Follow
Linus Karlsson
Linus Karlsson
PhD Student, Computer Security
Verified email at eit.lth.se - Homepage
Title
Cited by
Cited by
Year
The common language of speech perception and action: a neurocognitive perspective
JL Schwartz, M Sato, L Fadiga
Revue française de linguistique appliquée 13 (2), 9-22, 2008
322008
Multiple environmental influences on the lightning of cold-based continental cumulonimbus clouds. Part I: Description and validation of model
VTJ Phillips, M Formenton, VP Kanawade, LR Karlsson, S Patade, J Sun, ...
Journal of the Atmospheric Sciences 77 (12), 3999-4024, 2020
132020
Evaluation of different irrigation treatments with saline water in a future climate in Tunisia
T Selim, L Karlsson, F Bouksila, A Ben Slimane, M Persson
Irrigation and Drainage 68 (2), 281-296, 2019
92019
Safeguarding VNF credentials with Intel SGX
N Paladi, L Karlsson
Proceedings of the SIGCOMM Posters and Demos, 144-146, 2017
92017
Improved greedy nonrandomness detectors for stream ciphers
L Karlsson, M Hell, P Stankovski
International Conference on Information Systems Security and Privacy, 225-232, 2017
92017
Identifying, prioritizing and evaluating vulnerabilities in third party code
A Cobleigh, M Hell, L Karlsson, O Reimer, J Sönnerup, D Wisenhoff
2018 IEEE 22nd International Enterprise Distributed Object Computing …, 2018
72018
Not so greedy: Enhanced subset exploration for nonrandomness detectors
L Karlsson, M Hell, P Stankovski
Information Systems Security and Privacy: Third International Conference …, 2018
62018
eavesrop: Listening for rop payloads in data streams
C Jämthagen, L Karlsson, P Stankovski, M Hell
Information Security: 17th International Conference, ISC 2014, Hong Kong …, 2014
62014
Performance of constrained wireless devices in the Internet of Things
J Assarsson, L Karlsson
Department of Computer Science, Faculty of Engineering, LTH, Lund University, 2013
42013
A recommender system for user-specific vulnerability scoring
L Karlsson, PN Bideh, M Hell
Risks and Security of Internet and Systems: 14th International Conference …, 2020
22020
Contributions to Preventive Measures in Cyber Security
L Karlsson
12019
Privacy-Enabled Recommendations for Software Vulnerabilities
L Karlsson, N Paladi
2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2019
12019
Deliverable D3. 8 5G-PPP security enablers documentation (v2. 0) enabler BootstrappingTrust
N Paladi, L Karlsson
5G Enablers for Network and System Security and Resilience Project 2017, 1-190, 2017
12017
Enabling key migration between non-compatible TPM versions
L Karlsson, M Hell
Trust and Trustworthy Computing: 9th International Conference, TRUST 2016 …, 2016
12016
Using TPM secure storage in trusted high availability systems
M Hell, L Karlsson, B Smeets, J Mirosavljevic
Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China …, 2015
12015
Method for prioritizing among vulnerabilities in a software code and a server
L Karlsson, PN Bideh, M Hell
US Patent App. 17/594,225, 2022
2022
A Recommender System for User-specific Vulnerability Scoring (full version)
L Karlsson, PN Bideh, M Hell
2019
Analysis of simulation of lightning in a cold-based convective storm
L Karlsson
2018
Modern verksamhetsstyrning inom hälso-och sjukvård: En studie om processorientering
L Karlsson, E Mårtensson
2015
Beslut som fattas är inte bättre än den information besluten grundas i
R Sjöström, E Mårtensson, L Karlsson
2014
The system can't perform the operation now. Try again later.
Articles 1–20