


default search action
Wouter Joosen
Person information
- affiliation: Catholic University of Leuven, Belgium
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j111]Laurens Sion, Dimitri Van Landuyt, Kim Wuyts, Wouter Joosen:
Robust and reusable LINDDUN privacy threat knowledge. Comput. Secur. 154: 104419 (2025) - [j110]Javier Martínez Llamas, Davy Preuveneers, Wouter Joosen:
Certified unlearning for a trustworthy machine learning-based access control administration. Int. J. Inf. Sec. 24(2): 94 (2025) - [c508]Qianying Liao, Dimitri Van Landuyt, Davy Preuveneers, Wouter Joosen:
Towards A Common Task Framework for Distributed Collaborative Machine Learning. ICSTW 2025: 433-437 - [c507]Victor Le Pochat
, Cameron Ballard, Lieven Desmet
, Wouter Joosen
, Damon McCoy
, Tobias Lauinger
:
Partnërka in Crime: Characterizing Deceptive Affiliate Marketing Offers. PAM 2025: 405-436 - 2024
- [j109]Christof Koolen
, Kim Wuyts, Wouter Joosen, Peggy Valcke
:
From insight to compliance: Appropriate technical and organisational security measures through the lens of cybersecurity maturity models. Comput. Law Secur. Rev. 52: 105914 (2024) - [j108]Dimitri Van Landuyt
, Vincent Wijshoff, Wouter Joosen:
A study of NoSQL query injection in Neo4j. Comput. Secur. 137: 103590 (2024) - [j107]Davy Preuveneers
, Wouter Joosen
:
An Ontology-Based Cybersecurity Framework for AI-Enabled Systems and Applications. Future Internet 16(3): 69 (2024) - [j106]Tim Van hamme
, Giuseppe Garofalo
, Enrique Argones-Rúa
, Davy Preuveneers
, Wouter Joosen:
A Novel Evaluation Framework for Biometric Security: Assessing Guessing Difficulty as a Metric. IEEE Trans. Inf. Forensics Secur. 19: 8369-8384 (2024) - [c506]Dimitri Van Landuyt
, Marie Levrau
, Vincent Reniers
, Wouter Joosen
:
An E-Commerce Benchmark for Evaluating Performance Trade-Offs in Document Stores. DaWaK 2024: 284-290 - [c505]Laurens Sion, Dimitri Van Landuyt, Wouter Joosen:
A DPIA Repository for Interdisciplinary Data Protection Research. ESORICS Workshops (1) 2024: 181-192 - [c504]Laurens Sion, Dimitri Van Landuyt, Wouter Joosen:
Leveraging the Domain Experts: Specializing Privacy Threat Knowledge. ESORICS Workshops (1) 2024: 534-541 - [c503]Pieter Philippaerts, Jan Vanhoof, Tom Van Cutsem, Wouter Joosen:
Is Your OAuth Middleware Vulnerable? Evaluating Open-Source Identity Providers' Security. GLOBECOM 2024: 3607-3612 - [c502]José Santos, Eddy Truyen, Christoph Baumann, Filip De Turck, Gerald Budigiri, Wouter Joosen:
Towards Intent-Based Scheduling for Performance and Security in Edge-to-Cloud Networks. ICIN 2024: 222-227 - [c501]Javier Martínez Llamas, Davy Preuveneers, Wouter Joosen:
Poster: Robust Edge-Based Detection of Bot Attacks Through Federated Learning. SEC 2024: 542-544 - [c500]Ilias Tsingenopoulos
, Jacopo Cortellazzi
, Branislav Bosanský
, Simone Aonzo
, Davy Preuveneers
, Wouter Joosen
, Fabio Pierazzi
, Lorenzo Cavallaro
:
How to Train your Antivirus: RL-based Hardening through the Problem Space. RAID 2024: 130-146 - [c499]Pieter-Jan Vrielynck
, Tim Van hamme
, Rawad Ghostin
, Bert Lagaisse
, Davy Preuveneers
, Wouter Joosen
:
A Self-Sovereign Identity Approach to Decentralized Access Control with Transitive Delegations. SACMAT 2024 - [c498]Dimitri Van Landuyt
, Laurens Sion
, Walewein Philips, Wouter Joosen:
From automation to CI/CD: a comparative evaluation of threat modeling tools. SecDev 2024: 35-45 - [c497]Stef Verreydt, Koen Yskout, Laurens Sion, Wouter Joosen:
Threat modeling state of practice in Dutch organizations. SOUPS @ USENIX Security Symposium 2024: 473-486 - [c496]Victor Le Pochat, Simon Fernandez, Tom van Goethem, Samaneh Tajalizadehkhoob, Lieven Desmet
, Andrzej Duda
, Wouter Joosen, Maciej Korczynski:
Evaluating the Impact of Design Decisions on Passive DNS-Based Domain Rankings. TMA 2024: 1-11 - [c495]Karel Dhondt, Victor Le Pochat, Yana Dimova, Wouter Joosen, Stijn Volckaert:
Swipe Left for Identity Theft: An Analysis of User Data Privacy Risks on Location-based Dating Apps. USENIX Security Symposium 2024 - [i13]Jacopo Cortellazzi, Ilias Tsingenopoulos, Branislav Bosanský, Simone Aonzo, Davy Preuveneers, Wouter Joosen, Fabio Pierazzi
, Lorenzo Cavallaro:
How to Train your Antivirus: RL-based Hardening through the Problem-Space. CoRR abs/2402.19027 (2024) - 2023
- [j105]Davy Preuveneers, Wouter Joosen:
Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersections. Comput. Secur. 135: 103505 (2023) - [j104]Eddy Truyen
, Hongjie Xie, Wouter Joosen:
Vendor-Agnostic Reconfiguration of Kubernetes Clusters in Cloud Federations. Future Internet 15(2): 63 (2023) - [j103]Yana Dimova, Tom van Goethem, Wouter Joosen:
Everybody's Looking for SSOmething: A large-scale evaluation on the privacy of OAuth authentication on the web. Proc. Priv. Enhancing Technol. 2023(4): 452-467 (2023) - [j102]Absar-Ul-Haque Ahmar
, Emekcan Aras
, Thien Duc Nguyen
, Sam Michiels
, Wouter Joosen
, Danny Hughes
:
Design of a Robust MAC Protocol for LoRa. ACM Trans. Internet Things 4(1): 3:1-3:25 (2023) - [j101]Kristof Jannes
, Emad Heydari Beni
, Bert Lagaisse
, Wouter Joosen
:
BeauForT: Robust Byzantine Fault Tolerance for Client-Centric Mobile Web Applications. IEEE Trans. Parallel Distributed Syst. 34(4): 1241-1252 (2023) - [c494]Willem Verheyen
, Tim Van hamme
, Sander Joos
, Davy Preuveneers
, Wouter Joosen
:
Beware the Doppelgänger: Attacks against Adaptive Thresholds in Facial Recognition Systems. ARES 2023: 18:1-18:11 - [c493]Emma Lavens
, Davy Preuveneers
, Wouter Joosen
:
Mitigating undesired interactions between liveness detection components in biometric authentication. ARES 2023: 141:1-141:8 - [c492]Gerald Budigiri, Christoph Baumann, Eddy Truyen, Jan Tobias Mühlberg
, Wouter Joosen:
Zero-Cost In-Depth Enforcement of Network Policies for Low-Latency Cloud-Native Systems. CLOUD 2023: 249-261 - [c491]Anh-Duy Tran, Koen Yskout
, Wouter Joosen:
Threat Modeling: A Rough Diamond or Fool's Gold? ECSA (Tracks, Workshops and Doctoral Symposium) 2023: 120-129 - [c490]Shirin Kalantari, Pieter Philippaerts
, Yana Dimova, Danny Hughes, Wouter Joosen, Bart De Decker:
A User-Centric Approach to API Delegations - Enforcing Privacy Policies on OAuth Delegations. ESORICS (2) 2023: 318-337 - [c489]Davy Preuveneers, Javier Martínez Llamas, Irfan Bulut, Enrique Argones-Rúa, Pieter Verfaillie, Vince Demortier, Dimitri Surinx, Wouter Joosen:
On the Use of AutoML for Combating Alert Fatigue in Security Operations Centers. ESORICS Workshops (2) 2023: 609-627 - [c488]Javier Martínez Llamas
, Davy Preuveneers, Wouter Joosen:
Effective Machine Learning-based Access Control Administration through Unlearning. EuroS&P Workshops 2023: 50-57 - [c487]Tim Van hamme, Giuseppe Garofalo
, Davy Preuveneers, Wouter Joosen:
Masterkey attacks against free-text keystroke dynamics and security implications of demographic factors. EuroS&P 2023: 278-291 - [c486]Pieter Philippaerts
, Davy Preuveneers, Wouter Joosen:
Revisiting OAuth 2.0 Compliance: A Two-Year Follow-Up Study. EuroS&P Workshops 2023: 521-525 - [c485]Gilang Mentari Hamidy
, Sri Yulianti
, Pieter Philippaerts
, Wouter Joosen
:
TC4SE: A High-Performance Trusted Channel Mechanism for Secure Enclave-Based Trusted Execution Environments. ISC 2023: 246-264 - [c484]Davy Preuveneers
, Willem Verheyen
, Sander Joos
, Wouter Joosen
:
On the adversarial robustness of full integer quantized TinyML models at the edge. MIDDLEWEDGE@Middleware 2023: 7-12 - [c483]Laurens Sion
, Dimitri Van Landuyt
, Pierre Dewitte
, Peggy Valcke
, Wouter Joosen:
Demonstration of the DPMF for Data Protection Analysis. MoDELS (Companion) 2023: 75-79 - [c482]Gilang Mentari Hamidy
, Pieter Philippaerts
, Wouter Joosen
:
T3E: A Practical Solution to Trusted Time in Secure Enclaves. NSS 2023: 305-326 - [c481]Anh-Duy Tran
, Koen Yskout
, Wouter Joosen:
AndrAS: Automated Attack Surface Extraction for Android Applications. QRS 2023: 406-417 - [c480]Kristof Jannes
, Vincent Reniers
, Wouter Lenaerts
, Bert Lagaisse
, Wouter Joosen
:
DEDACS: Decentralized and dynamic access control for smart contracts in a policy-based manner. SAC 2023: 222-230 - [c479]Dimitri Van Landuyt
, Julien Benaouda
, Vincent Reniers
, Ansar Rafique
, Wouter Joosen
:
A Comparative Performance Evaluation of Multi-Model NoSQL Databases and Polyglot Persistence. SAC 2023: 286-293 - [c478]Stef Verreydt
, Dimitri Van Landuyt
, Wouter Joosen
:
Expressive and Systematic Risk Assessments with Instance-Centric Threat Models. SAC 2023: 1450-1457 - [c477]Tom van Goethem, Iskander Sánchez-Rola, Wouter Joosen:
Scripted Henchmen: Leveraging XS-Leaks for Cross-Site Vulnerability Detection. SP (Workshops) 2023: 371-383 - [c476]Victor Le Pochat
, Wouter Joosen
:
Analyzing Cyber Security Research Practices through a Meta-Research Framework. CSET @ USENIX Security Symposium 2023: 64-74 - [c475]Gertjan Franken, Tom van Goethem, Lieven Desmet, Wouter Joosen:
A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs. USENIX Security Symposium 2023: 3673-3690 - [c474]Yana Dimova
, Mrunmayee Kode
, Shirin Kalantari
, Kim Wuyts
, Wouter Joosen
, Jan Tobias Mühlberg
:
From Privacy Policies to Privacy Threats: A Case Study in Policy-Based Threat Modeling. WPES@CCS 2023: 17-29 - [i12]Ilias Tsingenopoulos, Vera Rimmer, Davy Preuveneers, Fabio Pierazzi
, Lorenzo Cavallaro, Wouter Joosen:
Adversarial Markov Games: On Adaptive Decision-Based Attacks and Defenses. CoRR abs/2312.13435 (2023) - 2022
- [j100]Enrique Argones-Rúa
, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Discriminative training of spiking neural networks organised in columns for stream-based biometric authentication. IET Biom. 11(5): 485-497 (2022) - [j99]Giuseppe Garofalo
, Tim Van hamme
, Davy Preuveneers
, Wouter Joosen, Aysajan Abidin
, Mustafa A. Mustafa
:
PIVOT: Private and Effective Contact Tracing. IEEE Internet Things J. 9(22): 22466-22489 (2022) - [j98]Vera Rimmer, Theodor Schnitzler, Tom van Goethem, Abel Rodríguez Romero, Wouter Joosen, Katharina Kohls:
Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor. Proc. Priv. Enhancing Technol. 2022(3): 314-335 (2022) - [j97]Dimitri Van Landuyt
, Wouter Joosen:
A descriptive study of assumptions in STRIDE security threat modeling. Softw. Syst. Model. 21(6): 2311-2328 (2022) - [j96]Fan Yang, Ashok Samraj Thangarajan
, Gowri Sankar Ramachandran
, Wouter Joosen, Danny Hughes:
AsTAR: Sustainable Energy Harvesting for the Internet of Things through Adaptive Task Scheduling. ACM Trans. Sens. Networks 18(1): 4:1-4:34 (2022) - [c473]Davy Preuveneers, Wouter Joosen:
Privacy-Preserving Polyglot Sharing and Analysis of Confidential Cyber Threat Intelligence. ARES 2022: 2:1-2:11 - [c472]Emma Lavens, Pieter Philippaerts
, Wouter Joosen:
A Quantitative Assessment of the Detection Performance of Web Vulnerability Scanners. ARES 2022: 149:1-149:10 - [c471]Tom van Goethem, Gertjan Franken, Iskander Sánchez-Rola, David Dworken, Wouter Joosen:
SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model. AsiaCCS 2022: 784-798 - [c470]Karel Dhondt, Victor Le Pochat
, Alexios Voulimeneas
, Wouter Joosen, Stijn Volckaert:
A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks. CCS 2022: 801-814 - [c469]Lisa Liu, Gints Engelen, Timothy M. Lynar
, Daryl Essam, Wouter Joosen:
Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018. CNS 2022: 254-262 - [c468]Sander Joos
, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Adversarial Robustness is Not Enough: Practical Limitations for Securing Facial Authentication. IWSPA@CODASPY 2022: 2-12 - [c467]Joseph Hallett, Simon N. Foley, David Manda, Joseph Gardiner, Dimitri Jonckers, Wouter Joosen, Awais Rashid:
Threat-Driven Dynamic Security Policies for Cyber-Physical Infrastructures. CRITIS 2022: 9-26 - [c466]Absar-Ul-Haque Ahmar, Wouter Joosen, Danny Hughes:
Smart-Hop: Low-Latency Multi-hop Networking for LoRa. DCOSS 2022: 17-20 - [c465]Dimitri Van Landuyt
, Wouter Joosen
:
A Systematic Survey of Architectural Approaches and Trade-Offs in Data De-identification. ECSA 2022: 66-82 - [c464]Pieter-Jan Vrielynck
, Emad Heydari Beni
, Kristof Jannes
, Bert Lagaisse
, Wouter Joosen:
DeFIRED: decentralized authorization with receiver-revocable and refutable delegations. EuroSec@EUROSYS 2022: 57-63 - [c463]Davy Preuveneers, Emma Lavens, Wouter Joosen:
Applying Machine Learning to use security oracles: a case study in virus and malware detection. EuroS&P Workshops 2022: 240-251 - [c462]Ilias Tsingenopoulos, Davy Preuveneers, Lieven Desmet
, Wouter Joosen:
Captcha me if you can: Imitation Games with Reinforcement Learning. EuroS&P 2022: 719-735 - [c461]Zhaoyi Liu, Haoyu Tang, Sam Michiels, Wouter Joosen, Danny Hughes:
Unsupervised Acoustic Anomaly Detection Systems Based on Gaussian Mixture Density Neural Network. EUSIPCO 2022: 259-263 - [c460]Alexander van Den Berghe, Koen Yskout
, Wouter Joosen:
A reimagined catalogue of software security patterns. EnCyCriS@ICSE 2022: 25-32 - [c459]Stef Verreydt
, Laurens Sion
, Koen Yskout
, Wouter Joosen:
Relationship-based threat modeling. EnCyCriS@ICSE 2022: 41-48 - [c458]Mengyao Liu, Jonathan Oostvogels
, Sam Michiels
, Wouter Joosen, Danny Hughes:
BoboLink: Low Latency and Low Power Communication for Intelligent Environments. Intelligent Environments 2022: 1-4 - [c457]Zhaoyi Liu
, Sam Michiels
, Wouter Joosen, Danny Hughes:
Poster Abstract: Adapting Pretrained Features for Efficient Unsupervised Acoustic Anomaly Detection. IPSN 2022: 525-526 - [c456]Kristof Jannes
, Bert Lagaisse
, Wouter Joosen:
Secure replication for client-centric data stores. DICG@Middleware 2022: 31-36 - [c455]Gilang Mentari Hamidy
, Pieter Philippaerts
, Wouter Joosen
:
SecSharp: Towards Efficient Trusted Execution in Managed Languages (Work in Progress). MPLR 2022: 119-127 - [c454]Pieter Philippaerts
, Davy Preuveneers, Wouter Joosen:
OAuch: Exploring Security Compliance in the OAuth 2.0 Ecosystem. RAID 2022: 460-481 - [c453]Ala'a Al-Momani, Christoph Bösch
, Kim Wuyts
, Laurens Sion
, Wouter Joosen, Frank Kargl:
Mitigation lost in translation: leveraging threat information to improve privacy solution selection. SAC 2022: 1236-1247 - [c452]Tom van Goethem, Wouter Joosen:
Towards Improving the Deprecation Process of Web Features through Progressive Web Security. SP (Workshops) 2022: 20-30 - [c451]Victor Le Pochat, Laura Edelson, Tom van Goethem, Wouter Joosen, Damon McCoy, Tobias Lauinger:
An Audit of Facebook's Political Ad Policy Enforcement. USENIX Security Symposium 2022: 607-624 - [c450]Xander Bouwman, Victor Le Pochat, Pawel Foremski, Tom van Goethem, Carlos Hernandez Gañán, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Wouter Joosen, Michel van Eeten:
Helping hands: Measuring the impact of a large threat intelligence sharing community. USENIX Security Symposium 2022: 1149-1165 - [c449]Ilias Tsingenopoulos, Ali Mohammad Shafiei
, Lieven Desmet
, Davy Preuveneers, Wouter Joosen:
Adaptive Malware Control: Decision-Based Attacks in the Problem Space of Dynamic Analysis. WoRMA@AsiaCCS 2022: 3-14 - [c448]Ali Mohammad Shafiei
, Vera Rimmer, Ilias Tsingenopoulos, Lieven Desmet
, Wouter Joosen:
Position Paper: On Advancing Adversarial Malware Generation Using Dynamic Features. WoRMA@AsiaCCS 2022: 15-20 - [c447]Yana Dimova, Gertjan Franken, Victor Le Pochat
, Wouter Joosen, Lieven Desmet
:
Tracking the Evolution of Cookie-based Tracking on Facebook. WPES@CCS 2022: 181-196 - [p11]Giuseppe Garofalo
, Manel Slokom
, Davy Preuveneers, Wouter Joosen, Martha A. Larson:
Machine Learning Meets Data Modification - The Potential of Pre-processing for Privacy Enchancement. Security and Artificial Intelligence 2022: 130-155 - [p10]Tim Van hamme, Giuseppe Garofalo
, Sander Joos
, Davy Preuveneers, Wouter Joosen:
AI for Biometric Authentication Systems. Security and Artificial Intelligence 2022: 156-180 - [p9]Azqa Nadeem
, Vera Rimmer, Wouter Joosen, Sicco Verwer:
Intelligent Malware Defenses. Security and Artificial Intelligence 2022: 217-253 - [p8]Vera Rimmer, Azqa Nadeem
, Sicco Verwer, Davy Preuveneers, Wouter Joosen:
Open-World Network Intrusion Detection. Security and Artificial Intelligence 2022: 254-283 - [p7]Carlos Javier Hernández-Castro, Zhuoran Liu, Alex Serban, Ilias Tsingenopoulos, Wouter Joosen:
Adversarial Machine Learning. Security and Artificial Intelligence 2022: 287-312 - [d1]Stef Verreydt
, Laurens Sion
, Koen Yskout
, Wouter Joosen
:
Relationship-Based Threat Modeling: Evaluation Data. Zenodo, 2022 - 2021
- [j95]Lieven Desmet
, Jan Spooren, Thomas Vissers, Peter Janssen, Wouter Joosen:
Premadoma: An Operational Solution to Prevent Malicious Domain Name Registrations in the .eu TLD. DTRAP 2(1): 2:1-2:24 (2021) - [j94]Majid Makki, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen:
Thread-level resource consumption control of tenant custom code in a shared JVM for multi-tenant SaaS. Future Gener. Comput. Syst. 115: 351-364 (2021) - [j93]Stef Verreydt
, Koen Yskout
, Wouter Joosen:
Security and Privacy Requirements for Electronic Consent: A Systematic Literature Review. ACM Trans. Comput. Heal. 2(2): 16:1-16:24 (2021) - [j92]Ansar Rafique
, Dimitri Van Landuyt
, Emad Heydari Beni
, Bert Lagaisse
, Wouter Joosen:
CryptDICE: Distributed data protection system for secure cloud data storage and computation. Inf. Syst. 96: 101671 (2021) - [j91]Davy Preuveneers
, Giuseppe Garofalo
, Wouter Joosen:
Cloud and edge based data analytics for privacy-preserving multi-modal engagement monitoring in the classroom. Inf. Syst. Frontiers 23(1): 151-164 (2021) - [j90]Davy Preuveneers
, Wouter Joosen:
Sharing Machine Learning Models as Indicators of Compromise for Cyber Threat Intelligence. J. Cybersecur. Priv. 1(1): 140-163 (2021) - [j89]Yana Dimova, Gunes Acar, Lukasz Olejnik, Wouter Joosen, Tom van Goethem:
The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion. Proc. Priv. Enhancing Technol. 2021(3): 394-412 (2021) - [j88]Jonathan Oostvogels
, Fan Yang, Sam Michiels
, Wouter Joosen, Danny Hughes:
Zero-Wire: Low-Latency Wireless Networking with Symbol-Synchronous LEDs. GetMobile Mob. Comput. Commun. 25(1): 34-38 (2021) - [j87]Jasper Bogaerts
, Bert Lagaisse
, Wouter Joosen:
SEQUOIA: A Middleware Supporting Policy-Based Access Control for Search and Aggregation in Data-Driven Applications. IEEE Trans. Dependable Secur. Comput. 18(1): 325-339 (2021) - [j86]Tim Van hamme
, Enrique Argones-Rúa
, Davy Preuveneers
, Wouter Joosen:
On the Security of Biometrics and Fuzzy Commitment Cryptosystems: A Study on Gait Authentication. IEEE Trans. Inf. Forensics Secur. 16: 5211-5224 (2021) - [j85]Emekcan Aras, Stéphane Delbruel, Fan Yang, Wouter Joosen, Danny Hughes:
Chimera: A Low-power Reconfigurable Platform for Internet of Things. ACM Trans. Internet Things 2(2): 10:1-10:25 (2021) - [j84]Kristof Jannes
, Bert Lagaisse
, Wouter Joosen:
OWebSync: Seamless Synchronization of Distributed Web Clients. IEEE Trans. Parallel Distributed Syst. 32(9): 2338-2351 (2021) - [c446]Enrique Argones-Rúa, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Gait Authentication based on Spiking Neural Networks. BIOSIG 2021: 51-60 - [c445]Ashok Samraj Thangarajan
, Fan Yang, Wouter Joosen, Sam Michiels
, Danny Hughes:
ReFrAEN: a Reconfigurable Vibration Analysis Framework for Constrained Sensor Nodes. DCOSS 2021: 124-131 - [c444]Stefanos Peros, Wouter Joosen, Danny Hughes:
Ermis: a middleware for bridging data collection and data processing in IoT streaming applications. DCOSS 2021: 259-266 - [c443]Gerald Budigiri, Christoph Baumann, Jan Tobias Mühlberg
, Eddy Truyen, Wouter Joosen:
Network Policies in Kubernetes: Performance Evaluation and Security Analysis. EuCNC/6G Summit 2021: 407-412 - [c442]Laurens Sion
, Dimitri Van Landuyt
, Wouter Joosen:
An Overview of Runtime Data Protection Enforcement Approaches. EuroS&P Workshops 2021: 351-358 - [c441]Martijn Sauwens
, Kristof Jannes
, Bert Lagaisse
, Wouter Joosen:
SCEW: Programmable BFT-Consensus with Smart Contracts for Client-Centric P2P Web Applications. PaPoC@EuroSys 2021: 2:1-2:7 - [c440]Martijn Sauwens, Emad Heydari Beni
, Kristof Jannes
, Bert Lagaisse
, Wouter Joosen:
ThunQ: A Distributed and Deep Authorization Middleware for Early and Lazy Policy Enforcement in Microservice Applications. ICSOC 2021: 204-220 - [c439]Kristof Jannes
, Bert Lagaisse
, Wouter Joosen:
Seamless Synchronization for Collaborative Web Services. ICSOC Workshops 2021: 311-314 - [c438]Majid Makki, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen:
Shared memory protection in a multi-tenant JVM. MPLR 2021: 1-15 - [c437]Emad Heydari Beni
, Eddy Truyen, Bert Lagaisse
, Wouter Joosen, Jordy Dieltjens:
Reducing cold starts during elastic scaling of containers in kubernetes. SAC 2021: 60-68 - [c436]Ala'a Al-Momani, Kim Wuyts
, Laurens Sion
, Frank Kargl, Wouter Joosen, Benjamin Erb, Christoph Bösch
:
Land of the lost: privacy patterns' forgotten properties: enhancing selection-support for privacy patterns. SAC 2021: 1217-1225 - [c435]Dimitri Van Landuyt
, Liliana Pasquale, Laurens Sion
, Wouter Joosen:
Threat modeling at run time: the case for reflective and adaptive threat management (NIER track). SEAMS@ICSE 2021: 203-209 - [c434]Laurens Sion
, Dimitri Van Landuyt
, Koen Yskout
, Stef Verreydt
, Wouter Joosen:
Automated Threat Analysis and Management in a Continuous Integration Pipeline. SecDev 2021: 30-37 - [c433]Fan Yang, Ashok Samraj Thangarajan
, Sam Michiels
, Wouter Joosen, Danny Hughes:
Morphy: Software Defined Charge Storage for the IoT. SenSys 2021: 248-260 - [c432]Gints Engelen
, Vera Rimmer, Wouter Joosen:
Troubleshooting an Intrusion Detection Dataset: the CICIDS2017 Case Study. SP (Workshops) 2021: 7-12 - [c431]Gertjan Franken
, Tom van Goethem, Wouter Joosen:
Reading Between the Lines: An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems. SP 2021: 1730-1747 - [c430]Oleksandr Tomashchuk
, Dimitri Van Landuyt
, Wouter Joosen:
The architectural divergence problem in security and privacy of eHealth IoT product lines. SPLC (A) 2021: 114-119 - [c429]Casper Claesen, Ansar Rafique, Dimitri Van Landuyt
, Wouter Joosen:
A YCSB Workload for Benchmarking Hotspot Object Behaviour in NoSQL Databases. TPCTC 2021: 1-16 - [c428]Davy Preuveneers, Sander Joos
, Wouter Joosen:
AuthGuide: Analyzing Security, Privacy and Usability Trade-Offs in Multi-factor Authentication. TrustBus 2021: 155-170 - [c427]Absar-Ul-Haque Ahmar
, Thien Duc Nguyen
, Wouter Joosen, Danny Hughes:
EH-CRAM: A Sustainable Energy Harvesting Algorithm for LPWANs. WCNC 2021: 1-7 - [p6]Steven Furnell
, Paul S. Haskell-Dowland
, Manish Agrawal
, Richard L. Baskerville
, Anirban Basu
, Matt Bishop
, Jorge Cuéllar, Sara Foresti
, Lynn Futcher
, Nurit Gal-Oz
, Tejaswini (Teju) Herath
, Christian Damsgaard Jensen
, Allen C. Johnston
, Wouter Joosen, Giovanni Livraga
, Javier López
, Stephen Marsh, Fabio Martinelli, Fabio Massacci
, Aljosa Pasic
, Stef Schinagl
, Abbas Shahim, Kerry-Lynn Thomson
, Jaideep Vaidya
, Tony Vance
, Merrill Warkentin
:
Information Security and Privacy - Challenges and Outlook. IFIP's Exciting First 60+ Years 2021: 383-401 - [i11]Yana Dimova, Gunes Acar, Lukasz Olejnik, Wouter Joosen, Tom van Goethem:
The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion. CoRR abs/2102.09301 (2021) - 2020
- [j83]Eddy Truyen
, Nane Kratzke
, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen:
Managing Feature Compatibility in Kubernetes: Vendor Comparison and Analysis. IEEE Access 8: 228420-228439 (2020) - [j82]Laurens Sion
, Pierre Dewitte
, Dimitri Van Landuyt
, Kim Wuyts
, Peggy Valcke
, Wouter Joosen:
DPMF: A Modeling Framework for Data Protection by Design. Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model. 15: 10:1-10:53 (2020) - [j81]Davy Preuveneers
, Wouter Joosen:
Automated Configuration of NoSQL Performance and Scalability Tactics for Data-Intensive Applications. Informatics 7(3): 29 (2020) - [j80]Davy Preuveneers
, Wouter Joosen, Jorge Bernal Bernabé
, Antonio F. Skarmeta
:
Distributed Security Framework for Reliable Threat Intelligence Sharing. Secur. Commun. Networks 2020: 8833765:1-8833765:15 (2020) - [j79]Davy Preuveneers
, Ilias Tsingenopoulos
, Wouter Joosen:
Resource Usage and Performance Trade-offs for Machine Learning Models in Smart Environments. Sensors 20(4): 1176 (2020) - [j78]Stefanos Peros, Stéphane Delbruel, Sam Michiels
, Wouter Joosen, Danny Hughes:
Simplifying CPS Application Development through Fine-grained, Automatic Timeout Predictions. ACM Trans. Internet Things 1(3): 18:1-18:30 (2020) - [c426]Sepideh Pouyanrad, Jan Tobias Mühlberg
, Wouter Joosen:
SCFMSP: static detection of side channels in MSP430 programs. ARES 2020: 21:1-21:10 - [c425]Oleksandr Tomashchuk
, Yuan Li, Dimitri Van Landuyt
, Wouter Joosen:
Operationalization of Privacy and Security Requirements for eHealth IoT Applications in the Context of GDPR and CSL. APF 2020: 143-160 - [c424]Absar-Ul-Haque Ahmar
, Emekcan Aras, Thien Duc Nguyen
, Sam Michiels
, Wouter Joosen, Danny Hughes:
CRAM: Robust Medium Access Control for LPWAN using Cryptographic Frequency Hopping. DCOSS 2020: 95-102 - [c423]Emekcan Aras, Mahmoud Ammar
, Fan Yang, Wouter Joosen, Danny Hughes:
MicroVault: Reliable Storage Unit for IoT Devices. DCOSS 2020: 132-140 - [c422]Vincent Reniers
, Dimitri Van Landuyt
, Ansar Rafique
, Wouter Joosen
:
A Workload-Driven Document Database Schema Recommender (DBSR). ER 2020: 471-484 - [c421]Dimitri Van Landuyt
, Laurens Sion
, Pierre Dewitte
, Wouter Joosen:
The Bigger Picture: Approaches to Inter-organizational Data Protection Impact Assessment. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 283-293 - [c420]Kim Wuyts
, Laurens Sion
, Wouter Joosen:
LINDDUN GO: A Lightweight Approach to Privacy Threat Modeling. EuroS&P Workshops 2020: 302-309 - [c419]Laurens Sion
, Dimitri Van Landuyt
, Wouter Joosen:
The Never-Ending Story: On the Need for Continuous Privacy Impact Assessment. EuroS&P Workshops 2020: 314-317 - [c418]Giuseppe Garofalo
, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
A Siamese Adversarial Anonymizer for Data Minimization in Biometric Applications. EuroS&P Workshops 2020: 334-343 - [c417]Koen Yskout
, Thomas Heyman, Dimitri Van Landuyt
, Laurens Sion
, Kim Wuyts
, Wouter Joosen:
Threat modeling: from infancy to maturity. ICSE (NIER) 2020: 9-12 - [c416]Laurens Sion
, Koen Yskout
, Dimitri Van Landuyt
, Alexander van Den Berghe, Wouter Joosen:
Security Threat Modeling: Are Data Flow Diagrams Enough? ICSE (Workshops) 2020: 254-257 - [c415]Ashok Samraj Thangarajan
, Fan Yang, Wouter Joosen, Danny Hughes:
Deterministic 40 year battery lifetime through a hybrid perpetual sensing platform (HyPer). IOT 2020: 11:1-11:8 - [c414]Eddy Truyen, Bert Lagaisse
, Wouter Joosen, Arnout Hoebreckx, Cédric De Dycker:
Flexible Migration in Blue-Green Deployments within a Fixed Cost. WOC@Middleware 2020: 13-18 - [c413]Stefanos Peros, Emekcan Aras, Wouter Joosen, Danny Hughes:
Kairos: a self-configuring approach for short and accurate event timeouts in IoT. MobiQuitous 2020: 347-356 - [c412]Victor Le Pochat, Tim Van hamme, Sourena Maroofi, Tom van Goethem, Davy Preuveneers, Andrzej Duda, Wouter Joosen, Maciej Korczynski:
A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints. NDSS 2020 - [c411]Eddy Truyen, André Jacobs, Stef Verreydt
, Emad Heydari Beni
, Bert Lagaisse
, Wouter Joosen:
Feasibility of container orchestration for adaptive performance isolation in multi-tenant SaaS applications. SAC 2020: 162-169 - [c410]Vincent Reniers, Yuan Gao, Ren Zhang
, Paolo Viviani
, Akash Madhusudan
, Bert Lagaisse
, Svetla Nikova
, Dimitri Van Landuyt
, Riccardo Lombardi, Bart Preneel
, Wouter Joosen:
Authenticated and auditable data sharing via smart contract. SAC 2020: 324-331 - [c409]Dimitri Van Landuyt
, Wouter Joosen:
A descriptive study of assumptions made in LINDDUN privacy threat elicitation. SAC 2020: 1280-1287 - [c408]Tom van Goethem, Christina Pöpper, Wouter Joosen, Mathy Vanhoef
:
Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections. USENIX Security Symposium 2020: 1985-2002 - [i10]Eddy Truyen, Dimitri Van Landuyt, Davy Preuveneers, Bert Lagaisse, Wouter Joosen:
A Comprehensive Feature Comparison Study of Open-Source Container Orchestration Frameworks. CoRR abs/2002.02806 (2020) - [i9]Giuseppe Garofalo, Tim Van hamme, Davy Preuveneers, Wouter Joosen, Aysajan Abidin, Mustafa A. Mustafa:
Striking the Balance: Effective yet Privacy Friendly Contact Tracing. IACR Cryptol. ePrint Arch. 2020: 559 (2020)
2010 – 2019
- 2019
- [j77]Gertjan Franken
, Tom van Goethem, Wouter Joosen:
Exposing Cookie Policy Flaws Through an Extensive Evaluation of Browsers and Their Extensions. IEEE Secur. Priv. 17(4): 25-34 (2019) - [j76]Vincent Reniers, Dimitri Van Landuyt
, Ansar Rafique, Wouter Joosen:
Object to NoSQL Database Mappers (ONDM): A systematic survey and comparison of frameworks. Inf. Syst. 85: 1-20 (2019) - [j75]Ansar Rafique
, Dimitri Van Landuyt
, Eddy Truyen, Vincent Reniers, Wouter Joosen:
SCOPE: self-adaptive and policy-based data management middleware for federated clouds. J. Internet Serv. Appl. 10(1): 2:1-2:19 (2019) - [j74]Emad Heydari Beni
, Bert Lagaisse
, Wouter Joosen:
Infracomposer: Policy-driven adaptive and reflective middleware for the cloudification of simulation & optimization workflows. J. Syst. Archit. 95: 36-46 (2019) - [j73]Tim Van hamme, Giuseppe Garofalo
, Enrique Argones-Rúa
, Davy Preuveneers
, Wouter Joosen:
A Systematic Comparison of Age and Gender Prediction on IMU Sensor-Based Gait Traces. Sensors 19(13): 2945 (2019) - [c407]Jan Spooren, Thomas Vissers, Peter Janssen, Wouter Joosen, Lieven Desmet
:
Premadoma: an operational solution for DNS registries to prevent malicious domain registrations. ACSAC 2019: 557-567 - [c406]Tom van Goethem, Victor Le Pochat
, Wouter Joosen:
Mobile Friendly or Attacker Friendly?: A Large-scale Security Evaluation of Mobile-first Websites. AsiaCCS 2019: 206-213 - [c405]Tom van Goethem, Najmeh Miramirkhani, Wouter Joosen, Nick Nikiforakis:
Purchased Fame: Exploring the Ecosystem of Private Blog Networks. AsiaCCS 2019: 366-378 - [c404]Dimitri Van Landuyt
, Luuk Raaijmakers, Ansar Rafique, Wouter Joosen:
Continuous and Client-centric Trust Monitoring in Multi-cloud Storage. CLOSER 2019: 100-110 - [c403]Stefanos Peros, Stéphane Delbruel
, Sam Michiels
, Wouter Joosen, Danny Hughes:
Khronos: Middleware for Simplified Time Management in CPS. DEBS 2019: 127-138 - [c402]Davy Preuveneers, Wouter Joosen:
Edge-Based and Privacy-Preserving Multi-Modal Monitoring of Student Engagement in Online Learning Environments. EDGE 2019: 18-20 - [c401]Dimitri Van Landuyt
, Laurens Sion
, Emiel Vandeloo, Wouter Joosen:
On the Applicability of Security and Privacy Threat Modeling for Blockchain Applications. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 195-203 - [c400]Davy Preuveneers, Wouter Joosen:
Towards Multi-party Policy-based Access Control in Federations of Cloud and Edge Microservices. EuroS&P Workshops 2019: 29-38 - [c399]Ilias Tsingenopoulos, Davy Preuveneers, Wouter Joosen:
AutoAttacker: A reinforcement learning approach for black-box adversarial attacks. EuroS&P Workshops 2019: 229-237 - [c398]Kristof Jannes
, Bert Lagaisse
, Wouter Joosen:
The Web Browser as Distributed Application Server: Towards Decentralized Web Applications in the Edge. EdgeSys@EuroSys 2019: 7-11 - [c397]Fan Yang, Ashok Samraj Thangarajan, Wouter Joosen, Christophe Huygens, Danny Hughes, Gowri Sankar Ramachandran, Bhaskar Krishnamachari:
AsTAR: Sustainable Battery Free Energy Harvesting for Heterogeneous Platforms and Dynamic Environments. EWSN 2019: 71-82 - [c396]Emekcan Aras, Stéphane Delbruel, Fan Yang, Wouter Joosen, Danny Hughes:
A Low-Power Hardware Platform for Smart Environment as a Call for More Flexibility and Re-Usability. EWSN 2019: 194-205 - [c395]Davy Preuveneers, Wouter Joosen:
TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE. FPS 2019: 172-188 - [c394]Jan Spooren, Davy Preuveneers, Wouter Joosen:
PPG2Live: Using dual PPG for active authentication and liveness detection. ICB 2019: 1-6 - [c393]Laurens Sion
, Pierre Dewitte
, Dimitri Van Landuyt
, Kim Wuyts
, Ivo Emanuilov
, Peggy Valcke
, Wouter Joosen:
An Architectural View for Data Protection by Design. ICSA 2019: 11-20 - [c392]Majid Makki, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen:
Thread-Level CPU and Memory Usage Control of Custom Code in Multi-tenant SaaS. ICSOC 2019: 267-282 - [c391]Laurens Sion
, Katja Tuma
, Riccardo Scandariato, Koen Yskout
, Wouter Joosen:
Towards Automated Security Design Flaw Detection. ASE Workshops 2019: 49-56 - [c390]Kristof Jannes
, Bert Lagaisse
, Wouter Joosen:
You Don't Need a Ledger: Lightweight Decentralized Consensus Between Mobile Web Clients. SERIAL@Middleware 2019: 3-8 - [c389]Matthijs Kaminski, Eddy Truyen, Emad Heydari Beni
, Bert Lagaisse
, Wouter Joosen:
A framework for black-box SLO tuning of multi-tenant applications in Kubernetes. WOC@Middleware 2019: 7-12 - [c388]Stef Verreydt
, Emad Heydari Beni
, Eddy Truyen, Bert Lagaisse
, Wouter Joosen:
Leveraging Kubernetes for adaptive and cost-efficient resource management. WOC@Middleware 2019: 37-42 - [c387]Emad Heydari Beni
, Bert Lagaisse
, Wouter Joosen, Abdelrahaman Aly, Michael Brackx:
DataBlinder: A distributed data protection middleware supporting search and computation on encrypted data. Middleware Industry 2019: 50-57 - [c386]Victor Le Pochat, Tom van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczynski, Wouter Joosen:
Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. NDSS 2019 - [c385]Victor Le Pochat
, Tom van Goethem, Wouter Joosen:
Funny Accents: Exploring Genuine Interest in Internationalized Domain Names. PAM 2019: 178-194 - [c384]Giuseppe Garofalo
, Davy Preuveneers, Wouter Joosen:
Data Privatizer for Biometric Applications and Online Identity Management. Privacy and Identity Management 2019: 209-225 - [c383]Eddy Truyen, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen:
Performance overhead of container orchestration frameworks for management of multi-tenant database deployments. SAC 2019: 156-159 - [c382]Vincent Reniers, Dimitri Van Landuyt
, Paolo Viviani
, Bert Lagaisse
, Riccardo Lombardi, Wouter Joosen:
Analysis of architectural variants for auditable blockchain-based private data sharing. SAC 2019: 346-354 - [c381]Pierre Dewitte
, Kim Wuyts
, Laurens Sion
, Dimitri Van Landuyt
, Ivo Emanuilov
, Peggy Valcke
, Wouter Joosen:
A comparison of system description models for data protection by design. SAC 2019: 1512-1515 - [c380]Jan Spooren, Davy Preuveneers, Lieven Desmet
, Peter Janssen, Wouter Joosen:
Detection of algorithmically generated domain names used by botnets: a dual arms race. SAC 2019: 1916-1923 - [c379]Laurens Sion
, Dimitri Van Landuyt
, Kim Wuyts
, Wouter Joosen:
Privacy Risk Assessment for Data Subject-Aware Threat Modeling. IEEE Symposium on Security and Privacy Workshops 2019: 64-71 - [c378]Kim Wuyts
, Laurens Sion
, Dimitri Van Landuyt
, Wouter Joosen:
Knowledge is Power: Systematic Reuse of Privacy Knowledge for Threat Elicitation. IEEE Symposium on Security and Privacy Workshops 2019: 80-83 - [c377]Victor Le Pochat
, Tom van Goethem, Wouter Joosen:
A Smörgåsbord of Typos: Exploring International Keyboard Layout Typosquatting. IEEE Symposium on Security and Privacy Workshops 2019: 187-192 - [c376]Thomas Vissers, Peter Janssen, Wouter Joosen, Lieven Desmet
:
Assessing the Effectiveness of Domain Blacklisting Against Malicious DNS Registrations. IEEE Symposium on Security and Privacy Workshops 2019: 199-204 - [c375]Majid Makki, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen:
Journal first presentation of a comparative study of workflow customization strategies: quality implications for multi-tenant SaaS. SPLC (A) 2019: 7:1 - [c374]Oleksandr Tomashchuk
, Dimitri Van Landuyt
, Daniel Pletea, Kim Wuyts
, Wouter Joosen:
A Data Utility-Driven Benchmark for De-identification Methods. TrustBus 2019: 63-77 - [c373]Gertjan Franken, Tom van Goethem, Wouter Joosen:
Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies. USENIX ATC 2019 - [c372]Victor Le Pochat, Tom van Goethem, Wouter Joosen:
Evaluating the Long-term Effects of Parameters on the Characteristics of the Tranco Top Sites Ranking. CSET @ USENIX Security Symposium 2019 - [c371]Absar-Ul-Haque Ahmar
, Emekcan Aras, Wouter Joosen, Danny Hughes:
Towards More Scalable and Secure LPWAN Networks Using Cryptographic Frequency Hopping. Wireless Days 2019: 1-4 - 2018
- [j72]Wito Delnat, Thomas Heyman, Wouter Joosen, Davy Preuveneers, Ansar Rafique, Eddy Truyen, Dimitri Van Landuyt
:
K8-Scalar: a workbench to compare autoscalers for container-orchestrated services (Artifact). Dagstuhl Artifacts Ser. 4(1): 03:1-03:6 (2018) - [j71]Davy Preuveneers
, Wouter Joosen, Elisabeth Ilie Zudor
:
Policy reconciliation for access control in dynamic cross-enterprise collaborations. Enterp. Inf. Syst. 12(3): 279-299 (2018) - [j70]Ansar Rafique
, Dimitri Van Landuyt
, Wouter Joosen:
PERSIST: Policy-Based Data Management Middleware for Multi-Tenant SaaS Leveraging Federated Cloud Storage. J. Grid Comput. 16(2): 165-194 (2018) - [j69]Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Managing distributed trust relationships for multi-modal authentication. J. Inf. Secur. Appl. 40: 258-270 (2018) - [j68]Majid Makki, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen:
A comparative study of workflow customization strategies: Quality implications for multi-tenant SaaS. J. Syst. Softw. 144: 423-438 (2018) - [j67]Hassaan Janjua
, Wouter Joosen, Sam Michiels
, Danny Hughes:
Trusted Operations on Sensor Data. Sensors 18(5): 1364 (2018) - [j66]Ansar Rafique, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen:
On the Performance Impact of Data Access Middleware for NoSQL Data Stores A Study of the Trade-Off between Performance and Migration Cost. IEEE Trans. Cloud Comput. 6(3): 843-856 (2018) - [c370]Eddy Truyen, Matt Bruzek, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen:
Evaluation of Container Orchestration Systems for Deploying and Managing NoSQL Database Clusters. IEEE CLOUD 2018: 468-475 - [c369]Tim Van hamme, Enrique Argones-Rúa, Davy Preuveneers, Wouter Joosen:
Gait template protection using HMM-UBM. BIOSIG 2018: 1-8 - [c368]Davy Preuveneers, Wouter Joosen, Elisabeth Ilie Zudor
:
Robust Digital Twin Compositions for Industry 4.0 Smart Manufacturing Systems. EDOC Workshops 2018: 69-78 - [c367]Victor Le Pochat
, Tom van Goethem, Wouter Joosen:
Idea: Visual Analytics for Web Security. ESSoS 2018: 124-132 - [c366]Laurens Sion
, Kim Wuyts
, Koen Yskout
, Dimitri Van Landuyt
, Wouter Joosen:
Interaction-Based Privacy Threat Elicitation. EuroS&P Workshops 2018: 79-86 - [c365]Stefanos Peros, Hassaan Janjua
, Sven Akkermans
, Wouter Joosen, Danny Hughes:
Dynamic QoS support for IoT backhaul networks through SDN. FMEC 2018: 187-192 - [c364]Laurens Sion
, Dimitri Van Landuyt
, Koen Yskout
, Wouter Joosen:
SPARTA: Security & Privacy Architecture Through Risk-Driven Threat Assessment. ICSA Companion 2018: 89-92 - [c363]Laurens Sion
, Koen Yskout
, Dimitri Van Landuyt
, Wouter Joosen:
Risk-based design security analysis. SEAD@ICSE 2018: 11-18 - [c362]Wito Delnat, Eddy Truyen, Ansar Rafique, Dimitri Van Landuyt
, Wouter Joosen:
K8-scalar: a workbench to compare autoscalers for container-orchestrated database clusters. SEAMS@ICSE 2018: 33-39 - [c361]Alexander van Den Berghe, Koen Yskout
, Wouter Joosen:
Security patterns 2.0: towards security patterns based on security building blocks. SEAD@ICSE 2018: 45-48 - [c360]Laurens Sion
, Koen Yskout
, Dimitri Van Landuyt
, Wouter Joosen:
Knowledge-enriched security and privacy threat modeling. ICSE (Companion Volume) 2018: 290-291 - [c359]Dimitri Jonckers, Bert Lagaisse
, Wouter Joosen:
Expect the unexpected: Towards a middleware for policy adaptation in IoT platforms. M4IoT@Middleware 2018: 7-10 - [c358]Ashok Samraj Thangarajan
, Fan Yang
, Wouter Joosen, Danny Hughes:
Real-time Distributed In-Situ Benchmarking of Energy Harvesting IoT Devices. M4IoT@Middleware 2018: 19-24 - [c357]Sven Akkermans, Bruno Crispo, Wouter Joosen, Danny Hughes:
Polyglot CerberOS: Resource Security, Interoperability and Multi-Tenancy for IoT Services on a Multilingual Platform. MobiQuitous 2018: 59-68 - [c356]Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom van Goethem, Wouter Joosen:
Automated Website Fingerprinting through Deep Learning. NDSS 2018 - [c355]Majid Makki, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen, Nick Hofstede:
Transparent IO access control for application-level tenant isolation. SAC 2018: 143-150 - [c354]Kim Wuyts
, Dimitri Van Landuyt
, Aram Hovsepyan, Wouter Joosen:
Effective and efficient privacy threat modeling through domain refinements. SAC 2018: 1175-1178 - [c353]Laurens Sion
, Koen Yskout
, Dimitri Van Landuyt
, Wouter Joosen:
Solution-aware data flow diagrams for security threat modeling. SAC 2018: 1425-1432 - [c352]Alexander van Den Berghe, Koen Yskout
, Riccardo Scandariato, Wouter Joosen:
A Lingua Franca for Security by Design. SecDev 2018: 69-76 - [c351]Gertjan Franken, Tom van Goethem, Wouter Joosen:
Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies. USENIX Security Symposium 2018: 151-168 - [c350]Giuseppe Garofalo, Vera Rimmer, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Fishy Faces: Crafting Adversarial Images to Poison Face Authentication. WOOT @ USENIX Security Symposium 2018 - [c349]Sven Akkermans, Stefanos Peros, Nicolas J. Small, Wouter Joosen, Danny Hughes:
Supporting IoT Application Middleware on Edge and Cloud Infrastructures. ZEUS 2018: 40-46 - [i8]Tim Van hamme, Vera Rimmer, Davy Preuveneers, Wouter Joosen, Mustafa A. Mustafa
, Aysajan Abidin, Enrique Argones-Rúa:
Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities. CoRR abs/1802.07233 (2018) - [i7]Victor Le Pochat, Tom van Goethem, Wouter Joosen:
Rigging Research Results by Manipulating Top Websites Rankings. CoRR abs/1806.01156 (2018) - 2017
- [j65]Davy Preuveneers
, Wouter Joosen:
Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows. Future Internet 9(4): 58 (2017) - [j64]Davy Preuveneers
, Wouter Joosen, Elisabeth Ilie Zudor
:
Trustworthy data-driven networked production for customer-centric plants. Ind. Manag. Data Syst. 117(10): 2305-2324 (2017) - [j63]Vincent Reniers
, Ansar Rafique, Dimitri Van Landuyt
, Wouter Joosen:
Object-NoSQL Database Mappers: a benchmark study on the performance overhead. J. Internet Serv. Appl. 8(1): 1:1-1:16 (2017) - [j62]Davy Preuveneers
, Wouter Joosen:
QoC2 Breaker: intelligent software circuit breakers for fault-tolerant distributed context-aware applications. J. Reliab. Intell. Environ. 3(1): 5-20 (2017) - [j61]Jan Spooren, Davy Preuveneers
, Wouter Joosen:
Leveraging Battery Usage from Mobile Devices for Active Authentication. Mob. Inf. Syst. 2017: 1367064:1-1367064:14 (2017) - [j60]Alexander van Den Berghe, Riccardo Scandariato, Koen Yskout
, Wouter Joosen:
Design notations for secure software: a systematic literature review. Softw. Syst. Model. 16(3): 809-831 (2017) - [c348]Vincent Reniers, Dimitri Van Landuyt
, Ansar Rafique, Wouter Joosen:
Schema design support for semi-structured data: Finding the sweet spot between NF and De-NF. IEEE BigData 2017: 2921-2930 - [c347]Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczynski, Arman Noroozian, Rainer Böhme, Tyler Moore
, Wouter Joosen, Michel van Eeten:
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting. CCS 2017: 553-567 - [c346]Thomas Vissers, Timothy Barron, Tom van Goethem, Wouter Joosen, Nick Nikiforakis:
The Wolf of Name Street: Hijacking Domains Through Their Nameservers. CCS 2017: 957-970 - [c345]Gowri Sankar Ramachandran
, Fan Yang
, Piers W. Lawrence, Sam Michiels
, Wouter Joosen, Danny Hughes:
μPnP-WAN: Experiences with LoRa and its deployment in DR Congo. COMSNETS 2017: 63-70 - [c344]Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Improving Resilience of Behaviometric Based Continuous Authentication with Multiple Accelerometers. DBSec 2017: 473-485 - [c343]Ping Chen, Jonas Visschers
, Cedric Verstraete, Letizia Paoli
, Christophe Huygens
, Lieven Desmet
, Wouter Joosen:
The relationship between the cost of cybercrime and web security posture: a case study on Belgian companies. ECSA (Companion) 2017: 115-120 - [c342]Majid Makki, Dimitri Van Landuyt
, Wouter Joosen:
Towards PaaS Offering of BPMN 2.0 Engines: A Proposal for Service-Level Tenant Isolation. ESOCC Workshops 2017: 5-19 - [c341]Jasper Bogaerts, Bert Lagaisse
, Wouter Joosen:
SEQUOIA: Scalable Policy-Based Access Control for Search Operations in Data-Driven Applications. ESSoS 2017: 1-18 - [c340]Emad Heydari Beni
, Bert Lagaisse
, Ren Zhang, Danny De Cock, Filipe Beato, Wouter Joosen:
A Voucher-Based Security Middleware for Secure Business Process Outsourcing. ESSoS 2017: 19-35 - [c339]Ansar Rafique, Dimitri Van Landuyt
, Vincent Reniers, Wouter Joosen:
Towards an Adaptive Middleware for Efficient Multi-Cloud Data Storage. CCB@EuroSys 2017: 4:1-4:6 - [c338]Alexander van Den Berghe, Koen Yskout
, Riccardo Scandariato, Wouter Joosen:
A Model for Provably Secure Software Design. FormaliSE@ICSE 2017: 3-9 - [c337]Koen Yskout
, Dimitri Van Landuyt
, Wouter Joosen:
Towards a Platform for Empirical Software Design Studies. ECASE@ICSE 2017: 3-7 - [c336]Dimitri Van Landuyt
, Fatih Gey, Eddy Truyen, Wouter Joosen:
Middleware for Dynamic Upgrade Activation and Compensations in Multi-tenant SaaS. ICSOC 2017: 340-348 - [c335]Tim Van hamme, Davy Preuveneers, Wouter Joosen:
A dynamic decision fusion middleware for trustworthy context-aware IoT applications. M4IoT@Middleware 2017: 1-6 - [c334]Emad Heydari Beni
, Bert Lagaisse
, Wouter Joosen:
Adaptive and reflective middleware for the cloudification of simulation & optimization workflows. ARM@Middleware 2017: 2:1-2:6 - [c333]Dimitri Jonckers, Aram Hovsepyan, Bert Lagaisse
, Wouter Joosen:
A shared multi-stakeholder platform for IoT: poster. Middleware Posters and Demos 2017: 5-6 - [c332]Wilfried Daniels, Danny Hughes, Mahmoud Ammar
, Bruno Crispo, Nelson Matthys, Wouter Joosen:
SμV - the security microvisor: a virtualisation-based security middleware for the internet of things. Middleware Industry 2017: 36-42 - [c331]Emekcan Aras, Nicolas J. Small, Gowri Sankar Ramachandran
, Stéphane Delbruel
, Wouter Joosen, Danny Hughes:
Selective Jamming of LoRaWAN using Commodity Hardware. MobiQuitous 2017: 363-372 - [c330]Hassaan Janjua
, Wouter Joosen, Sam Michiels
, Danny Hughes:
Trusted Operations On Mobile Phones. MobiQuitous 2017: 452-459 - [c329]Nicolas J. Small, Sven Akkermans
, Wouter Joosen, Danny Hughes:
Niflheim: An end-to-end middleware for applications on a multi-tier IoT infrastructure. NCA 2017: 209-216 - [c328]Laurens Sion
, Koen Yskout
, Riccardo Scandariato, Wouter Joosen:
A Modular Meta-model for Security Solutions. Programming 2017: 16:1-16:5 - [c327]Thomas Vissers, Jan Spooren, Pieter Agten, Dirk Jumpertz, Peter Janssen, Marc Van Wesemael, Frank Piessens, Wouter Joosen, Lieven Desmet
:
Exploring the Ecosystem of Malicious Domain Registrations in the .eu TLD. RAID 2017: 472-493 - [c326]Davy Preuveneers, Bavo Goosens, Wouter Joosen:
Enhanced fraud detection as a service supporting merchant-specific runtime customization. SAC 2017: 72-76 - [c325]Ansar Rafique, Dimitri Van Landuyt
, Vincent Reniers, Wouter Joosen:
Towards scalable and dynamic data encryption for multi-tenant SaaS. SAC 2017: 411-416 - [c324]Davy Preuveneers, Wouter Joosen, Elisabeth Ilie Zudor
:
Identity management for cyber-physical production workflows and individualized manufacturing in industry 4.0. SAC 2017: 1452-1455 - [c323]Gabriele Vassallo, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Privacy-Preserving Behavioral Authentication on Smartphones. HumanSys@SenSys 2017: 1-6 - [c322]Sven Akkermans, Nicolas J. Small, Wouter Joosen, Danny Hughes:
Niflheim: End-to-End Middleware for Applications Across all Tiers of the IoT. SenSys 2017: 41:1-41:2 - [c321]Ansar Rafique, Dimitri Van Landuyt
, Vincent Reniers, Wouter Joosen:
Leveraging NoSQL for Scalable and Dynamic Data Encryption in Multi-tenant SaaS. TrustCom/BigDataSE/ICESS 2017: 885-892 - [c320]Tom van Goethem, Wouter Joosen:
One Side-Channel to Bring Them All and in the Darkness Bind Them: Associating Isolated Browsing Sessions. WOOT 2017 - [c319]Vincent Reniers, Dimitri Van Landuyt
, Ansar Rafique, Wouter Joosen:
On the State of NoSQL Benchmarks. ICPE Companion 2017: 107-112 - [p5]Davy Preuveneers, Arun Ramakrishnan, Tim Van hamme, Vera Rimmer, Yolande Berbers, Wouter Joosen:
A Survey on Applying Machine Learning Techniques for Behavioral Awareness. State of the Art in AI Applied to Ambient Intelligence 2017: 1-34 - [i6]Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom van Goethem, Wouter Joosen:
Automated Feature Extraction for Website Fingerprinting through Deep Learning. CoRR abs/1708.06376 (2017) - [i5]Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczynski, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten:
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting. CoRR abs/1708.06693 (2017) - [i4]Emekcan Aras, Nicolas J. Small, Gowri Sankar Ramachandran, Stéphane Delbruel, Wouter Joosen, Danny Hughes:
Selective Jamming of LoRaWAN using Commodity Hardware. CoRR abs/1712.02141 (2017) - 2016
- [j59]Davy Preuveneers, Yolande Berbers, Wouter Joosen:
SAMURAI: A batch and streaming context architecture for large-scale intelligent applications and environments. J. Ambient Intell. Smart Environ. 8(1): 63-78 (2016) - [j58]Davy Preuveneers, Wouter Joosen:
Security and privacy controls for streaming data in extended intelligent environments. J. Ambient Intell. Smart Environ. 8(4): 467-483 (2016) - [j57]Gowri Sankar Ramachandran
, José Proença
, Wilfried Daniels, Mario Pickavet
, Dimitri Staessens, Christophe Huygens
, Wouter Joosen, Danny Hughes:
Hitch Hiker 2.0: a binding model with flexible data aggregation for the Internet-of-Things. J. Internet Serv. Appl. 7(1): 4:1-4:15 (2016) - [j56]Davy Preuveneers, Wouter Joosen:
Semantic analysis and verification of context-driven adaptive applications in intelligent environments. J. Reliab. Intell. Environ. 2(2): 53-73 (2016) - [j55]Davy Preuveneers, Thomas Heyman, Yolande Berbers, Wouter Joosen:
Systematic scalability assessment for feature oriented multi-tenant services. J. Syst. Softw. 116: 162-176 (2016) - [j54]Christophe Huygens
, Nelson Matthys, Wouter Joosen:
Optimizing resource and data security in shared sensor networks. Secur. Commun. Networks 9(2): 149-165 (2016) - [c318]Gowri Sankar Ramachandran
, Nelson Matthys, Wilfried Daniels, Wouter Joosen, Danny Hughes:
Building Dynamic and Dependable Component-Based Internet-of-Things Applications with Dawn. CBSE 2016: 97-106 - [c317]Aram Hovsepyan, Riccardo Scandariato, Wouter Joosen:
Is Newer Always Better?: The Case of Vulnerability Prediction Models. ESEM 2016: 26:1-26:6 - [c316]Tom van Goethem, Wout Scheepers, Davy Preuveneers, Wouter Joosen:
Accelerometer-Based Device Fingerprinting for Multi-factor Mobile Authentication. ESSoS 2016: 106-121 - [c315]Jasper Bogaerts, Bert Lagaisse
, Wouter Joosen:
Idea: Supporting Policy-Based Access Control on Database Systems. ESSoS 2016: 251-259 - [c314]Majid Makki, Dimitri Van Landuyt
, Wouter Joosen:
Automated regression testing of BPMN 2.0 processes: a capture and replay framework for continuous delivery. GPCE 2016: 178-189 - [c313]Davy Preuveneers, Nayyab Zia Naqvi, Arun Ramakrishnan, Yolande Berbers, Wouter Joosen:
Adaptive Dissemination for Mobile Electronic Health Record Applications with Proactive Situational Awareness. HICSS 2016: 3229-3238 - [c312]Davy Preuveneers, Thomas Heyman, Yolande Berbers, Wouter Joosen:
Feature-Based Variability Management for Scalable Enterprise Applications: Experiences with an E-Payment Case. HICSS 2016: 5793-5802 - [c311]Sven Akkermans
, Rafael Bachiller, Nelson Matthys, Wouter Joosen, Danny Hughes, Malisa Vucinic
:
Towards efficient publish-subscribe middleware in the IoT with IPv6 multicast. ICC 2016: 1-6 - [c310]Fatih Gey, Dimitri Van Landuyt
, Wouter Joosen:
Evolving multi-tenant SaaS applications through self-adaptive upgrade enactment and tenant mediation. SEAMS@ICSE 2016: 151-157 - [c309]Davy Preuveneers, Wouter Joosen, Elisabeth Ilie Zudor
:
Data Protection Compliance Regulations and Implications for Smart Factories of the Future. Intelligent Environments 2016: 40-47 - [c308]Fan Yang
, Gowri Sankar Ramachandran
, Piers W. Lawrence, Sam Michiels
, Wouter Joosen, Danny Hughes:
μPnP-WAN: Wide area plug and play sensing and actuation with LoRa. ISOCC 2016: 225-226 - [c307]Klaas Thoelen, Nicolas J. Small
, Sam Michiels
, Wouter Joosen, Danny Hughes:
Component-based Orchestration of Dynamic IaaS Applications. ARM@Middleware 2016: 2:1-2:6 - [c306]Eddy Truyen, Dimitri Van Landuyt
, Vincent Reniers, Ansar Rafique, Bert Lagaisse
, Wouter Joosen:
Towards a container-based architecture for multi-tenant SaaS applications. ARM@Middleware 2016: 6:1-6:6 - [c305]M. Zubair Rafique, Tom van Goethem, Wouter Joosen, Christophe Huygens, Nick Nikiforakis:
It's Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services. NDSS 2016 - [c304]Davy Preuveneers, Wouter Joosen:
Privacy-enabled remote health monitoring applications for resource constrained wearable devices. SAC 2016: 119-124 - [c303]Majid Makki, Dimitri Van Landuyt
, Stefan Walraven, Wouter Joosen:
Scalable and manageable customization of workflows in multi-tenant SaaS offerings. SAC 2016: 432-439 - [c302]Ping Chen, Christophe Huygens
, Lieven Desmet
, Wouter Joosen:
Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware. SEC 2016: 323-336 - [c301]Nelson Matthys, Fan Yang
, Wilfried Daniels, Wouter Joosen, Danny Hughes:
Demonstration of MicroPnP: The Zero-Configuration Wireless Sensing and Actuation Platform. SECON 2016: 1-2 - [c300]Majid Makki, Dimitri Van Landuyt, Wouter Joosen:
Automated workflow regression testing for multi-tenant SaaS: integrated support in self-service configuration dashboard. A-TEST@SIGSOFT FSE 2016: 70-73 - [c299]Laurens Sion
, Dimitri Van Landuyt
, Wouter Joosen, Gjalt de Jong:
Systematic quality trade-off support in the software product-line configuration process. SPLC 2016: 164-173 - [c298]Laurens Sion
, Dimitri Van Landuyt
, Koen Yskout
, Wouter Joosen:
Towards systematically addressing security variability in software product lines. SPLC 2016: 342-343 - [c297]Tom van Goethem, Mathy Vanhoef, Frank Piessens, Wouter Joosen:
Request and Conquer: Exposing Cross-Origin Resource Size. USENIX Security Symposium 2016: 447-462 - [c296]Ping Chen, Lieven Desmet
, Christophe Huygens
, Wouter Joosen:
Longitudinal Study of the Use of Client-side Security Mechanisms on the European Web. WWW (Companion Volume) 2016: 457-462 - 2015
- [j53]Jef Maerien, Sam Michiels
, Danny Hughes, Christophe Huygens
, Wouter Joosen:
SecLooCI: A comprehensive security middleware architecture for shared wireless sensor networks. Ad Hoc Networks 25: 141-169 (2015) - [j52]Philippe De Ryck, Nick Nikiforakis, Lieven Desmet
, Frank Piessens, Wouter Joosen:
Protected Web Components: Hiding Sensitive Information in the Shadows. IT Prof. 17(1): 36-43 (2015) - [j51]Stefan Walraven, Dimitri Van Landuyt
, Ansar Rafique, Bert Lagaisse
, Wouter Joosen:
PaaSHopper: Policy-driven middleware for multi-PaaS environments. J. Internet Serv. Appl. 6(1): 2:1-2:14 (2015) - [j50]Riccardo Scandariato, Kim Wuyts
, Wouter Joosen:
A descriptive study of Microsoft's threat modeling technique. Requir. Eng. 20(2): 163-180 (2015) - [c295]Maarten Decat, Bert Lagaisse
, Wouter Joosen:
Scalable and Secure Concurrent Evaluation of History-based Access Control Policies. ACSAC 2015: 281-290 - [c294]Jasper Bogaerts, Maarten Decat, Bert Lagaisse
, Wouter Joosen:
Entity-Based Access Control: supporting more expressive access control policies. ACSAC 2015: 291-300 - [c293]Ansar Rafique, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen:
Policy-Driven Data Management Middleware for Multi-cloud Storage in Multi-tenant SaaS. BDC 2015: 78-84 - [c292]Maarten Decat, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
On the Need for Federated Authorization in Cross-organizational e-Health Platforms. HEALTHINF 2015: 540-545 - [c291]Wilfried Daniels, José Proença
, Dave Clarke, Wouter Joosen, Danny Hughes:
Refraction: Low-Cost Management of Reflective Meta-Data in Pervasive Component-Based Applications. CBSE 2015: 27-36 - [c290]Gowri Sankar Ramachandran
, Wilfried Daniels, José Proença
, Sam Michiels
, Wouter Joosen, Danny Hughes, Barry Porter
:
Hitch Hiker: A Remote Binding Model with Priority Based Data Aggregation for Wireless Sensor Networks. CBSE 2015: 43-48 - [c289]Tom van Goethem, Wouter Joosen, Nick Nikiforakis:
The Clock is Still Ticking: Timing Attacks in the Modern Web. CCS 2015: 1382-1393 - [c288]Thomas Vissers, Tom van Goethem, Wouter Joosen, Nick Nikiforakis:
Maneuvering Around Clouds: Bypassing Cloud-based Security Providers. CCS 2015: 1530-1541 - [c287]Steven Van Acker, Daniel Hausknecht, Wouter Joosen, Andrei Sabelfeld:
Password Meters and Generators on the Web: From Large-Scale Empirical Study to Getting It Right. CODASPY 2015: 253-262 - [c286]Maarten Decat, Jasper Moeys, Bert Lagaisse, Wouter Joosen:
Improving Reuse of Attribute-Based Access Control Policies Using Policy Templates. ESSoS 2015: 196-210 - [c285]Jan Spooren, Davy Preuveneers, Wouter Joosen:
Mobile device fingerprinting considered harmful for risk-based authentication. EUROSEC 2015: 6:1-6:6 - [c284]Fan Yang
, Nelson Matthys, Rafael Bachiller, Sam Michiels, Wouter Joosen, Danny Hughes:
μPnP: plug and play peripherals for the internet of things. EuroSys 2015: 25:1-25:14 - [c283]Dimitri Van Landuyt
, Wouter Joosen:
On the Role of Early Architectural Assumptions in Quality Attribute Scenarios: A Qualitative and Quantitative Study. TwinPeaks@ICSE 2015: 9-15 - [c282]Fatih Gey, Dimitri Van Landuyt
, Wouter Joosen, Viviane Jonckers:
Continuous Evolution of Multi-tenant SaaS Applications: A Customizable Dynamic Adaptation Approach. PESOS@ICSE 2015: 10-16 - [c281]Laurens Sion
, Koen Yskout
, Alexander van Den Berghe, Riccardo Scandariato, Wouter Joosen:
MASC: Modelling Architectural Security Concerns. MiSE@ICSE 2015: 36-41 - [c280]Koen Yskout
, Riccardo Scandariato, Wouter Joosen:
Do Security Patterns Really Help Designers? ICSE (1) 2015: 292-302 - [c279]Davy Preuveneers, Wouter Joosen:
Change Impact Analysis for Context-Aware Applications in Intelligent Environments. Intelligent Environments (Workshops) 2015: 70-81 - [c278]Davy Preuveneers, Wouter Joosen:
SparkXS: Efficient Access Control for Intelligent and Large-Scale Streaming Data Applications. Intelligent Environments 2015: 96-103 - [c277]Emad Heydari Beni
, Bert Lagaisse
, Wouter Joosen:
WF-Interop: Adaptive and Reflective REST Interfaces for Interoperability between Workflow Engines. ARM@Middleware 2015: 1:1-1:6 - [c276]Wilfried Daniels, Fan Yang
, Nelson Matthys, Wouter Joosen, Danny Hughes:
Demo: Enabling Plug-and-Play for the Internet of Things. Middleware Posters and Demos 2015: 2:1-2:2 - [c275]Arnaud Schoonjans, Bert Lagaisse
, Wouter Joosen:
Advanced monitoring and smart auto-scaling of NoSQL systems. Middleware Doctoral Symposium 2015: 3:1-3:4 - [c274]Arnaud Schoonjans, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen:
On the suitability of black-box performance monitoring for SLA-driven cloud provisioning scenarios. ARM@Middleware 2015: 6:1-6:6 - [c273]Wilfried Daniels, José Proença
, Nelson Matthys, Wouter Joosen, Danny Hughes:
Tomography: lowering management overhead for distributed component-based applications. M4IoT@Middleware 2015: 13-18 - [c272]Gowri Sankar Ramachandran
, Nelson Matthys, Sam Michiels
, Wouter Joosen, Danny Hughes:
Dawn: Dependable Networking Framework for Multimedia-enabled Internet-of-Things. MoMM 2015: 211-215 - [c271]Rafael Bachiller, Nelson Matthys, Javier del Cid, Wouter Joosen, Danny Hughes, Kristof Van Laerhoven
:
@migo: A Comprehensive Middleware Solution for Participatory Sensing Applications. NCA 2015: 1-8 - [c270]Klaas Thoelen, Wouter Joosen, Danny Hughes:
Putting Sense inside Sensor Systems: A Coordinated Approach to Messaging. NCA 2015: 22-26 - [c269]Pieter Agten, Wouter Joosen, Frank Piessens, Nick Nikiforakis:
Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse. NDSS 2015 - [c268]Thomas Vissers, Wouter Joosen, Nick Nikiforakis:
Parking Sensors: Analyzing and Detecting Parked Domains. NDSS 2015 - [c267]Maarten Decat, Jasper Bogaerts, Bert Lagaisse
, Wouter Joosen:
Amusa: middleware for efficient access control management of multi-tenant SaaS applications. SAC 2015: 2141-2148 - [c266]Philippe De Ryck, Lieven Desmet
, Frank Piessens, Wouter Joosen:
SecSess: keeping your session tucked away in your browser. SAC 2015: 2171-2176 - [c265]Davy Preuveneers, Wouter Joosen:
SmartAuth: dynamic context fingerprinting for continuous user authentication. SAC 2015: 2185-2191 - [c264]Dimitri Van Landuyt
, Stefan Walraven, Wouter Joosen:
Variability middleware for multi-tenant SaaS applications: a research roadmap for service lines. SPLC 2015: 211-215 - [c263]Ansar Rafique, Dimitri Van Landuyt
, Wouter Joosen:
Expressive Data Storage Policies for Multi-cloud Storage Configurations. SYNASC 2015: 329-336 - [c262]Fatih Gey, Dimitri Van Landuyt
, Wouter Joosen:
Middleware for Customizable Multi-staged Dynamic Upgrades of Multi-tenant SaaS Applications. UCC 2015: 102-111 - [c261]Stefan Walraven, Wouter De Borger, Bart Van Brabant, Bert Lagaisse
, Dimitri Van Landuyt
, Wouter Joosen:
Adaptive Performance Isolation Middleware for Multi-tenant SaaS. UCC 2015: 112-121 - [c260]Nelson Matthys, Fan Yang
, Wilfried Daniels, Sam Michiels
, Wouter Joosen, Danny Hughes, Thomas Watteyne:
μPnP-Mesh: The plug-and-play mesh network for the Internet of Things. WF-IoT 2015: 311-315 - [c259]Nick Nikiforakis, Wouter Joosen, Benjamin Livshits:
PriVaricator: Deceiving Fingerprinters with Little White Lies. WWW 2015: 820-830 - [e6]Ivan Beschastnikh, Wouter Joosen:
Proceedings of the Doctoral Symposium of the 16th International Middleware Conference, Middleware Doct Symposium 2015, Vancouver, BC, Canada, December 7-11, 2015. ACM 2015, ISBN 978-1-4503-3728-1 [contents] - 2014
- [j49]Stefan Walraven, Eddy Truyen, Wouter Joosen:
Comparing PaaS offerings in light of SaaS development - A comparison of PaaS platforms based on a practical case study. Computing 96(8): 669-724 (2014) - [j48]Caren Crowley, Wilfried Daniels, Rafael Bachiller, Wouter Joosen, Danny Hughes:
Increasing user participation: An exploratory study of querying on the Facebook and Twitter platforms. First Monday 19(8) (2014) - [j47]Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna:
On the Workings and Current Practices of Web-Based Device Fingerprinting. IEEE Secur. Priv. 12(3): 28-36 (2014) - [j46]Aram Hovsepyan, Riccardo Scandariato, Maximilian Steff, Wouter Joosen:
Design Churn as Predictor of Vulnerabilities? Int. J. Secur. Softw. Eng. 5(3): 16-31 (2014) - [j45]Dries Geebelen, Kristof Geebelen, Eddy Truyen, Sam Michiels
, Johan A. K. Suykens
, Joos Vandewalle, Wouter Joosen:
QoS prediction for web service compositions using kernel-based quantile estimation with online adaptation of the constant offset. Inf. Sci. 268: 397-424 (2014) - [j44]Maarten Decat, Bert Lagaisse
, Wouter Joosen:
Middleware for efficient and confidentiality-aware federation of access control policies. J. Internet Serv. Appl. 5(1): 1:1-1:15 (2014) - [j43]Hendrik Moens, Eddy Truyen, Stefan Walraven, Wouter Joosen, Bart Dhoedt, Filip De Turck
:
Cost-Effective Feature Placement of Customizable Multi-Tenant Applications in the Cloud. J. Netw. Syst. Manag. 22(4): 517-558 (2014) - [j42]Stefan Walraven, Dimitri Van Landuyt
, Eddy Truyen, Koen Handekyn, Wouter Joosen:
Efficient customization of multi-tenant Software-as-a-Service applications with service lines. J. Syst. Softw. 91: 48-62 (2014) - [j41]Kim Wuyts
, Riccardo Scandariato, Wouter Joosen:
Empirical evaluation of a privacy-focused threat modeling methodology. J. Syst. Softw. 96: 122-138 (2014) - [j40]Marko van Dooren, Bart Jacobs
, Wouter Joosen:
Modular type checking of anchored exception declarations. Sci. Comput. Program. 87: 44-61 (2014) - [j39]Koen Yskout
, Riccardo Scandariato, Wouter Joosen:
Change patterns - Co-evolving requirements and architecture. Softw. Syst. Model. 13(2): 625-648 (2014) - [j38]Riccardo Scandariato, James Walden
, Aram Hovsepyan, Wouter Joosen:
Predicting Vulnerable Software Components via Text Mining. IEEE Trans. Software Eng. 40(10): 993-1006 (2014) - [c258]M. Zubair Rafique, Juan Caballero, Christophe Huygens
, Wouter Joosen:
Network dialog minimization and network dialog diffing: two novel primitives for network security applications. ACSAC 2014: 166-175 - [c257]Pedro Javier del Cid, Danny Hughes, Sam Michiels
, Wouter Joosen:
Ensuring application integrity in shared sensing environments. CBSE 2014: 149-158 - [c256]Steven Van Acker, Nick Nikiforakis, Lieven Desmet
, Frank Piessens, Wouter Joosen:
Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets. AsiaCCS 2014: 525-530 - [c255]Tom van Goethem, Frank Piessens, Wouter Joosen, Nick Nikiforakis:
Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals. CCS 2014: 918-929 - [c254]Dimitri Van Landuyt
, Wouter Joosen:
Modularizing Early Architectural Assumptions in Scenario-Based Requirements. FASE 2014: 170-184 - [c253]Thomas Heyman, Davy Preuveneers, Wouter Joosen:
Scalar: Systematic Scalability Analysis with the Universal Scalability Law. FiCloud 2014: 497-504 - [c252]Thomas Heyman, Davy Preuveneers, Wouter Joosen:
Scalability Analysis of the OpenAM Access Control System with the Universal Scalability Law. FiCloud 2014: 505-512 - [c251]M. Zubair Rafique, Ping Chen, Christophe Huygens
, Wouter Joosen:
Evolutionary algorithms for classification of malware families through different network behaviors. GECCO 2014: 1167-1174 - [c250]Danny Hughes, Caren Crowley, Wilfried Daniels, Rafael Bachiller, Wouter Joosen:
User-Rank: Generic Query Optimization for Participatory Social Applications. HICSS 2014: 1874-1883 - [c249]Ansar Rafique, Stefan Walraven, Bert Lagaisse
, Tom Desair, Wouter Joosen:
Towards portability and interoperability support in middleware for hybrid clouds. INFOCOM Workshops 2014: 7-12 - [c248]Nick Nikiforakis, Marco Balduzzi, Lieven Desmet, Frank Piessens, Wouter Joosen:
Soundsquatting: Uncovering the Use of Homophones in Domain Squatting. ISC 2014: 291-308 - [c247]Bart Van Brabant, Wouter Joosen:
Configuration management as a multi-cloud enabler. CCB@Middleware 2014: 1:1-1:3 - [c246]Jef Maerien, Sam Michiels
, Christophe Huygens
, Danny Hughes, Wouter Joosen:
Enabling resource sharing in heterogeneous wireless sensor networks. M4IoT@Middleware 2014: 7-12 - [c245]Fatih Gey, Dimitri Van Landuyt, Stefan Walraven, Wouter Joosen:
Feature Models at Run Time: Feature Middleware for Multi-tenant SaaS applications. Models@run.time 2014: 21-30 - [c244]Aram Hovsepyan, Dimitri Van Landuyt, Steven Op de beeck, Sam Michiels, Wouter Joosen, Gustavo Rangel, Javier Fernandez Briones, Jan Depauw:
Model-Driven Software Development of Safety-Critical Avionics Systems: an Experience Report. MD2P2@MoDELS 2014: 28-37 - [c243]Pieter-Jan Maenhaut
, Hendrik Moens, Maarten Decat, Jasper Bogaerts, Bert Lagaisse
, Wouter Joosen, Veerle Ongenae, Filip De Turck:
Characterizing the performance of tenant data management in multi-tenant cloud authorization systems. NOMS 2014: 1-8 - [c242]Davy Preuveneers, Wouter Joosen:
Federated Privileged Identity Management for Break-the-Glass: A Case Study with OpenAM. PAHI 2014: 37-52 - [c241]Thomas Heyman, Davy Preuveneers, Wouter Joosen:
Scalar: A Distributed Scalability Analysis Framework. QEST 2014: 241-244 - [c240]Dimitri Van Landuyt
, Steven Op de beeck, Aram Hovsepyan, Sam Michiels
, Wouter Joosen, Sven Meynckens, Gjalt de Jong, Olivier Barais
, Mathieu Acher:
Towards managing variability in the safety design of an automotive hall effect sensor. SPLC 2014: 304-309 - [c239]Tom van Goethem, Ping Chen, Nick Nikiforakis, Lieven Desmet, Wouter Joosen:
Large-Scale Security Analysis of the Web: Challenges and Findings. TRUST 2014: 110-126 - [c238]Nick Nikiforakis, Federico Maggi
, Gianluca Stringhini, M. Zubair Rafique, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna, Stefano Zanero
:
Stranger danger: exploring the ecosystem of ad-based URL shortening services. WWW 2014: 51-62 - [p4]Riccardo Scandariato, Federica Paci, Le Minh Sang Tran, Katsiaryna Labunets, Koen Yskout
, Fabio Massacci
, Wouter Joosen:
Empirical Assessment of Security Requirements and Architecture: Lessons Learned. Engineering Secure Future Internet Services and Systems 2014: 35-64 - [e5]Wouter Joosen, Fabio Martinelli, Thomas Heyman:
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), Munich, Germany, February 26, 2014. CEUR Workshop Proceedings 1298, CEUR-WS.org 2014 [contents] - [e4]Wouter Joosen, Luís Veiga:
Proceedings of the 11th Middleware Doctoral Symposium 2014, Bordeaux, France, December 8-9, 2014. ACM 2014, ISBN 978-1-4503-3221-7 [contents] - [e3]Maritta Heisel, Wouter Joosen, Javier López, Fabio Martinelli:
Engineering Secure Future Internet Services and Systems - Current Research. Lecture Notes in Computer Science 8431, Springer 2014, ISBN 978-3-319-07451-1 [contents] - [i3]Francesco Gadaleta, Nick Nikiforakis, Jan Tobias Mühlberg, Wouter Joosen:
HyperForce: Hypervisor-enForced Execution of Security-Critical Code. CoRR abs/1405.5648 (2014) - [i2]Francesco Gadaleta, Nick Nikiforakis, Yves Younan, Wouter Joosen:
Hello rootKitty: A lightweight invariance-enforcing framework. CoRR abs/1405.5651 (2014) - [i1]Francesco Gadaleta, Raoul Strackx, Nick Nikiforakis, Frank Piessens, Wouter Joosen:
On the effectiveness of virtualization-based security. CoRR abs/1405.6058 (2014) - 2013
- [j37]Koen Buyens, Riccardo Scandariato, Wouter Joosen:
Least privilege analysis in software architectures. Softw. Syst. Model. 12(2): 331-348 (2013) - [j36]Stefan Walraven, Bert Lagaisse
, Eddy Truyen, Wouter Joosen:
Policy-driven customization of cross-organizational features in distributed service systems. Softw. Pract. Exp. 43(10): 1145-1163 (2013) - [j35]Steven Op de beeck, Marko van Dooren, Bert Lagaisse
, Wouter Joosen:
Modularity and Variability of Distributed Software Architectures through Multi-view Refinement of AO-Connectors. LNCS Trans. Aspect Oriented Softw. Dev. 10: 109-147 (2013) - [c237]Philippe De Ryck, Nick Nikiforakis, Lieven Desmet
, Wouter Joosen:
TabShots: client-side detection of tabnabbing attacks. AsiaCCS 2013: 447-456 - [c236]Nick Nikiforakis, Frank Piessens, Wouter Joosen:
HeapSentry: Kernel-Assisted Protection against Heap Overflows. DIMVA 2013: 177-196 - [c235]Davy Preuveneers, Yolande Berbers, Wouter Joosen:
The Future of Mobile E-health Application Development: Exploring HTML5 for Context-aware Diabetes Monitoring. EUSPN/ICTH 2013: 351-359 - [c234]Jef Maerien, Sam Michiels, Christophe Huygens, Danny Hughes, Wouter Joosen:
Access Control in Multi-party Wireless Sensor Networks. EWSN 2013: 34-49 - [c233]Bart Van Brabant, Wouter Joosen:
A framework for integrated configuration management tools. IM 2013: 534-540 - [c232]Pieter-Jan Maenhaut, Hendrik Moens, Marino Verheye, Piet Verhoeve, Stefan Walraven, Eddy Truyen, Wouter Joosen, Veerle Ongenae, Filip De Turck:
Migrating medical communications software to a multi-tenant cloud environment. IM 2013: 900-903 - [c231]Wilfried Daniels, Bart Van Brabant, Danny Hughes, Wouter Joosen:
Automated allocation and configuration of dual stack IP networks. IM 2013: 1148-1153 - [c230]Riccardo Scandariato, James Walden
, Wouter Joosen:
Static analysis versus penetration testing: A controlled experiment. ISSRE 2013: 451-460 - [c229]Tom Desair, Wouter Joosen, Bert Lagaisse
, Ansar Rafique, Stefan Walraven:
Policy-driven middleware for heterogeneous, hybrid cloud platforms. ARM@Middleware 2013: 2:1-2:6 - [c228]Maarten Decat, Bert Lagaisse
, Wouter Joosen, Bruno Crispo:
Introducing concurrency in policy-based access control. MW4NextGen@Middleware 2013: 3:1-3:6 - [c227]Klaas Thoelen, Davy Preuveneers, Sam Michiels
, Wouter Joosen, Danny Hughes:
Types in Their Prime: Sub-typing of Data in Resource Constrained Environments. MobiQuitous 2013: 250-261 - [c226]Wilfried Daniels, Pedro Javier del Cid Garcia, Wouter Joosen, Danny Hughes:
Safe Reparametrization of Component-Based WSNs. MobiQuitous 2013: 524-536 - [c225]Wilfried Daniels, Pedro Javier del Cid, Danny Hughes, Sam Michiels
, Chris Blondia, Wouter Joosen:
Composition-Safe re-parametrization in Distributed Component-based WSN Applications. NCA 2013: 153-156 - [c224]Gowri Sankar Ramachandran
, Sam Michiels
, Wouter Joosen, Danny Hughes, Barry Porter:
Analysis of Sensor Network Operating System Performance Throughout the Software Life Cycle. NCA 2013: 211-218 - [c223]Pedro Javier del Cid, Nelson Matthys, Danny Hughes, Sam Michiels
, Wouter Joosen:
ACS: Specifying "Smart" Applications Using Sense-Process-Consume Flows. NCA 2013: 251-254 - [c222]Maarten Decat, Bert Lagaisse
, Dimitri Van Landuyt
, Bruno Crispo, Wouter Joosen:
Federated Authorization for Software-as-a-Service Applications. OTM Conferences 2013: 342-359 - [c221]Fatih Gey, Stefan Walraven, Dimitri Van Landuyt
, Wouter Joosen:
Building a Customizable Business-Process-as-a-Service Application with Current State-of-Practice. SC@STAF 2013: 113-127 - [c220]Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna:
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting. IEEE Symposium on Security and Privacy 2013: 541-555 - [c219]Danny Hughes, Eduardo Canete, Wilfried Daniels, Gowri Sankar Ramachandran
, James Meneghello, Nelson Matthys, Jef Maerien, Sam Michiels
, Christophe Huygens
, Wouter Joosen, Maarten Wijnants, Wim Lamotte, Erik Hulsmans, Bart Lannoo, Ingrid Moerman:
Energy aware software evolution for Wireless Sensor Networks. WOWMOM 2013: 1-9 - [c218]Nick Nikiforakis, Steven Van Acker, Wannes Meert, Lieven Desmet, Frank Piessens, Wouter Joosen:
Bitsquatting: exploiting bit-flips for fun, or profit? WWW 2013: 989-998 - 2012
- [j34]Pedro Javier del Cid, Danny Hughes, Sam Michiels
, Wouter Joosen:
Applying a metadata level for concurrency in wireless sensor networks. Concurr. Comput. Pract. Exp. 24(16): 1953-1962 (2012) - [j33]Yves Younan, Wouter Joosen, Frank Piessens:
Runtime countermeasures for code injection attacks against C and C++ programs. ACM Comput. Surv. 44(3): 17:1-17:28 (2012) - [j32]Bernard Spitz, Riccardo Scandariato, Wouter Joosen:
Extraction of an Architectural Model for Least Privilege Analysis. Int. J. Secur. Softw. Eng. 3(4): 27-44 (2012) - [j31]Wouter Joosen, Bert Lagaisse
, Eddy Truyen, Koen Handekyn:
Towards application driven security dashboards in future middleware. J. Internet Serv. Appl. 3(1): 107-115 (2012) - [j30]Klaas Thoelen, Danny Hughes, Nelson Matthys, Lei Fang, Simon Dobson
, Yizhou Qiang, Wei Bai, Ka Lok Man, Sheng-Uei Guan, Davy Preuveneers, Sam Michiels
, Christophe Huygens
, Wouter Joosen:
A reconfigurable component model with semantic type system for dynamic WSN applications. J. Internet Serv. Appl. 3(3): 277-290 (2012) - [j29]Dimitri Van Landuyt
, Steven Op de beeck, Eddy Truyen, Wouter Joosen:
Domain-Driven Discovery of Stable Abstractions for Pointcut Interfaces. LNCS Trans. Aspect Oriented Softw. Dev. 9: 1-52 (2012) - [c217]Dimitri Van Landuyt
, Eddy Truyen, Wouter Joosen:
On the modularity impact of architectural assumptions. NEMARA@AOSD 2012: 13-16 - [c216]Wouter De Borger, Bert Lagaisse
, Wouter Joosen:
A domain specific aspect language for run-time inspection. DSAL@AOSD 2012: 33-36 - [c215]Marko van Dooren, Eric Steegmans, Wouter Joosen:
An object-oriented framework for aspect-oriented languages. AOSD 2012: 215-226 - [c214]Steven Op de beeck, Marko van Dooren, Bert Lagaisse
, Wouter Joosen:
Multi-view refinement of AO-connectors in distributed software systems. AOSD 2012: 251-262 - [c213]Steven Van Acker, Nick Nikiforakis, Lieven Desmet, Wouter Joosen, Frank Piessens:
FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications. AsiaCCS 2012: 12-13 - [c212]Nick Nikiforakis, Luca Invernizzi, Alexandros Kapravelos, Steven Van Acker, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna:
You are what you include: large-scale evaluation of remote javascript inclusions. CCS 2012: 736-747 - [c211]Hendrik Moens, Eddy Truyen, Stefan Walraven, Wouter Joosen, Bart Dhoedt, Filip De Turck:
Network-aware impact determination algorithms for service workflow deployment in hybrid clouds. CNSM 2012: 28-36 - [c210]Rafael Bachiller, Danny Hughes, Sam Michiels
, Wouter Joosen:
Enabling Massive Scale Sensing with the @LooCI Mobile Sensing Framework. CSE 2012: 461-468 - [c209]Philippe De Ryck, Nick Nikiforakis, Lieven Desmet
, Frank Piessens, Wouter Joosen:
Serene: Self-Reliant Client-Side Protection against Session Fixation. DAIS 2012: 59-72 - [c208]Jef Maerien, Pieter Agten, Christophe Huygens
, Wouter Joosen:
FAMoS: A Flexible Active Monitoring Service for Wireless Sensor Networks. DAIS 2012: 104-117 - [c207]Maarten Decat, Bert Lagaisse, Wouter Joosen:
Federated Authorization for SaaS applications. ESSoS Doctoral Symposium 2012: 43-48 - [c206]Caren Crowley, Sam Michiels
, Wouter Joosen:
Show me the money The importance of network effects for mobile application business models. ICIN 2012: 164-170 - [c205]Koen Yskout
, Riccardo Scandariato, Wouter Joosen:
Does organizing security patterns focus architectural choices? ICSE 2012: 617-627 - [c204]Alexander van Den Berghe, Jan Van Haaren, Stefan Van Baelen, Yolande Berbers, Wouter Joosen:
Towards an Automated Pattern Selection Procedure in Software Models. ILP (Late Breaking Papers) 2012: 68-73 - [c203]Rafael Bachiller, Danny Hughes, Sam Michiels
, Wouter Joosen:
Users as reconfigurable elements in distributed sensing applications. MidSens 2012: 4 - [c202]Maarten Decat, Bert Lagaisse
, Wouter Joosen:
Toward efficient and confidentiality-aware federation of access control policies. MW4NG@Middleware 2012: 4:1-4:6 - [c201]Stefan Walraven, Tanguy Monheim, Eddy Truyen, Wouter Joosen:
Towards performance isolation in multi-tenant SaaS applications. MW4NG@Middleware 2012: 6:1-6:6 - [c200]Danny Hughes, Klaas Thoelen, Jef Maerien, Nelson Matthys, Wouter Horré, Javier del Cid, Christophe Huygens
, Sam Michiels
, Wouter Joosen:
LooCI: The Loosely-coupled Component Infrastructure. NCA 2012: 236-243 - [c199]Syed Rehan Afzal, Christophe Huygens
, Wouter Joosen:
DiFiSec: An Adaptable Multi-level Security Framework for Event-Driven Communication in Wireless Sensor Networks. NCA 2012: 263-271 - [c198]Klaas Thoelen, Danny Hughes, Sam Michiels
, Wouter Joosen:
StIgMa: Status information management for evolvable wireless sensor networks. NESEA 2012: 1-7 - [c197]Hendrik Moens, Eddy Truyen, Stefan Walraven, Wouter Joosen, Bart Dhoedt, Filip De Turck:
Feature placement algorithms for high-variability applications in cloud environments. NOMS 2012: 17-24 - [c196]Hendrik Moens, Eddy Truyen, Stefan Walraven, Wouter Joosen, Bart Dhoedt, Filip De Turck:
Developing and managing customizable Software as a Service using feature model conversion. NOMS 2012: 1295-1302 - [c195]Nick Nikiforakis, Steven Van Acker, Frank Piessens, Wouter Joosen:
Exploring the Ecosystem of Referrer-Anonymizing Services. Privacy Enhancing Technologies 2012: 259-278 - [c194]Nelson Matthys, Christophe Huygens
, Danny Hughes, Sam Michiels
, Wouter Joosen:
A Component and Policy-Based Approach for Efficient Sensor Network Reconfiguration. POLICY 2012: 53-60 - [c193]Eddy Truyen, Nicolás Cardozo, Stefan Walraven, Jorge Vallejos, Engineer Bainomugisha, Sebastian Günther, Theo D'Hondt, Wouter Joosen:
Context-oriented programming for customizable SaaS applications. SAC 2012: 418-425 - [c192]Francesco Gadaleta, Nick Nikiforakis, Jan Tobias Mühlberg
, Wouter Joosen:
HyperForce: Hypervisor-enForced Execution of Security-Critical Code. SEC 2012: 126-137 - [c191]Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen:
A Security Analysis of Emerging Web Standards - HTML5 and Friends, from Specification to Implementation. SECRYPT 2012: 257-262 - [c190]Thomas Heyman, Riccardo Scandariato, Wouter Joosen:
Reusable Formal Models for Secure Software Architectures. WICSA/ECSA 2012: 41-50 - [c189]Dimitri Van Landuyt
, Eddy Truyen, Wouter Joosen:
Documenting Early Architectural Assumptions in Scenario-Based Requirements. WICSA/ECSA 2012: 329-333 - [p3]Wouter De Borger, Bert Lagaisse
, Wouter Joosen:
Traceability Between Run-Time and Development Time Abstractions - A Case Study on AOSD and Debugging. Software and Systems Traceability 2012: 277-298 - 2011
- [j28]Kim Wuyts, Riccardo Scandariato, Griet Verhenneman, Wouter Joosen:
Integrating Patient Consent in e-Health Access Control. Int. J. Secur. Softw. Eng. 2(2): 1-24 (2011) - [j27]Danny Hughes, Jo Ueyama
, Eduardo M. Mendiondo
, Nelson Matthys, Wouter Horré, Sam Michiels
, Christophe Huygens
, Wouter Joosen, Ka Lok Man, Sheng-Uei Guan:
A middleware platform to support river monitoring using wireless sensor networks. J. Braz. Comput. Soc. 17(2): 85-102 (2011) - [j26]Wouter Horré, Sam Michiels
, Wouter Joosen, Danny Hughes:
Advanced Sensor Network Software Deployment using Application-level Quality Goals. J. Softw. 6(4): 528-535 (2011) - [j25]Mina Deng, Kim Wuyts
, Riccardo Scandariato, Bart Preneel
, Wouter Joosen:
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir. Eng. 16(1): 3-32 (2011) - [j24]Maarten Bynens, Eddy Truyen, Wouter Joosen:
A System of Patterns for Reusable Aspect Libraries. LNCS Trans. Aspect Oriented Softw. Dev. 8: 46-107 (2011) - [j23]Yves Younan, Pieter Philippaerts
, Frank Piessens, Wouter Joosen, Sven Lachmund, Thomas Walter:
Filter-resistant code injection on ARM. J. Comput. Virol. 7(3): 173-188 (2011) - [c188]John Wilander, Nick Nikiforakis, Yves Younan, Mariam Kamkar, Wouter Joosen:
RIPE: runtime intrusion prevention evaluator. ACSAC 2011: 41-50 - [c187]Steven Van Acker, Philippe De Ryck, Lieven Desmet
, Frank Piessens, Wouter Joosen:
WebJail: least-privilege integration of third-party components in web mashups. ACSAC 2011: 307-316 - [c186]Bart Van Brabant, Wouter Joosen:
Integrated management of network and security devices in IT infrastructures. CNSM 2011: 1-5 - [c185]Klaas Thoelen, Sam Michiels
, Wouter Joosen:
On-demand attribute-based service discovery for mobile WSANs. COMSWARE 2011: 7 - [c184]Aram Hovsepyan, Riccardo Scandariato, Stefan Van Baelen, Wouter Joosen, Serge Demeyer
:
Preserving Aspects via Automation: A Maintainability Study. ESEM 2011: 315-324 - [c183]Philippe De Ryck, Lieven Desmet
, Wouter Joosen, Frank Piessens:
Automatic and Precise Client-Side Protection against CSRF Attacks. ESORICS 2011: 100-116 - [c182]Nick Nikiforakis, Wannes Meert
, Yves Younan, Martin Johns
, Wouter Joosen:
SessionShield: Lightweight Protection against Session Hijacking. ESSoS 2011: 87-100 - [c181]Philippe De Ryck, Lieven Desmet
, Wouter Joosen:
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications. ESSoS 2011: 114-127 - [c180]Tom Goovaerts, Lieven Desmet
, Wouter Joosen:
Scalable Authorization Middleware for Service Oriented Architectures. ESSoS 2011: 221-233 - [c179]Nick Nikiforakis, Wouter Joosen, Martin Johns
:
Abusing locality in shared web hosting. EUROSEC 2011: 2 - [c178]Wouter Joosen, Javier López
, Fabio Martinelli, Fabio Massacci
:
Engineering Secure Future Internet Services. Future Internet Assembly 2011: 177-192 - [c177]Isabelle Perseil, Laurent Pautet, Jean-François Rolland, Mamoun Filali, Didier Delanote, Stefan Van Baelen, Wouter Joosen, Yolande Berbers, Frédéric Mallet
, Dominique Bertrand, Sébastien Faucou
, Abdelhafid Zitouni, Mahmoud Boufaïda, Lionel Seinturier, Joël Champeau, Thomas Abdoul, Peter H. Feiler, Chokri Mraidha
, Sébastien Gérard:
An Efficient Modeling and Execution Framework for Complex Systems Development. ICECCS 2011: 317-331 - [c176]Koen Buyens, Riccardo Scandariato, Wouter Joosen:
Composition of least privilege analysis results in software architectures (position paper). SESS@ICSE 2011: 29-35 - [c175]Francesco Gadaleta, Nick Nikiforakis, Yves Younan, Wouter Joosen:
Hello rootKitty: A Lightweight Invariance-Enforcing Framework. ISC 2011: 213-228 - [c174]Pedro Javier del Cid, Nelson Matthys, Christophe Huygens
, Sam Michiels
, Wouter Joosen, Danny Hughes:
Sensor Middleware to Support Diverse Data Qualities. ITNG 2011: 673-676 - [c173]Christophe Huygens
, Nelson Matthys, Jef Maerien, Wouter Joosen, Danny Hughes:
Building blocks for secure multiparty federated wireless sensor networks. IWCMC 2011: 2021-2027 - [c172]Nick Nikiforakis, Marco Balduzzi, Steven Van Acker, Wouter Joosen, Davide Balzarotti:
Exposing the Lack of Privacy in File Hosting Services. LEET 2011 - [c171]Bart Van Brabant, Joris Peeraer, Wouter Joosen:
Fine-grained Access-control for the Puppet Configuration Language. LISA 2011 - [c170]Jef Maerien, Sam Michiels
, Christophe Huygens
, Wouter Joosen:
SASHA: A Distributed Protocol for Secure Application Deployment in Shared Ad-Hoc Wireless Sensor Networks. MASS 2011: 43-48 - [c169]Wouter De Borger, Bert Lagaisse
, Wouter Joosen:
Inspection of distributed and composed systems. Middleware Doctoral Symposium 2011: 1:1-1:3 - [c168]Nelson Matthys, Sam Michiels
, Wouter Joosen, Christophe Scholliers
, Coen De Roover
, Wouter Amerijckx, Theo D'Hondt:
Language and middleware support for dynamism in wireless sensor and actuator network applications. MidSens 2011: 2 - [c167]Gabriela Gheorghe, Bruno Crispo, Roberto Carbone
, Lieven Desmet
, Wouter Joosen:
Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement. Middleware 2011: 350-369 - [c166]Stefan Walraven, Eddy Truyen, Wouter Joosen:
A Middleware Layer for Flexible and Cost-Efficient Multi-tenant Applications. Middleware 2011: 370-389 - [c165]Wouter De Borger, Bert Lagaisse
, Wouter Joosen:
A Generic Solution for Agile Run-Time Inspection Middleware. Middleware 2011: 451-470 - [c164]Maarten Bynens, Eddy Truyen, Wouter Joosen:
A Sequence of Patterns for Reusable Aspect Libraries with Easy Configuration. SC@TOOLS 2011: 68-83 - [e2]Shmuel Katz, Mira Mezini, Christa Schwanninger, Wouter Joosen:
Transactions on Aspect-Oriented Software Development VIII. Lecture Notes in Computer Science 6580, Springer 2011, ISBN 978-3-642-22030-2 [contents] - 2010
- [j22]Awais Rashid
, Thomas Cottenier, Phil Greenwood, Ruzanna Chitchyan
, Regine Meunier, Roberta Coelho, Mario Südholt, Wouter Joosen:
Aspect-Oriented Software Development in Practice: Tales from AOSD-Europe. Computer 43(2): 19-26 (2010) - [j21]Daniel Hughes, Klaas Thoelen, Wouter Horré, Nelson Matthys, Javier del Cid, Sam Michiels
, Christophe Huygens
, Wouter Joosen, Jo Ueyama
:
Building Wireless Sensor Network Applications with LooCI. Int. J. Mob. Comput. Multim. Commun. 2(4): 38-64 (2010) - [j20]Yves Younan, Wouter Joosen, Frank Piessens, Hans Van den Eynden:
Improving Memory Management Security for C and C++. Int. J. Secur. Softw. Eng. 1(2): 57-82 (2010) - [j19]Christophe Huygens
, Danny Hughes, Bert Lagaisse
, Wouter Joosen:
Streamlining Development for Networked Embedded Systems Using Multiple Paradigms. IEEE Softw. 27(5): 45-52 (2010) - [j18]Danny Weyns
, Robrecht Haesevoets, Alexander Helleboogh, Tom Holvoet
, Wouter Joosen:
The MACODO middleware for context-driven dynamic agent organizations. ACM Trans. Auton. Adapt. Syst. 5(1): 3:1-3:28 (2010) - [j17]Dimitri Van Landuyt
, Eddy Truyen, Wouter Joosen:
Discovery of Stable Abstractions for Aspect-Oriented Composition in the Car Crash Management Domain. LNCS Trans. Aspect Oriented Softw. Dev. 7: 375-422 (2010) - [c163]Aram Hovsepyan, Riccardo Scandariato, Stefan Van Baelen, Yolande Berbers, Wouter Joosen:
From aspect-oriented models to aspect-oriented code?: the maintenance perspective. AOSD 2010: 85-96 - [c162]Wouter De Borger, Bart De Win, Bert Lagaisse
, Wouter Joosen:
A permission system for secure AOP. AOSD 2010: 205-216 - [c161]Robrecht Haesevoets, Danny Weyns
, Mário Henrique Cruz Torres, Alexander Helleboogh, Tom Holvoet
, Wouter Joosen:
A Middleware Model in Alloy for Supply Chain-Wide Agent Interactions. AOSE 2010: 189-204 - [c160]Yves Younan, Pieter Philippaerts
, Lorenzo Cavallaro
, R. Sekar, Frank Piessens, Wouter Joosen:
PAriCheck: an efficient pointer arithmetic checker for C programs. AsiaCCS 2010: 145-156 - [c159]Thomas Heyman, Riccardo Scandariato, Wouter Joosen:
Security in Context: Analysis and Refinement of Software Architectures. COMPSAC 2010: 161-170 - [c158]Stefan Walraven, Bert Lagaisse
, Eddy Truyen, Wouter Joosen:
Dynamic Composition of Cross-Organizational Features in Distributed Software Systems. DAIS 2010: 183-197 - [c157]Nick Nikiforakis, Yves Younan, Wouter Joosen:
HProxy: Client-Side Detection of SSL Stripping Attacks. DIMVA 2010: 200-218 - [c156]Riccardo Scandariato, Koen Buyens, Wouter Joosen:
Automated Detection of Least Privilege Violations in Software Architectures. ECSA 2010: 150-165 - [c155]Francesco Gadaleta, Yves Younan, Wouter Joosen:
BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks. ESSoS 2010: 1-17 - [c154]Philippe De Ryck, Lieven Desmet, Thomas Heyman, Frank Piessens, Wouter Joosen:
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests. ESSoS 2010: 18-34 - [c153]Kristof Geebelen, Eryk Kulikowski, Eddy Truyen, Wouter Joosen:
A MVC Framework for Policy-Based Adaptation of Workflow Processes: A Case Study on Confidentiality. ICWS 2010: 401-408 - [c152]Wouter Horré, Sam Michiels
, Wouter Joosen, Danny Hughes:
QARI: Quality Aware Software Deployment for Wireless Sensor Networks. ITNG 2010: 642-647 - [c151]Thomas Delaet, Wouter Joosen, Bart Van Brabant:
A Survey of System Configuration Tools. LISA 2010 - [c150]Klaas Thoelen, Nelson Matthys, Wouter Horré, Christophe Huygens
, Wouter Joosen, Danny Hughes, Lei Fang, Sheng-Uei Guan:
Supporting reconfiguration and re-use through self-describing component interfaces. MidSens 2010: 29-34 - [c149]Christophe Huygens
, Nelson Matthys, Wouter Joosen:
Optimized Resource Access Control in Shared Sensor Networks. MobiSec 2010: 105-116 - [c148]Javier del Cid, Sam Michiels
, Wouter Joosen, Danny Hughes:
Middleware for resource sharing in multi-purpose Wireless Sensor Networks. NESEA 2010: 1-8 - [c147]Kevin Lee
, David Murray
, Danny Hughes, Wouter Joosen:
Extending sensor networks into the Cloud using Amazon Web Services. NESEA 2010: 1-7 - [c146]Philippe De Ryck, Maarten Decat, Lieven Desmet
, Frank Piessens, Wouter Joosen:
Security of Web Mashups: A Survey. NordSec 2010: 223-238 - [c145]Nelson Matthys, Syed Rehan Afzal, Christophe Huygens
, Sam Michiels
, Wouter Joosen, Danny Hughes:
Towards fine-grained and application-centric access control for wireless sensor networks. SAC 2010: 793-794 - [c144]Bart Van Brabant, Thomas Delaet, Wouter Joosen:
Authorizing and directing configuration updates in contemporary it infrastructures. SafeConfig 2010: 79-82 - [c143]Pedro Javier del Cid, Nelson Matthys, Danny Hughes, Sam Michiels
, Wouter Joosen:
Resource Management Middleware to Support Self Managing Wireless Sensor Networks. SASO Workshops 2010: 251-255 - [c142]Nelson Matthys, Christophe Huygens
, Danny Hughes, Jo Ueyama
, Sam Michiels
, Wouter Joosen:
Policy-Driven Tailoring of Sensor Networks. S-CUBE 2010: 20-35 - [c141]Klaas Thoelen, Sam Michiels
, Wouter Joosen:
Middleware for Adaptive Group Communication in Wireless Sensor Networks. S-CUBE 2010: 59-74 - [c140]Pedro Javier del Cid, Daniel Hughes, Sam Michiels
, Wouter Joosen:
Expressing and Configuring Quality of Data in Multi-purpose Wireless Sensor Networks. S-CUBE 2010: 91-106 - [c139]Jef Maerien, Sam Michiels
, Stefan Van Baelen, Christophe Huygens
, Wouter Joosen:
A Secure Multi-Application Platform for Vehicle Telematics. VTC Fall 2010: 1-5 - [c138]Jef Maerien, Sam Michiels
, Christophe Huygens
, Wouter Joosen:
MASY: MAnagement of Secret keYs for federated mobile wireless sensor networks. WiMob 2010: 121-128
2000 – 2009
- 2009
- [j16]Bart De Win, Riccardo Scandariato, Koen Buyens, Johan Grégoire, Wouter Joosen:
On the secure software development process: CLASP, SDL and Touchpoints compared. Inf. Softw. Technol. 51(7): 1152-1171 (2009) - [c137]Koen Buyens, Bart De Win, Wouter Joosen:
Identifying and Resolving Least Privilege Violations in Software Architectures. ARES 2009: 232-239 - [c136]Thomas Heyman, Riccardo Scandariato, Wouter Joosen:
Risk-Driven Architectural Decomposition. ARES 2009: 363-368 - [c135]Yves Younan, Frank Piessens, Wouter Joosen:
Protecting Global and Static Variables from Buffer Overflow Attacks. ARES 2009: 798-803 - [c134]Kim Wuyts
, Riccardo Scandariato, Bart De Decker, Wouter Joosen:
Linking Privacy Solutions to Developer Goals. ARES 2009: 847-852 - [c133]Maarten Bynens, Wouter Joosen:
Towards a pattern language for aspect-based design. PLATE@AOSD 2009: 13-15 - [c132]Dimitri Van Landuyt
, Steven Op de beeck, Eddy Truyen, Wouter Joosen:
Domain-driven discovery of stable abstractions for pointcut interfaces. AOSD 2009: 75-86 - [c131]Wouter De Borger, Bert Lagaisse
, Wouter Joosen:
A generic and reflective debugging architecture to support runtime visibility and traceability of aspects. AOSD 2009: 173-184 - [c130]Klaas Thoelen, Sam Michiels, Wouter Joosen, Koen Vangheluwe, Katja Verbeeck:
A sensor middleware and agent-based communication platform for supply-chain management. AAMAS (2) 2009: 1409-1410 - [c129]Wim Maes, Thomas Heyman, Lieven Desmet
, Wouter Joosen:
Browser protection against cross-site request forgery. SecuCode@CCS 2009: 3-10 - [c128]Yves Younan, Pieter Philippaerts
, Frank Piessens, Wouter Joosen, Sven Lachmund, Thomas Walter:
Filter-resistant code injection on ARM. CCS 2009: 11-20 - [c127]Koen Buyens, Riccardo Scandariato, Wouter Joosen:
Measuring the interplay of security principles in software architectures. ESEM 2009: 554-563 - [c126]Francesco Gadaleta, Yves Younan, Bart Jacobs
, Wouter Joosen, Erik De Neve, Nils Beosier:
Instruction-level countermeasures against stack-based buffer overflow attacks. VDTS@EuroSys 2009: 7-12 - [c125]Lieven Desmet
, Wouter Joosen, Fabio Massacci
, Katsiaryna Naliuka, Pieter Philippaerts
, Frank Piessens, Ida Sri Rejeki Siahaan
, Dries Vanoverberghe:
A Security Architecture for Web 2.0 Applications. Future Internet Assembly 2009: 35-46 - [c124]Frans Sanen, Eddy Truyen, Wouter Joosen:
Problem-Solution Feature Interactions as Configuration Knowledge in Distributed Runtime Adaptations. ICFI 2009: 166-175 - [c123]Frans Sanen, Eddy Truyen, Wouter Joosen:
Mapping problem-space to solution-space features: a feature interaction approach. GPCE 2009: 167-176 - [c122]Dimitri Van Landuyt
, Eddy Truyen, Wouter Joosen:
Automating the discovery of stable domain abstractions for reusable aspects. EA@ICSE 2009: 1-7 - [c121]Koen Buyens, Bart De Win, Wouter Joosen:
Resolving least privilege violations in software architectures. SESS@ICSE 2009: 9-16 - [c120]Robrecht Haesevoets, Danny Weyns
, Tom Holvoet
, Wouter Joosen:
A formal model for self-adaptive and self-healing organizations. SEAMS 2009: 116-125 - [c119]Syed Rehan Afzal, Christophe Huygens
, Wouter Joosen:
Extending middleware frameworks for Wireless Sensor Networks. ICUMT 2009: 1-7 - [c118]Christophe Huygens
, Wouter Joosen:
Federated and Shared Use of Sensor Networks through Security Middleware. ITNG 2009: 1005-1011 - [c117]Thomas Delaet, Wouter Joosen:
Managing your content with CIMPLE - a content-centric storage interface. LCN 2009: 491-498 - [c116]Bart Van Brabant, Thomas Delaet, Wouter Joosen:
Federated Access Control and Workflow Enforcement in Systems Configuration. LISA 2009: 129-143 - [c115]Pedro Javier del Cid, Danny Hughes, Jo Ueyama
, Sam Michiels
, Wouter Joosen:
DARMA: adaptable service and resource management for wireless sensor networks. MidSens 2009: 1-6 - [c114]Nelson Matthys, Christophe Huygens
, Danny Hughes, Sam Michiels
, Wouter Joosen:
Flexible integration of data qualities in wireless sensor networks. MidSens 2009: 31-36 - [c113]Danny Hughes, Klaas Thoelen, Wouter Horré, Nelson Matthys, Javier del Cid, Sam Michiels
, Christophe Huygens
, Wouter Joosen:
LooCI: a loosely-coupled component infrastructure for networked embedded systems. MoMM 2009: 195-203 - [c112]Wouter Horré, Kevin Lee
, Danny Hughes, Sam Michiels
, Wouter Joosen:
A Graph Based Approach to Supporting Reconfiguration in Wireless Sensor Networks. NetCoM 2009: 326-331 - [c111]Nelson Matthys, Danny Hughes, Sam Michiels
, Christophe Huygens
, Wouter Joosen:
Fine-Grained Tailoring of Component Behaviour for Embedded Systems. SEUS 2009: 156-167 - [c110]Aram Hovsepyan, Stefan Van Baelen, Yolande Berbers, Wouter Joosen:
Specifying and Composing Concerns Expressed in Domain-Specific Modeling Languages. TOOLS (47) 2009: 116-135 - [c109]Robrecht Haesevoets, Eddy Truyen, Tom Holvoet
, Wouter Joosen:
Weaving the Fabric of the Control Loop through Aspects. SOAR 2009: 38-65 - [c108]Lieven Desmet
, Wouter Joosen, Fabio Massacci
, Katsiaryna Naliuka, Pieter Philippaerts
, Frank Piessens, Dries Vanoverberghe:
The S3MS.NET Run Time Monitor: Tool Demonstration. BYTECODE@ETAPS 2009: 153-159 - [p2]Bart De Win, Tom Goovaerts, Wouter Joosen, Pieter Philippaerts
, Frank Piessens, Yves Younan:
Security Middleware for Mobile Applications. Middleware for Network Eccentric and Mobile Applications 2009: 265-284 - 2008
- [j15]Wouter Horré, Sam Michiels
, Wouter Joosen, Pierre Verbaeten:
DAVIM: Adaptable Middleware for Sensor Networks. IEEE Distributed Syst. Online 9(1) (2008) - [j14]Lieven Desmet
, Wouter Joosen, Fabio Massacci
, Pieter Philippaerts
, Frank Piessens, Ida Sri Rejeki Siahaan
, Dries Vanoverberghe:
Security-by-contract on the .NET platform. Inf. Secur. Tech. Rep. 13(1): 25-32 (2008) - [j13]Lieven Desmet
, Pierre Verbaeten, Wouter Joosen, Frank Piessens:
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies. IEEE Trans. Software Eng. 34(1): 50-64 (2008) - [c107]Kim Wuyts
, Riccardo Scandariato, Geert Claeys, Wouter Joosen:
Hardening XDS-Based Architectures. ARES 2008: 18-25 - [c106]Thomas Heyman, Riccardo Scandariato, Christophe Huygens
, Wouter Joosen:
Using Security Patterns to Combine Security Metrics. ARES 2008: 1156-1163 - [c105]Koen Yskout
, Riccardo Scandariato, Bart De Win, Wouter Joosen:
Transforming Security Requirements into Architecture. ARES 2008: 1421-1428 - [c104]Eddy Truyen, Wouter Joosen:
Towards an aspect-oriented architecture for self-adaptive frameworks. ACP4IS@AOSD 2008: 9:1-9:8 - [c103]Eddy Truyen, Nico Janssens, Frans Sanen, Wouter Joosen:
Support for distributed adaptations in aspect-oriented middleware. AOSD 2008: 120-131 - [c102]Klaas Thoelen, Sam Michiels, Wouter Joosen:
Tracking and tracing containers through distributed sensor middleware. Autonomics 2008: 25 - [c101]Aram Hovsepyan, Stefan Van Baelen, Yolande Berbers, Wouter Joosen:
Generic Reusable Concern Compositions. ECMDA-FA 2008: 231-245 - [c100]Frans Sanen, Eddy Truyen, Wouter Joosen:
Modeling Context-Dependent Aspect Interference Using Default Logics. RAM-SE 2008: 15-20 - [c99]Eddy Truyen, Wouter Joosen:
A reference model for cross-organizational coordination architectures. EDOCW 2008: 252-263 - [c98]Nelson Matthys, Sam Michiels, Wouter Joosen, Pierre Verbaeten:
Policy-based management of middleware for distributed sensor applications. MiNEMA 2008: 15-17 - [c97]Eryk Kylikowski, Riccardo Scandariato, Wouter Joosen:
Using Multi-Level Security Annotations to Improve Software Assurance. HASE 2008: 471-474 - [c96]Didier Delanote, Stefan Van Baelen, Wouter Joosen, Yolande Berbers:
Using AADL to Model a Protocol Stack. ICECCS 2008: 277-281 - [c95]Thomas Delaet, Paul Anderson, Wouter Joosen:
Managing Real-World System Configurations with Constraints. ICN 2008: 594-601 - [c94]Danny Weyns, Robrecht Haesevoets, Bart Van Eylen, Alexander Helleboogh, Tom Holvoet, Wouter Joosen:
Endogenous versus exogenous self-management. SEAMS 2008: 41-48 - [c93]Nelson Matthys, Wouter Joosen:
Towards policy-based management of sensor networks. MidSens 2008: 13-18 - [c92]Tom Goovaerts, Bart De Win, Wouter Joosen:
A comparison of two approaches for achieving flexible and adaptive security middleware. Middleware Security 2008: 19-24 - [c91]Kristof Geebelen, Sam Michiels
, Wouter Joosen:
Dynamic reconfiguration using template based web service composition. MW4SOC 2008: 49-54 - [c90]Koen Yskout, Bart De Win, Wouter Joosen:
Transforming Security Audit Requirements into a Software Architecture. MODSEC@MoDELS 2008 - [c89]Robrecht Haesevoets, Danny Weyns
, Tom Holvoet
, Wouter Joosen, Paul Valckenaers:
Hierarchical Organizations and a Supporting Software Architecture for Floating Car Data. SASO Workshops 2008: 31-36 - [c88]Koen Buyens, Bart De Win, Wouter Joosen:
Improving Least Privilege in Software Architecture by Guided Automated Compartmentalization. WOSIS 2008: 145-150 - [c87]Paul Grace
, Bert Lagaisse
, Eddy Truyen, Wouter Joosen:
A Reflective Framework for Fine-Grained Adaptation of Aspect-Oriented Compositions. SC@ETAPS 2008: 215-230 - [c86]Mina Deng, Riccardo Scandariato, Danny De Cock, Bart Preneel
, Wouter Joosen:
Identity in federated electronic healthcare. Wireless Days 2008: 1-5 - [e1]Wouter Joosen:
Proceedings of the 2008 Workshop on Next Generation Aspect Oriented Middleware, NAOMI@AOSD 2008, Brussels, Belgium, April 1, 2008. ACM 2008, ISBN 978-1-60558-148-4 [contents] - 2007
- [c85]Koen Buyens, Bart De Win, Wouter Joosen:
Empirical and statistical analysis of risk analysis-driven techniques for threat management. ARES 2007: 1034-1041 - [c84]Davy Preuveneers, Julien Pauty, Dimitri Van Landuyt
, Yolande Berbers, Wouter Joosen:
Comparative Evaluation of Converged Service-Oriented Architectures. AINA Workshops (1) 2007: 989-994 - [c83]Maarten Bynens, Bert Lagaisse
, Wouter Joosen, Eddy Truyen:
The elementary pointcut pattern. BPAOSD@AOSD 2007: 2 - [c82]Koen Buyens, Sam Michiels
, Wouter Joosen:
A Software Architecture to Facilitate the Creation of DRM Systems. CCNC 2007: 955-959 - [c81]Lieven Desmet
, Wouter Joosen, Fabio Massacci
, Katsiaryna Naliuka, Pieter Philippaerts
, Frank Piessens, Dries Vanoverberghe:
A flexible security architecture to support third-party applications on mobile devices. CSAW 2007: 19-28 - [c80]Koen Buyens, Riccardo Scandariato, Wouter Joosen:
Process Activities Supporting Security Principles. COMPSAC (2) 2007: 281-292 - [c79]Tom Goovaerts, Bart De Win, Wouter Joosen:
A Flexible Architecture for Enforcing and Composing Policies in a Service-Oriented Environment. DAIS 2007: 253-266 - [c78]Frans Sanen, Eddy Truyen, Wouter Joosen:
Managing Concern Interactions in Middleware. DAIS 2007: 267-283 - [c77]Robrecht Haesevoets, Bart Van Eylen, Danny Weyns
, Alexander Helleboogh, Tom Holvoet
, Wouter Joosen:
Managing Agent Interactions with Context-Driven Dynamic Organizations. EEMMAS 2007: 166-186 - [c76]Nico Janssens, Eddy Truyen, Frans Sanen, Wouter Joosen:
Adding dynamic reconfiguration support to JBoss AOP. MAI 2007: 1-8 - [c75]Kris Verlaenen, Wouter Joosen, Pierre Verbaeten:
Arriclides: An Architecture Integrating Clinical Decision Support Models. HICSS 2007: 135 - [c74]Johan Grégoire, Koen Buyens, Bart De Win, Riccardo Scandariato, Wouter Joosen:
On the Secure Software Development Process: CLASP and SDL Compared. SESS@ICSE 2007: 1 - [c73]Thomas Heyman, Koen Yskout
, Riccardo Scandariato, Wouter Joosen:
An Analysis of the Security Patterns Landscape. SESS@ICSE 2007: 3 - [c72]Kris Verlaenen, Bart De Win, Wouter Joosen:
Towards simplified specification of policies in different domains. Integrated Network Management 2007: 20-29 - [c71]Thomas Delaet, Wouter Joosen:
PoDIM: A Language for High-Level Configuration Management. LISA 2007: 261-273 - [c70]Paul Grace
, Eddy Truyen, Bert Lagaisse
, Wouter Joosen:
The case for aspect-oriented reflective middleware. ARM 2007: 2 - [c69]Wouter Horré, Sam Michiels
, Nelson Matthys, Wouter Joosen, Pierre Verbaeten:
On the integration of sensor networks and general purpose IT infrastructure. MidSens 2007: 7-12 - [c68]Bert Vanhooff, Dhouha Ayed, Stefan Van Baelen, Wouter Joosen, Yolande Berbers:
UniTI: A Unified Transformation Infrastructure. MoDELS 2007: 31-45 - [c67]Bert Lagaisse, Eddy Truyen, Wouter Joosen:
Multi-stage Aspect-Oriented Composition of Component-Based Applications. OTM Conferences (1) 2007: 630-647 - [c66]Kris Verlaenen, Bart De Win, Wouter Joosen:
Policy Analysis Using a Hybrid Semantic Reasoning Engine. POLICY 2007: 193-200 - [c65]Liesje Demuynck, Bart De Decker, Wouter Joosen:
A Credential-Based System for the Anonymous Delegation of Rights. SEC 2007: 169-180 - [c64]Tom Goovaerts, Bart De Win, Wouter Joosen:
Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies. REM@ESORICS 2007: 31-43 - 2006
- [j12]Tine Verhanneman, Frank Piessens, Bart De Win, Eddy Truyen, Wouter Joosen:
A Modular Access Control Service for Supporting Application-Specific Policies. IEEE Distributed Syst. Online 7(6) (2006) - [j11]Johan Brichau, Ruzanna Chitchyan
, Siobhán Clarke
, Ellie D'Hondt
, Alessandro Garcia, Michael Haupt, Wouter Joosen, Shmuel Katz, Jacques Noyé, Awais Rashid
, Mario Südholt:
A Model Curriculum for Aspect-Oriented Software Development. IEEE Softw. 23(6): 53-61 (2006) - [j10]Eddy Truyen, Wouter Joosen:
Run-Time and Atomic Weaving of Distributed Aspects. LNCS Trans. Aspect Oriented Softw. Dev. 2: 147-181 (2006) - [c63]Yves Younan, Davide Pozza
, Frank Piessens, Wouter Joosen:
Extended Protection against Stack Smashing Attacks without Performance Loss. ACSAC 2006: 429-438 - [c62]Mathieu Braem, Kris Verlaenen, Niels Joncheere, Wim Vanderperren, Ragnhild Van Der Straeten, Eddy Truyen, Wouter Joosen, Viviane Jonckers:
Isolating Process-Level Concerns Using Padus. Business Process Management 2006: 113-128 - [c61]Riccardo Scandariato, Bart De Win, Wouter Joosen:
Towards a measuring framework for security properties of software. QoP 2006: 27-30 - [c60]Lieven Desmet
, Frank Piessens, Wouter Joosen, Pierre Verbaeten:
Bridging the gap between web application firewalls and web applications. FMSE 2006: 67-77 - [c59]Adriaan Moors, Frank Piessens, Wouter Joosen:
An object-oriented approach to datatype-generic programming. ICFP-WGP 2006: 96-106 - [c58]Yves Younan, Wouter Joosen, Frank Piessens:
Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic. ICICS 2006: 379-398 - [c57]Bart De Win, Frank Piessens, Wouter Joosen:
How secure is AOP and what can we do about it? SESS@ICSE 2006: 27-34 - [c56]Sam Michiels
, Wouter Horré, Wouter Joosen, Pierre Verbaeten:
DAViM: a dynamically adaptable virtual machine for sensor networks. MidSens 2006: 7-12 - [c55]Bert Lagaisse
, Wouter Joosen:
True and Transparent Distributed Composition of Aspect-Components. Middleware 2006: 42-61 - [c54]Bert Vanhooff, Stefan Van Baelen, Aram Hovsepyan, Wouter Joosen, Yolande Berbers:
Towards a Transformation Chain Modeling Language. SAMOS 2006: 39-48 - [c53]Aram Hovsepyan, Stefan Van Baelen, Bert Vanhooff, Wouter Joosen, Yolande Berbers:
Key Research Challenges for Successfully Applying MDD Within Real-Time Embedded Software Development. SAMOS 2006: 49-58 - [c52]Thomas Heyman, Bart De Win, Christophe Huygens, Wouter Joosen:
Improving Intrusion Detection through Alert Verification. WOSIS 2006: 207-216 - [c51]Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten:
Static Verification of Indirect Data Sharing in Loosely-coupled Component Systems. SC@ETAPS 2006: 34-49 - [c50]Maarten Bynens, Bart De Win, Wouter Joosen, Bart Theeten:
Ontology-Based Discovery of Data-Driven Services. SOSE 2006: 175-178 - 2005
- [j9]Nico Janssens, Wouter Joosen, Pierre Verbaeten:
NeCoMan: Middleware for Safe Distributed-Service Adaptation in Programmable Networks. IEEE Distributed Syst. Online 6(7) (2005) - [j8]