How to systematically classify computer security intrusions U Lindqvist, E Jonsson Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997 | 456 | 1997 |
A quantitative model of the security intrusion process based on attacker behavior E Jonsson, T Olovsson IEEE Transactions on Software Engineering 23 (4), 235-245, 1997 | 415 | 1997 |
Security aspects of the in-vehicle network in the connected car P Kleberger, T Olovsson, E Jonsson 2011 IEEE intelligent vehicles symposium (IV), 528-533, 2011 | 333 | 2011 |
An approach to specification-based attack detection for in-vehicle networks UE Larson, DK Nilsson, E Jonsson 2008 IEEE Intelligent Vehicles Symposium, 220-225, 2008 | 258 | 2008 |
Efficient in-vehicle delayed data authentication based on compound message authentication codes DK Nilsson, UE Larson, E Jonsson 2008 IEEE 68th Vehicular Technology Conference, 1-5, 2008 | 233 | 2008 |
Synthesizing test data for fraud detection systems EL Barse, H Kvarnstrom, E Jonsson 19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003 | 188 | 2003 |
Anomaly-based intrusion detection: privacy concerns and other problems E Lundin, E Jonsson Computer networks 34 (4), 623-640, 2000 | 134 | 2000 |
A first simulation of attacks in the automotive network communications protocol flexray DK Nilsson, UE Larson, F Picasso, E Jonsson Proceedings of the International Workshop on Computational Intelligence in …, 2009 | 132 | 2009 |
A map of security risks associated with using COTS U Lindqvist, E Jonsson Computer 31 (6), 60-66, 1998 | 123 | 1998 |
Using active learning in intrusion detection M Almgren, E Jonsson Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., 88-98, 2004 | 110 | 2004 |
On measurement of operational security S Brocklehurst, B Littlewood, T Olovsson, E Jonsson IEEE Aerospace and Electronic Systems Magazine 9 (10), 7-16, 1994 | 108 | 1994 |
A synthetic fraud data generation methodology E Lundin, H Kvarnström, E Jonsson Information and Communications Security: 4th International Conference, ICICS …, 2002 | 100 | 2002 |
An integrated framework for security and dependability E Jonsson Proceedings of the 1998 workshop on New security paradigms, 22-29, 1998 | 98 | 1998 |
Towards an integrated conceptual model of security and dependability E Jonsson First International Conference on Availability, Reliability and Security …, 2006 | 89 | 2006 |
Survey of intrusion detection research E Lundin, E Jonsson Chalmers University of Technology, 2002 | 84 | 2002 |
An approach to UNIX security logging S Axelsson, U Lindqvist, U Gustafson, E Jonsson Proceedings of the 21st National Information Systems Security Conference, 62-75, 1998 | 69 | 1998 |
An approach to using honeypots in in-vehicle networks V Verendel, DK Nilsson, UE Larson, E Jonsson 2008 IEEE 68th vehicular technology conference, 1-5, 2008 | 67 | 2008 |
On the functional relation between security and dependability impairments E Jonsson, L Strömberg, S Lindskog Proceedings of the 1999 workshop on New security paradigms, 104-111, 1999 | 42 | 1999 |
On the integration of security and dependability in computer systems E Jonsson, T Olovsson IASTED International Conference on Reliability, Quality Control and Risk …, 1992 | 42 | 1992 |
Privacy vs. Intrusion Detection Analysis. E Lundin, E Jonsson Recent Advances in Intrusion Detection, 1999 | 41 | 1999 |