Emilie Lundin
List of publications from the DBLP Bibliography Server - FAQ
2005 | ||
---|---|---|
6 | EE | Ulf Larson, Emilie Lundin Barse, Erland Jonsson: METAL - A Tool for Extracting Attack Manifestations. DIMVA 2005: 85-102 |
2004 | ||
5 | EE | Emilie Lundin Barse, Erland Jonsson: Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection. ACSAC 2004: 158-167 |
2003 | ||
4 | EE | Emilie Lundin Barse, Håkan Kvarnström, Erland Jonsson: Synthesizing Test Data for Fraud Detection Systems. ACSAC 2003: 384-395 |
2002 | ||
3 | EE | Emilie Lundin, Håkan Kvarnström, Erland Jonsson: A Synthetic Fraud Data Generation Methodology. ICICS 2002: 265-277 |
2000 | ||
2 | EE | Emilie Lundin, Erland Jonsson: Anomaly-based intrusion detection: privacy concerns and other problems. Computer Networks 34(4): 623-640 (2000) |
1999 | ||
1 | EE | Emilie Lundin, Erland Jonsson: Privacy vs. Intrusion Detection Analysis. Recent Advances in Intrusion Detection 1999 |
1 | Erland Jonsson | [1] [2] [3] [4] [5] [6] |
2 | Håkan Kvarnström | [3] [4] |
3 | Ulf Larson | [6] |