Bengt Carlsson
Bengt Carlsson
Verified email at
Cited by
Cited by
The rise and fall of napster-an evolutionary approach
B Carlsson, R Gustavsson
International Computer Science Conference on Active Media Technology, 347-354, 2001
Integrated modelling of runoff, alkalinity, and pH on a daily basis
S Bergström, B Carlsson, G Sandberg, L Maxe
Hydrology Research 16 (2), 89-104, 1985
Static code analysis to detect software security vulnerabilities-does experience matter?
D Baca, K Petersen, B Carlsson, L Lundberg
2009 International Conference on Availability, Reliability and Security, 804-810, 2009
Agile development with security engineering activities
D Baca, B Carlsson
Proceedings of the 2011 International Conference on Software and Systems …, 2011
Evaluating the cost reduction of static code analysis for software security
D Baca, B Carlsson, L Lundberg
Proceedings of the third ACM SIGPLAN workshop on Programming languages and …, 2008
Climate and hydrology of the Baltic Basin
S Bergström, H Alexandersson, B Carlsson, W Josefsson, KG Karlsson, ...
A systems Analysis of the Baltic Sea, 75-112, 2001
Method and apparatus for generating management data for drifting mobile radios
S Svedevall, B Carlsson, S Johansson
US Patent 7,076,249, 2006
Improving software security with static automated code analysis in an industry setting
D Baca, B Carlsson, K Petersen, L Lundberg
Software: Practice and Experience 43 (3), 259-279, 2013
Identification and evaluation of security activities in agile projects
T Ayalew, T Kidane, B Carlsson
Nordic Conference on Secure IT Systems, 139-153, 2013
On the risk exposure of smart home automation systems
A Jacobsson, M Boldt, B Carlsson
2014 International Conference on Future Internet of Things and Cloud, 183-190, 2014
Exploring spyware effects
M Boldt, B Carlsson, A Jacobsson
Nordsec 2004, 2004
Privacy-invasive software and preventive mechanisms
M Boldt, B Carlsson
2006 International Conference on Systems and Networks Communications (ICSNC …, 2006
A study of the nickel-rich and cobalt-rich corners of the systems Ni-Ti-C and Co-Ti-C
L Backerud
An iterated hawk-and-dove game
B Carlsson, S Johansson
Australian Workshop on Distributed Artificial Intelligence, 179-192, 1997
Software security analysis-execution phase audit
B Carlsson, D Baca
31st EUROMICRO Conference on Software Engineering and Advanced Applications …, 2005
Grid size optimization for potential field based maritime anomaly detection
E Osekowska, H Johnson, B Carlsson
Transportation Research Procedia 3, 720-729, 2014
Om säkerhet i digitala ekosystem
B Carlsson, A Jacobsson
Studentlitteratur AB, 2012
Privacy-Invasive Software in Filesharing Tools
A Jacobsson, M Boldt, B Carlsson
Information Security Management, Education and Privacy, 281-296, 2004
Extremum seeking control of the CANON process—Existence of multiple stationary solutions
O Trollberg, B Carlsson, EW Jacobsen
Journal of Process Control 24 (2), 348-356, 2014
A new method for fault detection and diagnosis
B Carlsson, M Salgado, G Goodwin
Rapport technique, EE8842, Departement of electrical engineering and …, 1988
The system can't perform the operation now. Try again later.
Articles 1–20