Repository logo Institutional repository
  • Communities & Collections
  • Scientific publicationsOpen knowledge
Search repository
High contrast
  1. Home
  2. Browse by Author

Browsing by Author "Yskout, Koen"

Filter results by typing the first few letters
Now showing 1 - 20 of 20
  • Results per page
  • Sort Options
  • Loading...
    Thumbnail Image
    Publication

    A lingua franca for security by design

    van den Berghe, Alexander
    ;
    Yskout, Koen
    ;
    Scandariato, Riccardo
    ;
    Joosen, Wouter  
    Proceedings paper
    2018, Proceedings - 2018 IEEE Cybersecurity Development Conference, SecDev 2018, 30/09/2018
  • Loading...
    Thumbnail Image
    Publication

    A model for provably secure software design

    Van den Berghe, Alexander
    ;
    Yskout, Koen
    ;
    Joosen, Wouter  
    ;
    Scandariato, Riccardo
    Proceedings paper
    2017, Proceedings of the 5th International FME Workshop on Formal Methods in Software Engineering - FormaliSE, 20/05/2017, p.3-9
  • Loading...
    Thumbnail Image
    Publication

    A modular meta-model for security solutions

    Sion, Laurens
    ;
    Yskout, Koen
    ;
    Scandariato, Ricardo
    ;
    Joosen, Wouter  
    Proceedings paper
    2017, 1st International Conference on the Art, Science and Engineering of Programming, 3/04/2017, p.Art. 16
  • Loading...
    Thumbnail Image
    Publication

    A Reimagined Catalogue of Software Security Patterns

    van den Berghe, Alexander
    ;
    Yskout, Koen
    ;
    Joosen, Wouter  
    Proceedings paper
    2022, 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), MAY 16, 2022, p.25-32
  • Loading...
    Thumbnail Image
    Publication

    Automated Threat Analysis and Management in a Continuous Integration Pipeline

    Sion, Laurens
    ;
    Van Landuyt, Dimitri
    ;
    Yskout, Koen
    ;
    Verreydt, Stef
    ;
    Joosen, Wouter  
    Proceedings paper
    2021, 6th IEEE Secure Development Conference (SecDev), OCT 18-20, 2021, p.30-37
  • Loading...
    Thumbnail Image
    Publication

    Automating the early detection of security design flaws

    Tuma, Katja
    ;
    Sion, Laurens
    ;
    Scandariato, Riccardio
    ;
    Yskout, Koen
    Proceedings paper
    2020, MODELS '20: Proceedings of the 23rd ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 13/10/2020, p.332-342
  • Loading...
    Thumbnail Image
    Publication

    Design notations for secure software: a systematic literature review

    van den Berghe, Alexander
    ;
    Scandariato, Riccardo
    ;
    Yskout, Koen
    ;
    Joosen, Wouter  
    Journal article
    2017, Software and Systems Modeling, (16) 3, p.809-831
  • Loading...
    Thumbnail Image
    Publication

    Empirical research on security and privacy by design: What (not) to expect as a researcher or a reviewer

    Yskout, Koen
    ;
    Wuyts, Kim
    ;
    Van Landuyt, Dimitri
    ;
    Scandariato, Ricardo
    ;
    Joosen, Wouter  
    Book chapter
    2017
  • Loading...
    Thumbnail Image
    Publication

    Interaction-based privacy threat elicitation

    Sion, Laurens
    ;
    Wuyts, Kim
    ;
    Yskout, Koen
    ;
    Van landuyt, Dimitri
    ;
    Joosen, Wouter  
    Proceedings paper
    2018, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 27/04/2018
  • Loading...
    Thumbnail Image
    Publication

    Poster: Knowledge-enriched security and privacy threat modeling

    Sion, Laurens
    ;
    Yskout, Koen
    ;
    Van landuyt, Dimitri
    ;
    Joosen, Wouter  
    Proceedings paper
    2018, ICSE '18 Proceedings of the 40th International Conference on Software Engineering, 27/05/2018, p.290-291
  • Loading...
    Thumbnail Image
    Publication

    Relationship-Based Threat Modeling

    Verreydt, Stef
    ;
    Sion, Laurens
    ;
    Yskout, Koen
    ;
    Joosen, Wouter  
    Proceedings paper
    2022, 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), MAY 16, 2022, p.41-48
  • Loading...
    Thumbnail Image
    Publication

    Risk-based design security analysis

    Sion, Laurens
    ;
    Yskout, Koen
    ;
    Van landuyt, Dimitri
    ;
    Joosen, Wouter  
    Proceedings paper
    2018, SEAD '18 Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, 27/05/2018, p.11-18
  • Loading...
    Thumbnail Image
    Publication

    Security threat modeling: Are data flow diagrams enough?

    Sion, Laurens
    ;
    Yskout, Koen
    ;
    Van landuyt, Dimitri
    ;
    Van den Berghe, Alexander
    ;
    Joosen, Wouter  
    Proceedings paper
    2020, 1st International Workshop on Engineering and Cybersecurity of Critical Systems - EnCyCriS, 23/05/2020, p.254-257
  • Loading...
    Thumbnail Image
    Publication

    Solution-aware data flow diagrams for security threat modelling

    Sion, Laurens
    ;
    Yskout, Koen
    ;
    Van landuyt, Dimitri
    ;
    Joosen, Wouter  
    Proceedings paper
    2018, SAC '18 Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 9/04/2018, p.1425-1432
  • Loading...
    Thumbnail Image
    Publication

    SPARTA: Security & privacy architecture through risk-driven threat assessment

    Sion, Laurens
    ;
    Van landuyt, Dimitri
    ;
    Yskout, Koen
    ;
    Joosen, Wouter  
    Proceedings paper
    2018, 2018 IEEE International Conference on Software Architecture Companion (ICSA-C), 30/04/2018
  • Loading...
    Thumbnail Image
    Publication

    Testing and Practical Implementation of a User-Friendly Personalized and Long-Term Electronic Informed Consent Prototype in Clinical Research: Mixed Methods Study

    De Sutter, Evelien
    ;
    Geerts, David
    ;
    Yskout, Koen
    ;
    Verreydt, Stef
    ;
    Borry, Pascal
    ;
    Barbier, Liese
    Journal article
    2023, JOURNAL OF MEDICAL INTERNET RESEARCH, 25, p.Art. e46306
  • Loading...
    Thumbnail Image
    Publication

    Threat Modeling: A Rough Diamond or Fool's Gold?

    Anh-Duy Tran
    ;
    Yskout, Koen
    ;
    Joosen, Wouter  
    Proceedings paper
    2024, 17th European Conference on Software Architecture (ECSA), SEP 18-22, 2023, p.120-129
  • Loading...
    Thumbnail Image
    Publication

    Threat modeling: from infancy to maturity

    Yskout, Koen
    ;
    Heyman, Thomas
    ;
    Van Landuyt, Dimitri
    ;
    Sion, Laurens
    ;
    Wuyts, Kim
    ;
    Joosen, Wouter  
    Proceedings paper
    2020, 42nd IEEE/ACM International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER), JUN 27-JUL 19, 2020, p.9-12
  • Loading...
    Thumbnail Image
    Publication

    Towards a platform for empirical software design studies

    Yskout, Koen
    ;
    Van Landuyt, Dimitri
    ;
    Joosen, Wouter  
    Proceedings paper
    2017, 1st Int. Workshop on Establishing the Community-Wide Infrastructure for Architecture-Based Software Engineering - ECASE, 22/05/2017, p.3-7
  • Loading...
    Thumbnail Image
    Publication

    Towards automated security design flaw detection

    Sion, Laurens
    ;
    Tuma, Katja
    ;
    Scandariato, Riccardo
    ;
    Yskout, Koen
    ;
    Joosen, Wouter  
    Proceedings paper
    2019, 2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW), 11/11/2019

Follow imec on

VimeoLinkedInFacebook

The repository

  • Contact us
  • Policy
  • About imec
Privacy statement | Cookie settings