![]() |
| 2006 | ||
|---|---|---|
| 8 | William Yurcik, Stefan Axelsson, Kiran Lakkaraju, Soon Tee Teoh: 3rd Workshop on Visualization for Computer Security (VizSEC 2006), 3 November 2006, Alexandria, Virginia, USA ACM 2006 | |
| 2004 | ||
| 7 | Stefan Axelsson: Visualising Intrusions: Watching the Webserver. SEC 2004: 259-274 | |
| 6 | EE | Stefan Axelsson: Combining a bayesian classifier with visualisation: understanding the IDS. VizSEC 2004: 99-108 |
| 2003 | ||
| 5 | EE | Stefan Axelsson: Visualisation for Intrusion Detection. ESORICS 2003: 309-325 |
| 2000 | ||
| 4 | EE | Stefan Axelsson: The base-rate fallacy and the difficulty of intrusion detection. ACM Trans. Inf. Syst. Secur. 3(3): 186-205 (2000) |
| 1999 | ||
| 3 | EE | Stefan Axelsson: The Base-Rate Fallacy and Its Implications for the Difficulty of Intrusion Detection. ACM Conference on Computer and Communications Security 1999: 1-7 |
| 2 | EE | Stefan Axelsson: On a Difficulty of Intrusion Detection. Recent Advances in Intrusion Detection 1999 |
| 1997 | ||
| 1 | Johan Stahre, A. Johansson, Stefan Axelsson: Joint Optimization of People and Technology-An Example from the Car Industry. HCI (1) 1997: 265-268 | |
| 1 | A. Johansson | [1] |
| 2 | Kiran Lakkaraju | [8] |
| 3 | Johan Stahre | [1] |
| 4 | Soon Tee Teoh | [8] |
| 5 | William Yurcik | [8] |