Ulf Lindqvist
Ulf Lindqvist
Program Director, SRI International
Bestätigte E-Mail-Adresse bei sri.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Detecting computer and network misuse through the production-based expert system toolset (P-BEST)
U Lindqvist, PA Porras
Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No …, 1999
4811999
How to systematically classify computer security intrusions
U Lindqvist, E Jonsson
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
4251997
Using model-based intrusion detection for SCADA networks
S Cheung, B Dutertre, M Fong, U Lindqvist, K Skinner, A Valdes
Proceedings of the SCADA security scientific symposium 46, 1-12, 2007
3842007
Modeling multistep cyber attacks for scenario recognition
S Cheung, U Lindqvist, MW Fong
Proceedings DARPA Information Survivability Conference And Exposition 1, 284-292, 2003
3452003
A map of security risks associated with using COTS
U Lindqvist, E Jonsson
Computer 31 (6), 60-66, 1998
1191998
Application-integrated data collection for security monitoring
M Almgren, U Lindqvist
International Workshop on Recent Advances in Intrusion Detection, 22-36, 2001
1172001
Key management and secure software updates in wireless process control environments
DK Nilsson, T Roosta, U Lindqvist, A Valdes
Proceedings of the first ACM conference on Wireless network security, 100-108, 2008
1162008
The future of the Internet of Things
U Lindqvist, PG Neumann
Communications of the ACM 60 (2), 26-30, 2017
802017
An approach to UNIX security logging
S Axelsson, U Lindqvist, U Gustafson, E Jonsson
Proceedings of the 21st National Information Systems Security Conference, 62-75, 1998
721998
Detecting anomalies in cellular networks using an ensemble method
GF Ciocarlie, U Lindqvist, S Nováczki, H Sanneck
Proceedings of the 9th international conference on network and service …, 2013
702013
Application-layer anomaly and misuse detection
PA Porras, M Almgren, UE Lindqvist, SM Dawson
US Patent 7,143,444, 2006
702006
eXpert-BSM: A host-based intrusion detection solution for Sun Solaris
U Lindqvist, PA Porras
Seventeenth Annual Computer Security Applications Conference, 240-251, 2001
702001
Detection, correlation, and visualization of attacks against critical infrastructure systems
L Briesemeister, S Cheung, U Lindqvist, A Valdes
2010 Eighth International Conference on Privacy, Security and Trust, 15-22, 2010
562010
An intrusion detection system for wireless process control systems
T Roosta, DK Nilsson, U Lindqvist, A Valdes
2008 5th IEEE international conference on mobile ad hoc and sensor systems …, 2008
482008
A multi-sensor model to improve automated attack detection
M Almgren, U Lindqvist, E Jonsson
International Workshop on Recent Advances in Intrusion Detection, 291-310, 2008
372008
Anomaly detection and diagnosis for automatic radio network verification
GF Ciocarlie, C Connolly, CC Cheng, U Lindqvist, S Nováczki, H Sanneck, ...
International Conference on Mobile Networks and Management, 163-176, 2014
312014
Crossing the" Valley of Death": Transitioning Cybersecurity Research into Practice
D Maughan, D Balenson, U Lindqvist, Z Tudor
IEEE Security & Privacy 11 (2), 14-23, 2013
292013
On the feasibility of deploying cell anomaly detection in operational cellular networks
G Ciocarlie, U Lindqvist, K Nitz, S Nováczki, H Sanneck
2014 IEEE Network Operations and Management Symposium (NOMS), 1-6, 2014
272014
Jumping the air gap: Modeling cyber-physical attack paths in the Internet-of-Things
I Agadakos, CY Chen, M Campanelli, P Anantharaman, M Hasan, ...
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and …, 2017
252017
Bonsai: Balanced lineage authentication
A Gehani, U Lindqvist
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
252007
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20