Repository logo Institutional repository
  • Communities & Collections
  • Browse
  • Site
Search repository
High contrast
  1. Home
  2. Browse by Author

Browsing by Author "Joosen, Wouter"

Filter results by typing the first few letters
Now showing 1 - 20 of 209
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Publication

    A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs

    Franken, Gertjan
    ;
    Van Goethem, Tom
    ;
    Desmet, Lieven
    ;
    Joosen, Wouter  
    Proceedings paper
    2023, 32nd USENIX Security Symposium, AUG 09-11, 2023, p.3673-3690
  • Loading...
    Thumbnail Image
    Publication

    A Comparative Performance Evaluation of Multi-Model NoSQL Databases and Polyglot Persistence

    Van Landuyt, Dimitri
    ;
    Reniers, Vincent
    ;
    Benaouda, Julien
    ;
    Rafique, Ansar
    ;
    Joosen, Wouter  
    Proceedings paper
    2023, 38th Annual ACM Symposium on Applied Computing (ACM SAC), MAR 27-31, 2023, p.286-293
  • Loading...
    Thumbnail Image
    Publication

    A comparative study of workflow customization strategies: Quality implications for multi-tenant SaaS

    Makki, Majid
    ;
    Van landuyt, Dimitri
    ;
    Lagaisse, Bert
    ;
    Joosen, Wouter  
    Journal article
    2018, Journal of Systems and Software, 144, p.423-438
  • Loading...
    Thumbnail Image
    Publication

    A comparison of system description models for data protection bij design

    Dewitte, Pierre
    ;
    Wuyts, Kim
    ;
    Sion, Laurens
    ;
    Van Landuyt, Dimitri
    ;
    Emanuilov, Ivo
    ;
    Valcke, Peggy
    Proceedings paper
    2019, SAC '19 Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 8/04/2018, p.1512-1515
  • Loading...
    Thumbnail Image
    Publication

    A comprehensive feature comparison study of open-source container orchestration frameworks

    Truyen, Eddy
    ;
    Van Landuyt, Dimitri
    ;
    Preuveneers, Davy
    ;
    Lagaisse, Bert
    ;
    Joosen, Wouter  
    Journal article
    2019, Applied Sciences, (9) 5, p.931
  • Loading...
    Thumbnail Image
    Publication

    A data utility-driven benchmark for de-identification methods

    Tomashchuk, Oleksandr
    ;
    Van Landuyt, Dimitri
    ;
    Pletea, Daniel
    ;
    Wuyts, Kim
    ;
    Joosen, Wouter  
    Proceedings paper
    2019, 16th International Conference on Trust, Privacy and Security in Digital Business, 26/08/2019, p.63-77
  • Loading...
    Thumbnail Image
    Publication

    A descriptive study of assumptions in STRIDE security threat modeling

    Van Landuyt, Dimitri
    ;
    Joosen, Wouter  
    Journal article
    2021, SOFTWARE AND SYSTEMS MODELING
  • Loading...
    Thumbnail Image
    Publication

    A descriptive study of assumptions made in LINDDUN privacy threat elicitation

    Van Landuyt, Dimitri
    ;
    Joosen, Wouter  
    Proceedings paper
    2019, 35th ACM/SIGAPP Symposium On Applied Computing, 30/03/2019
  • Loading...
    Thumbnail Image
    Publication

    A dynamic decision fusion middleware for trustworthy context-aware IoT applications

    Van Hamme, Tim
    ;
    Preuveneers, Davy
    ;
    Joosen, Wouter  
    Proceedings paper
    2017, M4IoT '17. Proceedings of the 4th Workshop on Middleware and Applications for the Internet of Things, 11/12/2017, p.1-6
  • Loading...
    Thumbnail Image
    Publication

    A framework for black-box SLO tuning of multi-tenant applications in Kubernetes

    Kaminski, Matthijs
    ;
    Truyen, Eddy
    ;
    Heydari Beni, Emad
    ;
    Lagaisse, Bert
    ;
    Joosen, Wouter  
    Proceedings paper
    2019, WOC '19 Proceedings of the 5th International Workshop on Container Technologies and Container Clouds, 9/12/2019, p.1-6
  • Loading...
    Thumbnail Image
    Publication

    A lingua franca for security by design

    van den Berghe, Alexander
    ;
    Yskout, Koen
    ;
    Scandariato, Riccardo
    ;
    Joosen, Wouter  
    Proceedings paper
    2018, Proceedings - 2018 IEEE Cybersecurity Development Conference, SecDev 2018, 30/09/2018
  • Loading...
    Thumbnail Image
    Publication

    A low-power hardware platform for smart environment as a call for more flexibility and re-usability

    Aras, Emekcan
    ;
    Delbruel, Stephane
    ;
    Yang, Fan
    ;
    Joosen, Wouter  
    ;
    Hughes, Danny
    Proceedings paper
    2019, EWSN '19 Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 25/02/2019, p.194-205
  • Loading...
    Thumbnail Image
    Publication

    A model for provably secure software design

    Van den Berghe, Alexander
    ;
    Yskout, Koen
    ;
    Joosen, Wouter  
    ;
    Scandariato, Riccardo
    Proceedings paper
    2017, Proceedings of the 5th International FME Workshop on Formal Methods in Software Engineering - FormaliSE, 20/05/2017, p.3-9
  • Loading...
    Thumbnail Image
    Publication

    A modular meta-model for security solutions

    Sion, Laurens
    ;
    Yskout, Koen
    ;
    Scandariato, Ricardo
    ;
    Joosen, Wouter  
    Proceedings paper
    2017, 1st International Conference on the Art, Science and Engineering of Programming, 3/04/2017, p.Art. 16
  • Loading...
    Thumbnail Image
    Publication

    A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints

    Le Pochat, Victor
    ;
    Van Hamme, Tim
    ;
    Maroofi, Sourena
    ;
    Van Goethem, Tom
    ;
    Preuveneers, Davy
    Proceedings paper
    2020, 27th Annual Network and Distributed System Security Symposium (NDSS), FEB 23-26, 2020
  • Loading...
    Thumbnail Image
    Publication

    A Reimagined Catalogue of Software Security Patterns

    van den Berghe, Alexander
    ;
    Yskout, Koen
    ;
    Joosen, Wouter  
    Proceedings paper
    2022, 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), MAY 16, 2022, p.25-32
  • Loading...
    Thumbnail Image
    Publication

    A shared multi-stakeholder platform for IoT: Poster

    Jonckers, Dimitri
    ;
    Hovsepyan, Aram
    ;
    Lagaisse, Bert
    ;
    Joosen, Wouter  
    Proceedings paper
    2017, 18th ACM/IFIP/USENIX Middleware Conference: Posters and Demos -, 11/12/2017, p.5-6
  • Loading...
    Thumbnail Image
    Publication

    A Siamese Adversarial Anonymizer for Data Minimization in Biometric Applications

    Garofalo, Giuseppe
    ;
    Van Hamme, Tim
    ;
    Preuveneers, Davy
    ;
    Joosen, Wouter  
    Proceedings paper
    2020, 5th IEEE European Symposium on Security and Privacy (IEEE Euro S and P), SEP 07-11, 2020, p.334-343
  • Loading...
    Thumbnail Image
    Publication

    A smörgåsbord of typos: exploring international keyboard layout typosquatting

    Le Pochat, Victor
    ;
    Van Goethem, Tom
    ;
    Joosen, Wouter  
    Proceedings paper
    2019, 4th International Workshop on Traffic Measurments for Cybersecurity, 25/05/2018, p.187-192
  • Loading...
    Thumbnail Image
    Publication

    A survey on applying machine learning techniques for behavioral awareness

    Preuveneers, Davy
    ;
    Ramakrishnan, Arun Ramakrishnan
    ;
    Van Hamme, Tim
    ;
    Rimmer, Vera
    Book chapter
    2017
  • «
  • 1 (current)
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • »

Follow imec on

VimeoLinkedInFacebook

The repository

  • Contact us
  • Policy
  • About imec
Privacy statement | Cookie settings