Stig Andersson

Learn More
Most rating scales for affective disorders measure either depressive or hypomanic/manic symptoms and there are few scales for hypomania/mania in a self-rating format. We wanted to develop and validate a self-rating scale for comprehensive assessment of depressive, manic/hypomanic and mixed affective states. We developed an 18-item self-rating scale starting(More)
Buffer overflow attacks continue to be a major security problem and detecting attacks of this nature is therefore crucial to network security. Signature based network based intrusion detection systems (NIDS) compare network traffic to signatures modelling suspicious or attack traffic to detect network attacks. Since detection is based on pattern matching, a(More)
Code injection vulnerabilities continue to prevail. Attacks of this kind such as stack buffer overflows and heap buffer overflows account for roughly half of the vulnerabilities discovered in software every year. The research presented in this paper extends earlier work in the area of code injection attack detection in UNIX environments. It presents a(More)
BACKGROUND The way GPs work does not appear to be adapted to the needs of depressive patients. Therefore we wanted to examine Swedish GPs' conceptions of depressive disorders and their treatment and GPs' ideas of factors that may influence their manner of work with depressive patients. METHODS A postal questionnaire to a stratified sample of 617 Swedish(More)
Intrusion detection systems (IDSs) are widely recognised as the last line of defence often used to enable incident response when intrusion prevention mechanisms are ineffective, or have been compromised. A signature based network IDS (NIDS) which operates by comparing network traffic to a database of suspicious activity patterns (known as signatures) is a(More)
  • 1