Tomas Olovsson

Orcid: 0000-0001-9548-819X

According to our database1, Tomas Olovsson authored at least 44 papers between 1995 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Systematic Literature Review on Automotive Digital Forensics: Challenges, Technical Solutions and Data Collection.
IEEE Trans. Intell. Veh., February, 2023

The Automotive BlackBox: Towards a Standardization of Automotive Digital Forensics.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023

Secure Vehicle Software Updates: Requirements for a Reference Architecture.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

Gap Analysis of ISO/SAE 21434 - Improving the Automotive Cybersecurity Engineering Life Cycle.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2023

2021
Resilient Shield: Reinforcing the Resilience of Vehicles Against Security Threats.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021

Spectra: detecting attacks on in-vehicle networks through spectral analysis of CAN-message payloads.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Proposing HEAVENS 2.0 - an automotive risk assessment model.
Proceedings of the CSCS '21: Computer Science in Cars Symposium, 2021

V2C: A Trust-Based Vehicle to Cloud Anomaly Detection Framework for Automotive Systems.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
REMIND: A Framework for the Resilient Design of Automotive Systems.
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020

2019
CASAD: CAN-Aware Stealthy-Attack Detection for In-Vehicle Networks.
CoRR, 2019

A Preliminary Security Assessment of 5G V2X.
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019

Extending AUTOSAR's Counter-Based Solution for Freshness of Authenticated Messages in Vehicles.
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019

2018
Securing the Connected Car: A Security-Enhancement Methodology.
IEEE Veh. Technol. Mag., 2018

Open Problems when Mapping Automotive Security Levels to System Requirements.
Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems, 2018

Towards a Standardized Mapping from Automotive Security Levels to Security Mechanisms.
Proceedings of the 21st International Conference on Intelligent Transportation Systems, 2018

Understanding Common Automotive Security Issues and Their Implications.
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018

2017
In-Vehicle CAN Message Authentication: An Evaluation Based on Industrial Criteria.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Introducing Differential Privacy to the Automotive Domain: Opportunities and Challenges.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Joint Subjective and Objective Data Capture and Analytics for Automotive Applications.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

What the Stack? On Memory Exploitation and Protection in Resource Constrained Automotive Systems.
Proceedings of the Critical Information Infrastructures Security, 2017

2016
A Risk Assessment Framework for Automotive Embedded Systems.
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, 2016

Security and privacy for big data: A systematic literature review.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

2015
Improving in-vehicle network architectures using automated partitioning algorithms.
Proceedings of the 2015 IEEE Vehicular Networking Conference, 2015

2014
Towards designing secure in-vehicle network architectures using community detection algorithms.
Proceedings of the 2014 IEEE Vehicular Networking Conference, 2014

Securing Vehicle Diagnostics in Repair Shops.
Proceedings of the Computer Safety, Reliability, and Security, 2014

Overlapping Communities for Identifying Misbehavior in Network Communications.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

Experiences from implementing the ETSI ITS SecuredMessage service.
Proceedings of the 2014 IEEE Intelligent Vehicles Symposium Proceedings, 2014

A local seed selection algorithm for overlapping community detection.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

A Graph-Based Analysis of Medical Queries of a Swedish Health Care Portal.
Proceedings of the 5th International Workshop on Health Text Mining and Information Analysis, 2014

2013
Protecting Vehicles Against Unauthorised Diagnostics Sessions Using Trusted Third Parties.
Proceedings of the Computer Safety, Reliability, and Security, 2013

2012
An Evaluation of Community Detection Algorithms on Large-Scale Email Traffic.
Proceedings of the Experimental Algorithms - 11th International Symposium, 2012

Towards modeling legitimate and unsolicited email traffic using social network properties.
Proceedings of the Fifth Workshop on Social Network Systems, 2012

Assessing the Quality of Packet-Level Traces Collected on Internet Backbone Links.
Proceedings of the Secure IT Systems - 17th Nordic Conference, 2012

2011
Security aspects of the in-vehicle network in the connected car.
Proceedings of the IEEE Intelligent Vehicles Symposium (IV), 2011

The Anti-Social Behavior of Spam.
Proceedings of the Seventh European Conference on Computer Network Defense, 2011

Mapping Systems Security Research at Chalmers.
Proceedings of the First SysSec Workshop 2011, 2011

On collection of large-scale multi-purpose datasets on internet backbone links.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

2010
Analyzing the Social Structure and Dynamics of E-mail and Spam in Massive Backbone Internet Traffic
CoRR, 2010

Passive internet measurement: Overview and guidelines based on experiences.
Comput. Commun., 2010

2009
An Analysis of the Robustness and Stability of the Network Stack in Symbian-based Smartphones.
J. Networks, 2009

2008
Trends and Differences in Connection-Behavior within Classes of Internet Backbone Traffic.
Proceedings of the Passive and Active Network Measurement, 9th International Conference, 2008

1997
A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior.
IEEE Trans. Software Eng., 1997

1996
On the modelling of preventive security based on a PC network intrusion experiment.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

1995
Practical Experimentation as a Tool for Vulnerability Analysis and Security Evaluation.
PhD thesis, 1995


  Loading...