Stefan Axelsson

Orcid: 0000-0002-9085-4469

According to our database1, Stefan Axelsson authored at least 42 papers between 1997 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Corrigendum to "It is about time-do exFAT implementations handle timestamps correctly?" [Forensic Science International: Digital Investigation 42-43 (2022) 301476].
Forensic Sci. Int. Digit. Investig., June, 2023

2022
Reliability assessment of digital forensic investigations in the Norwegian police.
Digit. Investig., 2022

It is about time-Do exFAT implementations handle timestamps correctly?
Digit. Investig., 2022

Legal and technical questions of file system reverse engineering.
Comput. Law Secur. Rev., 2022

2021
Safe Collaborative Assembly on a Continuously Moving Line with Large Industrial Robots.
Robotics Comput. Integr. Manuf., 2021

Timestamp prefix carving for filesystem metadata extraction.
Digit. Investig., 2021

Reliability validation for file system interpretation.
Digit. Investig., 2021

Chip chop - smashing the mobile phone secure chip for fun and digital forensics.
Digit. Investig., 2021

Digital Forensic Acquisition Kill Chain - Analysis and Demonstration.
Proceedings of the Advances in Digital Forensics XVII, 2021

Leveraging USB Power Delivery Implementations for Digital Forensic Acquisition.
Proceedings of the Advances in Digital Forensics XVII, 2021

2020
Disk Cluster Allocation Behavior in Windows and NTFS.
Mob. Networks Appl., 2020

Generic Metadata Time Carving.
Digit. Investig., 2020

An Empirical Study of the NTFS Cluster Allocation Behavior Over Time.
Digit. Investig., 2020

2019
Using the object ID index as an investigative approach for NTFS file systems.
Digit. Investig., 2019

Reverse engineering of ReFS.
Digit. Investig., 2019

Using NTFS Cluster Allocation Behavior to Find the Location of User Data.
Digit. Investig., 2019

Creating a Map of User Data in NTFS to Improve File Carving.
Proceedings of the Advances in Digital Forensics XV, 2019

Digital Forensic Atomic Force Microscopy of Semiconductor Memory Arrays.
Proceedings of the Advances in Digital Forensics XV, 2019

Exploiting Vendor-Defined Messages in the USB Power Delivery Protocol.
Proceedings of the Advances in Digital Forensics XV, 2019

2018
Analysis of fraud controls using the PaySim financial simulator.
Int. J. Simul. Process. Model., 2018

Forensics acquisition - Analysis and circumvention of samsung secure boot enforced common criteria mode.
Digit. Investig., 2018

2017
Digital Forensic Implications of Collusion Attacks on the Lightning Network.
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017

2015
Using the RetSim simulator for fraud detection research.
Int. J. Simul. Process. Model., 2015

Using the RetSim Fraud Simulation Tool to Set Thresholds for Triage of Retail Fraud.
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015

Do Data Loss Prevention Systems Really Work?
Proceedings of the Advances in Digital Forensics XI, 2015

2014
VMI-PL: A monitoring language for virtual platforms using virtual machine introspection.
Digit. Investig., 2014

Key-hiding on the ARM platform.
Digit. Investig., 2014

2013
File Fragment Analysis Using Normalized Compression Distance.
Proceedings of the Advances in Digital Forensics IX, 2013

2012
Similarity assessment for removal of noisy end user license agreements.
Knowl. Inf. Syst., 2012

Money Laundering Detection using Synthetic Data.
Proceedings of the 27th Annual Workshop of the Swedish Artificial Intelligence Society, 2012

Using Data Mining for Static Code Analysis of C.
Proceedings of the Advanced Data Mining and Applications, 8th International Conference, 2012

2010
The Normalised Compression Distance as a file fragment classifier.
Digit. Investig., 2010

Using Normalized Compression Distance for Classifying File Fragments.
Proceedings of the ARES 2010, 2010

2009
Detecting Defects with an Interactive Code Review Tool Based on Visualisation and Machine Learning.
Proceedings of the 21st International Conference on Software Engineering & Knowledge Engineering (SEKE'2009), 2009

2006
Understanding Intrusion Detection Through Visualization
Advances in Information Security 24, Springer, ISBN: 978-0-387-27634-2, 2006

2004
Combining a bayesian classifier with visualisation: understanding the IDS.
Proceedings of the 1st ACM Workshop on Visualization and Data Mining for Computer Security, 2004

Visualising Intrusions: Watching the Webserver.
Proceedings of the Security and Protection in Information Processing Systems, 2004

2003
Visualisation for Intrusion Detection.
Proceedings of the Computer Security, 2003

2000
The base-rate fallacy and the difficulty of intrusion detection.
ACM Trans. Inf. Syst. Secur., 2000

1999
On a Difficulty of Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999

The Base-Rate Fallacy and Its Implications for the Difficulty of Intrusion Detection.
Proceedings of the CCS '99, 1999

1997
Joint Optimization of People and Technology-An Example from the Car Industry.
Proceedings of the Design of Computing Systems: Cognitive Considerations, 1997


  Loading...