The rise and fall of napster-an evolutionary approach B Carlsson, R Gustavsson International Computer Science Conference on Active Media Technology, 347-354, 2001 | 86 | 2001 |
Agile development with security engineering activities D Baca, B Carlsson Proceedings of the 2011 International Conference on Software and Systems …, 2011 | 72 | 2011 |
Static code analysis to detect software security vulnerabilities-does experience matter? D Baca, K Petersen, B Carlsson, L Lundberg 2009 International Conference on Availability, Reliability and Security, 804-810, 2009 | 67 | 2009 |
Evaluating the cost reduction of static code analysis for software security D Baca, B Carlsson, L Lundberg Proceedings of the third ACM SIGPLAN workshop on Programming languages and …, 2008 | 48 | 2008 |
Method and apparatus for generating management data for drifting mobile radios S Svedevall, B Carlsson, S Johansson US Patent 7,076,249, 2006 | 46 | 2006 |
Improving software security with static automated code analysis in an industry setting D Baca, B Carlsson, K Petersen, L Lundberg Software: Practice and Experience 43 (3), 259-279, 2013 | 38 | 2013 |
A study of the Co-WC system at liquidus temperatures B Uhrenius | 32 | 1976 |
Identification and evaluation of security activities in agile projects T Ayalew, T Kidane, B Carlsson Nordic Conference on Secure IT Systems, 139-153, 2013 | 26 | 2013 |
Exploring spyware effects M Boldt, B Carlsson, A Jacobsson Nordsec 2004, 2004 | 26 | 2004 |
On the risk exposure of smart home automation systems A Jacobsson, M Boldt, B Carlsson 2014 International Conference on Future Internet of Things and Cloud, 183-190, 2014 | 25 | 2014 |
Privacy-invasive software and preventive mechanisms M Boldt, B Carlsson 2006 International Conference on Systems and Networks Communications (ICSNC …, 2006 | 24 | 2006 |
A study of the nickel-rich and cobalt-rich corners of the systems Ni-Ti-C and Co-Ti-C L Backerud | 21 | 1974 |
Software security analysis-execution phase audit B Carlsson, D Baca 31st EUROMICRO Conference on Software Engineering and Advanced Applications …, 2005 | 17 | 2005 |
An iterated hawk-and-dove game B Carlsson, S Johansson Australian Workshop on Distributed Artificial Intelligence, 179-192, 1997 | 16 | 1997 |
Om säkerhet i digitala ekosystem B Carlsson, A Jacobsson Studentlitteratur AB, 2012 | 15 | 2012 |
Privacy-Invasive Software in Filesharing Tools A Jacobsson, M Boldt, B Carlsson Information Security Management, Education and Privacy, 281-296, 2004 | 14 | 2004 |
A new method for fault detection and diagnosis B Carlsson, M Salgado, G Goodwin Rapport technique, EE8842, Departement of electrical engineering and …, 1988 | 14 | 1988 |
Extremum seeking control of the CANON process—Existence of multiple stationary solutions O Trollberg, B Carlsson, EW Jacobsen Journal of Process Control 24 (2), 348-356, 2014 | 13 | 2014 |
Grid size optimization for potential field based maritime anomaly detection E Osekowska, H Johnson, B Carlsson Transportation Research Procedia 3, 720-729, 2014 | 13 | 2014 |
Coordination models for dynamic resource allocation S Johansson, P Davidsson, B Carlsson International Conference on Coordination Languages and Models, 182-197, 2000 | 13 | 2000 |