Stefan Lindskog

According to our database1, Stefan Lindskog authored at least 40 papers between 1999 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Measuring the Usability of Firewall Rule Sets.
IEEE Access, 2020

Using Features of Encrypted Network Traffic to Detect Malware.
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020

2019
System Administrators Are Parting Ways With Command Line Interfaces: An Exploratory Study of Firewall Interfaces.
CoRR, 2019

System Administrators Prefer Command Line Interfaces, Don't They? An Exploratory Study of Firewall Interfaces.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

Using Partial Signatures in Intrusion Detection for Multipath TCP.
Proceedings of the Secure IT Systems, 2019

2018
Systematic Literature Review on Usability of Firewall Configuration.
ACM Comput. Surv., 2018

Slice Distance: An Insert-Only Levenshtein Distance with a Focus on Security Applications.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

2017
How Much Privilege Does an App Need? Investigating Resource Usage of Android Apps (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

2016
Towards Multipath TCP Aware Security Technologies.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

2015
Challenges in Managing Firewalls.
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015

Multipath TCP IDS Evasion and Mitigation.
Proceedings of the Information Security - 18th International Conference, 2015

Automated testing of IDS rules.
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015

2014
Spoiled Onions: Exposing Malicious Tor Exit Relays.
CoRR, 2014

Spoiled Onions: Exposing Malicious Tor Exit Relays.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

2013
Performance analysis and improvement of PR-SCTP for small messages.
Comput. Networks, 2013

2012
How China Is Blocking Tor
CoRR, 2012

How the Great Firewall of China is Blocking Tor.
Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012

An investigation of entropy of selectively encrypted bitmap images.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

2011
Entropy of Selectively Encrypted Strings.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

Guesswork changes in multi-processor attacks.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Performance evaluation of IKEv2 authentication methods in next generation wireless networks.
Secur. Commun. Networks, 2010

Priority Based Delivery of PR-SCTP Messages in a Syslog Context.
Proceedings of the Access Networks - 5th International ICST Conference on Access Networks, 2010

Extending the definition of guesswork.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
The Design and Implementation of Secure Socket SCTP.
Trans. Comput. Sci., 2009

2008
A Conceptual Model for Analysis and Design of Tunable Security Services.
J. Networks, 2008

The Design and Message Complexity of Secure Socket SCTP.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008

Operator-Centric and Adaptive Intrusion Detection.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

An End-to-End Security Solution for SCTP.
Proceedings of the The Third International Conference on Availability, 2008

A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection.
Proceedings of the The Third International Conference on Availability, 2008

2007
On the Relationship between Confidentiality Measures: Entropy and Guesswork.
Proceedings of the Security in Information Systems, 2007

Analyzing IKEv2 Performance when Protecting Mobile IPv6 Signaling.
Proceedings of the 4th IEEE International Symposium on Wireless Communication Systems, 2007

A Model-based Analysis of Tunability in Privacy Services.
Proceedings of the Future of Identity in the Information Society, 2007

Experiences from Educating Practitioners in Vulnerability Analysis.
Proceedings of the Fifth World Conference on Information Security Education, 2007

2006
Using Guesswork as a Measure for Confidentiality of Selectively Encrypted Messages.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

Middleware Support for Tunable Encryption.
Proceedings of the Wireless Information Systems, 2006

Providing Tunable Security Services: An IEEE 802.11i Example.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

A Conceptual Model of Tunable Security Services.
Proceedings of the 3rd IEEE International Symposium on Wireless Communication Systems, 2006

2005
Data Protection Based on Physical Separation: Concepts and Application Scenarios.
Proceedings of the Computational Science and Its Applications, 2005

2004
A Content-Independent Scalable Encryption Model.
Proceedings of the Computational Science and Its Applications, 2004

1999
On the functional relation between security and dependability impairments.
Proceedings of the 1999 Workshop on New Security Paradigms, 1999


  Loading...