Ulf Larson
Visar 37 publikationer
T-Fuzz: Model-based fuzzing for robustness testing of telecommunication protocols
Guidance for Selecting Data Collection Mechanisms for Intrusion Detection
A Structured Approach to Selecting Data Collection Mechanisms for Intrusion Detection
Using system call information to reveal hidden attack manifestations
A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure
Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks
Unidirectional Auxiliary Channel Challenge-Response Authentication
An Approach to using Honeypots in In-Vehicle Networks
An Approach to Specification-based Attack Detection for In-Vehicle Networks
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Combining Physical and Digital Evidence in Vehicle Environments
A Roadmap for Securing Vehicles against Cyber Attacks
Secure Firmware Updates over the Air in Intelligent Vehicles
Decision Support for Intrusion Detection Data Collection
Vehicle ECU Classification Based on Safety-Security Characteristics
Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes
A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection
Auxiliary Channel Diffie-Hellman Encrypted Key-Exchange Authentication
Operator-Centric and Adaptive Intrusion Detection
A Step Towards Securing Vehicles against Cyber Attacks
Simulated Attacks on CAN Buses: Vehicle virus
A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay
Security Recommendations for a Hierarchical Wireless Vehicular Infrastructure
Securing Vehicles against Cyber Attacks
Low-Cost Key Management for Hierarchical Wireless Vehicle Networks
Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks
A General Model and Guidelines for Attack Manifestation Generation
A General Model and Guidelines for Attack Manifestation Generation
Using Common Log Information to Reveal Hidden Attack Manifestations
An intrusion detection-centric taxonomy and survey of data log mechanisms
An intrusion detection-centric taxonomy and survey of data log mechanisms
METAL - A tool for extracting attack manifestations
Reducing system call logs with selective auditing
New security issues in emerging computing environments - A reflection
Ladda ner publikationslistor
Du kan ladda ner denna lista till din dator.
Filtrera och ladda ner publikationslista
Som inloggad användare hittar du ytterligare funktioner i MyResearch.
Du kan även exportera direkt till Zotero eller Mendeley genom webbläsarplugins. Dessa hittar du här:
Zotero Connector
Mendeley Web Importer
Tjänsten SwePub erbjuder uttag av Researchs listor i andra format, till exempel kan du få uttag av publikationer enligt Harvard och Oxford i .RIS, BibTex och RefWorks-format.