detection

Magnus Almgren, Erland Jonsson, Ulf Lindqvist
The 12th Nordic Workshop on Secure IT-systems
Paper i proceeding
2007

A General Model and Guidelines for Attack Manifestation Generation

Dennis Nilsson, Ulf Larson, Erland Jonsson
Rapport
2007

Analyzing and Securing Bluetooth-based Pico Networks

Dennis Nilsson, Phillip A. Porras, Erland Jonsson
Rapport
2007

Using Common Log Information to Reveal Hidden Attack Manifestations

Ulf Larson, Dennis Nilsson, Erland Jonsson
Rapport
2007

How to Secure Bluetooth-based Pico Networks

Dennis Nilsson, Phillip A. Porras, Erland Jonsson
Proceedings of the 26th International Conference on Computer Safety, Reliability, and Security (SAFECOMP), September 18-21, 2007, Nuremberg, Germany., p. 209-223
Paper i proceeding
2006

An intrusion detection-centric taxonomy and survey of data log mechanisms

Ulf Larson, Erland Jonsson
The 11th Nordic Workshop on Secure IT-systems
Artikel i vetenskaplig tidskrift
2006

Towards an Integrated Conceptual Model of Security and Dependability

Erland Jonsson
The First IEEE International Conference on Availability, Reliability and Security (ARES 2006), p. 646-653
Paper i proceeding
2006

Tuning an IDS - Learning the User's Preferences

Magnus Almgren, Erland Jonsson
The 11th Nordic Workshop on Secure IT-systems
Paper i proceeding
2005

METAL - A tool for extracting attack manifestations

Ulf Larson, Emilie Lundin Barse, Erland Jonsson
Detection of Intrusions and Malware, and Vulnerability Assessment, Second International Conference, DIMVA 2005, p. 85-102
Paper i proceeding
2005

Reducing system call logs with selective auditing

Ulf Larson, Erland Jonsson
Nordic Workshop on Secure IT Systems (NordSec), p. 122-131
Paper i proceeding
2004

New security issues in emerging computing environments - A reflection

Håkan Kvarnström, Ulf Larson, Erland Jonsson
Rapport
2004

Dynamic Data Protection Services for Network Transfers: Concepts and Taxonomy

Stefan Lindskog, Anna Brunstrom, Erland Jonsson
Proceedings of the 4th Annual Information Security South Africa Conference
Paper i proceeding
2004

Protecting Stateful Security Policies using One-Way Functions

Håkan Kvarnström, Hans Hedbom, Erland Jonsson
Proceedings of the Asia Pacific Information Technology Security Conference (AusCERT 2004)
Artikel i vetenskaplig tidskrift
2004

A Content-Independent Scalable Encryption Model

Stefan Lindskog, Johan Strandbergh, Mikael Hackman et al
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3043 (1), p. 821-830
Artikel i vetenskaplig tidskrift
2004

Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004

Erland Jonsson, Alfonso Valdes, Magnus Almgren
Samlingsverk (redaktörskap)
2004

Extracting attack manifestations to determine log data requirements for intrusion detection

Emilie Lundin Barse, Erland Jonsson
20th Annual Computer Security Applications Conference (ACSAC 2004)
Paper i proceeding
2004

Adding Security to QoS Architectures

Stefan Lindskog, Erland Jonsson
Perspectives on Multimedia: Communication, Media and Information Technology, p. 145-158
Kapitel i bok
2004

Setting the Scene for Intrusion Detection

Emilie Lundin Barse, Erland Jonsson
Rapport
2004

Protecting Security Policies in Ubiquitous Environments Using One-Way Functions

Håkan Kvarnström, Hans Hedbom, Erland Jonsson
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 2802, p. 71-85
Paper i proceeding
2004

Using Active Learning in Intrusion Detection

Magnus Almgren, Erland Jonsson
Computer Security Foundations Workshop, p. 88--98-
Paper i proceeding
2003

Implications of IDS Classification on Attack Detection

Magnus Almgren, Emilie Lundin, Erland Jonsson
Nordic Workshop on Secure IT Systems (NordSec), p. 57--70-
Paper i proceeding
2003

Synthesizing test data for fraud detection systems

Emilie Lundin Barse, Håkan Kvarnström, Erland Jonsson
19th Annual Computer Security Conference, LAS VEGAS, NV, DEC 08-12, 2003, p. 384-394
Paper i proceeding
2002

A Protection Scheme For Security Policies In Ubiquitous Environments Using One-Way Functions

Håkan Kvarnström, Hans Hedbom, Erland Jonsson
UBICOMP2002 - Workshop on Security in Ubiquitous Computing, Göteborg, 29 September 2002
Paper i proceeding
2002

A synthetic fraud data generation methodology

Emilie Lundin, Håkan Kvarnström, Erland Jonsson
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 2513, p. 265-277
Paper i proceeding
2002

Survey of Intrusion Detection Research

Emilie Lundin, Erland Jonsson
Rapport
2002

Different Aspects of Security Problems in Network Operating Systems

Stefan Lindskog, Erland Jonsson
Proceedings of the Third Annual International Systems Security Engineering Association Conference (2002 ISSEA Conference), Orlando, 13-15 Mars 2002
Paper i proceeding
1997

A quantitative model of the security intrusion process based on attacker behavior

Erland Jonsson, Tomas Olovsson
IEEE Transactions on Software Engineering. Vol. 23 (4), p. 235-245
Artikel i vetenskaplig tidskrift
1997

How to systematically classify computer security intrusions

Ulf Lindqvist, Erland Jonsson
IEEE Symposium on Security and Privacy, 1997. Proceedings.
Paper i proceeding
1997

Security intrusion process: an empirical model

Erland Jonsson, Tomas Olovsson
IEEE Aerospace and Electronic Systems Magazine. Vol. 12 (4), p. 7-17
Artikel i vetenskaplig tidskrift
1996

An analysis of a secure system based on trusted components

Ulf Lindqvist, Tomas Olovsson, Erland Jonsson
IEEE Proceedings of the Eleventh Annual Conference on Computer Assurance, COMPASS '96, p. 213-223
Paper i proceeding
1996

Security Assessment Based on Attacker Behavior

Erland Jonsson, Tomas Olovsson
Nordic Workshop on Secure Computer Systems, NORDSEC '96
Paper i proceeding
1996

An Empirical Model of the Security Intrusion Process

Erland Jonsson, Tomas Olovsson
Proceedings of the Eleventh Annual Conference on Computer Assurance, 1996. COMPASS 1996., p. 176-186
Artikel i vetenskaplig tidskrift
1996

On the modelling of preventive security based on a PC network intrusion experiment

Ulf Gustafson, Erland Jonsson, Tomas Olovsson
ACISP '96 Proceedings of the First Australasian Conference on Information Security and Privacy. Vol. 1172, p. 242-252
Paper i proceeding
1996

Security Evaluation of a PC Network based on Intrusion Experiments

Ulf Gustafson, Erland Jonsson, Tomas Olovsson
SECURICOM 1996 - 14th Worldwide Congress on Computer and Communications Security Protection
Artikel i vetenskaplig tidskrift
1995

Towards operational measures of computer security: Experimentation and modelling

Tomas Olovsson, Erland Jonsson, Sarah Brocklehurst et al
Predictably Secure Computing Systems, p. 555-572
Kapitel i bok
1995

An Attempt to Quantitative Modelling of Behavioural Security

Erland Jonsson, Mikael Andersson, Søren Asmussen
Proceedings of the 11th International Information Security Conference - IFIP/SEC 1995. Vol. addendum, p. 44-57
Artikel i vetenskaplig tidskrift
1995

Security Evaluation of a PC Network based on Intrusion Experiments

Ulf Gustafson, Erland Jonsson, Tomas Olovsson
Proc. 14th Int'l Congress on Computer and Communications Security, SECURICOM '96, Paris, France, p. 187-203
Paper i proceeding
1994

A practical dependability measure for degradable computer systems with non-exponential degradation

Erland Jonsson, Mikael Andersson, Sören Asmussen
IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processe - SAFEPROCESS 1994. Vol. Vol. 1, p. 231-237
Artikel i vetenskaplig tidskrift
1994

Security in a Dependability Perspective

Erland Jonsson, Tomas Olovsson
Nordic Seminar on Dependable Computing Systems 1994 (NSDCS '94), Lyngby, Denmark, p. 175-186
Paper i proceeding
1994

On measurement of operational security

Sarah Brocklehurst, Bev Littlewood, Tomas Olovsson et al
IEEE Aerospace and Electronic Systems Magazine. Vol. 9 (10), p. 7-16
Artikel i vetenskaplig tidskrift
1993

Data Collection for Security Fault Forecasting - Pilot Experiment

Tomas Olovsson, Erland Jonsson, Sarah Brocklehurst et al
Predictably Dependable Computing Systems (PDCS) First Year Report, p. 515-560
Artikel i vetenskaplig tidskrift
1993

A practical dependability measure for embedded computer systems

Erland Jonsson, Søren Assmussen
Proceedings of the IFAC 12th World Congress. Vol. Vol. 3, p. 267-272
Artikel i vetenskaplig tidskrift
1992

A Dependability Measure for Degradable Computing Systems

Erland Jonsson, Søren Asmussen
Rapport
1992

Security forms for protection against vulnerabilities in computer systems

Tomas Olovsson, Erland Jonsson
IASTED International conference on Reliability, Quality control and Risk Assessment, Washington DC, USA., p. 138-143
Paper i proceeding
1992

On the Integration of Security and Dependability in Computer Systems

Erland Jonsson, Tomas Olovsson
IASTED International Conference on Reliability, Quality Control and Risk Assessment Washington DC, USA, 1992, ISBN 0-88986-171-4, p. 93-97
Paper i proceeding

Ladda ner publikationslistor

Du kan ladda ner denna lista till din dator.

Filtrera och ladda ner publikationslista

Som inloggad användare hittar du ytterligare funktioner i MyResearch.

Du kan även exportera direkt till Zotero eller Mendeley genom webbläsarplugins. Dessa hittar du här:

Zotero Connector
Mendeley Web Importer

Tjänsten SwePub erbjuder uttag av Researchs listor i andra format, till exempel kan du få uttag av publikationer enligt Harvard och Oxford i .RIS, BibTex och RefWorks-format.

Det finns inga projekt att visa.
Det kan finnas fler projekt där Erland Jonsson medverkar, men du måste vara inloggad som anställd på Chalmers för att kunna se dem.