Erland Jonsson
Visar 83 publikationer
Securing the Connected Car: A Security Enhancement Methodology
Guidance for Selecting Data Collection Mechanisms for Intrusion Detection
A First Security Analysis of a Secure Intermodal Goods Transport System
Identifying Suitable Attributes for Security and Dependability Metrication
An In-Depth Analysis of the Security of the Connected Repair Shop
Security aspects of the in-vehicle network in the connected car
Emerging and Future Cyber Threats to Critical Systems
A Cause and Effect Approach Towards Risk Analysis
A Framework for Assessing the Security of the Connected Car Infrastructure
Mapping Systems Security Research at Chalmers
A Framework for Security Metrics Based on Operational System Attributes
A Structured Approach to Selecting Data Collection Mechanisms for Intrusion Detection
Security Arena, årsrapport 2009
Forward White Book: Emerging ICT Threats
Using system call information to reveal hidden attack manifestations
Anticipating Security Threats to a Future Internet
Security Arena, årsrapport 2008
FORWARD -- Second Workshop Report
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Unidirectional Auxiliary Channel Challenge-Response Authentication
An Approach to Specification-based Attack Detection for In-Vehicle Networks
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Decision Support for Intrusion Detection Data Collection
An Approach to using Honeypots in In-Vehicle Networks
Investigating the Benefits of Using Multiple Intrusion-Detection Sensors
Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes
Auxiliary Channel Diffie-Hellman Encrypted Key-Exchange Authentication
Operator-Centric and Adaptive Intrusion Detection
Low-Cost Key Management for Hierarchical Wireless Vehicle Networks
Future threats to future trust
A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay
Security Recommendations for a Hierarchical Wireless Vehicular Infrastructure
A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection
A Multi-Sensor Model to Improve Automated Attack Detection
A General Model and Guidelines for Attack Manifestation Generation
A Comparison of Alternative Audit Sources for Web Server Attack Detection
A General Model and Guidelines for Attack Manifestation Generation
Using Common Log Information to Reveal Hidden Attack Manifestations
How to Secure Bluetooth-based Pico Networks
Analyzing and Securing Bluetooth-based Pico Networks
An intrusion detection-centric taxonomy and survey of data log mechanisms
An intrusion detection-centric taxonomy and survey of data log mechanisms
Towards an Integrated Conceptual Model of Security and Dependability
Tuning an IDS - Learning the User's Preferences
METAL - A tool for extracting attack manifestations
Reducing system call logs with selective auditing
Protecting Stateful Security Policies using One-Way Functions
A Content-Independent Scalable Encryption Model
Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004
New security issues in emerging computing environments - A reflection
Dynamic Data Protection Services for Network Transfers: Concepts and Taxonomy
Extracting attack manifestations to determine log data requirements for intrusion detection
Protecting Security Policies in Ubiquitous Environments Using One-Way Functions
Using Active Learning in Intrusion Detection
Adding Security to QoS Architectures
Implications of IDS Classification on Attack Detection
Synthesizing test data for fraud detection systems
A synthetic fraud data generation methodology
A Protection Scheme For Security Policies In Ubiquitous Environments Using One-Way Functions
Different Aspects of Security Problems in Network Operating Systems
A quantitative model of the security intrusion process based on attacker behavior
How to systematically classify computer security intrusions
Security intrusion process: an empirical model
An Empirical Model of the Security Intrusion Process
Security Assessment Based on Attacker Behavior
Security Evaluation of a PC Network based on Intrusion Experiments
On the modelling of preventive security based on a PC network intrusion experiment
An analysis of a secure system based on trusted components
A Quantitative Approach to Computer Security from a Dependability Perspective
Towards operational measures of computer security: Experimentation and modelling
An Attempt to Quantitative Modelling of Behavioural Security
Security Evaluation of a PC Network based on Intrusion Experiments
A practical dependability measure for degradable computer systems with non-exponential degradation
Security in a Dependability Perspective
On measurement of operational security
Data Collection for Security Fault Forecasting - Pilot Experiment
A practical dependability measure for embedded computer systems
A Dependability Measure for Degradable Computing Systems
Security forms for protection against vulnerabilities in computer systems
On the Integration of Security and Dependability in Computer Systems
Ladda ner publikationslistor
Du kan ladda ner denna lista till din dator.
Filtrera och ladda ner publikationslista
Som inloggad användare hittar du ytterligare funktioner i MyResearch.
Du kan även exportera direkt till Zotero eller Mendeley genom webbläsarplugins. Dessa hittar du här:
Zotero Connector
Mendeley Web Importer
Tjänsten SwePub erbjuder uttag av Researchs listor i andra format, till exempel kan du få uttag av publikationer enligt Harvard och Oxford i .RIS, BibTex och RefWorks-format.