Dennis K. Nilsson

According to our database1, Dennis K. Nilsson authored at least 17 papers between 2007 and 2009.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2009
A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure.
J. Networks, 2009

Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks.
Int. J. Digit. Crime Forensics, 2009

Building a self-healing embedded system in a multi-OS environment.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Online Self-Healing Support for Embedded Systems.
Proceedings of the 2009 IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2009

2008
Unidirectional auxiliary channel challenge-response authentication.
Proceedings of the Wireless Telecommunications Symposium, 2008

Key management and secure software updates in wireless process control environments.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

An Approach to using Honeypots in In-Vehicle Networks.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles.
Proceedings of the Computer Safety, 2008

Combining Physical and Digital Evidence in Vehicle Environments.
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008

Auxiliary channel Diffie-Hellman encrypted key-exchange authentication.
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008

An intrusion detection system for wireless process control systems.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Securing vehicles against cyber attacks.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay.
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, 2008

Operator-Centric and Adaptive Intrusion Detection.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
How to Secure Bluetooth-Based Pico Networks.
Proceedings of the Computer Safety, 2007

A General Model and Guidelines for Attack Manifestation Generation.
Proceedings of the Critical Information Infrastructures Security, 2007


  Loading...