Browsing Articles by imec author "3fe37b998b946eabd994c877dc7aef6fbccc4a9e"
Now showing items 21-40 of 44
-
Managing distributed trust relationships for multi-modal authentication
Van Hamme, T.; Preuveneers, D.; Joosen, Wouter (2018) -
Managing Feature Compatibility in Kubernetes: Vendor Comparison and Analysis
Truyen, Eddy; Kratzke, Nane; Van Landuyt, Dimitri; Lagaisse, Bert; Joosen, Wouter (2020) -
Object to NoSQL Database Mappers (ONDM):a systematic survey and comparison of frameworks
Reniers, Vincent; Van Landuyt, Dimitri; Rafique, Ansar; Joosen, Wouter (2019) -
Object-NoSQL database mappers: a benchmark study on the performance overhead
Reniers, Vincent; Rafique, Ansar; Van Landuyt, Dimitri; Joosen, Wouter (2017) -
On the Performance Impact of Data Access Middleware for NoSQL Data Stores A Study of the Trade-Off between Performance and Migration Cost
Rafique, Ansar; Van landuyt, Dimitri; Lagaisse, Bert; Joosen, Wouter (2018) -
On the Security of Biometrics and Fuzzy Commitment Cryptosystems: A Study on Gait Authentication
Van Hamme, Tim; Rua, Enrique Argones; Preuveneers, Davy; Joosen, Wouter (2021) -
On the use of DGAs in malware: an everlasting competition of detection and evasion
Spooren, Jan; Preuveneers, Danny; Desmet, Lieven; Janssen, Peter; Joosen, Wouter (2020) -
OWebSync: Seamless Synchronization of Distributed Web Clients
Jannes, Kristof; Lagaisse, Bert; Joosen, Wouter (2021) -
PERSIST: Policy-based data management middleware for multi-tenant SaaS leveraging federated cloud storage
Rafique, Ansar; Van landuyt, Dimitri; Joosen, Wouter (2018) -
PIVOT: Private and Effective Contact Tracing
Garofalo, Giuseppe; Van Hamme, Tim; Preuveneers, Davy; Joosen, Wouter; Abidin, Aysajan; Mustafa, Mustafa A. (2022) -
Policy reconciliation for access control in dynamic cross-enterprise collaborations
Preuveneers, Davy; Joosen, Wouter; Ilie-Zudor, Elisabeth (2018) -
Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersections
Preuveneers, Davy; Joosen, Wouter (2023) -
Resource usage and performance trade-offs for machine learning models in smart environments
Preuveneers, D.; Tsingenopoulos, I.; Joosen, Wouter (2020) -
Rumble: A low power audio bus for wireless communication with sensors in liquid and metallic environments
Hughes, Danny; Fang, Yan; Joosen, Wouter (2017) -
SCOPE: self-adaptive and policy-based data management middleware for federated clouds
Rafique, Ansar; Van Landuyt, Dimitri; Truyen, Eddy; Reniers, Vincent; Joosen, Wouter (2019) -
Security and Privacy Requirements for Electronic Consent: A Systematic Literature Review
Verreydt, S; Yskout, K; Joosen, Wouter (2021-03-21) -
SEQUOIA: A Middleware Supporting Policy-Based Access Control for Search and Aggregation in Data-Driven Applications
Bogaerts, Jasper; Lagaisse, Bert; Joosen, Wouter (2021) -
Sharing Machine Learning Models as Indicators of Compromise for Cyber Threat Intelligence
Preuveneers, Davy; Joosen, Wouter (2021-02) -
Simplifying CPS application development through fine-grained, automatic timeout predictions
Peros, S.; Delbruel, S.; Michiels, S.; Joosen, Wouter; Hughes, D. (2020) -
Thread-level resource consumption control of tenant custom code in a shared JVM for multi-tenant SaaS
Makki, Majid; Van Landuyt, Dimitri; Lagaisse, Bert; Joosen, Wouter (2021)