Ulf Larson
Visar 37 publikationer
T-Fuzz: Model-based fuzzing for robustness testing of telecommunication protocols
Guidance for Selecting Data Collection Mechanisms for Intrusion Detection
A Structured Approach to Selecting Data Collection Mechanisms for Intrusion Detection
Using system call information to reveal hidden attack manifestations
A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure
Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks
A Roadmap for Securing Vehicles against Cyber Attacks
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Combining Physical and Digital Evidence in Vehicle Environments
Unidirectional Auxiliary Channel Challenge-Response Authentication
Secure Firmware Updates over the Air in Intelligent Vehicles
An Approach to Specification-based Attack Detection for In-Vehicle Networks
Vehicle ECU Classification Based on Safety-Security Characteristics
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Decision Support for Intrusion Detection Data Collection
An Approach to using Honeypots in In-Vehicle Networks
Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes
A Step Towards Securing Vehicles against Cyber Attacks
Auxiliary Channel Diffie-Hellman Encrypted Key-Exchange Authentication
Operator-Centric and Adaptive Intrusion Detection
Securing Vehicles against Cyber Attacks
Low-Cost Key Management for Hierarchical Wireless Vehicle Networks
Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks
Simulated Attacks on CAN Buses: Vehicle virus
A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay
Security Recommendations for a Hierarchical Wireless Vehicular Infrastructure
A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection
A General Model and Guidelines for Attack Manifestation Generation
A General Model and Guidelines for Attack Manifestation Generation
Using Common Log Information to Reveal Hidden Attack Manifestations
An intrusion detection-centric taxonomy and survey of data log mechanisms
An intrusion detection-centric taxonomy and survey of data log mechanisms
METAL - A tool for extracting attack manifestations
Reducing system call logs with selective auditing
New security issues in emerging computing environments - A reflection
Ladda ner publikationslistor
Du kan ladda ner denna lista till din dator.
Filtrera och ladda ner publikationslista
Som inloggad användare hittar du ytterligare funktioner i MyResearch.
Du kan även exportera direkt till Zotero eller Mendeley genom webbläsarplugins. Dessa hittar du här:
Zotero Connector
Mendeley Web Importer
Tjänsten SwePub erbjuder uttag av Researchs listor i andra format, till exempel kan du få uttag av publikationer enligt Harvard och Oxford i .RIS, BibTex och RefWorks-format.