Browsing by Author "Joosen, Wouter"
- Results Per Page
- Sort Options
Publication A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs
Proceedings paper2023, 32nd USENIX Security Symposium, AUG 09-11, 2023, p.3673-3690Publication A Comparative Performance Evaluation of Multi-Model NoSQL Databases and Polyglot Persistence
Proceedings paper2023, 38th Annual ACM Symposium on Applied Computing (ACM SAC), MAR 27-31, 2023, p.286-293Publication A comparative study of workflow customization strategies: Quality implications for multi-tenant SaaS
Journal article2018, Journal of Systems and Software, 144, p.423-438Publication A comparison of system description models for data protection bij design
;Dewitte, Pierre ;Wuyts, Kim ;Sion, Laurens ;Van Landuyt, Dimitri ;Emanuilov, IvoValcke, PeggyProceedings paper2019, SAC '19 Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 8/04/2018, p.1512-1515Publication A comprehensive feature comparison study of open-source container orchestration frameworks
Journal article2019, Applied Sciences, (9) 5, p.931Publication A data utility-driven benchmark for de-identification methods
Proceedings paper2019, 16th International Conference on Trust, Privacy and Security in Digital Business, 26/08/2019, p.63-77Publication A descriptive study of assumptions made in LINDDUN privacy threat elicitation
;Van Landuyt, DimitriProceedings paper2019, 35th ACM/SIGAPP Symposium On Applied Computing, 30/03/2019Publication A dynamic decision fusion middleware for trustworthy context-aware IoT applications
Proceedings paper2017, M4IoT '17. Proceedings of the 4th Workshop on Middleware and Applications for the Internet of Things, 11/12/2017, p.1-6Publication A framework for black-box SLO tuning of multi-tenant applications in Kubernetes
Proceedings paper2019, WOC '19 Proceedings of the 5th International Workshop on Container Technologies and Container Clouds, 9/12/2019, p.1-6Publication A lingua franca for security by design
Proceedings paper2018, Proceedings - 2018 IEEE Cybersecurity Development Conference, SecDev 2018, 30/09/2018Publication A low-power hardware platform for smart environment as a call for more flexibility and re-usability
Proceedings paper2019, EWSN '19 Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 25/02/2019, p.194-205Publication A model for provably secure software design
Proceedings paper2017, Proceedings of the 5th International FME Workshop on Formal Methods in Software Engineering - FormaliSE, 20/05/2017, p.3-9Publication A modular meta-model for security solutions
Proceedings paper2017, 1st International Conference on the Art, Science and Engineering of Programming, 3/04/2017, p.Art. 16Publication A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints
;Le Pochat, Victor ;Van Hamme, Tim ;Maroofi, Sourena ;Van Goethem, TomPreuveneers, DavyProceedings paper2020, 27th Annual Network and Distributed System Security Symposium (NDSS), FEB 23-26, 2020Publication A Reimagined Catalogue of Software Security Patterns
Proceedings paper2022, 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), MAY 16, 2022, p.25-32Publication A shared multi-stakeholder platform for IoT: Poster
Proceedings paper2017, 18th ACM/IFIP/USENIX Middleware Conference: Posters and Demos -, 11/12/2017, p.5-6Publication A Siamese Adversarial Anonymizer for Data Minimization in Biometric Applications
Proceedings paper2020, 5th IEEE European Symposium on Security and Privacy (IEEE Euro S and P), SEP 07-11, 2020, p.334-343Publication A smörgåsbord of typos: exploring international keyboard layout typosquatting
Proceedings paper2019, 4th International Workshop on Traffic Measurments for Cybersecurity, 25/05/2018, p.187-192Publication A survey on applying machine learning techniques for behavioral awareness
;Preuveneers, Davy ;Ramakrishnan, Arun Ramakrishnan ;Van Hamme, TimRimmer, VeraBook chapter2017