2008 |
11 | EE | Magnus Almgren,
Ulf Lindqvist,
Erland Jonsson:
A Multi-Sensor Model to Improve Automated Attack Detection.
RAID 2008: 291-310 |
10 | EE | Dennis K. Nilsson,
Tanya Roosta,
Ulf Lindqvist,
Alfonso Valdes:
Key management and secure software updates in wireless process control environments.
WISEC 2008: 100-108 |
2007 |
9 | EE | Ashish Gehani,
Ulf Lindqvist:
Bonsai: Balanced Lineage Authentication.
ACSAC 2007: 363-373 |
8 | EE | Robert Cunningham,
Steven Cheung,
Martin W. Fong,
Ulf Lindqvist,
David M. Nicol,
Ronald Pawlowski,
Eric Robinson,
William H. Sanders,
Sankalp Singh,
Alfonso Valdes,
Bradley Woodworth,
Michael Zhivich:
Securing Current and Future Process Control Systems.
Critical Infrastructure Protection 2007: 99-115 |
2006 |
7 | EE | Steven Cheung,
Bruno Dutertre,
Ulf Lindqvist:
Detecting Disruptive Routers in Wireless Sensor Networks.
ADHOC-NOW 2006: 19-31 |
2003 |
6 | EE | Steven Cheung,
Ulf Lindqvist,
Martin W. Fong:
Modeling Multistep Cyber Attacks for Scenario Recognition.
DISCEX (1) 2003: 284-292 |
2001 |
5 | EE | Ulf Lindqvist,
Phillip A. Porras:
eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris.
ACSAC 2001: 240-251 |
4 | EE | Magnus Almgren,
Ulf Lindqvist:
Application-Integrated Data Collection for Security Monitoring.
Recent Advances in Intrusion Detection 2001: 22-36 |
1999 |
3 | EE | Ulf Lindqvist,
Phillip A. Porras:
Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST).
IEEE Symposium on Security and Privacy 1999: 146-161 |
1998 |
2 | | Ulf Lindqvist,
Erland Jonsson:
A Map of Security Risks Associated wuth Using COTS.
IEEE Computer 31(6): 60-66 (1998) |
1997 |
1 | EE | Ulf Lindqvist,
Erland Jonsson:
How to Systematically Classify Computer Security Intrusions.
IEEE Symposium on Security and Privacy 1997: 154-163 |