| 2008 |
| 25 | EE | Ulf Larson,
Erland Jonsson,
Stefan Lindskog:
A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection.
ARES 2008: 624-629 |
| 24 | EE | Magnus Almgren,
Ulf Lindqvist,
Erland Jonsson:
A Multi-Sensor Model to Improve Automated Attack Detection.
RAID 2008: 291-310 |
| 23 | EE | Dennis K. Nilsson,
Ulf Larson,
Erland Jonsson:
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles.
SAFECOMP 2008: 207-220 |
| 22 | EE | Vilhelm Verendel,
Dennis K. Nilsson,
Ulf Larson,
Erland Jonsson:
An Approach to using Honeypots in In-Vehicle Networks.
VTC Fall 2008: 1-5 |
| 21 | EE | Dennis K. Nilsson,
Ulf Larson,
Erland Jonsson:
Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes.
VTC Fall 2008: 1-5 |
| 2007 |
| 20 | EE | Dennis K. Nilsson,
Phillip A. Porras,
Erland Jonsson:
How to Secure Bluetooth-Based Pico Networks.
SAFECOMP 2007: 209-223 |
| 2006 |
| 19 | EE | Erland Jonsson:
Towards an Integrated Conceptual Model of Security and Dependability.
ARES 2006: 646-653 |
| 2005 |
| 18 | EE | Ulf Larson,
Emilie Lundin Barse,
Erland Jonsson:
METAL - A Tool for Extracting Attack Manifestations.
DIMVA 2005: 85-102 |
| 2004 |
| 17 | | Erland Jonsson,
Alfonso Valdes,
Magnus Almgren:
Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings
Springer 2004 |
| 16 | EE | Emilie Lundin Barse,
Erland Jonsson:
Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection.
ACSAC 2004: 158-167 |
| 15 | EE | Magnus Almgren,
Erland Jonsson:
Using Active Learning in Intrusion Detection.
CSFW 2004: 88- |
| 14 | EE | Stefan Lindskog,
Johan Strandbergh,
Mikael Hackman,
Erland Jonsson:
A Content-Independent Scalable Encryption Model.
ICCSA (1) 2004: 821-830 |
| 2003 |
| 13 | | Giovanni Vigna,
Erland Jonsson,
Christopher Krügel:
Recent Advances in Intrusion Detection, 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings
Springer 2003 |
| 12 | EE | Emilie Lundin Barse,
Håkan Kvarnström,
Erland Jonsson:
Synthesizing Test Data for Fraud Detection Systems.
ACSAC 2003: 384-395 |
| 11 | EE | Håkan Kvarnström,
Hans Hedbom,
Erland Jonsson:
Protecting Security Policies in Ubiquitous Environments Using One-Way Functions.
SPC 2003: 71-85 |
| 2002 |
| 10 | EE | Emilie Lundin,
Håkan Kvarnström,
Erland Jonsson:
A Synthetic Fraud Data Generation Methodology.
ICICS 2002: 265-277 |
| 2000 |
| 9 | EE | Emilie Lundin,
Erland Jonsson:
Anomaly-based intrusion detection: privacy concerns and other problems.
Computer Networks 34(4): 623-640 (2000) |
| 1999 |
| 8 | EE | Emilie Lundin,
Erland Jonsson:
Privacy vs. Intrusion Detection Analysis.
Recent Advances in Intrusion Detection 1999 |
| 1998 |
| 7 | EE | Erland Jonsson:
An Integrated Framework for Security and Dependability.
Workshop on New Security Paradigms 1998: 22-29 |
| 6 | | Ulf Lindqvist,
Erland Jonsson:
A Map of Security Risks Associated wuth Using COTS.
IEEE Computer 31(6): 60-66 (1998) |
| 1997 |
| 5 | EE | Ulf Lindqvist,
Erland Jonsson:
How to Systematically Classify Computer Security Intrusions.
IEEE Symposium on Security and Privacy 1997: 154-163 |
| 4 | | Erland Jonsson,
Lech J. Janczewski:
A taxonomy and overview of information security experiments.
SEC 1997: 139-150 |
| 3 | EE | Erland Jonsson,
Tomas Olovsson:
A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior.
IEEE Trans. Software Eng. 23(4): 235-245 (1997) |
| 1996 |
| 2 | | Erland Jonsson,
Mikael Andersson:
On the quantitative assessment of behavioural security.
ACISP 1996: 228-241 |
| 1 | | Ulf Gustafson,
Erland Jonsson,
Tomas Olovsson:
On the modelling of preventive security based on a PC network intrusion experiment.
ACISP 1996: 242-252 |