Using Quality Criteria in Programming Industry: A Case Study

Eivind J Nordby , E. Jonsson , Martin Blom , Donald F Ross
the European Software Day, Euromicro 98, Västerås, Sweden. August 1998

2
1998
Security Implications of Distributed Instrusion Detection Architectures

E. Jonsson , H. Kvarnström , Hans Hedbom
the Forth Nordic Workshop on Secure IT Systems, Stockholm, November 1-2 ,1999

1999
Using active learning in intrusion detection

M. Almgren , E. Jonsson
ieee computer security foundations symposium 88 -98

51
2004
Towards an integrated conceptual model of security and dependability

E. Jonsson
availability, reliability and security 646 -653

54
2006
A Practical Dependability Measure for Embedded Computer Systems

E. Jonsson , S. Asmussen
IFAC Proceedings Volumes 26 ( 2) 647 -652

3
1993
A map of security risks associated with using COTS

U. Lindqvist , E. Jonsson
IEEE Computer 31 ( 6) 60 -66

65
1998
Extracting attack manifestations to determine log data requirements for intrusion detection

E.L. Barse , E. Jonsson
annual computer security applications conference 158 -167

23
2004
An empirical model of the security intrusion process

E. Jonsson , T. Olovsson
Proceedings of 11th Annual Conference on Computer Assurance. COMPASS '96 176 -186

10
1996
An analysis of a secure system based on trusted components

U. Lindqvist , T. Olovsson , E. Jonsson
Proceedings of 11th Annual Conference on Computer Assurance. COMPASS '96 213 -223

21
1996
Mapping Systems Security Research at Chalmers

M. Almgren , Z. Fu , E. Jonsson , P. Kleberger
2011 First SysSec Workshop 67 -70

2
2011
On measurement of operational security

S. Brocklehurst , B. Littlewood , T. Olovsson , E. Jonsson
IEEE Aerospace and Electronic Systems Magazine 9 ( 10) 7 -16

61
1994
Security intrusion process: an empirical model

E. Jonsson , T. Olovsson
IEEE Aerospace and Electronic Systems Magazine 12 ( 4) 7 -17

3
1997
A quantitative model of the security intrusion process based on attacker behavior

E. Jonsson , T. Olovsson
IEEE Transactions on Software Engineering 23 ( 4) 235 -245

248
1997
A Framework for Security Metrics Based on Operational System Attributes

E. Jonsson , L. Pirzadeh
international workshop on security 58 -65

14
2011
A Cause and Effect Approach towards Risk Analysis

L. Pirzadeh , E. Jonsson
international workshop on security 80 -83

4
2011
A practical dependability measure for degradable computer systems with non-exponential degradation

E. Jonsson , M. Andersson , S. Asmussen
IFAC Proceedings Volumes 27 ( 5) 227 -233

10
1994
A taxonomy and overview of information security experiments

E. Jonsson , L. J. Janczewski
information security 139 -150

3
1997
How to systematically classify computer security intrusions

U. Lindqvist , E. Jonsson
ieee symposium on security and privacy 154 -163

248
1997