SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Jonsson Stefan) ;lar1:(kau)"

Sökning: WFRF:(Jonsson Stefan) > Karlstads universitet

  • Resultat 1-10 av 30
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Hedbom, Hans, et al. (författare)
  • A Comparison of the Security of Windows NT and UNIX
  • 1998
  • Konferensbidrag (refereegranskat)abstract
    • This paper presents a brief comparison of two operating systems, Windows NT and UNIX. The comparison covers two different aspects. First, we compare the main security features of the two operating systems and then we make a comparison of a selection of vulnerabilities most of which we know have been used for making real intrusions. We found that Windows NT has slightly more rigorous security features than standard UNIX but the two systems display similar vulnerabilities. The conclusion is that there are no significant differences in the real level of security between these systems
  •  
2.
  • Hedbom, Hans, et al. (författare)
  • Analysis of the Security of Windows NT
  • 1998
  • Rapport (refereegranskat)abstract
    • This paper presents an analysis of the security in Windows NT 4.0, working in both stand-alone and networking mode. The objective of the work was to find out how secure this operating system actually is. A technical overview of the system, and in particular its security features is given. The system security was analyzed and practical intrusion attempts were made in order to verify vulnerabilities or to find new ones. All vulnerabilities are described in detail and classified according to a classification scheme. A comparison to commonly known UNIX weaknesses was made. It revealed generic similarities between the two systems to a surprisingly high degree. Finally a number of recommendations are given. The paper concludes that there are ample opportunities to improve the security of Windows NT. We have reason to believe that it is probably not higher than that of UNIX
  •  
3.
  • Forseth, Torbjörn, et al. (författare)
  • Thermal growth performance of juvenile brown trout Salmo trutta : no support for thermal adaptation hypotheses
  • 2009
  • Ingår i: Journal of Fish Biology. - : Wiley. - 0022-1112 .- 1095-8649. ; 74:1, s. 133-149
  • Tidskriftsartikel (refereegranskat)abstract
    • Using thermal growth data from eight populations of anadromous and lake-feeding brown trout Salmo trutta, hypotheses of adaptation to local optima and countergradient variation in growth were tested. The adaptation to local optima hypothesis suggests that natural selection can shift optimal performance temperatures to match the prevailing temperature in a new or changed thermal niche. In contradiction, the countergradient variation hypothesis suggests that populations from hostile environments perform better than conspecifics from benign environments at all temperatures. In this study, growth capacity varied between populations but there was no significant correlation between any of the estimated thermal performance parameters (e.g. lower and upper thermal growth limits, optimal temperature for growth and maximum growth capacity) and natural climatic conditions among populations. Hence, S. trutta growth response to temperature lends no support for either of the two suggested thermal adaptation hypotheses. Instead, growth capacity among populations tended to correlate positively with female size at maturity.
  •  
4.
  • Hedbom, Hans, et al. (författare)
  • A Preliminary Evaluation of the Security of a Non-Distributed Version of Windows NT
  • 1997
  • Konferensbidrag (refereegranskat)abstract
    • In this paper we present a preliminary evaluation of the security of a non-distributed version of Windows NT. The objectives of the work are twofold: first, to learn more about the security system; and, second, to find out how secure the system actually is. Thus the architecture and security mechanisms of Windows NT have been studied. Furthermore, the paper contains a few examples of successful intrusions on the target system, which was a standard personal computer with Windows NT Workstation 3.51 and one with NT Workstation 4.0, both working in a stand-alone mode. We have also found some evidence that other, more severe security flaws exist in the system
  •  
5.
  • Hedbom, Hans, et al. (författare)
  • A Security Evaluation of a Non-Distributed Version of Windows NT
  • 1997
  • Rapport (refereegranskat)abstract
    • In this paper we present an evaluation of the security in Windows NT. The objectives of the work are twofold: first, to learn more about the security system; and, second, to find out how secure the system actually is. To investigate the latter, the authors, have adopted the role of attackers. This paper contains results from several attempts to violate the security of Windows NT. In some cases, the attempts were successful, meaning that we gained access to information or resources that should be protected. The target systems were standard personal computers with Windows NT Workstation 3.51 and Windows NT Workstation 4.0 respectively, both working in stand-alone mode
  •  
6.
  • Hedbom, Hans, et al. (författare)
  • Risks and Dangers of Security Extensions
  • 2001
  • Konferensbidrag (refereegranskat)abstract
    • Securing computer systems is an increasing concern as more and more systems are connected together in large networks. Traditional operating system based protection mechanisms have failed to fully meet the demands of this new situation. To overcome some of the shortcomings of these mechanisms new types have been developed with the intention to stop or reduce the impact of the new threats. We would like to call these new mechanisms security extensions, since they are not usually part of the core operating system. However, security extensions often contain sensitive and vital information that also needs to be secured. Usually they are dependent on the security mechanisms of the operating system for their own protection, i.e., they are dependent on the security of a mechanism whose insecurity they are supposed to patch. This is clearly an undesirable situation. We thus argue that security extensions actually add risks and vulnerabilities to the system when the underlying system is insecure or when they are not capable of handling their own security by themselves. In this paper, we discuss and analyze possible vulnerabilities in three types of security extensions, i.e., anti-malware software, firewalls, and intrusion detection systems. We also introduce a crude classification scheme for the different types of risks that the security extensions discussed add to the system.
  •  
7.
  •  
8.
  • Jonsson, Anders, et al. (författare)
  • Fire-Related Mortality in Sweden : Temporal Trends 1952 to 2013
  • 2016
  • Ingår i: Fire Technology. - : Springer Science and Business Media LLC. - 0015-2684 .- 1572-8099. ; 52:6, s. 1697-1707
  • Tidskriftsartikel (refereegranskat)abstract
    • This study examines temporal trends in deaths due to fire-related accidents in Sweden from 1952 to 2013 based on statistics in the Cause of Death register held by the Swedish National Board of Health and Welfare. Fatalities coded with underlying cause of death associated with fire-related accidents are included and absolute numbers and age-adjusted mortality rates are calculated and statistically analysed for trends using Poisson regression. The results show a significant reduction in both absolute numbers and in the age-adjusted mortality rate with a decline in absolute number of deaths of 34% over the period. However, the elderly population (80+ years) showed a significant increase in absolute numbers. Regarding the age-adjusted mortality rate, a significant reduction of 63% was observed and children aged 0 to 4 years showed the largest decrease (91%). A reduction was seen both in terms of fatalities due to burns and carbon monoxide poisoning, although the reduction was more pronounced with regards to burns (69% compared to 46%). Although an overall decrease was observed in both absolute numbers and in the age-adjusted mortality rate, with an aging population, the absolute numbers of fire-related deaths for the elderly population will most likely increase in the future. Therefore, whilst previously a child-injury issue, fire-related deaths in Sweden is now predominantly an issue of safety for the elderly. In combination with more deaths now being attributed to carbon monoxide poisoning, new preventative strategies may be required.
  •  
9.
  • Jonsson, Erland, et al. (författare)
  • On the Functional Relation between Security and Dependability Impairments
  • 1999
  • Konferensbidrag (refereegranskat)abstract
    • Problems related to security and dependability/reliability are still treated separately in many contexts. It has been shown that there is a considerable conceptual overlap, however, and an integrated framework for the two disciplines has already been suggested. This paper shows that there is also a conceptual overlap of impairments from these areas and suggests an integrated approach that clarifies the functional relation between these, both from dependability and security viewpoints. The overall objective is to arrive at a general and clear-cut framework that would describe how trustable (dependable, secure) a system is, regardless of the reason for its not being totally trustable. For example, it should be possible to treat a system failure caused by an intentional intrusion or a hardware fault using the same methodology. A few examples from real-world situations are given to support the suggested approach
  •  
10.
  • Larson, Ulf, 1975, et al. (författare)
  • A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection
  • 2008
  • Ingår i: Proceedings of the Third IEEE International Conference on Availability, Reliability and Security (ARES 2008). - Barcelona, Spain : IEEE. - 9780769531021 ; , s. 624-629
  • Konferensbidrag (refereegranskat)abstract
    • Surprisingly few data collection mechanisms have been used for intrusion detection, and most systems rely on network and system call data as input to the detection engine. Even though the quality of log data is vital to the detection process and heavily dependent on the collection mechanism, no extensive survey or taxonomy has been conducted within the detection field. In this paper, we propose a revised taxonomy which provides a unified terminology and a framework in which data collection mechanisms can be systematically inspected, evaluated, and compared. Since the taxonomy is derived from existing mechanisms, it also provides a useful overview of different types of mechanisms. The paper also suggests areas within data collection where additional work is required.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 30
Typ av publikation
konferensbidrag (15)
tidskriftsartikel (6)
rapport (4)
bokkapitel (4)
konstnärligt arbete (1)
doktorsavhandling (1)
visa fler...
visa färre...
Typ av innehåll
refereegranskat (26)
övrigt vetenskapligt/konstnärligt (4)
Författare/redaktör
Lindskog, Stefan (21)
Jonsson, Erland (17)
Jonsson, Erland, 194 ... (6)
Hedbom, Hans (6)
Larson, Ulf, 1975 (4)
Larson, Ulf E. (4)
visa fler...
Henriksson, Gunnar (3)
Arshadi, Mehrdad (3)
Finell, Michael (3)
Berghel, Jonas, 1966 ... (3)
Frodeson, Stefan, Un ... (3)
Jonsson, Carina (3)
Siwale, Workson (3)
Nilsson, Dennis, 198 ... (3)
Lindskog, Stefan, 19 ... (2)
Axelsson, Stefan (2)
Brunström, Anna (2)
Nilson, Finn, 1980- (2)
Runefors, Marcus (2)
Larsson, Stefan (1)
Jonsson, Anders (1)
Jonsson, Stefan, Pro ... (1)
Särdqvist, Stefan (1)
Jonsson, Bror, 1948- (1)
Berglund, Ingemar (1)
Jensen, Arne J. (1)
Forseth, Torbjörn (1)
Naslund, Ingemar (1)
Lagerström, Cecilia, ... (1)
Strömberg, Lars (1)
Gustafson, Ulf (1)
Jonsson, Anders, 196 ... (1)
Sardqvist, Stefan (1)
Strandbergh, Johan (1)
Hackman, Mikael (1)
Nilsson, Dennis K (1)
Lindqvis, Ulf (1)
Parsberg, Cecilia, 1 ... (1)
Dahlberg, Göran, Red ... (1)
visa färre...
Lärosäte
Chalmers tekniska högskola (6)
Sveriges Lantbruksuniversitet (3)
Umeå universitet (2)
Kungliga Tekniska Högskolan (2)
Lunds universitet (1)
Språk
Engelska (29)
Svenska (1)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (24)
Medicin och hälsovetenskap (3)
Teknik (2)
Lantbruksvetenskap (2)
Samhällsvetenskap (1)
Humaniora (1)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy