Erland Jonsson
Affiliations:- Chalmers University of Technology, Gothenburg, Sweden
According to our database1,
Erland Jonsson
authored at least 36 papers
between 1996 and 2018.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on chalmers.se
On csauthors.net:
Bibliography
2018
IEEE Veh. Technol. Mag., 2018
2011
Proceedings of the IEEE Intelligent Vehicles Symposium (IV), 2011
Proceedings of the Third International Workshop on Security Measurements and Metrics, 2011
Proceedings of the Third International Workshop on Security Measurements and Metrics, 2011
Proceedings of the First SysSec Workshop 2011, 2011
2010
Proceedings of the Open Research Problems in Network Security, 2010
2008
Proceedings of the Wireless Telecommunications Symposium, 2008
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008
Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles.
Proceedings of the Computer Safety, 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008
A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay.
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection.
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the Computer Safety, 2007
Proceedings of the Critical Information Infrastructures Security, 2007
2006
Proceedings of the The First International Conference on Availability, 2006
2005
Proceedings of the Detection of Intrusions and Malware, 2005
2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004
Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
2003
Proceedings of the Security in Pervasive Computing, 2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
2000
Comput. Networks, 2000
1999
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999
Proceedings of the 1999 Workshop on New Security Paradigms, 1999
1998
Proceedings of the 1998 Workshop on New Security Paradigms, 1998
1997
IEEE Trans. Software Eng., 1997
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997
A taxonomy and overview of information security experiments.
Proceedings of the Information Security in Research and Business, 1997
1996
PhD thesis, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996