Browsing by Author "Yskout, Koen"
- Results per page
- Sort Options
Publication A lingua franca for security by design
Proceedings paper2018, Proceedings - 2018 IEEE Cybersecurity Development Conference, SecDev 2018, 30/09/2018Publication A model for provably secure software design
Proceedings paper2017, Proceedings of the 5th International FME Workshop on Formal Methods in Software Engineering - FormaliSE, 20/05/2017, p.3-9Publication A modular meta-model for security solutions
Proceedings paper2017, 1st International Conference on the Art, Science and Engineering of Programming, 3/04/2017, p.Art. 16Publication A Reimagined Catalogue of Software Security Patterns
Proceedings paper2022, 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), MAY 16, 2022, p.25-32Publication Automated Threat Analysis and Management in a Continuous Integration Pipeline
Proceedings paper2021, 6th IEEE Secure Development Conference (SecDev), OCT 18-20, 2021, p.30-37Publication Automating the early detection of security design flaws
;Tuma, Katja ;Sion, Laurens ;Scandariato, RiccardioYskout, KoenProceedings paper2020, MODELS '20: Proceedings of the 23rd ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 13/10/2020, p.332-342Publication Design notations for secure software: a systematic literature review
Journal article2017, Software and Systems Modeling, (16) 3, p.809-831Publication Empirical research on security and privacy by design: What (not) to expect as a researcher or a reviewer
Book chapter2017Publication Interaction-based privacy threat elicitation
Proceedings paper2018, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 27/04/2018Publication Poster: Knowledge-enriched security and privacy threat modeling
Proceedings paper2018, ICSE '18 Proceedings of the 40th International Conference on Software Engineering, 27/05/2018, p.290-291Publication Relationship-Based Threat Modeling
Proceedings paper2022, 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), MAY 16, 2022, p.41-48Publication Risk-based design security analysis
Proceedings paper2018, SEAD '18 Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, 27/05/2018, p.11-18Publication Security threat modeling: Are data flow diagrams enough?
Proceedings paper2020, 1st International Workshop on Engineering and Cybersecurity of Critical Systems - EnCyCriS, 23/05/2020, p.254-257Publication Solution-aware data flow diagrams for security threat modelling
Proceedings paper2018, SAC '18 Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 9/04/2018, p.1425-1432Publication SPARTA: Security & privacy architecture through risk-driven threat assessment
Proceedings paper2018, 2018 IEEE International Conference on Software Architecture Companion (ICSA-C), 30/04/2018Publication Testing and Practical Implementation of a User-Friendly Personalized and Long-Term Electronic Informed Consent Prototype in Clinical Research: Mixed Methods Study
;De Sutter, Evelien ;Geerts, David ;Yskout, Koen ;Verreydt, Stef ;Borry, PascalBarbier, LieseJournal article2023, JOURNAL OF MEDICAL INTERNET RESEARCH, 25, p.Art. e46306Publication Threat Modeling: A Rough Diamond or Fool's Gold?
Proceedings paper2024, 17th European Conference on Software Architecture (ECSA), SEP 18-22, 2023, p.120-129Publication Threat modeling: from infancy to maturity
Proceedings paper2020, 42nd IEEE/ACM International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER), JUN 27-JUL 19, 2020, p.9-12Publication Towards a platform for empirical software design studies
Proceedings paper2017, 1st Int. Workshop on Establishing the Community-Wide Infrastructure for Architecture-Based Software Engineering - ECASE, 22/05/2017, p.3-7Publication Towards automated security design flaw detection
Proceedings paper2019, 2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW), 11/11/2019