The common language of speech perception and action: a neurocognitive perspective JL Schwartz, M Sato, L Fadiga Revue française de linguistique appliquée 13 (2), 9-22, 2008 | 32 | 2008 |
Multiple environmental influences on the lightning of cold-based continental cumulonimbus clouds. Part I: Description and validation of model VTJ Phillips, M Formenton, VP Kanawade, LR Karlsson, S Patade, J Sun, ... Journal of the Atmospheric Sciences 77 (12), 3999-4024, 2020 | 14 | 2020 |
Evaluation of different irrigation treatments with saline water in a future climate in Tunisia T Selim, L Karlsson, F Bouksila, A Ben Slimane, M Persson Irrigation and Drainage 68 (2), 281-296, 2019 | 12 | 2019 |
Safeguarding VNF credentials with Intel SGX N Paladi, L Karlsson Proceedings of the SIGCOMM Posters and Demos, 144-146, 2017 | 10 | 2017 |
Improved greedy nonrandomness detectors for stream ciphers L Karlsson, M Hell, P Stankovski International Conference on Information Systems Security and Privacy, 225-232, 2017 | 9 | 2017 |
Identifying, prioritizing and evaluating vulnerabilities in third party code A Cobleigh, M Hell, L Karlsson, O Reimer, J Sönnerup, D Wisenhoff 2018 IEEE 22nd International Enterprise Distributed Object Computing …, 2018 | 8 | 2018 |
Not so greedy: Enhanced subset exploration for nonrandomness detectors L Karlsson, M Hell, P Stankovski Information Systems Security and Privacy: Third International Conference …, 2018 | 6 | 2018 |
eavesrop: Listening for rop payloads in data streams C Jämthagen, L Karlsson, P Stankovski, M Hell Information Security: 17th International Conference, ISC 2014, Hong Kong …, 2014 | 6 | 2014 |
Performance of constrained wireless devices in the Internet of Things J Assarsson, L Karlsson Department of Computer Science, Faculty of Engineering, LTH, Lund University, 2013 | 4 | 2013 |
A recommender system for user-specific vulnerability scoring L Karlsson, PN Bideh, M Hell Risks and Security of Internet and Systems: 14th International Conference …, 2020 | 2 | 2020 |
Contributions to Preventive Measures in Cyber Security L Karlsson | 1 | 2019 |
Privacy-Enabled Recommendations for Software Vulnerabilities L Karlsson, N Paladi 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2019 | 1 | 2019 |
Deliverable D3. 8 5G-PPP security enablers documentation (v2. 0) enabler BootstrappingTrust N Paladi, L Karlsson 5G Enablers for Network and System Security and Resilience Project 2017, 1-190, 2017 | 1 | 2017 |
Enabling key migration between non-compatible TPM versions L Karlsson, M Hell Trust and Trustworthy Computing: 9th International Conference, TRUST 2016 …, 2016 | 1 | 2016 |
Using TPM secure storage in trusted high availability systems M Hell, L Karlsson, B Smeets, J Mirosavljevic Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China …, 2015 | 1 | 2015 |
Method for prioritizing among vulnerabilities in a software code and a server L Karlsson, PN Bideh, M Hell US Patent App. 17/594,225, 2022 | | 2022 |
A Recommender System for User-specific Vulnerability Scoring (full version) L Karlsson, PN Bideh, M Hell | | 2019 |
Analysis of simulation of lightning in a cold-based convective storm L Karlsson | | 2018 |
Modern verksamhetsstyrning inom hälso-och sjukvård: En studie om processorientering L Karlsson, E Mårtensson | | 2015 |
Beslut som fattas är inte bättre än den information besluten grundas i R Sjöström, E Mårtensson, L Karlsson | | 2014 |