A quantitative model of the security intrusion process based on attacker behavior E Jonsson, T Olovsson IEEE Transactions on Software Engineering 23 (4), 235-245, 1997 | 413 | 1997 |
Security aspects of the in-vehicle network in the connected car P Kleberger, T Olovsson, E Jonsson 2011 IEEE intelligent vehicles symposium (IV), 528-533, 2011 | 319 | 2011 |
On measurement of operational security S Brocklehurst, B Littlewood, T Olovsson, E Jonsson IEEE Aerospace and Electronic Systems Magazine 9 (10), 7-16, 1994 | 106 | 1994 |
A risk assessment framework for automotive embedded systems MM Islam, A Lautenbach, C Sandberg, T Olovsson Proceedings of the 2nd ACM International Workshop on Cyber-Physical System …, 2016 | 86 | 2016 |
Trends and differences in connection-behavior within classes of internet backbone traffic W John, S Tafvelin, T Olovsson Passive and Active Network Measurement: 9th International Conference, PAM …, 2008 | 73 | 2008 |
Security and privacy for big data: A systematic literature review B Nelson, T Olovsson 2016 IEEE international conference on big data (big data), 3693-3702, 2016 | 71 | 2016 |
A structured approach to computer security T Olovsson Chalmers University of Technology, 1992 | 65 | 1992 |
A local seed selection algorithm for overlapping community detection F Moradi, T Olovsson, P Tsigas 2014 IEEE/ACM International Conference on Advances in Social Networks …, 2014 | 64 | 2014 |
Passive internet measurement: Overview and guidelines based on experiences W John, S Tafvelin, T Olovsson Computer Communications 33 (5), 533-550, 2010 | 53 | 2010 |
In-vehicle CAN message authentication: An evaluation based on industrial criteria N Nowdehi, A Lautenbach, T Olovsson 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), 1-7, 2017 | 52 | 2017 |
An evaluation of community detection algorithms on large-scale email traffic F Moradi, T Olovsson, P Tsigas Experimental Algorithms: 11th International Symposium, SEA 2012, Bordeaux …, 2012 | 42 | 2012 |
On the integration of security and dependability in computer systems E Jonsson, T Olovsson IASTED International Conference on Reliability, Quality Control and Risk …, 1992 | 39 | 1992 |
Future connected vehicles: Communications demands, privacy and cyber-security T Olovsson, T Svensson, J Wu Communications in Transportation Research 2, 100056, 2022 | 38 | 2022 |
Towards operational measures of computer security: Experimentation and modelling T Olovsson, E Jonsson, S Brocklehurst, B Littlewood Predictably Dependable Computing Systems, 555-569, 1995 | 37 | 1995 |
Securing the connected car: A security-enhancement methodology K Strandberg, T Olovsson, E Jonsson IEEE vehicular technology magazine 13 (1), 56-65, 2018 | 30 | 2018 |
CASAD: CAN-aware stealthy-attack detection for in-vehicle networks N Nowdehi, W Aoudi, M Almgren, T Olovsson arXiv preprint arXiv:1909.08407, 2019 | 28 | 2019 |
Detection of malicious traffic on back‐bone links via packet header analysis W John, T Olovsson Campus-Wide Information Systems 25 (5), 342-358, 2008 | 28 | 2008 |
An analysis of a secure system based on trusted components U Lindqvist, T Olovsson, E Jonsson Proceedings of 11th Annual Conference on Computer Assurance. COMPASS'96, 213-223, 1996 | 24 | 1996 |
A systematic literature review on automotive digital forensics: Challenges, technical solutions and data collection K Strandberg, N Nowdehi, T Olovsson IEEE Transactions on Intelligent Vehicles 8 (2), 1350-1367, 2022 | 23 | 2022 |
Deliverable d2-security models M Islam, C Sandberg, A Bokesand, T Olovsson, H Broberg, P Kleberger, ... HEAVENS Project, Version 1, 2014 | 21 | 2014 |