Publikationer av Joel Brynielsson
Refereegranskade
Artiklar
[1]
A. Andreasson et al., "Cybersecurity work at Swedish administrative authorities : taking action or waiting for approval," Cognition, Technology & Work, 2024.
[2]
S. Varga, J. Brynielsson och U. Franke, "Cyber-threat perception and risk management in the Swedish financial sector," Computers & security (Print), vol. 105, 2021.
[3]
S. Aronsson et al., "Design of simulator training : a comparative study of Swedish dynamic decision-making training facilities," Cognition, Technology and Work, vol. 23, no. 1, s. 117-130, 2021.
[4]
M. Garcia Lozano et al., "Veracity assessment of online data," Decision Support Systems, vol. 129, 2020.
[5]
J. Brynielsson et al., "Informing crisis alerts using social media : Best practices and proof of concept," Journal of Contingencies and Crisis Management, vol. 26, no. 1, s. 28-40, 2018.
[6]
M. García Lozano, J. Schreiber och J. Brynielsson, "Tracking Geographical Locations using a Geo-Aware Topic Model for Analyzing Social Media Data," Decision Support Systems, vol. 99, no. SI, s. 18-29, 2017.
[7]
J. Brynielsson, L. Kaati och P. Svenson, "Social Positions and Simulation Relations," Social Network Analysis and Mining, vol. 2, no. 1, s. 39-52, 2012.
[8]
S. Cooper et al., "An Exploration of the Current State of Information Assurance Education," ACM SIGCSE Bulletin, vol. 41, no. 4, s. 109-125, 2009.
[9]
J. Brynielsson, "An Information Assurance Curriculum for Commanding Officers using Hands-on Experiments," SIGCSE Bulletin Inroads, vol. 41, no. 1, s. 236-240, 2009.
[10]
J. Brynielsson, "Using AI and games for decision support in command and control," Decision Support Systems, vol. 43, no. 4, s. 1454-1463, 2007.
[11]
J. Brynielsson och S. Arnborg, "An Information Fusion Game Component," Journal of Advances in Information Fusion, vol. 1, no. 2, s. 108-121, 2006.
Konferensbidrag
[12]
A. Carp, J. Brynielsson och A. Tegen, "Active Learning for Improvement of Classification of Cyberthreat Actors in Text Fragments," i Proceedings - 22nd IEEE International Conference on Machine Learning and Applications, ICMLA 2023, 2023, s. 1279-1286.
[13]
J. Brynielsson et al., "Comparison of Strategies for Honeypot Deployment," i Proceedings Of The 2023 Ieee/Acm International Conference On Advances In Social Networks Analysis And Mining, Asonam 2023, 2023, s. 612-619.
[14]
P. Hansen et al., "Real-time estimation of heart rate in situations characterized by dynamic illumination using remote photoplethysmography," i Proceedings : 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, CVPRW 2023, 2023, s. 6094-6103.
[15]
A. Andreasson et al., "A Census of Swedish Public Sector Employee Communication on Cybersecurity during the COVID-19 Pandemic," i Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA 2021, 2021, s. 1-8.
[16]
A. Andreasson et al., "A Census of Swedish Government Administrative Authority Employee Communications on Cybersecurity during the COVID-19 Pandemic," i 2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2020.
[17]
J. Brynielsson, "Message from the Program Chair," i Proceedings of the 2019 European Intelligence and Security Informatics Conference, EISIC 2019, 2019.
[18]
S. Varga, J. Brynielsson och U. Franke, "Information requirements for national level cyber situational awareness," i Proceedings of the 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2018, 2018, s. 774-781.
[19]
J. Brynielsson, "Message from the program chair," i Proceedings of the 8th European Intelligence and Security Informatics Conference, EISIC 2018, 2018.
[20]
[21]
J. Brynielsson och F. Johansson, "Message from the program chairs," i Proceedings - 2016 European Intelligence and Security Informatics Conference, EISIC 2016, 2017.
[22]
J. Brynielsson, S. Lindquist och L. Luotsinen, "Efficient Implementation of Simulation Support for Tactical-Level Military Training," i Proceedings of the 2016 Interservice/Industry Training, Simulation, and Education Conference (I/ITSEC 2016), 2016, s. 1-12.
[23]
H. Lilja, J. Brynielsson och S. Lindquist, "Identifying Radio Communication Inefficiency to Improve Air Combat Training Debriefings," i Proceedings of the 2016 Interservice/Industry Training, Simulation, and Education Conference (I/ITSEC 2016), 2016, s. 1-12.
[24]
J. Brynielsson et al., "Using Cyber Defense Exercises to Obtain Additional Data for Attacker Profiling," i Proceedings of the 14th IEEE International Conference on Intelligence and Security Informatics (ISI 2016), 2016, s. 37-42.
[25]
J. Brynielsson och R. Sharma, "Detectability of Low-Rate HTTP Server DoS Attacks using Spectral Analysis," i PROCEEDINGS OF THE 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2015), 2015, s. 954-961.
[26]
J. Brynielsson och M. H. Yap, "Message from the Program Chairs," i Proceedings - 2015 European Intelligence and Security Informatics Conference, EISIC 2015, 2015.
[27]
A. Westling, J. Brynielsson och T. Gustavi, "Mining the web for sympathy : The pussy riot case," i Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014, 2014, s. 123-128.
[28]
M. A. Tariq, J. Brynielsson och H. Artman, "The Security Awareness Paradox : A Case Study," i Advances in Social Networks Analysis and Mining (ASONAM), 2014 IEEE/ACM International Conference on, 2014, s. 704-711.
[29]
J. Brynielsson et al., "Analysis of Weak Signals for Detecting Lone Wolf Terrorists," i Proceedings of the IEEE European Intelligence and Security Informatics Conference 2012 (EISIC 2012), 2012, s. 197-204.
[30]
F. Johansson, J. Brynielsson och M. Narganes Quijano, "Estimating Citizen Alertness in Crises using Social Media Monitoring and Analysis," i Proceedings of the IEEE European Intelligence and Security Informatics Conference 2012 (EISIC 2012), 2012, s. 189-196.
[31]
M. A. Tariq, J. Brynielsson och H. Artman, "Framing the attacker in organized cybercrime," i Proceedings - 2012 European Intelligence and Security Informatics Conference, EISIC 2012, 2012, s. 30-37.
[32]
S. Nilsson et al., "Making use of New Media for pan-European Crisis Communication," i Proceedings of the Ninth International Conference on Information Systems for Crisis Response and Management (ISCRAM 2012), 2012.
[33]
M. A. Tariq, J. Brynielsson och H. Artman, "Storytelling for Tackling Organized Cybercrime," i Proceedings of the 26th BCS Conference on Human Computer Interaction, 2012, s. 1-4.
[34]
C. Párraga Niebla et al., "Alert4All : An Integrated Concept for Effective Population Alerting in Crisis Situations," i Eighth International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011). Lisbon, Portugal, May 8-11 2011, 2011.
[35]
F. Johansson et al., "Detecting Emergent Conflicts through Web Mining and Visualization," i Proceedings of the IEEE European Intelligence and Security Informatics Conference 2011 (EISIC 2011), 2011, s. 346-353.
[36]
H. Artman et al., "Dialogical Emergency Management and StrategicAwareness in Emergency Communication," i Proceedings of the 8th International ISCRAM Conference, 2011.
[37]
L. C. Pérez et al., "Information Assurance Education in Two- and Four-Year Institutions," i Proceedings of the 2011 ITiCSE Working Group Reports (ITiCSE-WGR’11), 2011, s. 39-53.
[38]
J. Brynielsson et al., "Using Temporal Analytics for Early Discovery of Upcoming Threats," i Proceedings of the National Symposium on Technology and Methodology for Security and Crisis Management 2011 (TAMSEC 2011), 2011, s. 16.
[39]
J. Brynielsson et al., "Detecting Social Positions Using Simulation," i Proceedings of the 2010 International Conference on Advances in Social Network Analysis and Mining (ASONAM 2010), 2010, s. 48-55.
[40]
S. Cooper et al., "Towards Information Assurance (IA) Curricular Guidelines," i Proceedings of the 2010 ITiCSE Working Group Reports (ITiCSE-WGR’10), 2010, s. 49-64.
[41]
J. Brynielsson, "An Information Assurance Curriculum for Commanding Officers using Hands-on Experiments," i Proceedings of the 40th ACM SIGCSE Technical Symposium on Computer Science Education, 2009, s. 236-240.
[42]
J. Brynielsson et al., "Development of Computerized Support Tools for Intelligence Work," i Proceedings of the 14th International Command and Control Research and Technology Symposium (14th ICCRTS), 2009.
[43]
J. Brynielsson et al., "A Vision of a Toolbox for Intelligence Production," i Skövde Workshop on Information Fusion Topics (SWIFT 2008), 2008, s. 77-80.
[44]
S. Axberg, J. Brynielsson och M. Norsell, "A Sensor Concept for Superior Surveillance," i Proceedings of the Ninth International Symposium on Protection against Chemical and Biological Warfare Agents, 2007.
[45]
J. Brynielsson, "Teaching Computer Security for High Rank Officers using Laboratory Experiments," i Proceedings of the Third International Conference on Military Technology, 2007.
[46]
J. Brynielsson et al., "Enhanced situation awareness using random particles," i Proceedingsof the Tenth International Command and Control Research and TechnologySymposium (ICCRTS), 2005.
[47]
J. Brynielsson och S. Arnborg, "Refinements of the command and control game component," i Proceedings of the Eighth International Conferenceon Information Fusion (FUSION 2005), 2005, s. 6-pp.
[48]
J. Brynielsson och S. Arnborg, "Bayesian Games for Threat Prediction and Situation Analysis," i Proceedings of the Seventh International Conference on Information Fusion (FUSION 2004), 2004.
[49]
J. Brynielsson, "Game-Theoretic Reasoning in Command and Control," i Proceedings of the 15th Mini-EURO Conference : Managing Uncertainty in Decision Support Models (MUDSM 2004), 2004.
[50]
Q. Huang et al., "Simulation-Based Decision Support for Command and Control in Joint Operations," i Proceedings of the 2003 European Simulation Interoperability Workshop, 2003, s. 591-599.
[51]
J. Brynielsson, "A Decision-Theoretic Framework Using Rational Agency," i Proceedings of the 11th Conference on Computer-Generated Forces and Behavioral Representation, 2002, s. 459-463.
[52]
J. Brynielsson och R. Granlund, "Assistance in Decision Making : Decision Help and Decision Analysis," i Proceedings Sixth International Command and Control Research and Technology Symposium, 2001.
[53]
J. Brynielsson och K. Wallenius, "Game environment for command andcontrol operations (GECCO)," i Proceedings of the First International Workshopon Cognitive Research With Microworlds, 2001, s. 85-95.
[54]
S. Arnborg et al., "Information awareness in command and control : precision, quality, utility," i FUSION 2000 : Proceedings of the Third International Conference on Information Fusion, 2000, s. THB1/25-THB1/32 vol.2.
Kapitel i böcker
[55]
J. Brynielsson, U. Franke och S. Varga, "Cyber Situational Awareness Testing," i Combatting Cybercrime and Cyberterrorism : Challenges, Trends and Priorities, Akhgar, Babak; Brewster, Ben red., Cham, Switzerland : Springer International Publishing AG, 2016, s. 209-233.
[56]
J. Brynielsson, "Computer Security Training : A Military Officer Case Study," i Stockholm Contributions in Military-Technology 2007, Stockholm : Försvarshögskolan (FHS), 2008, s. 49-64.
Icke refereegranskade
Konferensbidrag
[57]
J. Brynielsson och F. Johansson, "Message from the Program Chairs EISIC 2013," i Proceedings - 2013 European Intelligence and Security Informatics Conference, EISIC 2013, 2013, s. 6657116.
Böcker
[58]
J. Andersson et al., Lärobok i Militärteknik, vol. 3 : Teknik till stöd för ledning. Stockholm : Försvarshögskolan (FHS), 2009.
Kapitel i böcker
[59]
S. Varga, T. Sommestad och J. Brynielsson, "Automation of Cybersecurity Work," i Artificial Intelligence and Cybersecurity : Theory and Applications, : Springer Nature, 2022, s. 67-101.
[60]
U. Franke et al., "Cyber situational awareness issues and challenges," i Cybersecurity and Cognitive Science, Ahmed A. Moustafa red., : Elsevier, 2022, s. 235-265.
[61]
H. Artman et al., "More efficient environmental inspections and enforcement," i Efficient Environmental Inspections and Enforcement, Herzing, M., Jacobsson, Adam red., : Naturvårdsverket, 2016, s. 246.
Avhandlingar
[62]
J. Brynielsson, "A gaming perspective on command and control," Doktorsavhandling Stockholm : KTH, Trita-CSC-A, 2006:07, 2006.
Rapporter
[63]
H. Artman et al., "Effektiv miljötillsyn : Slutrapport," Stockholm : Naturvårdsverket, Rapport / Naturvårdsverket, 6558, 2013.
[64]
J. Brynielsson och K. Wallenius, "A toolbox for multi-attribute decision-making," Stockholm : KTH, TRITA-NA, 0307, 2003.
Proceedings (redaktörskap)
[65]
"Proceedings of the 2017 European Intelligence and Security Informatics Conference (EISIC 2017)," Piscataway, New Jersey, IEEE, 2017.
[66]
"Proceedings of the 2016 European Intelligence and Security Informatics Conference (EISIC 2016)," Piscataway, New Jersey, IEEE, 2016.
Senaste synkning med DiVA:
2024-12-02 00:07:41