Stefan Lindskog
Orcid: 0000-0003-0778-4736
According to our database1,
Stefan Lindskog
authored at least 42 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
On the Evaluation of Privacy Impact Assessment and Privacy Risk Assessment Methodologies: A Systematic Literature Review.
IEEE Access, 2024
2020
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020
2019
System Administrators Are Parting Ways With Command Line Interfaces: An Exploratory Study of Firewall Interfaces.
CoRR, 2019
System Administrators Prefer Command Line Interfaces, Don't They? An Exploratory Study of Firewall Interfaces.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019
Proceedings of the Secure IT Systems, 2019
2018
ACM Comput. Surv., 2018
Slice Distance: An Insert-Only Levenshtein Distance with a Focus on Security Applications.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
2017
How Much Privilege Does an App Need? Investigating Resource Usage of Android Apps (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
2016
Proceedings of the 8th IFIP International Conference on New Technologies, 2016
Proceedings of the 8th International Conference on Electronics, 2016
2015
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015
2014
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014
2013
Comput. Networks, 2013
2012
Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012
2011
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
2010
Performance evaluation of IKEv2 authentication methods in next generation wireless networks.
Secur. Commun. Networks, 2010
Proceedings of the Access Networks - 5th International ICST Conference on Access Networks, 2010
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
2009
2008
J. Networks, 2008
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
Proceedings of the The Third International Conference on Availability, 2008
A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection.
Proceedings of the The Third International Conference on Availability, 2008
2007
On the Relationship between Confidentiality Measures: Entropy and Guesswork.
Proceedings of the Security in Information Systems, 2007
Proceedings of the 4th IEEE International Symposium on Wireless Communication Systems, 2007
Proceedings of the Future of Identity in the Information Society, 2007
Proceedings of the Fifth World Conference on Information Security Education, 2007
2006
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006
Middleware Support for Tunable Encryption.
Proceedings of the Wireless Information Systems, 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Proceedings of the 3rd IEEE International Symposium on Wireless Communication Systems, 2006
2005
Proceedings of the Computational Science and Its Applications, 2005
2004
Proceedings of the Computational Science and Its Applications, 2004
1999
Proceedings of the 1999 Workshop on New Security Paradigms, 1999