Erland Jonsson

Affiliations:
  • Chalmers University of Technology, Gothenburg, Sweden


According to our database1, Erland Jonsson authored at least 36 papers between 1996 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2018
Securing the Connected Car: A Security-Enhancement Methodology.
IEEE Veh. Technol. Mag., 2018

2011
Security aspects of the in-vehicle network in the connected car.
Proceedings of the IEEE Intelligent Vehicles Symposium (IV), 2011

A Cause and Effect Approach towards Risk Analysis.
Proceedings of the Third International Workshop on Security Measurements and Metrics, 2011

A Framework for Security Metrics Based on Operational System Attributes.
Proceedings of the Third International Workshop on Security Measurements and Metrics, 2011

Mapping Systems Security Research at Chalmers.
Proceedings of the First SysSec Workshop 2011, 2011

2010
Emerging and Future Cyber Threats to Critical Systems.
Proceedings of the Open Research Problems in Network Security, 2010

2008
Unidirectional auxiliary channel challenge-response authentication.
Proceedings of the Wireless Telecommunications Symposium, 2008

An Approach to using Honeypots in In-Vehicle Networks.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles.
Proceedings of the Computer Safety, 2008

A Multi-Sensor Model to Improve Automated Attack Detection.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Auxiliary channel Diffie-Hellman encrypted key-exchange authentication.
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008

A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay.
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, 2008

Operator-Centric and Adaptive Intrusion Detection.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection.
Proceedings of the The Third International Conference on Availability, 2008

2007
How to Secure Bluetooth-Based Pico Networks.
Proceedings of the Computer Safety, 2007

A General Model and Guidelines for Attack Manifestation Generation.
Proceedings of the Critical Information Infrastructures Security, 2007

2006
Towards an Integrated Conceptual Model of Security and Dependability.
Proceedings of the The First International Conference on Availability, 2006

2005
METAL - A Tool for Extracting Attack Manifestations.
Proceedings of the Detection of Intrusions and Malware, 2005

2004
A Content-Independent Scalable Encryption Model.
Proceedings of the Computational Science and Its Applications, 2004

Using Active Learning in Intrusion Detection.
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004

Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Protecting Security Policies in Ubiquitous Environments Using One-Way Functions.
Proceedings of the Security in Pervasive Computing, 2003

Synthesizing Test Data for Fraud Detection Systems.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
A Synthetic Fraud Data Generation Methodology.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

2000
Anomaly-based intrusion detection: privacy concerns and other problems.
Comput. Networks, 2000

1999
Privacy vs. Intrusion Detection Analysis.
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999

On the functional relation between security and dependability impairments.
Proceedings of the 1999 Workshop on New Security Paradigms, 1999

1998
A Map of Security Risks Associated wuth Using COTS.
Computer, 1998

An Integrated Framework for Security and Dependability.
Proceedings of the 1998 Workshop on New Security Paradigms, 1998

1997
A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior.
IEEE Trans. Software Eng., 1997

How to Systematically Classify Computer Security Intrusions.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

A taxonomy and overview of information security experiments.
Proceedings of the Information Security in Research and Business, 1997

1996
A Quantitative Approach to Computer Security from a Dependability Perspective.
PhD thesis, 1996

On the quantitative assessment of behavioural security.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

On the modelling of preventive security based on a PC network intrusion experiment.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996


  Loading...