
Tomas Olovsson
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c29]Thomas Rosenstatter
, Kim Strandberg, Rodi Jolak, Riccardo Scandariato, Tomas Olovsson:
REMIND: A Framework for the Resilient Design of Automotive Systems. SecDev 2020: 81-95
2010 – 2019
- 2019
- [c28]Thomas Rosenstatter
, Christian Sandberg, Tomas Olovsson:
Extending AUTOSAR's Counter-Based Solution for Freshness of Authenticated Messages in Vehicles. PRDC 2019: 1-10 - [c27]Aljoscha Lautenbach, Nasser Nowdehi, Tomas Olovsson, Romi Zaragatzky:
A Preliminary Security Assessment of 5G V2X. VTC Spring 2019: 1-7 - [i2]Nasser Nowdehi, Wissam Aoudi
, Magnus Almgren, Tomas Olovsson:
CASAD: CAN-Aware Stealthy-Attack Detection for In-Vehicle Networks. CoRR abs/1909.08407 (2019) - 2018
- [c26]Aljoscha Lautenbach
, Magnus Almgren
, Tomas Olovsson
:
Understanding Common Automotive Security Issues and Their Implications. ISSA/CSITS@ESORICS 2018: 19-34 - [c25]Thomas Rosenstatter
, Tomas Olovsson:
Towards a Standardized Mapping from Automotive Security Levels to Security Mechanisms. ITSC 2018: 1501-1507 - [c24]Thomas Rosenstatter
, Tomas Olovsson:
Open Problems when Mapping Automotive Security Levels to System Requirements. VEHITS 2018: 251-260 - 2017
- [c23]Aljoscha Lautenbach, Magnus Almgren
, Tomas Olovsson:
What the Stack? On Memory Exploitation and Protection in Resource Constrained Automotive Systems. CRITIS 2017: 185-193 - [c22]Mathias Johanson, Jonas Jalminger, Emmanuel Frécon, Boel Nelson
, Tomas Olovsson, Mats Gjertz:
Joint Subjective and Objective Data Capture and Analytics for Automotive Applications. VTC-Fall 2017: 1-5 - [c21]Boel Nelson
, Tomas Olovsson:
Introducing Differential Privacy to the Automotive Domain: Opportunities and Challenges. VTC-Fall 2017: 1-7 - [c20]Nasser Nowdehi, Aljoscha Lautenbach
, Tomas Olovsson:
In-Vehicle CAN Message Authentication: An Evaluation Based on Industrial Criteria. VTC-Fall 2017: 1-7 - 2016
- [c19]Boel Nelson
, Tomas Olovsson:
Security and privacy for big data: A systematic literature review. BigData 2016: 3693-3702 - [c18]Mafijul Md. Islam, Aljoscha Lautenbach, Christian Sandberg, Tomas Olovsson:
A Risk Assessment Framework for Automotive Embedded Systems. CPSS@AsiaCCS 2016: 3-14 - 2015
- [c17]Nasser Nowdehi, Pierre Kleberger, Tomas Olovsson:
Improving in-vehicle network architectures using automated partitioning algorithms. VNC 2015: 259-266 - 2014
- [c16]Farnaz Moradi, Ann-Marie Eklund, Dimitrios Kokkinakis, Tomas Olovsson, Philippas Tsigas:
A Graph-Based Analysis of Medical Queries of a Swedish Health Care Portal. Louhi@EACL 2014: 2-10 - [c15]Farnaz Moradi, Tomas Olovsson, Philippas Tsigas
:
A local seed selection algorithm for overlapping community detection. ASONAM 2014: 1-8 - [c14]Nasser Nowdehi, Tomas Olovsson:
Experiences from implementing the ETSI ITS SecuredMessage service. Intelligent Vehicles Symposium 2014: 1055-1060 - [c13]Farnaz Moradi, Tomas Olovsson, Philippas Tsigas
:
Overlapping Communities for Identifying Misbehavior in Network Communications. PAKDD (1) 2014: 398-409 - [c12]Pierre Kleberger, Tomas Olovsson:
Securing Vehicle Diagnostics in Repair Shops. SAFECOMP 2014: 93-108 - [c11]Pierre Kleberger, Nasser Nowdehi, Tomas Olovsson:
Towards designing secure in-vehicle network architectures using community detection algorithms. VNC 2014: 69-76 - 2013
- [c10]Pierre Kleberger, Tomas Olovsson:
Protecting Vehicles Against Unauthorised Diagnostics Sessions Using Trusted Third Parties. SAFECOMP 2013: 70-81 - 2012
- [c9]Behrooz Sangchoolie, Mazdak Rajabi Nasab, Tomas Olovsson, Wolfgang John
:
Assessing the Quality of Packet-Level Traces Collected on Internet Backbone Links. NordSec 2012: 184-198 - [c8]Farnaz Moradi, Tomas Olovsson, Philippas Tsigas
:
Towards modeling legitimate and unsolicited email traffic using social network properties. SNS 2012: 9 - [c7]Farnaz Moradi, Tomas Olovsson, Philippas Tsigas
:
An Evaluation of Community Detection Algorithms on Large-Scale Email Traffic. SEA 2012: 283-294 - 2011
- [c6]Farnaz Moradi, Magnus Almgren
, Wolfgang John
, Tomas Olovsson, Philippas Tsigas
:
On collection of large-scale multi-purpose datasets on internet backbone links. BADGERS@EuroSys 2011: 62-69 - [c5]Magnus Almgren
, Zhang Fu, E. Jonsson, Pierre Kleberger, Andreas Larsson, Farnaz Moradi, Tomas Olovsson, Marina Papatriantafilou
, L. Pirzadeh, Philippas Tsigas
:
Mapping Systems Security Research at Chalmers. SysSec@DIMVA 2011: 67-70 - [c4]Farnaz Moradi, Tomas Olovsson, Philippas Tsigas
:
The Anti-Social Behavior of Spam. EC2ND 2011: 57 - [c3]Pierre Kleberger, Tomas Olovsson, Erland Jonsson:
Security aspects of the in-vehicle network in the connected car. Intelligent Vehicles Symposium 2011: 528-533 - 2010
- [j3]Wolfgang John
, Sven Tafvelin, Tomas Olovsson:
Passive internet measurement: Overview and guidelines based on experiences. Comput. Commun. 33(5): 533-550 (2010) - [i1]Farnaz Moradi, Tomas Olovsson, Philippas Tsigas:
Analyzing the Social Structure and Dynamics of E-mail and Spam in Massive Backbone Internet Traffic. CoRR abs/1008.3289 (2010)
2000 – 2009
- 2009
- [j2]Sheikh Mahbub Habib, Cyril Jacob, Tomas Olovsson:
An Analysis of the Robustness and Stability of the Network Stack in Symbian-based Smartphones. J. Networks 4(10): 968-975 (2009) - 2008
- [c2]Wolfgang John
, Sven Tafvelin, Tomas Olovsson:
Trends and Differences in Connection-Behavior within Classes of Internet Backbone Traffic. PAM 2008: 192-201
1990 – 1999
- 1997
- [j1]Erland Jonsson, Tomas Olovsson:
A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior. IEEE Trans. Software Eng. 23(4): 235-245 (1997) - 1996
- [c1]Ulf Gustafson, Erland Jonsson, Tomas Olovsson:
On the modelling of preventive security based on a PC network intrusion experiment. ACISP 1996: 242-252 - 1995
- [b1]Tomas Olovsson:
Practical Experimentation as a Tool for Vulnerability Analysis and Security Evaluation. Chalmers University of Technology, Gothenburg, Sweden, 1995
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-24 22:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint