Detecting computer and network misuse through the production-based expert system toolset (P-BEST) U Lindqvist, PA Porras Proceedings of the 1999 IEEE symposium on security and privacy (Cat. No …, 1999 | 498 | 1999 |
Using model-based intrusion detection for SCADA networks S Cheung, B Dutertre, M Fong, U Lindqvist, K Skinner, A Valdes Proceedings of the SCADA security scientific symposium 46, 1-12, 2007 | 478 | 2007 |
How to systematically classify computer security intrusions U Lindqvist, E Jonsson Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997 | 455 | 1997 |
Modeling multistep cyber attacks for scenario recognition S Cheung, U Lindqvist, MW Fong Proceedings DARPA Information Survivability Conference And Exposition 1, 284-292, 2003 | 363 | 2003 |
Key management and secure software updates in wireless process control environments DK Nilsson, T Roosta, U Lindqvist, A Valdes Proceedings of the first ACM conference on Wireless network security, 100-108, 2008 | 164 | 2008 |
A map of security risks associated with using COTS U Lindqvist, E Jonsson Computer 31 (6), 60-66, 1998 | 124 | 1998 |
Application-integrated data collection for security monitoring M Almgren, U Lindqvist International Workshop on Recent Advances in Intrusion Detection, 22-36, 2001 | 122 | 2001 |
The future of the Internet of Things U Lindqvist, PG Neumann Communications of the ACM 60 (2), 26-30, 2017 | 112 | 2017 |
Detecting anomalies in cellular networks using an ensemble method GF Ciocarlie, U Lindqvist, S Nováczki, H Sanneck Proceedings of the 9th international conference on network and service …, 2013 | 91 | 2013 |
Application-layer anomaly and misuse detection PA Porras, M Almgren, UE Lindqvist, SM Dawson US Patent 7,143,444, 2006 | 75 | 2006 |
eXpert-BSM: A host-based intrusion detection solution for Sun Solaris U Lindqvist, PA Porras Seventeenth Annual Computer Security Applications Conference, 240-251, 2001 | 74 | 2001 |
An approach to UNIX security logging S Axelsson, U Lindqvist, U Gustafson, E Jonsson Proceedings of the 21st National Information Systems Security Conference, 62-75, 1998 | 71 | 1998 |
Detection, correlation, and visualization of attacks against critical infrastructure systems L Briesemeister, S Cheung, U Lindqvist, A Valdes 2010 Eighth International Conference on Privacy, Security and Trust, 15-22, 2010 | 64 | 2010 |
An intrusion detection system for wireless process control systems T Roosta, DK Nilsson, U Lindqvist, A Valdes 2008 5th IEEE international conference on mobile ad hoc and sensor systems …, 2008 | 53 | 2008 |
Jumping the air gap: Modeling cyber-physical attack paths in the Internet-of-Things I Agadakos, CY Chen, M Campanelli, P Anantharaman, M Hasan, ... Proceedings of the 2017 workshop on cyber-physical systems security and …, 2017 | 44 | 2017 |
A multi-sensor model to improve automated attack detection M Almgren, U Lindqvist, E Jonsson Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008 | 44 | 2008 |
Crossing the" Valley of Death": Transitioning cybersecurity research into practice D Maughan, D Balenson, U Lindqvist, Z Tudor IEEE Security & Privacy 11 (2), 14-23, 2013 | 43 | 2013 |
Anomaly detection and diagnosis for automatic radio network verification GF Ciocarlie, C Connolly, CC Cheng, U Lindqvist, S Nováczki, H Sanneck, ... Mobile Networks and Management: 6th International Conference, MONAMI 2014 …, 2015 | 37 | 2015 |
On the feasibility of deploying cell anomaly detection in operational cellular networks G Ciocarlie, U Lindqvist, K Nitz, S Nováczki, H Sanneck 2014 IEEE Network Operations and Management Symposium (NOMS), 1-6, 2014 | 37 | 2014 |
Bonsai: Balanced lineage authentication A Gehani, U Lindqvist Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007 | 27 | 2007 |