Ulf Larson

According to our database1, Ulf Larson authored at least 17 papers between 2005 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Performance and Service Continuity of HD Map Downloads in MEC-Enabled Cross-Border Mobile Radio Networks.
Proceedings of the Joint European Conference on Networks and Communications & 6G Summit, 2021

2014
T-Fuzz: Model-Based Fuzzing for Robustness Testing of Telecommunication Protocols.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

2009
On Adapting Data Collection to Intrusion Detection.
PhD thesis, 2009

A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure.
J. Networks, 2009

Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks.
Int. J. Digit. Crime Forensics, 2009

2008
Unidirectional auxiliary channel challenge-response authentication.
Proceedings of the Wireless Telecommunications Symposium, 2008

An Approach to using Honeypots in In-Vehicle Networks.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles.
Proceedings of the Computer Safety, 2008

Combining Physical and Digital Evidence in Vehicle Environments.
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008

Auxiliary channel Diffie-Hellman encrypted key-exchange authentication.
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008

Securing vehicles against cyber attacks.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay.
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, 2008

Operator-Centric and Adaptive Intrusion Detection.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection.
Proceedings of the The Third International Conference on Availability, 2008

2007
A General Model and Guidelines for Attack Manifestation Generation.
Proceedings of the Critical Information Infrastructures Security, 2007

2005
METAL - A Tool for Extracting Attack Manifestations.
Proceedings of the Detection of Intrusions and Malware, 2005


  Loading...