Contributions to Preventive Measures in Cyber Security

Linus Karlsson

Research output: ThesisDoctoral Thesis (compilation)

628 Downloads (Pure)

Search results

  • 2020

    A Recommender System for User-Specific Vulnerability Scoring

    Karlsson, L., Nikbakht Bideh, P. & Hell, M., 2020, CRiSIS 2019: Risks and Security of Internet and Systems. Springer, p. 355-364 ( Lecture Notes in Computer Science; vol. 12026).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceedingpeer-review

    Open Access
    File
    133 Downloads (Pure)
  • 2019

    Privacy-enabled Recommendations for Software Vulnerabilities

    Karlsson, L. & Paladi, N., 2019, The 17th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2019). IEEE - Institute of Electrical and Electronics Engineers Inc.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceedingpeer-review

    Open Access
    File
    176 Downloads (Pure)
  • 2018

    Not so greedy: Enhanced subset exploration for nonrandomness detectors

    Karlsson, L., Hell, M. & Stankovski, P., 2018 Jan 1, Information Systems Security and Privacy - 3rd International Conference, ICISSP 2017, Revised Selected Papers. Springer, p. 273-294 22 p. (Communications in Computer and Information Science; vol. 867).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceedingpeer-review

    Open Access
    File
    163 Downloads (Pure)
  • Trust Anchors in Software Defined Networks

    Paladi, N., Karlsson, L. & Elbashir, K., 2018 Aug 7, 23rd European Symposium on Research in Computer Security, ESORICS 2018. Springer, Vol. 11099. p. 485-505 20 p. (Lecture Notes in Computer Science; vol. 11009).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceedingpeer-review

    Open Access
    File
    265 Downloads (Pure)
  • 2016

    Enabling Key Migration Between Non-Compatible TPM Versions

    Karlsson, L. & Hell, M., 2016, Trust and Trustworthy Computing. Springer, Vol. 9824. p. 101-118 8 p. (Lecture Notes in Computer Science; vol. 9824).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceedingpeer-review

    Open Access
    File
    917 Downloads (Pure)
  • 2014

    Using TPM Secure Storage in Trusted High Availability Systems

    Hell, M., Karlsson, L., Smeets, B. & Mirosavljevic, J., 2014, Trusted Systems/Lecture Notes in Computer Science. Yung, M., Zhu, L. & Yang, Y. (eds.). Springer, Vol. 9473. p. 243-258 (Lecture Notes in Computer Science; vol. 9473).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceedingpeer-review

    Open Access
    File
    377 Downloads (Pure)