Ulf Lindqvist

Orcid: 0009-0002-5941-0947

According to our database1, Ulf Lindqvist authored at least 35 papers between 1997 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Critical Infrastructure Security Goes to Space: Leveraging Lessons Learned on the Ground.
CoRR, 2023

2022
Importance of Cyber Security Analysis in the Operational Technology System Lifecycle.
Proceedings of the Critical Infrastructure Protection XVI, 2022

2020
IoTHound: environment-agnostic device identification and monitoring.
Proceedings of the IoT '20: 10th International Conference on the Internet of Things, 2020

2018
Risks and Benefits of Side-Channels in Battlefields.
Proceedings of the 21st International Conference on Information Fusion, 2018

2017
Building on the Success of Building Security In.
IEEE Secur. Priv., 2017

The future of the internet of things.
Commun. ACM, 2017

Building Hardened Internet-of-Things Clients with Language-Theoretic Security.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

Jumping the Air Gap: Modeling Cyber-Physical Attack Paths in the Internet-of-Things.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

2016
IEEE SecDev 2016: Prioritizing Secure Development.
IEEE Secur. Priv., 2016

2015
Government-Funded R&D to Drive Cybersecurity Technologies.
IT Prof., 2015

Alarm Prioritization and Diagnosis for Cellular Networks.
Proceedings of the Mobile Networks and Management - 7th International Conference, 2015

2014
DCAD: Dynamic Cell Anomaly Detection for operational cellular networks.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

On the feasibility of deploying cell anomaly detection in operational cellular networks.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Anomaly Detection and Diagnosis for Automatic Radio Network Verification.
Proceedings of the Mobile Networks and Management - 6th International Conference, 2014

Managing scope changes for cellular network-level anomaly detection.
Proceedings of the 11th International Symposium on Wireless Communications Systems, 2014

Demo: SONVer: SON verification for operational cellular networks.
Proceedings of the 11th International Symposium on Wireless Communications Systems, 2014

2013
Crossing the "Valley of Death": Transitioning Cybersecurity Research into Practice.
IEEE Secur. Priv., 2013

Detecting anomalies in cellular networks using an ensemble method.
Proceedings of the 9th International Conference on Network and Service Management, 2013

2012
The IEEE Symposium on Security and Privacy Is Moving to San Francisco.
IEEE Secur. Priv., 2012

2010
Detection, correlation, and visualization of attacks against critical infrastructure systems.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

2009
Panel: Technical, Social and Legal Frameworks for Digital Forensics and CyberInfrastructure Security.
Proceedings of the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, 2009

2008
Key management and secure software updates in wireless process control environments.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

A Multi-Sensor Model to Improve Automated Attack Detection.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

An intrusion detection system for wireless process control systems.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

2007
VEIL: A System for Certifying Video Provenance.
Proceedings of the Ninth IEEE International Symposium on Multimedia, 2007

Securing Current and Future Process Control Systems.
Proceedings of the Critical Infrastructure Protection, 2007

Bonsai: Balanced Lineage Authentication.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Detecting Disruptive Routers in Wireless Sensor Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006

2003
Modeling Multistep Cyber Attacks for Scenario Recognition.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2001
Application-Integrated Data Collection for Security Monitoring.
Proceedings of the Recent Advances in Intrusion Detection, 4th International Symposium, 2001

eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

1999
On the Fundamentals of Analysis and Detection of Computer Misuse.
PhD thesis, 1999

Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST).
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

1998
A Map of Security Risks Associated wuth Using COTS.
Computer, 1998

1997
How to Systematically Classify Computer Security Intrusions.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997


  Loading...