Erland Jonsson
Visar 83 publikationer
Securing the Connected Car: A Security Enhancement Methodology
Guidance for Selecting Data Collection Mechanisms for Intrusion Detection
A First Security Analysis of a Secure Intermodal Goods Transport System
Identifying Suitable Attributes for Security and Dependability Metrication
An In-Depth Analysis of the Security of the Connected Repair Shop
A Framework for Assessing the Security of the Connected Car Infrastructure
A Structured Approach to Selecting Data Collection Mechanisms for Intrusion Detection
A Cause and Effect Approach Towards Risk Analysis
A Framework for Security Metrics Based on Operational System Attributes
Emerging and Future Cyber Threats to Critical Systems
Security aspects of the in-vehicle network in the connected car
Mapping Systems Security Research at Chalmers
Security Arena, årsrapport 2009
Forward White Book: Emerging ICT Threats
Using system call information to reveal hidden attack manifestations
Anticipating Security Threats to a Future Internet
FORWARD -- Second Workshop Report
Security Arena, årsrapport 2008
Unidirectional Auxiliary Channel Challenge-Response Authentication
Auxiliary Channel Diffie-Hellman Encrypted Key-Exchange Authentication
Security Recommendations for a Hierarchical Wireless Vehicular Infrastructure
Investigating the Benefits of Using Multiple Intrusion-Detection Sensors
A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay
Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes
An Approach to Specification-based Attack Detection for In-Vehicle Networks
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Future threats to future trust
A Multi-Sensor Model to Improve Automated Attack Detection
An Approach to using Honeypots in In-Vehicle Networks
Operator-Centric and Adaptive Intrusion Detection
Decision Support for Intrusion Detection Data Collection
Low-Cost Key Management for Hierarchical Wireless Vehicle Networks
A General Model and Guidelines for Attack Manifestation Generation
Analyzing and Securing Bluetooth-based Pico Networks
Using Common Log Information to Reveal Hidden Attack Manifestations
A General Model and Guidelines for Attack Manifestation Generation
How to Secure Bluetooth-based Pico Networks
A Comparison of Alternative Audit Sources for Web Server Attack Detection
Tuning an IDS - Learning the User's Preferences
An intrusion detection-centric taxonomy and survey of data log mechanisms
Towards an Integrated Conceptual Model of Security and Dependability
An intrusion detection-centric taxonomy and survey of data log mechanisms
METAL - A tool for extracting attack manifestations
Reducing system call logs with selective auditing
New security issues in emerging computing environments - A reflection
Dynamic Data Protection Services for Network Transfers: Concepts and Taxonomy
Protecting Stateful Security Policies using One-Way Functions
Adding Security to QoS Architectures
Using Active Learning in Intrusion Detection
Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004
Extracting attack manifestations to determine log data requirements for intrusion detection
Protecting Security Policies in Ubiquitous Environments Using One-Way Functions
A Content-Independent Scalable Encryption Model
Implications of IDS Classification on Attack Detection
Synthesizing test data for fraud detection systems
Different Aspects of Security Problems in Network Operating Systems
A Protection Scheme For Security Policies In Ubiquitous Environments Using One-Way Functions
A synthetic fraud data generation methodology
A quantitative model of the security intrusion process based on attacker behavior
How to systematically classify computer security intrusions
Security intrusion process: an empirical model
On the modelling of preventive security based on a PC network intrusion experiment
A Quantitative Approach to Computer Security from a Dependability Perspective
An analysis of a secure system based on trusted components
Security Evaluation of a PC Network based on Intrusion Experiments
Security Assessment Based on Attacker Behavior
An Empirical Model of the Security Intrusion Process
Towards operational measures of computer security: Experimentation and modelling
Security Evaluation of a PC Network based on Intrusion Experiments
An Attempt to Quantitative Modelling of Behavioural Security
A practical dependability measure for degradable computer systems with non-exponential degradation
Security in a Dependability Perspective
On measurement of operational security
Data Collection for Security Fault Forecasting - Pilot Experiment
A practical dependability measure for embedded computer systems
A Dependability Measure for Degradable Computing Systems
On the Integration of Security and Dependability in Computer Systems
Security forms for protection against vulnerabilities in computer systems
Ladda ner publikationslistor
Du kan ladda ner denna lista till din dator.
Filtrera och ladda ner publikationslista
Som inloggad användare hittar du ytterligare funktioner i MyResearch.
Du kan även exportera direkt till Zotero eller Mendeley genom webbläsarplugins. Dessa hittar du här:
Zotero Connector
Mendeley Web Importer
Tjänsten SwePub erbjuder uttag av Researchs listor i andra format, till exempel kan du få uttag av publikationer enligt Harvard och Oxford i .RIS, BibTex och RefWorks-format.