A quantitative model of the security intrusion process based on attacker behavior E Jonsson, T Olovsson IEEE Transactions on Software Engineering 23 (4), 235-245, 1997 | 408 | 1997 |
Security aspects of the in-vehicle network in the connected car P Kleberger, T Olovsson, E Jonsson 2011 IEEE Intelligent Vehicles Symposium (IV), 528-533, 2011 | 288 | 2011 |
On measurement of operational security S Brocklehurst, B Littlewood, T Olovsson, E Jonsson IEEE Aerospace and Electronic Systems Magazine 9 (10), 7-16, 1994 | 101 | 1994 |
Trends and differences in connection-behavior within classes of internet backbone traffic W John, S Tafvelin, T Olovsson International Conference on Passive and Active Network Measurement, 192-201, 2008 | 70 | 2008 |
A risk assessment framework for automotive embedded systems MM Islam, A Lautenbach, C Sandberg, T Olovsson Proceedings of the 2nd ACM International Workshop on Cyber-Physical System …, 2016 | 65 | 2016 |
A structured approach to computer security T Olovsson Chalmers University of Technology, 1992 | 62 | 1992 |
Security and privacy for big data: A systematic literature review B Nelson, T Olovsson 2016 IEEE international conference on big data (big data), 3693-3702, 2016 | 55 | 2016 |
A local seed selection algorithm for overlapping community detection F Moradi, T Olovsson, P Tsigas 2014 IEEE/ACM International Conference on Advances in Social Networks …, 2014 | 54 | 2014 |
Passive internet measurement: Overview and guidelines based on experiences W John, S Tafvelin, T Olovsson Computer Communications 33 (5), 533-550, 2010 | 53 | 2010 |
On the integration of security and dependability in computer systems E Jonsson, T Olovsson IASTED International Conference on Reliability, Quality Control and Risk …, 1992 | 39 | 1992 |
An evaluation of community detection algorithms on large-scale email traffic F Moradi, T Olovsson, P Tsigas International symposium on experimental algorithms, 283-294, 2012 | 38 | 2012 |
In-vehicle CAN message authentication: An evaluation based on industrial criteria N Nowdehi, A Lautenbach, T Olovsson 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), 1-7, 2017 | 36 | 2017 |
Towards operational measures of computer security: Experimentation and modelling T Olovsson, E Jonsson, S Brocklehurst, B Littlewood Predictably Dependable Computing Systems, 555-569, 1995 | 35 | 1995 |
Detection of malicious traffic on back‐bone links via packet header analysis W John, T Olovsson Campus-Wide Information Systems, 2008 | 26 | 2008 |
An analysis of a secure system based on trusted components U Lindqvist, T Olovsson, E Jonsson Proceedings of 11th Annual Conference on Computer Assurance. COMPASS'96, 213-223, 1996 | 24 | 1996 |
CASAD: CAN-aware stealthy-attack detection for in-vehicle networks N Nowdehi, W Aoudi, M Almgren, T Olovsson arXiv preprint arXiv:1909.08407, 2019 | 18 | 2019 |
Securing the connected car: a security-enhancement methodology K Strandberg, T Olovsson, E Jonsson IEEE vehicular technology magazine 13 (1), 56-65, 2018 | 18 | 2018 |
An empirical model of the security intrusion process E Jonsson, T Olovsson Proceedings of 11th Annual Conference on Computer Assurance. COMPASS'96, 176-186, 1996 | 18 | 1996 |
Security evaluation of a PC network based on intrusion experiments U Gustafson, E Jonsson, T Olovsson SECURICOM 1996-14th Worldwide Congress on Computer and Communications …, 1996 | 18 | 1996 |
Experiences from implementing the ETSI ITS SecuredMessage service N Nowdehi, T Olovsson 2014 IEEE Intelligent Vehicles Symposium Proceedings, 1055-1060, 2014 | 14 | 2014 |