Joel Brynielsson

Affiliations:
  • Royal Institute of Technology, Stockholm, Sweden


According to our database1, Joel Brynielsson authored at least 30 papers between 2006 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Design of simulator training: a comparative study of Swedish dynamic decision-making training facilities.
Cogn. Technol. Work., 2021

Cyber-threat perception and risk management in the Swedish financial sector.
Comput. Secur., 2021

A Census of Swedish Public Sector Employee Communication on Cybersecurity during the COVID-19 Pandemic.
Proceedings of the International Conference on Cyber Situational Awareness, 2021

2020
Veracity assessment of online data.
Decis. Support Syst., 2020

A Census of Swedish Government Administrative Authority Employee Communications on Cybersecurity during the COVID-19 Pandemic.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2020

2018
Information Requirements for National Level Cyber Situational Awareness.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

2017
Tracking geographical locations using a geo-aware topic model for analyzing social media data.
Decis. Support Syst., 2017

2016
Using cyber defense exercises to obtain additional data for attacker profiling.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

2015
Detectability of Low-Rate HTTP Server DoS Attacks using Spectral Analysis.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Emotion classification of social media posts for estimating people's reactions to communicated alert messages during crises.
Secur. Informatics, 2014

Cyber situational awareness - A systematic review of the literature.
Comput. Secur., 2014

Mining the Web for Sympathy: The Pussy Riot Case.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

The security awareness paradox: A case study.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

2013
Harvesting and analysis of weak signals for detecting lone wolf terrorists.
Secur. Informatics, 2013

Learning to classify emotional content in crisis-related tweets.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Using Video Prototyping as a Means to Involve Crisis Communication Personnel in the Design Process: Innovating Crisis Management by Creating a Social Media Awareness Tool.
Proceedings of the Human Interface and the Management of Information. Information and Interaction for Learning, Culture, Collaboration and Business,, 2013

2012
Social positions and simulation relations.
Soc. Netw. Anal. Min., 2012

Making use of new media for pan-European crisis communication.
Proceedings of the 9th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2012

Framing the Attacker in Organized Cybercrime.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

Estimating Citizen Alertness in Crises Using Social Media Monitoring and Analysis.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

Analysis of Weak Signals for Detecting Lone Wolf Terrorists.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

2011
Information assurance education in two- and four-year institutions.
Proceedings of the 16th annual conference reports on Innovation and technology in computer science education, 2011

Dialogical emergency management and strategic awareness in emergency communication.
Proceedings of the 8th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2011

Detecting Emergent Conflicts through Web Mining and Visualization.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

2010
Towards information assurance (IA) curricular guidelines.
Proceedings of the 2010 ITiCSE working group reports, 2010

Detecting Social Positions Using Simulation.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2010

2009
An exploration of the current state of information assurance education.
ACM SIGCSE Bull., 2009

An information assurance curriculum for commanding officers using hands-on experiments.
Proceedings of the 40th SIGCSE Technical Symposium on Computer Science Education, 2009

2007
Using AI and games for decision support in command and control.
Decis. Support Syst., 2007

2006
An Information Fusion Game Component.
J. Adv. Inf. Fusion, 2006


  Loading...