Search the dblp DataBase
Svein J. Knapskog :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Karin Sallhammar , Bjarne E. Helvik , Svein J. Knapskog Towards a Stochastic Model for Integrated Security and Dependability Evaluation. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:156-165 [Conf ] Audun Jøsang , Daniel Bradley , Svein J. Knapskog Belief-Based Risk Analysis. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2004, pp:63-68 [Conf ] Svein J. Knapskog Formal Specification and Verification of Secure Communication Protocols. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:58-73 [Conf ] André Årnes , Karin Sallhammar , Kjetil Haslum , Tønnes Brekne , Marie Elisabeth Gaup Moe , Svein J. Knapskog Real-Time Risk Assessment with Network Sensors and Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:388-397 [Conf ] Danilo Gligoroski , Svein J. Knapskog , Suzana Andova Cryptcoding - Encryption and Error-Correction Coding in a Single Step. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:145-151 [Conf ] Karin Sallhammar , Bjarne E. Helvik , Svein J. Knapskog Incorporating Attacker Behavior in Stochastic Models of Security. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:79-85 [Conf ] Karin Sallhammar , Bjarne E. Helvik , Svein J. Knapskog A Game-Theoretic Approach to Stochastic Security and Dependability Evaluation. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:61-68 [Conf ] Svein J. Knapskog Privacy Protected Payments - Realization of a Protocol that Guarantees Payer Anonymity. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:107-122 [Conf ] Karin Sallhammar , Svein J. Knapskog , Bjarne E. Helvik Using Stochastic Game Theory to Compute the Expected Behavior of Attackers. [Citation Graph (0, 0)][DBLP ] SAINT Workshops, 2005, pp:102-105 [Conf ] Audun Jøsang , F. Van Laenen , Svein J. Knapskog , Joos Vandewalle How to trust systems. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:241-252 [Conf ] Bypassing Data Execution Prevention on MicrosoftWindows XP SP2. [Citation Graph (, )][DBLP ] Cross-Situation Trust Reasoning. [Citation Graph (, )][DBLP ] Attribute Normalization in Network Intrusion Detection. [Citation Graph (, )][DBLP ] On the Importance of the Key Separation Principle for Different Modes of Operation. [Citation Graph (, )][DBLP ] Real-time intrusion prevention and security analysis of networks using HMMs. [Citation Graph (, )][DBLP ] Trust transferability among similar contexts. [Citation Graph (, )][DBLP ] TSR: trust-based secure MANET routing using HMMs. [Citation Graph (, )][DBLP ] Autonomic Intrusion Detection System. [Citation Graph (, )][DBLP ] HiNFRA: Hierarchical Neuro-Fuzzy Learning for Online Risk Assessment. [Citation Graph (, )][DBLP ] New Cryptographic Primitives. [Citation Graph (, )][DBLP ] DIPS: A Framework for Distributed Intrusion Prediction and Prevention Using Hidden Markov Models and Online Fuzzy Risk Assessment. [Citation Graph (, )][DBLP ] High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms. [Citation Graph (, )][DBLP ] A Public Key Block Cipher Based on Multivariate Quadratic Quasigroups [Citation Graph (, )][DBLP ] A Probabilistic Reputation Algorithm for Decentralized Multi-Agent Environments. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.003secs