Linus Karlsson

knuten till universitetet
Fler filtreringsmöjligheter
  1. 2020
  2. A Recommender System for User-Specific Vulnerability Scoring

    Linus Karlsson, Pegah Nikbakht Bideh & Martin Hell, 2020, CRiSIS 2019: Risks and Security of Internet and Systems. Springer, s. 355-364 ( Lecture Notes in Computer Science; vol. 12026).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  3. 2019
  4. Contributions to Preventive Measures in Cyber Security

    Linus Karlsson, 2019 sep 30, Department of Electrical and Information Technology, Lund University. 205 s.

    Forskningsoutput: AvhandlingDoktorsavhandling (sammanläggning)

  5. Privacy-enabled Recommendations for Software Vulnerabilities

    Linus Karlsson & Nicolae Paladi, 2019, The 17th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2019). IEEE - Institute of Electrical and Electronics Engineers Inc.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  6. 2018
  7. Trust Anchors in Software Defined Networks

    Nicolae Paladi, Linus Karlsson & Elbashir, K., 2018 aug 7, 23rd European Symposium on Research in Computer Security, ESORICS 2018. Springer, Vol. 11099. s. 485-505 20 s. (Lecture Notes in Computer Science; vol. 11009).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  8. Not so greedy: Enhanced subset exploration for nonrandomness detectors

    Linus Karlsson, Martin Hell & Paul Stankovski, 2018 jan 1, Information Systems Security and Privacy - 3rd International Conference, ICISSP 2017, Revised Selected Papers. Springer, s. 273-294 22 s. (Communications in Computer and Information Science; vol. 867).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  9. Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code

    Cobleigh, A., Martin Hell, Linus Karlsson, Reimer, O., Jonathan Sönnerup & Wisenhoff, D., 2018, IEEE 22nd International Enterprise Distributed Object Computing Workshop. IEEE - Institute of Electrical and Electronics Engineers Inc., 4 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  10. 2017
  11. Safeguarding VNF Credentials with Intel SGX

    Nicolae Paladi & Linus Karlsson, 2017 aug 22, SIGCOMM Posters and Demos '17. Association for Computing Machinery (ACM), s. 144-146

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  12. Improved Greedy Nonrandomness Detectors for Stream Ciphers

    Linus Karlsson, Martin Hell & Paul Stankovski, 2017 feb, Proceedings of the 3rd International Conference on Information Systems Security and Privacy. Porto, Portugal: SciTePress, Vol. 1. s. 225-232 8 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  13. 2016
  14. Enabling Key Migration Between Non-Compatible TPM Versions

    Linus Karlsson & Martin Hell, 2016, Trust and Trustworthy Computing. Springer, Vol. 9824. s. 101-118 8 s. (Lecture Notes in Computer Science; vol. 9824).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  15. 2014
  16. eavesROP: Listening for ROP Payloads in Data Streams

    Jämthagen, C., Linus Karlsson, Paul Stankovski & Martin Hell, 2014, Information Security/Lecture Notes in Computer Science. Chow, S. S. M., Camenisch, J., Hui, L. C. K. & Yiu, S. M. (red.). Springer, Vol. 8783. s. 413-424 (Lecture Notes in Computer Science; vol. 8783).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  17. eavesROP: Listening for ROP Payloads in Data Streams (preliminary full version)

    Jämthagen, C., Linus Karlsson, Paul Stankovski & Martin Hell, 2014, (Unpublished) [Publisher information missing].

    Forskningsoutput: Bok/rapportRapport

  18. Using TPM Secure Storage in Trusted High Availability Systems

    Martin Hell, Linus Karlsson, Ben Smeets & Mirosavljevic, J., 2014, Trusted Systems/Lecture Notes in Computer Science. Yung, M., Zhu, L. & Yang, Y. (red.). Springer, Vol. 9473. s. 243-258 (Lecture Notes in Computer Science; vol. 9473).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding