2008 |
25 | EE | Ulf Larson,
Erland Jonsson,
Stefan Lindskog:
A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection.
ARES 2008: 624-629 |
24 | EE | Magnus Almgren,
Ulf Lindqvist,
Erland Jonsson:
A Multi-Sensor Model to Improve Automated Attack Detection.
RAID 2008: 291-310 |
23 | EE | Dennis K. Nilsson,
Ulf Larson,
Erland Jonsson:
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles.
SAFECOMP 2008: 207-220 |
22 | EE | Vilhelm Verendel,
Dennis K. Nilsson,
Ulf Larson,
Erland Jonsson:
An Approach to using Honeypots in In-Vehicle Networks.
VTC Fall 2008: 1-5 |
21 | EE | Dennis K. Nilsson,
Ulf Larson,
Erland Jonsson:
Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes.
VTC Fall 2008: 1-5 |
2007 |
20 | EE | Dennis K. Nilsson,
Phillip A. Porras,
Erland Jonsson:
How to Secure Bluetooth-Based Pico Networks.
SAFECOMP 2007: 209-223 |
2006 |
19 | EE | Erland Jonsson:
Towards an Integrated Conceptual Model of Security and Dependability.
ARES 2006: 646-653 |
2005 |
18 | EE | Ulf Larson,
Emilie Lundin Barse,
Erland Jonsson:
METAL - A Tool for Extracting Attack Manifestations.
DIMVA 2005: 85-102 |
2004 |
17 | | Erland Jonsson,
Alfonso Valdes,
Magnus Almgren:
Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings
Springer 2004 |
16 | EE | Emilie Lundin Barse,
Erland Jonsson:
Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection.
ACSAC 2004: 158-167 |
15 | EE | Magnus Almgren,
Erland Jonsson:
Using Active Learning in Intrusion Detection.
CSFW 2004: 88- |
14 | EE | Stefan Lindskog,
Johan Strandbergh,
Mikael Hackman,
Erland Jonsson:
A Content-Independent Scalable Encryption Model.
ICCSA (1) 2004: 821-830 |
2003 |
13 | | Giovanni Vigna,
Erland Jonsson,
Christopher Krügel:
Recent Advances in Intrusion Detection, 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings
Springer 2003 |
12 | EE | Emilie Lundin Barse,
Håkan Kvarnström,
Erland Jonsson:
Synthesizing Test Data for Fraud Detection Systems.
ACSAC 2003: 384-395 |
11 | EE | Håkan Kvarnström,
Hans Hedbom,
Erland Jonsson:
Protecting Security Policies in Ubiquitous Environments Using One-Way Functions.
SPC 2003: 71-85 |
2002 |
10 | EE | Emilie Lundin,
Håkan Kvarnström,
Erland Jonsson:
A Synthetic Fraud Data Generation Methodology.
ICICS 2002: 265-277 |
2000 |
9 | EE | Emilie Lundin,
Erland Jonsson:
Anomaly-based intrusion detection: privacy concerns and other problems.
Computer Networks 34(4): 623-640 (2000) |
1999 |
8 | EE | Emilie Lundin,
Erland Jonsson:
Privacy vs. Intrusion Detection Analysis.
Recent Advances in Intrusion Detection 1999 |
1998 |
7 | EE | Erland Jonsson:
An Integrated Framework for Security and Dependability.
Workshop on New Security Paradigms 1998: 22-29 |
6 | | Ulf Lindqvist,
Erland Jonsson:
A Map of Security Risks Associated wuth Using COTS.
IEEE Computer 31(6): 60-66 (1998) |
1997 |
5 | EE | Ulf Lindqvist,
Erland Jonsson:
How to Systematically Classify Computer Security Intrusions.
IEEE Symposium on Security and Privacy 1997: 154-163 |
4 | | Erland Jonsson,
Lech J. Janczewski:
A taxonomy and overview of information security experiments.
SEC 1997: 139-150 |
3 | EE | Erland Jonsson,
Tomas Olovsson:
A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior.
IEEE Trans. Software Eng. 23(4): 235-245 (1997) |
1996 |
2 | | Erland Jonsson,
Mikael Andersson:
On the quantitative assessment of behavioural security.
ACISP 1996: 228-241 |
1 | | Ulf Gustafson,
Erland Jonsson,
Tomas Olovsson:
On the modelling of preventive security based on a PC network intrusion experiment.
ACISP 1996: 242-252 |