The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Svein J. Knapskog: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Karin Sallhammar, Bjarne E. Helvik, Svein J. Knapskog
    Towards a Stochastic Model for Integrated Security and Dependability Evaluation. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:156-165 [Conf]
  2. Audun Jøsang, Daniel Bradley, Svein J. Knapskog
    Belief-Based Risk Analysis. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2004, pp:63-68 [Conf]
  3. Svein J. Knapskog
    Formal Specification and Verification of Secure Communication Protocols. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:58-73 [Conf]
  4. André Årnes, Karin Sallhammar, Kjetil Haslum, Tønnes Brekne, Marie Elisabeth Gaup Moe, Svein J. Knapskog
    Real-Time Risk Assessment with Network Sensors and Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:388-397 [Conf]
  5. Danilo Gligoroski, Svein J. Knapskog, Suzana Andova
    Cryptcoding - Encryption and Error-Correction Coding in a Single Step. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:145-151 [Conf]
  6. Karin Sallhammar, Bjarne E. Helvik, Svein J. Knapskog
    Incorporating Attacker Behavior in Stochastic Models of Security. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:79-85 [Conf]
  7. Karin Sallhammar, Bjarne E. Helvik, Svein J. Knapskog
    A Game-Theoretic Approach to Stochastic Security and Dependability Evaluation. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:61-68 [Conf]
  8. Svein J. Knapskog
    Privacy Protected Payments - Realization of a Protocol that Guarantees Payer Anonymity. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:107-122 [Conf]
  9. Karin Sallhammar, Svein J. Knapskog, Bjarne E. Helvik
    Using Stochastic Game Theory to Compute the Expected Behavior of Attackers. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2005, pp:102-105 [Conf]
  10. Audun Jøsang, F. Van Laenen, Svein J. Knapskog, Joos Vandewalle
    How to trust systems. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:241-252 [Conf]

  11. Bypassing Data Execution Prevention on MicrosoftWindows XP SP2. [Citation Graph (, )][DBLP]


  12. Cross-Situation Trust Reasoning. [Citation Graph (, )][DBLP]


  13. Attribute Normalization in Network Intrusion Detection. [Citation Graph (, )][DBLP]


  14. On the Importance of the Key Separation Principle for Different Modes of Operation. [Citation Graph (, )][DBLP]


  15. Real-time intrusion prevention and security analysis of networks using HMMs. [Citation Graph (, )][DBLP]


  16. Trust transferability among similar contexts. [Citation Graph (, )][DBLP]


  17. TSR: trust-based secure MANET routing using HMMs. [Citation Graph (, )][DBLP]


  18. Autonomic Intrusion Detection System. [Citation Graph (, )][DBLP]


  19. HiNFRA: Hierarchical Neuro-Fuzzy Learning for Online Risk Assessment. [Citation Graph (, )][DBLP]


  20. New Cryptographic Primitives. [Citation Graph (, )][DBLP]


  21. DIPS: A Framework for Distributed Intrusion Prediction and Prevention Using Hidden Markov Models and Online Fuzzy Risk Assessment. [Citation Graph (, )][DBLP]


  22. High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms. [Citation Graph (, )][DBLP]


  23. A Public Key Block Cipher Based on Multivariate Quadratic Quasigroups [Citation Graph (, )][DBLP]


  24. A Probabilistic Reputation Algorithm for Decentralized Multi-Agent Environments. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002