default search action
Andreas Jacobsson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c25]Kayode S. Adewole, Andreas Jacobsson, Paul Davidsson:
ARAM: Assets-based Risk Assessment Model for Connected Smart Homes. FiCloud 2024: 47-54 - [c24]Sally Bagheri, Andreas Jacobsson, Paul Davidsson:
Smart Homes as Digital Ecosystems: Exploring Privacy in IoT Contexts. ICISSP 2024: 869-877 - [c23]Kayode S. Adewole, Andreas Jacobsson:
HOMEFUS: A Privacy and Security-Aware Model for IoT Data Fusion in Smart Connected Homes. IoTBDS 2024: 133-140 - [e1]Anna Kobusinska, Andreas Jacobsson, Victor Chang:
Proceedings of the 9th International Conference on Internet of Things, Big Data and Security, IoTBDS 2024, Angers, France, April 28-30, 2024. SCITEPRESS 2024, ISBN 978-989-758-699-6 [contents] - 2023
- [c22]Joseph Bugeja, Andreas Jacobsson:
Green Intelligent Homes: A Perspective on the Future of Smart Homes and Their Implications. IoTBDS 2023: 186-193 - 2022
- [j6]Joseph Bugeja, Andreas Jacobsson, Paul Davidsson:
The Ethical Smart Home: Perspectives and Guidelines. IEEE Secur. Priv. 20(1): 72-80 (2022) - [j5]Hussan Munir, Bahtijar Vogel, Andreas Jacobsson:
Artificial Intelligence and Machine Learning Approaches in Digital Education: A Systematic Revision. Inf. 13(4): 203 (2022) - 2021
- [j4]Joseph Bugeja, Andreas Jacobsson, Paul Davidsson:
PRASH: A Framework for Privacy Risk Analysis of Smart Homes. Sensors 21(19): 6399 (2021) - 2020
- [c21]Joseph Bugeja, Andreas Jacobsson, Paul Davidsson:
Is your home becoming a spy?: a data-centered analysis and classification of smart connected home systems. IOT 2020: 17:1-17:8 - [c20]Joseph Bugeja, Andreas Jacobsson, Paul Davidsson:
A Privacy-Centered System Model for Smart Connected Homes. PerCom Workshops 2020: 1-4 - [c19]Joseph Bugeja, Andreas Jacobsson, Romina Spalazzese:
On the Analysis of Semantic Denial-of-Service Attacks Affecting Smart Living Devices. SAI (2) 2020: 427-444
2010 – 2019
- 2019
- [c18]Joseph Bugeja, Bahtijar Vogel, Andreas Jacobsson, Rimpu Varshney:
IoTSM: An End-to-end Security Model for IoT Ecosystems. PerCom Workshops 2019: 267-272 - [c17]Joseph Bugeja, Andreas Jacobsson:
On the Design of a Privacy-Centered Data Lifecycle for Smart Living Spaces. Privacy and Identity Management 2019: 126-141 - 2018
- [c16]Joseph Bugeja, Paul Davidsson, Andreas Jacobsson:
Functional Classification and Quantitative Analysis of Smart Connected Home Devices. GIoTS 2018: 1-6 - [c15]Joseph Bugeja, Andreas Jacobsson, Paul Davidsson:
An Empirical Analysis of Smart Connected Home Data. ICIOT 2018: 134-149 - [c14]Joseph Bugeja, Desiree Jonsson, Andreas Jacobsson:
An Investigation of Vulnerabilities in Smart Connected Cameras. PerCom Workshops 2018: 537-542 - 2017
- [j3]Martin Boldt, Andreas Jacobsson, Dejan Baca, Bengt Carlsson:
Introducing a Novel Security-Enhanced Agile Software Development Process. Int. J. Secur. Softw. Eng. 8(2): 26-52 (2017) - [c13]Joseph Bugeja, Andreas Jacobsson, Paul Davidsson:
An analysis of malicious threat agents for the smart connected home. PerCom Workshops 2017: 557-562 - 2016
- [j2]Andreas Jacobsson, Martin Boldt, Bengt Carlsson:
A risk analysis of a smart home automation system. Future Gener. Comput. Syst. 56: 719-733 (2016) - [c12]Joseph Bugeja, Andreas Jacobsson, Paul Davidsson:
On Privacy and Security Challenges in Smart Connected Homes. EISIC 2016: 172-175 - 2015
- [c11]Dejan Baca, Martin Boldt, Bengt Carlsson, Andreas Jacobsson:
A Novel Security-Enhanced Agile Software Development Process Applied in an Industrial Setting. ARES 2015: 11-19 - [c10]Andreas Jacobsson, Paul Davidsson:
Towards a model of privacy and security for smart homes. WF-IoT 2015: 727-732 - 2014
- [c9]Andreas Jacobsson, Martin Boldt, Bengt Carlsson:
On the Risk Exposure of Smart Home Automation Systems. FiCloud 2014: 183-190 - 2013
- [c8]Bengt Carlsson, Andreas Jacobsson:
An Evolutionary View of Collective Intelligence. ICAART (2) 2013: 571-577 - 2011
- [j1]Niklas Lavesson, Martin Boldt, Paul Davidsson, Andreas Jacobsson:
Learning to detect spyware using end user license agreements. Knowl. Inf. Syst. 26(2): 285-307 (2011)
2000 – 2009
- 2009
- [c7]Paul Davidsson, Johan Holmgren, Jan A. Persson, Andreas Jacobsson:
Plug and Play Transport Chain Management: Agent-Based Support to the Planning and Execution of Transports. ICETE (Selected Papers) 2009: 139-155 - [c6]Paul Davidsson, Jan A. Persson, Andreas Jacobsson:
An Agent-based Approach to Transport Chain Management. ICE-B 2009: 175-182 - [p2]Paul Davidsson, Andreas Jacobsson:
Towards Norm-Governed Behavior in Virtual Enterprises. Intelligent Agents in the Evolution of Web and Applications 2009: 35-55 - 2008
- [b1]Andreas Jacobsson:
Privacy and security in Internet-based information systems. Blekinge Institute of Technology, Sweden, 2008 - [c5]Bengt Carlsson, Paul Davidsson, Andreas Jacobsson, Stefan J. Johansson, Jan A. Persson:
Security Aspects on Inter-organizational Cooperation Using Wrapper Agents. ATOP@AAMAS 2008: 220-233 - [p1]Niklas Lavesson, Paul Davidsson, Martin Boldt, Andreas Jacobsson:
Spyware Prevention by Classifying End User License Agreements. New Challenges in Applied Intelligence Technologies 2008: 373-382 - 2007
- [i1]Paul Davidsson, Andreas Jacobsson:
Aligning Models of Normative Systems and Artificial Societies: Towards norm-governed behavior in virtual enterprises. Normative Multi-agent Systems 2007 - 2006
- [c4]Andreas Jacobsson, Paul Davidsson:
An Analysis of Plug and Play Business Software. I3E 2006: 31-43 - [c3]Paul Davidsson, Anders Hederstierna, Andreas Jacobsson, Jan A. Persson, Bengt Carlsson, Stefan J. Johansson, Anders Nilsson, Gunnar Ågren, Stefan Östholm:
The Concept and Technology of Plug and Play Business. ICEIS (4) 2006: 213-217 - 2005
- [c2]Bengt Carlsson, Andreas Jacobsson:
On Contamination in Information Ecosystems. HICSS 2005 - 2004
- [c1]Andreas Jacobsson, Martin Boldt, Bengt Carlsson:
Privacy Invasive Software in File-Sharing Tools. International Information Security Workshops 2004: 277-292
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-30 01:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint