Panel: Technical, Social and Legal Frameworks for Digital Forensics and CyberInfrastructure Security

Jean West , Ulf Lindqvist Peter J. Vasquez , Michael Losavio , Sean Peisert
2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering 97 -98

2009
A Comparison of Alternative Audit Sources for Web Server Attack Detection

Magnus Almgren , Ulf Lindqvist , Erland Jonsson
The 12th Nordic Workshop on Secure IT-systems

5
2007
On the Fundamentals of Analysis and Detection of Computer Misuse

Ulf Lindqvist
Chalmers University of Technology

26
1999
Detecting disruptive routers in wireless sensor networks

Bruno Dutertre , Steven Cheung , Ulf Lindqvist
Lecture Notes in Computer Science 19 -31

2
2006
IoTHound: environment-agnostic device identification and monitoring

Gabriela Ciocarlie , Ulf Lindqvist , Ioannis Agadakos , Prashant Anantharaman
the internet of things

2020
Jumping the Air Gap: Modeling Cyber-Physical Attack Paths in the Internet-of-Things

Ioannis Agadakos , Chien-Ying Chen , Matteo Campanelli , Prashant Anantharaman
workshop on cyber physical systems 37 -48

19
2017
Key management and secure software updates in wireless process control environments

Dennis K. Nilsson , Tanya Roosta , Ulf Lindqvist , Alfonso Valdes
wireless network security 100 -108

92
2008
Managing scope changes for cellular network-level anomaly detection

Gabriela F. Ciocarlie , Chih-Chieh Cheng , Christopher Connolly , Ulf Lindqvist
international symposium on wireless communication systems 375 -379

8
2014
Building Hardened Internet-of-Things Clients with Language-Theoretic Security

Prashant Anantharaman , Michael Locasto , Gabriela F. Ciocarlie , Ulf Lindqvist
ieee symposium on security and privacy 120 -126

11
2017
Detecting anomalies in cellular networks using an ensemble method

Gabriela F. Ciocarlie , Ulf Lindqvist , Szabolcs Novaczki , Henning Sanneck
conference on network and service management 171 -174

50
2013
Risks and Benefits of Side-Channels in Battlefields

Ioannis Agadakos , Gabriela F. Ciocarlie , Bogdan Copos , Tancrede Lepoint
international conference on information fusion 2290 -2297

1
2018
DCAD: Dynamic Cell Anomaly Detection for operational cellular networks

Gabriela Ciocarlie , Ulf Lindqvist , Kenneth Nitz , Szabolcs Novaczki
2014 IEEE Network Operations and Management Symposium (NOMS) 1 -2

5
2014
On the feasibility of deploying cell anomaly detection in operational cellular networks

Gabriela Ciocarlie , Ulf Lindqvist , Kenneth Nitz , Szabolcs Novaczki
2014 IEEE Network Operations and Management Symposium (NOMS) 1 -6

23
2014
Crossing the "Valley of Death": Transitioning Cybersecurity Research into Practice

Douglas Maughan , David Balenson , Ulf Lindqvist , Zachary Tudor
ieee symposium on security and privacy 11 ( 2) 14 -23

16
2013
IEEE SecDev 2016: Prioritizing Secure Development

Robert Cunningham , Pamela Gupta , Ulf Lindqvist , Stelios Sidiroglou-Douskos
ieee symposium on security and privacy 14 ( 4) 82 -84

2
2016
Building on the Success of Building Security In

Archer Batcheller , Summer Craze Fowler , Robert Cunningham , Dinara Doyle
ieee symposium on security and privacy 15 ( 4) 85 -87

5
2017
VEIL: A System for Certifying Video Provenance

Ashish Gehani , Ulf Lindqvist
international symposium on multimedia 263 -272

9
2007
Host protection strategies for industrial control systems

Anne McIntyre , Ulf Lindqvist , Brian Peterson , Zachary Tudor
ieee international conference on technologies for homeland security 87 -92

3
2012
Correlated Attack Modeling (CAM)

Ulf Lindqvist , Steven Cheung , Rico Valdez
Defense Technical Information Center

3
2003