Tomas Olovsson
Visar 71 publikationer
The Automotive BlackBox: Towards a Standardization of Automotive Digital Forensics
Gap analysis of ISO/SAE 21434 – Improving the automotive cybersecurity engineering life cycle
Secure Vehicle Software Updates: Requirements for a Reference Architecture
Future connected vehicles: Communications demands, privacy and cyber-security
Security of In-Vehicle Communication Systems
Proposing HEAVENS 2.0 – an automotive risk assessment model
V2C: A Trust-Based Vehicle to Cloud Anomaly Detection Framework for Automotive Systems
Spectra: Detecting Attacks on In-Vehicle Networks through Spectral Analysis of CAN-Message Payloads
Resilient Shield: Reinforcing the Resilience of Vehicles Against Security Threats
REMIND: A Framework for the Resilient Design of Automotive Systems
Extending AUTOSAR's Counter-based Solution for Freshness of Authenticated Messages in Vehicles
A Preliminary Security Assessment of 5G V2X
Understanding Common Automotive Security Issues and Their Implications
CASAD: CAN-Aware Stealthy-Attack Detection for In-Vehicle Networks
What the Stack? On Memory Exploitation and Protection in Resource Constrained Automotive Systems
Open Problems when Mapping Automotive Security Levels to System Requirements
Towards a Standardized Mapping from Automotive Security Levels to Security Mechanisms
Securing the Connected Car: A Security Enhancement Methodology
Joint Subjective and Objective Data Capture and Analytics for Automotive Applications
In-vehicle CAN message authentication: An evaluation based on industrial criteria
Introducing Differential Privacy to the Automotive Domain: Opportunities and Challenges
Security and Privacy for Big Data: A Systematic Literature Review
Improving In-Vehicle Network Architectures Using Automated Partitioning Algorithms
A risk assessment framework for automotive embedded systems
Towards designing secure in-vehicle network architectures using community detection algorithms
Experiences from Implementing the ETSI ITS SecuredMessage Service
A Graph-Based Analysis of Medical Queries of a Swedish Health Care Portal
Securing Vehicle Diagnostics in Repair Shops
Overlapping Communities for Identifying Misbehavior in Network Communications
A Local Seed Selection Algorithm for Overlapping Community Detection
A First Security Analysis of a Secure Intermodal Goods Transport System
Protecting Vehicles Against Unauthorised Diagnostics Sessions Using Trusted Third Parties
Towards Modeling Legitimate and Unsolicited Email Traffic Using Social Network Properties
Assessing the Quality of Packet-Level Traces Collected on Internet Backbone Links
An Evaluation of Community Detection Algorithms on Large-Scale Email Traffic
An In-Depth Analysis of the Security of the Connected Repair Shop
Mining Network-Level Communication Patterns of Email Traffic for Spotting Unsolicited Email
The anti-social behavior of spam
A Framework for Assessing the Security of the Connected Car Infrastructure
Mapping Systems Security Research at Chalmers
Security aspects of the in-vehicle network in the connected car
Structural and Temporal Properties of Email and Spam Networks
On Collection of Large-Scale Multi-Purpose Datasets on Internet Backbone Links
Analyzing the Social Structure and Dynamics of E-mail and Spam in Massive Backbone Internet Traffic
Passive Internet Measurement: Overview and Guidelines based on Experiences
An Analysis of the Robustness and Stability of the Network Stack in Symbian-based Smartphones
Access management evolves over 20 years
Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic
A Practical Analysis of the Robustness and Stability of the Network Stack in Smartphones
Detection of malicious Traffic on Backbone links via Packet Header Analysis
De-perimeterization: How to make it a reality in a cost-effective way
The Jericho Forum: De-perimeterisation of network resources
A quantitative model of the security intrusion process based on attacker behavior
Security intrusion process: an empirical model
An analysis of a secure system based on trusted components
Security Assessment Based on Attacker Behavior
An Empirical Model of the Security Intrusion Process
On the modelling of preventive security based on a PC network intrusion experiment
Security Evaluation of a PC Network based on Intrusion Experiments
Towards operational measures of computer security: Experimentation and modelling
Practical Experimentation as a Tool for Vulnerability Analysis and Security Evaluation
Security Evaluation of a PC Network based on Intrusion Experiments
Security in a Dependability Perspective
On measurement of operational security
Security and Dependability - A Comparison of Concepts
Data Collection for Security Fault Forecasting - Pilot Experiment
Security forms for protection against vulnerabilities in computer systems
On the Integration of Security and Dependability in Computer Systems
Ladda ner publikationslistor
Du kan ladda ner denna lista till din dator.
Filtrera och ladda ner publikationslista
Som inloggad användare hittar du ytterligare funktioner i MyResearch.
Du kan även exportera direkt till Zotero eller Mendeley genom webbläsarplugins. Dessa hittar du här:
Zotero Connector
Mendeley Web Importer
Tjänsten SwePub erbjuder uttag av Researchs listor i andra format, till exempel kan du få uttag av publikationer enligt Harvard och Oxford i .RIS, BibTex och RefWorks-format.