Följ
Linus Karlsson
Linus Karlsson
PhD Student, Computer Security
Verifierad e-postadress på eit.lth.se - Startsida
Titel
Citeras av
Citeras av
År
Safeguarding VNF credentials with Intel SGX
N Paladi, L Karlsson
Proceedings of the SIGCOMM Posters and Demos, 144-146, 2017
102017
Improved Greedy Nonrandomness Detectors for Stream Ciphers.
L Karlsson, M Hell, P Stankovski
ICISSP 2017, 225-232, 2017
82017
Multiple environmental influences on the lightning of cold-based continental cumulonimbus clouds. Part I: Description and validation of model
VTJ Phillips, M Formenton, VP Kanawade, LR Karlsson, S Patade, J Sun, ...
Journal of the Atmospheric Sciences 77 (12), 3999-4024, 2020
62020
Evaluation of different irrigation treatments with saline water in a future climate in Tunisia
T Selim, L Karlsson, F Bouksila, A Ben Slimane, M Persson
Irrigation and Drainage 68 (2), 281-296, 2019
52019
Identifying, prioritizing and evaluating vulnerabilities in third party code
A Cobleigh, M Hell, L Karlsson, O Reimer, J Sönnerup, D Wisenhoff
2018 IEEE 22nd International Enterprise Distributed Object Computing …, 2018
42018
eavesrop: Listening for rop payloads in data streams
C Jämthagen, L Karlsson, P Stankovski, M Hell
International Conference on Information Security, 413-424, 2014
42014
Not so greedy: Enhanced subset exploration for nonrandomness detectors
L Karlsson, M Hell, P Stankovski
International Conference on Information Systems Security and Privacy, 273-294, 2017
32017
Performance of constrained wireless devices in the Internet of Things
J Assarsson, L Karlsson
Department of Computer Science, Faculty of Engineering, LTH, Lund University, 2013
32013
A recommender system for user-specific vulnerability scoring
L Karlsson, PN Bideh, M Hell
International Conference on Risks and Security of Internet and Systems, 355-364, 2019
12019
Using TPM secure storage in trusted high availability systems
M Hell, L Karlsson, B Smeets, J Mirosavljevic
International Conference on Trusted Systems, 243-258, 2014
12014
Method for prioritizing among vulnerabilities in a software code and a server
L Karlsson, PN Bideh, M Hell
US Patent App. 17/594,225, 2022
2022
Contributions to Preventive Measures in Cyber Security.
L Karlsson
Lund University, Sweden, 2019
2019
Privacy-enabled Recommendations for Software Vulnerabilities
L Karlsson, N Paladi
2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2019
2019
A Recommender System for User-specific Vulnerability Scoring (full version)
L Karlsson, P Nikbakht Bideh, M Hell
2019
Analysis of simulation of lightning in a cold-based convective storm
L Karlsson
2018
Enabling Key Migration Between Non-Compatible TPM Versions
L Karlsson, M Hell
International Conference on Trust and Trustworthy Computing, 101-118, 2016
2016
Modern verksamhetsstyrning inom hälso-och sjukvård: En studie om processorientering
L Karlsson, E Mårtensson
2015
Beslut som fattas är inte bättre än den information besluten grundas i
R Sjöström, E Mårtensson, L Karlsson
2014
eavesROP: Listening for ROP Payloads in Data Streams (preliminary full version)
C Jämthagen, L Karlsson, P Stankovski, M Hell
[Publisher information missing], 2014
2014
Performance of constrained wireless devices in the Internet of Things
L Karlsson, J Assarsson
2013
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20