Publications by Joel Brynielsson
Peer reviewed
Articles
[1]
A. Andreasson et al., "Cybersecurity work at Swedish administrative authorities : taking action or waiting for approval," Cognition, Technology & Work, 2024.
[2]
S. Varga, J. Brynielsson and U. Franke, "Cyber-threat perception and risk management in the Swedish financial sector," Computers & security (Print), vol. 105, 2021.
[3]
S. Aronsson et al., "Design of simulator training : a comparative study of Swedish dynamic decision-making training facilities," Cognition, Technology and Work, vol. 23, no. 1, pp. 117-130, 2021.
[4]
M. Garcia Lozano et al., "Veracity assessment of online data," Decision Support Systems, vol. 129, 2020.
[5]
J. Brynielsson et al., "Informing crisis alerts using social media : Best practices and proof of concept," Journal of Contingencies and Crisis Management, vol. 26, no. 1, pp. 28-40, 2018.
[6]
M. García Lozano, J. Schreiber and J. Brynielsson, "Tracking Geographical Locations using a Geo-Aware Topic Model for Analyzing Social Media Data," Decision Support Systems, vol. 99, no. SI, pp. 18-29, 2017.
[7]
J. Brynielsson, L. Kaati and P. Svenson, "Social Positions and Simulation Relations," Social Network Analysis and Mining, vol. 2, no. 1, pp. 39-52, 2012.
[8]
S. Cooper et al., "An Exploration of the Current State of Information Assurance Education," ACM SIGCSE Bulletin, vol. 41, no. 4, pp. 109-125, 2009.
[9]
J. Brynielsson, "An Information Assurance Curriculum for Commanding Officers using Hands-on Experiments," SIGCSE Bulletin Inroads, vol. 41, no. 1, pp. 236-240, 2009.
[10]
J. Brynielsson, "Using AI and games for decision support in command and control," Decision Support Systems, vol. 43, no. 4, pp. 1454-1463, 2007.
[11]
J. Brynielsson and S. Arnborg, "An Information Fusion Game Component," Journal of Advances in Information Fusion, vol. 1, no. 2, pp. 108-121, 2006.
Conference papers
[12]
A. Carp, J. Brynielsson and A. Tegen, "Active Learning for Improvement of Classification of Cyberthreat Actors in Text Fragments," in Proceedings - 22nd IEEE International Conference on Machine Learning and Applications, ICMLA 2023, 2023, pp. 1279-1286.
[13]
J. Brynielsson et al., "Comparison of Strategies for Honeypot Deployment," in Proceedings Of The 2023 Ieee/Acm International Conference On Advances In Social Networks Analysis And Mining, Asonam 2023, 2023, pp. 612-619.
[14]
P. Hansen et al., "Real-time estimation of heart rate in situations characterized by dynamic illumination using remote photoplethysmography," in Proceedings : 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, CVPRW 2023, 2023, pp. 6094-6103.
[15]
A. Andreasson et al., "A Census of Swedish Public Sector Employee Communication on Cybersecurity during the COVID-19 Pandemic," in Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA 2021, 2021, pp. 1-8.
[16]
A. Andreasson et al., "A Census of Swedish Government Administrative Authority Employee Communications on Cybersecurity during the COVID-19 Pandemic," in 2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2020.
[17]
J. Brynielsson, "Message from the Program Chair," in Proceedings of the 2019 European Intelligence and Security Informatics Conference, EISIC 2019, 2019.
[18]
S. Varga, J. Brynielsson and U. Franke, "Information requirements for national level cyber situational awareness," in Proceedings of the 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2018, 2018, pp. 774-781.
[19]
J. Brynielsson, "Message from the program chair," in Proceedings of the 8th European Intelligence and Security Informatics Conference, EISIC 2018, 2018.
[20]
[21]
J. Brynielsson and F. Johansson, "Message from the program chairs," in Proceedings - 2016 European Intelligence and Security Informatics Conference, EISIC 2016, 2017.
[22]
J. Brynielsson, S. Lindquist and L. Luotsinen, "Efficient Implementation of Simulation Support for Tactical-Level Military Training," in Proceedings of the 2016 Interservice/Industry Training, Simulation, and Education Conference (I/ITSEC 2016), 2016, pp. 1-12.
[23]
H. Lilja, J. Brynielsson and S. Lindquist, "Identifying Radio Communication Inefficiency to Improve Air Combat Training Debriefings," in Proceedings of the 2016 Interservice/Industry Training, Simulation, and Education Conference (I/ITSEC 2016), 2016, pp. 1-12.
[24]
J. Brynielsson et al., "Using Cyber Defense Exercises to Obtain Additional Data for Attacker Profiling," in Proceedings of the 14th IEEE International Conference on Intelligence and Security Informatics (ISI 2016), 2016, pp. 37-42.
[25]
J. Brynielsson and R. Sharma, "Detectability of Low-Rate HTTP Server DoS Attacks using Spectral Analysis," in PROCEEDINGS OF THE 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2015), 2015, pp. 954-961.
[26]
J. Brynielsson and M. H. Yap, "Message from the Program Chairs," in Proceedings - 2015 European Intelligence and Security Informatics Conference, EISIC 2015, 2015.
[27]
A. Westling, J. Brynielsson and T. Gustavi, "Mining the web for sympathy : The pussy riot case," in Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014, 2014, pp. 123-128.
[28]
M. A. Tariq, J. Brynielsson and H. Artman, "The Security Awareness Paradox : A Case Study," in Advances in Social Networks Analysis and Mining (ASONAM), 2014 IEEE/ACM International Conference on, 2014, pp. 704-711.
[29]
J. Brynielsson et al., "Analysis of Weak Signals for Detecting Lone Wolf Terrorists," in Proceedings of the IEEE European Intelligence and Security Informatics Conference 2012 (EISIC 2012), 2012, pp. 197-204.
[30]
F. Johansson, J. Brynielsson and M. Narganes Quijano, "Estimating Citizen Alertness in Crises using Social Media Monitoring and Analysis," in Proceedings of the IEEE European Intelligence and Security Informatics Conference 2012 (EISIC 2012), 2012, pp. 189-196.
[31]
M. A. Tariq, J. Brynielsson and H. Artman, "Framing the attacker in organized cybercrime," in Proceedings - 2012 European Intelligence and Security Informatics Conference, EISIC 2012, 2012, pp. 30-37.
[32]
S. Nilsson et al., "Making use of New Media for pan-European Crisis Communication," in Proceedings of the Ninth International Conference on Information Systems for Crisis Response and Management (ISCRAM 2012), 2012.
[33]
M. A. Tariq, J. Brynielsson and H. Artman, "Storytelling for Tackling Organized Cybercrime," in Proceedings of the 26th BCS Conference on Human Computer Interaction, 2012, pp. 1-4.
[34]
C. Párraga Niebla et al., "Alert4All : An Integrated Concept for Effective Population Alerting in Crisis Situations," in Eighth International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011). Lisbon, Portugal, May 8-11 2011, 2011.
[35]
F. Johansson et al., "Detecting Emergent Conflicts through Web Mining and Visualization," in Proceedings of the IEEE European Intelligence and Security Informatics Conference 2011 (EISIC 2011), 2011, pp. 346-353.
[36]
H. Artman et al., "Dialogical Emergency Management and StrategicAwareness in Emergency Communication," in Proceedings of the 8th International ISCRAM Conference, 2011.
[37]
L. C. Pérez et al., "Information Assurance Education in Two- and Four-Year Institutions," in Proceedings of the 2011 ITiCSE Working Group Reports (ITiCSE-WGR’11), 2011, pp. 39-53.
[38]
J. Brynielsson et al., "Using Temporal Analytics for Early Discovery of Upcoming Threats," in Proceedings of the National Symposium on Technology and Methodology for Security and Crisis Management 2011 (TAMSEC 2011), 2011, p. 16.
[39]
J. Brynielsson et al., "Detecting Social Positions Using Simulation," in Proceedings of the 2010 International Conference on Advances in Social Network Analysis and Mining (ASONAM 2010), 2010, pp. 48-55.
[40]
S. Cooper et al., "Towards Information Assurance (IA) Curricular Guidelines," in Proceedings of the 2010 ITiCSE Working Group Reports (ITiCSE-WGR’10), 2010, pp. 49-64.
[41]
J. Brynielsson, "An Information Assurance Curriculum for Commanding Officers using Hands-on Experiments," in Proceedings of the 40th ACM SIGCSE Technical Symposium on Computer Science Education, 2009, pp. 236-240.
[42]
J. Brynielsson et al., "Development of Computerized Support Tools for Intelligence Work," in Proceedings of the 14th International Command and Control Research and Technology Symposium (14th ICCRTS), 2009.
[43]
J. Brynielsson et al., "A Vision of a Toolbox for Intelligence Production," in Skövde Workshop on Information Fusion Topics (SWIFT 2008), 2008, pp. 77-80.
[44]
S. Axberg, J. Brynielsson and M. Norsell, "A Sensor Concept for Superior Surveillance," in Proceedings of the Ninth International Symposium on Protection against Chemical and Biological Warfare Agents, 2007.
[45]
J. Brynielsson, "Teaching Computer Security for High Rank Officers using Laboratory Experiments," in Proceedings of the Third International Conference on Military Technology, 2007.
[46]
J. Brynielsson et al., "Enhanced situation awareness using random particles," in Proceedingsof the Tenth International Command and Control Research and TechnologySymposium (ICCRTS), 2005.
[47]
J. Brynielsson and S. Arnborg, "Refinements of the command and control game component," in Proceedings of the Eighth International Conferenceon Information Fusion (FUSION 2005), 2005, pp. 6-pp.
[48]
J. Brynielsson and S. Arnborg, "Bayesian Games for Threat Prediction and Situation Analysis," in Proceedings of the Seventh International Conference on Information Fusion (FUSION 2004), 2004.
[49]
J. Brynielsson, "Game-Theoretic Reasoning in Command and Control," in Proceedings of the 15th Mini-EURO Conference : Managing Uncertainty in Decision Support Models (MUDSM 2004), 2004.
[50]
Q. Huang et al., "Simulation-Based Decision Support for Command and Control in Joint Operations," in Proceedings of the 2003 European Simulation Interoperability Workshop, 2003, pp. 591-599.
[51]
J. Brynielsson, "A Decision-Theoretic Framework Using Rational Agency," in Proceedings of the 11th Conference on Computer-Generated Forces and Behavioral Representation, 2002, pp. 459-463.
[52]
J. Brynielsson and R. Granlund, "Assistance in Decision Making : Decision Help and Decision Analysis," in Proceedings Sixth International Command and Control Research and Technology Symposium, 2001.
[53]
J. Brynielsson and K. Wallenius, "Game environment for command andcontrol operations (GECCO)," in Proceedings of the First International Workshopon Cognitive Research With Microworlds, 2001, pp. 85-95.
[54]
S. Arnborg et al., "Information awareness in command and control : precision, quality, utility," in FUSION 2000 : Proceedings of the Third International Conference on Information Fusion, 2000, pp. THB1/25-THB1/32 vol.2.
Chapters in books
[55]
J. Brynielsson, U. Franke and S. Varga, "Cyber Situational Awareness Testing," in Combatting Cybercrime and Cyberterrorism : Challenges, Trends and Priorities, Akhgar, Babak; Brewster, Ben Ed., Cham, Switzerland : Springer International Publishing AG, 2016, pp. 209-233.
[56]
J. Brynielsson, "Computer Security Training : A Military Officer Case Study," in Stockholm Contributions in Military-Technology 2007, Stockholm : Försvarshögskolan (FHS), 2008, pp. 49-64.
Non-peer reviewed
Conference papers
[57]
J. Brynielsson and F. Johansson, "Message from the Program Chairs EISIC 2013," in Proceedings - 2013 European Intelligence and Security Informatics Conference, EISIC 2013, 2013, p. 6657116.
Books
[58]
J. Andersson et al., Lärobok i Militärteknik, vol. 3 : Teknik till stöd för ledning. Stockholm : Försvarshögskolan (FHS), 2009.
Chapters in books
[59]
S. Varga, T. Sommestad and J. Brynielsson, "Automation of Cybersecurity Work," in Artificial Intelligence and Cybersecurity : Theory and Applications, : Springer Nature, 2022, pp. 67-101.
[60]
U. Franke et al., "Cyber situational awareness issues and challenges," in Cybersecurity and Cognitive Science, Ahmed A. Moustafa Ed., : Elsevier, 2022, pp. 235-265.
[61]
H. Artman et al., "More efficient environmental inspections and enforcement," in Efficient Environmental Inspections and Enforcement, Herzing, M., Jacobsson, Adam Ed., : Naturvårdsverket, 2016, p. 246.
Theses
[62]
J. Brynielsson, "A gaming perspective on command and control," Doctoral thesis Stockholm : KTH, Trita-CSC-A, 2006:07, 2006.
Reports
[63]
H. Artman et al., "Effektiv miljötillsyn : Slutrapport," Stockholm : Naturvårdsverket, Rapport / Naturvårdsverket, 6558, 2013.
[64]
J. Brynielsson and K. Wallenius, "A toolbox for multi-attribute decision-making," Stockholm : KTH, TRITA-NA, 0307, 2003.
Conference Proceedings
[65]
"Proceedings of the 2017 European Intelligence and Security Informatics Conference (EISIC 2017)," Piscataway, New Jersey, IEEE, 2017.
[66]
"Proceedings of the 2016 European Intelligence and Security Informatics Conference (EISIC 2016)," Piscataway, New Jersey, IEEE, 2016.
Latest sync with DiVA:
2024-12-02 00:07:41