default search action
Wouter Joosen
Person information
- affiliation: Catholic University of Leuven, Belgium
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j109]Christof Koolen, Kim Wuyts, Wouter Joosen, Peggy Valcke:
From insight to compliance: Appropriate technical and organisational security measures through the lens of cybersecurity maturity models. Comput. Law Secur. Rev. 52: 105914 (2024) - [j108]Dimitri Van Landuyt, Vincent Wijshoff, Wouter Joosen:
A study of NoSQL query injection in Neo4j. Comput. Secur. 137: 103590 (2024) - [j107]Davy Preuveneers, Wouter Joosen:
An Ontology-Based Cybersecurity Framework for AI-Enabled Systems and Applications. Future Internet 16(3): 69 (2024) - [j106]Tim Van hamme, Giuseppe Garofalo, Enrique Argones-Rúa, Davy Preuveneers, Wouter Joosen:
A Novel Evaluation Framework for Biometric Security: Assessing Guessing Difficulty as a Metric. IEEE Trans. Inf. Forensics Secur. 19: 8369-8384 (2024) - [c502]Dimitri Van Landuyt, Marie Levrau, Vincent Reniers, Wouter Joosen:
An E-Commerce Benchmark for Evaluating Performance Trade-Offs in Document Stores. DaWaK 2024: 284-290 - [c501]José Santos, Eddy Truyen, Christoph Baumann, Filip De Turck, Gerald Budigiri, Wouter Joosen:
Towards Intent-Based Scheduling for Performance and Security in Edge-to-Cloud Networks. ICIN 2024: 222-227 - [c500]Javier Martínez Llamas, Davy Preuveneers, Wouter Joosen:
Poster: Robust Edge-Based Detection of Bot Attacks Through Federated Learning. SEC 2024: 542-544 - [c499]Ilias Tsingenopoulos, Jacopo Cortellazzi, Branislav Bosanský, Simone Aonzo, Davy Preuveneers, Wouter Joosen, Fabio Pierazzi, Lorenzo Cavallaro:
How to Train your Antivirus: RL-based Hardening through the Problem Space. RAID 2024: 130-146 - [c498]Pieter-Jan Vrielynck, Tim Van hamme, Rawad Ghostin, Bert Lagaisse, Davy Preuveneers, Wouter Joosen:
A Self-Sovereign Identity Approach to Decentralized Access Control with Transitive Delegations. SACMAT 2024 - [c497]Dimitri Van Landuyt, Laurens Sion, Walewein Philips, Wouter Joosen:
From automation to CI/CD: a comparative evaluation of threat modeling tools. SecDev 2024: 35-45 - [c496]Stef Verreydt, Koen Yskout, Laurens Sion, Wouter Joosen:
Threat modeling state of practice in Dutch organizations. SOUPS @ USENIX Security Symposium 2024: 473-486 - [c495]Victor Le Pochat, Simon Fernandez, Tom van Goethem, Samaneh Tajalizadehkhoob, Lieven Desmet, Andrzej Duda, Wouter Joosen, Maciej Korczynski:
Evaluating the Impact of Design Decisions on Passive DNS-Based Domain Rankings. TMA 2024: 1-11 - [c494]Karel Dhondt, Victor Le Pochat, Yana Dimova, Wouter Joosen, Stijn Volckaert:
Swipe Left for Identity Theft: An Analysis of User Data Privacy Risks on Location-based Dating Apps. USENIX Security Symposium 2024 - [i13]Jacopo Cortellazzi, Ilias Tsingenopoulos, Branislav Bosanský, Simone Aonzo, Davy Preuveneers, Wouter Joosen, Fabio Pierazzi, Lorenzo Cavallaro:
How to Train your Antivirus: RL-based Hardening through the Problem-Space. CoRR abs/2402.19027 (2024) - 2023
- [j105]Davy Preuveneers, Wouter Joosen:
Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersections. Comput. Secur. 135: 103505 (2023) - [j104]Eddy Truyen, Hongjie Xie, Wouter Joosen:
Vendor-Agnostic Reconfiguration of Kubernetes Clusters in Cloud Federations. Future Internet 15(2): 63 (2023) - [j103]Yana Dimova, Tom van Goethem, Wouter Joosen:
Everybody's Looking for SSOmething: A large-scale evaluation on the privacy of OAuth authentication on the web. Proc. Priv. Enhancing Technol. 2023(4): 452-467 (2023) - [j102]Absar-Ul-Haque Ahmar, Emekcan Aras, Thien Duc Nguyen, Sam Michiels, Wouter Joosen, Danny Hughes:
Design of a Robust MAC Protocol for LoRa. ACM Trans. Internet Things 4(1): 3:1-3:25 (2023) - [j101]Kristof Jannes, Emad Heydari Beni, Bert Lagaisse, Wouter Joosen:
BeauForT: Robust Byzantine Fault Tolerance for Client-Centric Mobile Web Applications. IEEE Trans. Parallel Distributed Syst. 34(4): 1241-1252 (2023) - [c493]Willem Verheyen, Tim Van hamme, Sander Joos, Davy Preuveneers, Wouter Joosen:
Beware the Doppelgänger: Attacks against Adaptive Thresholds in Facial Recognition Systems. ARES 2023: 18:1-18:11 - [c492]Emma Lavens, Davy Preuveneers, Wouter Joosen:
Mitigating undesired interactions between liveness detection components in biometric authentication. ARES 2023: 141:1-141:8 - [c491]Gerald Budigiri, Christoph Baumann, Eddy Truyen, Jan Tobias Mühlberg, Wouter Joosen:
Zero-Cost In-Depth Enforcement of Network Policies for Low-Latency Cloud-Native Systems. CLOUD 2023: 249-261 - [c490]Anh-Duy Tran, Koen Yskout, Wouter Joosen:
Threat Modeling: A Rough Diamond or Fool's Gold? ECSA (Tracks, Workshops and Doctoral Symposium) 2023: 120-129 - [c489]Shirin Kalantari, Pieter Philippaerts, Yana Dimova, Danny Hughes, Wouter Joosen, Bart De Decker:
A User-Centric Approach to API Delegations - Enforcing Privacy Policies on OAuth Delegations. ESORICS (2) 2023: 318-337 - [c488]Davy Preuveneers, Javier Martínez Llamas, Irfan Bulut, Enrique Argones-Rúa, Pieter Verfaillie, Vince Demortier, Dimitri Surinx, Wouter Joosen:
On the Use of AutoML for Combating Alert Fatigue in Security Operations Centers. ESORICS Workshops (2) 2023: 609-627 - [c487]Javier Martínez Llamas, Davy Preuveneers, Wouter Joosen:
Effective Machine Learning-based Access Control Administration through Unlearning. EuroS&P Workshops 2023: 50-57 - [c486]Tim Van hamme, Giuseppe Garofalo, Davy Preuveneers, Wouter Joosen:
Masterkey attacks against free-text keystroke dynamics and security implications of demographic factors. EuroS&P 2023: 278-291 - [c485]Pieter Philippaerts, Davy Preuveneers, Wouter Joosen:
Revisiting OAuth 2.0 Compliance: A Two-Year Follow-Up Study. EuroS&P Workshops 2023: 521-525 - [c484]Gilang Mentari Hamidy, Sri Yulianti, Pieter Philippaerts, Wouter Joosen:
TC4SE: A High-Performance Trusted Channel Mechanism for Secure Enclave-Based Trusted Execution Environments. ISC 2023: 246-264 - [c483]Davy Preuveneers, Willem Verheyen, Sander Joos, Wouter Joosen:
On the adversarial robustness of full integer quantized TinyML models at the edge. MIDDLEWEDGE@Middleware 2023: 7-12 - [c482]Laurens Sion, Dimitri Van Landuyt, Pierre Dewitte, Peggy Valcke, Wouter Joosen:
Demonstration of the DPMF for Data Protection Analysis. MoDELS (Companion) 2023: 75-79 - [c481]Gilang Mentari Hamidy, Pieter Philippaerts, Wouter Joosen:
T3E: A Practical Solution to Trusted Time in Secure Enclaves. NSS 2023: 305-326 - [c480]Anh-Duy Tran, Koen Yskout, Wouter Joosen:
AndrAS: Automated Attack Surface Extraction for Android Applications. QRS 2023: 406-417 - [c479]Kristof Jannes, Vincent Reniers, Wouter Lenaerts, Bert Lagaisse, Wouter Joosen:
DEDACS: Decentralized and dynamic access control for smart contracts in a policy-based manner. SAC 2023: 222-230 - [c478]Dimitri Van Landuyt, Julien Benaouda, Vincent Reniers, Ansar Rafique, Wouter Joosen:
A Comparative Performance Evaluation of Multi-Model NoSQL Databases and Polyglot Persistence. SAC 2023: 286-293 - [c477]Stef Verreydt, Dimitri Van Landuyt, Wouter Joosen:
Expressive and Systematic Risk Assessments with Instance-Centric Threat Models. SAC 2023: 1450-1457 - [c476]Tom van Goethem, Iskander Sánchez-Rola, Wouter Joosen:
Scripted Henchmen: Leveraging XS-Leaks for Cross-Site Vulnerability Detection. SP (Workshops) 2023: 371-383 - [c475]Victor Le Pochat, Wouter Joosen:
Analyzing Cyber Security Research Practices through a Meta-Research Framework. CSET @ USENIX Security Symposium 2023: 64-74 - [c474]Gertjan Franken, Tom van Goethem, Lieven Desmet, Wouter Joosen:
A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs. USENIX Security Symposium 2023: 3673-3690 - [c473]Yana Dimova, Mrunmayee Kode, Shirin Kalantari, Kim Wuyts, Wouter Joosen, Jan Tobias Mühlberg:
From Privacy Policies to Privacy Threats: A Case Study in Policy-Based Threat Modeling. WPES@CCS 2023: 17-29 - [i12]Ilias Tsingenopoulos, Vera Rimmer, Davy Preuveneers, Fabio Pierazzi, Lorenzo Cavallaro, Wouter Joosen:
Adversarial Markov Games: On Adaptive Decision-Based Attacks and Defenses. CoRR abs/2312.13435 (2023) - 2022
- [j100]Enrique Argones-Rúa, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Discriminative training of spiking neural networks organised in columns for stream-based biometric authentication. IET Biom. 11(5): 485-497 (2022) - [j99]Giuseppe Garofalo, Tim Van hamme, Davy Preuveneers, Wouter Joosen, Aysajan Abidin, Mustafa A. Mustafa:
PIVOT: Private and Effective Contact Tracing. IEEE Internet Things J. 9(22): 22466-22489 (2022) - [j98]Vera Rimmer, Theodor Schnitzler, Tom van Goethem, Abel Rodríguez Romero, Wouter Joosen, Katharina Kohls:
Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor. Proc. Priv. Enhancing Technol. 2022(3): 314-335 (2022) - [j97]Dimitri Van Landuyt, Wouter Joosen:
A descriptive study of assumptions in STRIDE security threat modeling. Softw. Syst. Model. 21(6): 2311-2328 (2022) - [j96]Fan Yang, Ashok Samraj Thangarajan, Gowri Sankar Ramachandran, Wouter Joosen, Danny Hughes:
AsTAR: Sustainable Energy Harvesting for the Internet of Things through Adaptive Task Scheduling. ACM Trans. Sens. Networks 18(1): 4:1-4:34 (2022) - [c472]Davy Preuveneers, Wouter Joosen:
Privacy-Preserving Polyglot Sharing and Analysis of Confidential Cyber Threat Intelligence. ARES 2022: 2:1-2:11 - [c471]Emma Lavens, Pieter Philippaerts, Wouter Joosen:
A Quantitative Assessment of the Detection Performance of Web Vulnerability Scanners. ARES 2022: 149:1-149:10 - [c470]Tom van Goethem, Gertjan Franken, Iskander Sánchez-Rola, David Dworken, Wouter Joosen:
SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model. AsiaCCS 2022: 784-798 - [c469]Karel Dhondt, Victor Le Pochat, Alexios Voulimeneas, Wouter Joosen, Stijn Volckaert:
A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks. CCS 2022: 801-814 - [c468]Lisa Liu, Gints Engelen, Timothy M. Lynar, Daryl Essam, Wouter Joosen:
Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018. CNS 2022: 254-262 - [c467]Sander Joos, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Adversarial Robustness is Not Enough: Practical Limitations for Securing Facial Authentication. IWSPA@CODASPY 2022: 2-12 - [c466]Joseph Hallett, Simon N. Foley, David Manda, Joseph Gardiner, Dimitri Jonckers, Wouter Joosen, Awais Rashid:
Threat-Driven Dynamic Security Policies for Cyber-Physical Infrastructures. CRITIS 2022: 9-26 - [c465]Absar-Ul-Haque Ahmar, Wouter Joosen, Danny Hughes:
Smart-Hop: Low-Latency Multi-hop Networking for LoRa. DCOSS 2022: 17-20 - [c464]Dimitri Van Landuyt, Wouter Joosen:
A Systematic Survey of Architectural Approaches and Trade-Offs in Data De-identification. ECSA 2022: 66-82 - [c463]Pieter-Jan Vrielynck, Emad Heydari Beni, Kristof Jannes, Bert Lagaisse, Wouter Joosen:
DeFIRED: decentralized authorization with receiver-revocable and refutable delegations. EuroSec@EUROSYS 2022: 57-63 - [c462]Davy Preuveneers, Emma Lavens, Wouter Joosen:
Applying Machine Learning to use security oracles: a case study in virus and malware detection. EuroS&P Workshops 2022: 240-251 - [c461]Ilias Tsingenopoulos, Davy Preuveneers, Lieven Desmet, Wouter Joosen:
Captcha me if you can: Imitation Games with Reinforcement Learning. EuroS&P 2022: 719-735 - [c460]Zhaoyi Liu, Haoyu Tang, Sam Michiels, Wouter Joosen, Danny Hughes:
Unsupervised Acoustic Anomaly Detection Systems Based on Gaussian Mixture Density Neural Network. EUSIPCO 2022: 259-263 - [c459]Alexander van Den Berghe, Koen Yskout, Wouter Joosen:
A reimagined catalogue of software security patterns. EnCyCriS@ICSE 2022: 25-32 - [c458]Stef Verreydt, Laurens Sion, Koen Yskout, Wouter Joosen:
Relationship-based threat modeling. EnCyCriS@ICSE 2022: 41-48 - [c457]Mengyao Liu, Jonathan Oostvogels, Sam Michiels, Wouter Joosen, Danny Hughes:
BoboLink: Low Latency and Low Power Communication for Intelligent Environments. Intelligent Environments 2022: 1-4 - [c456]Zhaoyi Liu, Sam Michiels, Wouter Joosen, Danny Hughes:
Poster Abstract: Adapting Pretrained Features for Efficient Unsupervised Acoustic Anomaly Detection. IPSN 2022: 525-526 - [c455]Kristof Jannes, Bert Lagaisse, Wouter Joosen:
Secure replication for client-centric data stores. DICG@Middleware 2022: 31-36 - [c454]Gilang Mentari Hamidy, Pieter Philippaerts, Wouter Joosen:
SecSharp: Towards Efficient Trusted Execution in Managed Languages (Work in Progress). MPLR 2022: 119-127 - [c453]Pieter Philippaerts, Davy Preuveneers, Wouter Joosen:
OAuch: Exploring Security Compliance in the OAuth 2.0 Ecosystem. RAID 2022: 460-481 - [c452]Ala'a Al-Momani, Christoph Bösch, Kim Wuyts, Laurens Sion, Wouter Joosen, Frank Kargl:
Mitigation lost in translation: leveraging threat information to improve privacy solution selection. SAC 2022: 1236-1247 - [c451]Tom van Goethem, Wouter Joosen:
Towards Improving the Deprecation Process of Web Features through Progressive Web Security. SP (Workshops) 2022: 20-30 - [c450]Victor Le Pochat, Laura Edelson, Tom van Goethem, Wouter Joosen, Damon McCoy, Tobias Lauinger:
An Audit of Facebook's Political Ad Policy Enforcement. USENIX Security Symposium 2022: 607-624 - [c449]Xander Bouwman, Victor Le Pochat, Pawel Foremski, Tom van Goethem, Carlos Hernandez Gañán, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Wouter Joosen, Michel van Eeten:
Helping hands: Measuring the impact of a large threat intelligence sharing community. USENIX Security Symposium 2022: 1149-1165 - [c448]Ilias Tsingenopoulos, Ali Mohammad Shafiei, Lieven Desmet, Davy Preuveneers, Wouter Joosen:
Adaptive Malware Control: Decision-Based Attacks in the Problem Space of Dynamic Analysis. WoRMA@AsiaCCS 2022: 3-14 - [c447]Ali Mohammad Shafiei, Vera Rimmer, Ilias Tsingenopoulos, Lieven Desmet, Wouter Joosen:
Position Paper: On Advancing Adversarial Malware Generation Using Dynamic Features. WoRMA@AsiaCCS 2022: 15-20 - [c446]Yana Dimova, Gertjan Franken, Victor Le Pochat, Wouter Joosen, Lieven Desmet:
Tracking the Evolution of Cookie-based Tracking on Facebook. WPES@CCS 2022: 181-196 - [p11]Giuseppe Garofalo, Manel Slokom, Davy Preuveneers, Wouter Joosen, Martha A. Larson:
Machine Learning Meets Data Modification - The Potential of Pre-processing for Privacy Enchancement. Security and Artificial Intelligence 2022: 130-155 - [p10]Tim Van hamme, Giuseppe Garofalo, Sander Joos, Davy Preuveneers, Wouter Joosen:
AI for Biometric Authentication Systems. Security and Artificial Intelligence 2022: 156-180 - [p9]Azqa Nadeem, Vera Rimmer, Wouter Joosen, Sicco Verwer:
Intelligent Malware Defenses. Security and Artificial Intelligence 2022: 217-253 - [p8]Vera Rimmer, Azqa Nadeem, Sicco Verwer, Davy Preuveneers, Wouter Joosen:
Open-World Network Intrusion Detection. Security and Artificial Intelligence 2022: 254-283 - [p7]Carlos Javier Hernández-Castro, Zhuoran Liu, Alex Serban, Ilias Tsingenopoulos, Wouter Joosen:
Adversarial Machine Learning. Security and Artificial Intelligence 2022: 287-312 - [d1]Stef Verreydt, Laurens Sion, Koen Yskout, Wouter Joosen:
Relationship-Based Threat Modeling: Evaluation Data. Zenodo, 2022 - 2021
- [j95]Lieven Desmet, Jan Spooren, Thomas Vissers, Peter Janssen, Wouter Joosen:
Premadoma: An Operational Solution to Prevent Malicious Domain Name Registrations in the .eu TLD. DTRAP 2(1): 2:1-2:24 (2021) - [j94]Majid Makki, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
Thread-level resource consumption control of tenant custom code in a shared JVM for multi-tenant SaaS. Future Gener. Comput. Syst. 115: 351-364 (2021) - [j93]Stef Verreydt, Koen Yskout, Wouter Joosen:
Security and Privacy Requirements for Electronic Consent: A Systematic Literature Review. ACM Trans. Comput. Heal. 2(2): 16:1-16:24 (2021) - [j92]Ansar Rafique, Dimitri Van Landuyt, Emad Heydari Beni, Bert Lagaisse, Wouter Joosen:
CryptDICE: Distributed data protection system for secure cloud data storage and computation. Inf. Syst. 96: 101671 (2021) - [j91]Davy Preuveneers, Giuseppe Garofalo, Wouter Joosen:
Cloud and edge based data analytics for privacy-preserving multi-modal engagement monitoring in the classroom. Inf. Syst. Frontiers 23(1): 151-164 (2021) - [j90]Davy Preuveneers, Wouter Joosen:
Sharing Machine Learning Models as Indicators of Compromise for Cyber Threat Intelligence. J. Cybersecur. Priv. 1(1): 140-163 (2021) - [j89]Yana Dimova, Gunes Acar, Lukasz Olejnik, Wouter Joosen, Tom van Goethem:
The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion. Proc. Priv. Enhancing Technol. 2021(3): 394-412 (2021) - [j88]Jonathan Oostvogels, Fan Yang, Sam Michiels, Wouter Joosen, Danny Hughes:
Zero-Wire: Low-Latency Wireless Networking with Symbol-Synchronous LEDs. GetMobile Mob. Comput. Commun. 25(1): 34-38 (2021) - [j87]Jasper Bogaerts, Bert Lagaisse, Wouter Joosen:
SEQUOIA: A Middleware Supporting Policy-Based Access Control for Search and Aggregation in Data-Driven Applications. IEEE Trans. Dependable Secur. Comput. 18(1): 325-339 (2021) - [j86]Tim Van hamme, Enrique Argones-Rúa, Davy Preuveneers, Wouter Joosen:
On the Security of Biometrics and Fuzzy Commitment Cryptosystems: A Study on Gait Authentication. IEEE Trans. Inf. Forensics Secur. 16: 5211-5224 (2021) - [j85]Emekcan Aras, Stéphane Delbruel, Fan Yang, Wouter Joosen, Danny Hughes:
Chimera: A Low-power Reconfigurable Platform for Internet of Things. ACM Trans. Internet Things 2(2): 10:1-10:25 (2021) - [j84]Kristof Jannes, Bert Lagaisse, Wouter Joosen:
OWebSync: Seamless Synchronization of Distributed Web Clients. IEEE Trans. Parallel Distributed Syst. 32(9): 2338-2351 (2021) - [c445]Enrique Argones-Rúa, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Gait Authentication based on Spiking Neural Networks. BIOSIG 2021: 51-60 - [c444]Ashok Samraj Thangarajan, Fan Yang, Wouter Joosen, Sam Michiels, Danny Hughes:
ReFrAEN: a Reconfigurable Vibration Analysis Framework for Constrained Sensor Nodes. DCOSS 2021: 124-131 - [c443]Stefanos Peros, Wouter Joosen, Danny Hughes:
Ermis: a middleware for bridging data collection and data processing in IoT streaming applications. DCOSS 2021: 259-266 - [c442]Gerald Budigiri, Christoph Baumann, Jan Tobias Mühlberg, Eddy Truyen, Wouter Joosen:
Network Policies in Kubernetes: Performance Evaluation and Security Analysis. EuCNC/6G Summit 2021: 407-412 - [c441]Laurens Sion, Dimitri Van Landuyt, Wouter Joosen:
An Overview of Runtime Data Protection Enforcement Approaches. EuroS&P Workshops 2021: 351-358 - [c440]Martijn Sauwens, Kristof Jannes, Bert Lagaisse, Wouter Joosen:
SCEW: Programmable BFT-Consensus with Smart Contracts for Client-Centric P2P Web Applications. PaPoC@EuroSys 2021: 2:1-2:7 - [c439]Martijn Sauwens, Emad Heydari Beni, Kristof Jannes, Bert Lagaisse, Wouter Joosen:
ThunQ: A Distributed and Deep Authorization Middleware for Early and Lazy Policy Enforcement in Microservice Applications. ICSOC 2021: 204-220 - [c438]Kristof Jannes, Bert Lagaisse, Wouter Joosen:
Seamless Synchronization for Collaborative Web Services. ICSOC Workshops 2021: 311-314 - [c437]Majid Makki, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
Shared memory protection in a multi-tenant JVM. MPLR 2021: 1-15 - [c436]Emad Heydari Beni, Eddy Truyen, Bert Lagaisse, Wouter Joosen, Jordy Dieltjens:
Reducing cold starts during elastic scaling of containers in kubernetes. SAC 2021: 60-68 - [c435]Ala'a Al-Momani, Kim Wuyts, Laurens Sion, Frank Kargl, Wouter Joosen, Benjamin Erb, Christoph Bösch:
Land of the lost: privacy patterns' forgotten properties: enhancing selection-support for privacy patterns. SAC 2021: 1217-1225 - [c434]Dimitri Van Landuyt, Liliana Pasquale, Laurens Sion, Wouter Joosen:
Threat modeling at run time: the case for reflective and adaptive threat management (NIER track). SEAMS@ICSE 2021: 203-209 - [c433]Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Stef Verreydt, Wouter Joosen:
Automated Threat Analysis and Management in a Continuous Integration Pipeline. SecDev 2021: 30-37 - [c432]Fan Yang, Ashok Samraj Thangarajan, Sam Michiels, Wouter Joosen, Danny Hughes:
Morphy: Software Defined Charge Storage for the IoT. SenSys 2021: 248-260 - [c431]Gints Engelen, Vera Rimmer, Wouter Joosen:
Troubleshooting an Intrusion Detection Dataset: the CICIDS2017 Case Study. SP (Workshops) 2021: 7-12 - [c430]Gertjan Franken, Tom van Goethem, Wouter Joosen:
Reading Between the Lines: An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems. SP 2021: 1730-1747 - [c429]Oleksandr Tomashchuk, Dimitri Van Landuyt, Wouter Joosen:
The architectural divergence problem in security and privacy of eHealth IoT product lines. SPLC (A) 2021: 114-119 - [c428]Casper Claesen, Ansar Rafique, Dimitri Van Landuyt, Wouter Joosen:
A YCSB Workload for Benchmarking Hotspot Object Behaviour in NoSQL Databases. TPCTC 2021: 1-16 - [c427]Davy Preuveneers, Sander Joos, Wouter Joosen:
AuthGuide: Analyzing Security, Privacy and Usability Trade-Offs in Multi-factor Authentication. TrustBus 2021: 155-170 - [c426]Absar-Ul-Haque Ahmar, Thien Duc Nguyen, Wouter Joosen, Danny Hughes:
EH-CRAM: A Sustainable Energy Harvesting Algorithm for LPWANs. WCNC 2021: 1-7 - [p6]Steven Furnell, Paul S. Haskell-Dowland, Manish Agrawal, Richard L. Baskerville, Anirban Basu, Matt Bishop, Jorge Cuéllar, Sara Foresti, Lynn Futcher, Nurit Gal-Oz, Tejaswini (Teju) Herath, Christian Damsgaard Jensen, Allen C. Johnston, Wouter Joosen, Giovanni Livraga, Javier López, Stephen Marsh, Fabio Martinelli, Fabio Massacci, Aljosa Pasic, Stef Schinagl, Abbas Shahim, Kerry-Lynn Thomson, Jaideep Vaidya, Tony Vance, Merrill Warkentin:
Information Security and Privacy - Challenges and Outlook. IFIP's Exciting First 60+ Years 2021: 383-401 - [i11]Yana Dimova, Gunes Acar, Lukasz Olejnik, Wouter Joosen, Tom van Goethem:
The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion. CoRR abs/2102.09301 (2021) - 2020
- [j83]Eddy Truyen, Nane Kratzke, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
Managing Feature Compatibility in Kubernetes: Vendor Comparison and Analysis. IEEE Access 8: 228420-228439 (2020) - [j82]Laurens Sion, Pierre Dewitte, Dimitri Van Landuyt, Kim Wuyts, Peggy Valcke, Wouter Joosen:
DPMF: A Modeling Framework for Data Protection by Design. Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model. 15: 10:1-10:53 (2020) - [j81]Davy Preuveneers, Wouter Joosen:
Automated Configuration of NoSQL Performance and Scalability Tactics for Data-Intensive Applications. Informatics 7(3): 29 (2020) - [j80]Davy Preuveneers, Wouter Joosen, Jorge Bernal Bernabé, Antonio F. Skarmeta:
Distributed Security Framework for Reliable Threat Intelligence Sharing. Secur. Commun. Networks 2020: 8833765:1-8833765:15 (2020) - [j79]Davy Preuveneers, Ilias Tsingenopoulos, Wouter Joosen:
Resource Usage and Performance Trade-offs for Machine Learning Models in Smart Environments. Sensors 20(4): 1176 (2020) - [j78]Stefanos Peros, Stéphane Delbruel, Sam Michiels, Wouter Joosen, Danny Hughes:
Simplifying CPS Application Development through Fine-grained, Automatic Timeout Predictions. ACM Trans. Internet Things 1(3): 18:1-18:30 (2020) - [c425]Sepideh Pouyanrad, Jan Tobias Mühlberg, Wouter Joosen:
SCFMSP: static detection of side channels in MSP430 programs. ARES 2020: 21:1-21:10 - [c424]Oleksandr Tomashchuk, Yuan Li, Dimitri Van Landuyt, Wouter Joosen:
Operationalization of Privacy and Security Requirements for eHealth IoT Applications in the Context of GDPR and CSL. APF 2020: 143-160 - [c423]Absar-Ul-Haque Ahmar, Emekcan Aras, Thien Duc Nguyen, Sam Michiels, Wouter Joosen, Danny Hughes:
CRAM: Robust Medium Access Control for LPWAN using Cryptographic Frequency Hopping. DCOSS 2020: 95-102 - [c422]Emekcan Aras, Mahmoud Ammar, Fan Yang, Wouter Joosen, Danny Hughes:
MicroVault: Reliable Storage Unit for IoT Devices. DCOSS 2020: 132-140 - [c421]Vincent Reniers, Dimitri Van Landuyt, Ansar Rafique, Wouter Joosen:
A Workload-Driven Document Database Schema Recommender (DBSR). ER 2020: 471-484 - [c420]Dimitri Van Landuyt, Laurens Sion, Pierre Dewitte, Wouter Joosen:
The Bigger Picture: Approaches to Inter-organizational Data Protection Impact Assessment. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 283-293 - [c419]Kim Wuyts, Laurens Sion, Wouter Joosen:
LINDDUN GO: A Lightweight Approach to Privacy Threat Modeling. EuroS&P Workshops 2020: 302-309 - [c418]Laurens Sion, Dimitri Van Landuyt, Wouter Joosen:
The Never-Ending Story: On the Need for Continuous Privacy Impact Assessment. EuroS&P Workshops 2020: 314-317 - [c417]Giuseppe Garofalo, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
A Siamese Adversarial Anonymizer for Data Minimization in Biometric Applications. EuroS&P Workshops 2020: 334-343 - [c416]Koen Yskout, Thomas Heyman, Dimitri Van Landuyt, Laurens Sion, Kim Wuyts, Wouter Joosen:
Threat modeling: from infancy to maturity. ICSE (NIER) 2020: 9-12 - [c415]Laurens Sion, Koen Yskout, Dimitri Van Landuyt, Alexander van Den Berghe, Wouter Joosen:
Security Threat Modeling: Are Data Flow Diagrams Enough? ICSE (Workshops) 2020: 254-257 - [c414]Ashok Samraj Thangarajan, Fan Yang, Wouter Joosen, Danny Hughes:
Deterministic 40 year battery lifetime through a hybrid perpetual sensing platform (HyPer). IOT 2020: 11:1-11:8 - [c413]Eddy Truyen, Bert Lagaisse, Wouter Joosen, Arnout Hoebreckx, Cédric De Dycker:
Flexible Migration in Blue-Green Deployments within a Fixed Cost. WOC@Middleware 2020: 13-18 - [c412]Stefanos Peros, Emekcan Aras, Wouter Joosen, Danny Hughes:
Kairos: a self-configuring approach for short and accurate event timeouts in IoT. MobiQuitous 2020: 347-356 - [c411]Victor Le Pochat, Tim Van hamme, Sourena Maroofi, Tom van Goethem, Davy Preuveneers, Andrzej Duda, Wouter Joosen, Maciej Korczynski:
A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints. NDSS 2020 - [c410]Eddy Truyen, André Jacobs, Stef Verreydt, Emad Heydari Beni, Bert Lagaisse, Wouter Joosen:
Feasibility of container orchestration for adaptive performance isolation in multi-tenant SaaS applications. SAC 2020: 162-169 - [c409]Vincent Reniers, Yuan Gao, Ren Zhang, Paolo Viviani, Akash Madhusudan, Bert Lagaisse, Svetla Nikova, Dimitri Van Landuyt, Riccardo Lombardi, Bart Preneel, Wouter Joosen:
Authenticated and auditable data sharing via smart contract. SAC 2020: 324-331 - [c408]Dimitri Van Landuyt, Wouter Joosen:
A descriptive study of assumptions made in LINDDUN privacy threat elicitation. SAC 2020: 1280-1287 - [c407]Tom van Goethem, Christina Pöpper, Wouter Joosen, Mathy Vanhoef:
Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections. USENIX Security Symposium 2020: 1985-2002 - [i10]Eddy Truyen, Dimitri Van Landuyt, Davy Preuveneers, Bert Lagaisse, Wouter Joosen:
A Comprehensive Feature Comparison Study of Open-Source Container Orchestration Frameworks. CoRR abs/2002.02806 (2020) - [i9]Giuseppe Garofalo, Tim Van hamme, Davy Preuveneers, Wouter Joosen, Aysajan Abidin, Mustafa A. Mustafa:
Striking the Balance: Effective yet Privacy Friendly Contact Tracing. IACR Cryptol. ePrint Arch. 2020: 559 (2020)
2010 – 2019
- 2019
- [j77]Gertjan Franken, Tom van Goethem, Wouter Joosen:
Exposing Cookie Policy Flaws Through an Extensive Evaluation of Browsers and Their Extensions. IEEE Secur. Priv. 17(4): 25-34 (2019) - [j76]Vincent Reniers, Dimitri Van Landuyt, Ansar Rafique, Wouter Joosen:
Object to NoSQL Database Mappers (ONDM): A systematic survey and comparison of frameworks. Inf. Syst. 85: 1-20 (2019) - [j75]Ansar Rafique, Dimitri Van Landuyt, Eddy Truyen, Vincent Reniers, Wouter Joosen:
SCOPE: self-adaptive and policy-based data management middleware for federated clouds. J. Internet Serv. Appl. 10(1): 2:1-2:19 (2019) - [j74]Emad Heydari Beni, Bert Lagaisse, Wouter Joosen:
Infracomposer: Policy-driven adaptive and reflective middleware for the cloudification of simulation & optimization workflows. J. Syst. Archit. 95: 36-46 (2019) - [j73]Tim Van hamme, Giuseppe Garofalo, Enrique Argones-Rúa, Davy Preuveneers, Wouter Joosen:
A Systematic Comparison of Age and Gender Prediction on IMU Sensor-Based Gait Traces. Sensors 19(13): 2945 (2019) - [c406]Jan Spooren, Thomas Vissers, Peter Janssen, Wouter Joosen, Lieven Desmet:
Premadoma: an operational solution for DNS registries to prevent malicious domain registrations. ACSAC 2019: 557-567 - [c405]Tom van Goethem, Victor Le Pochat, Wouter Joosen:
Mobile Friendly or Attacker Friendly?: A Large-scale Security Evaluation of Mobile-first Websites. AsiaCCS 2019: 206-213 - [c404]Tom van Goethem, Najmeh Miramirkhani, Wouter Joosen, Nick Nikiforakis:
Purchased Fame: Exploring the Ecosystem of Private Blog Networks. AsiaCCS 2019: 366-378 - [c403]Dimitri Van Landuyt, Luuk Raaijmakers, Ansar Rafique, Wouter Joosen:
Continuous and Client-centric Trust Monitoring in Multi-cloud Storage. CLOSER 2019: 100-110 - [c402]Stefanos Peros, Stéphane Delbruel, Sam Michiels, Wouter Joosen, Danny Hughes:
Khronos: Middleware for Simplified Time Management in CPS. DEBS 2019: 127-138 - [c401]Davy Preuveneers, Wouter Joosen:
Edge-Based and Privacy-Preserving Multi-Modal Monitoring of Student Engagement in Online Learning Environments. EDGE 2019: 18-20 - [c400]Dimitri Van Landuyt, Laurens Sion, Emiel Vandeloo, Wouter Joosen:
On the Applicability of Security and Privacy Threat Modeling for Blockchain Applications. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 195-203 - [c399]Davy Preuveneers, Wouter Joosen:
Towards Multi-party Policy-based Access Control in Federations of Cloud and Edge Microservices. EuroS&P Workshops 2019: 29-38 - [c398]Ilias Tsingenopoulos, Davy Preuveneers, Wouter Joosen:
AutoAttacker: A reinforcement learning approach for black-box adversarial attacks. EuroS&P Workshops 2019: 229-237 - [c397]Kristof Jannes, Bert Lagaisse, Wouter Joosen:
The Web Browser as Distributed Application Server: Towards Decentralized Web Applications in the Edge. EdgeSys@EuroSys 2019: 7-11 - [c396]Fan Yang, Ashok Samraj Thangarajan, Wouter Joosen, Christophe Huygens, Danny Hughes, Gowri Sankar Ramachandran, Bhaskar Krishnamachari:
AsTAR: Sustainable Battery Free Energy Harvesting for Heterogeneous Platforms and Dynamic Environments. EWSN 2019: 71-82 - [c395]Emekcan Aras, Stéphane Delbruel, Fan Yang, Wouter Joosen, Danny Hughes:
A Low-Power Hardware Platform for Smart Environment as a Call for More Flexibility and Re-Usability. EWSN 2019: 194-205 - [c394]Davy Preuveneers, Wouter Joosen:
TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE. FPS 2019: 172-188 - [c393]Jan Spooren, Davy Preuveneers, Wouter Joosen:
PPG2Live: Using dual PPG for active authentication and liveness detection. ICB 2019: 1-6 - [c392]Laurens Sion, Pierre Dewitte, Dimitri Van Landuyt, Kim Wuyts, Ivo Emanuilov, Peggy Valcke, Wouter Joosen:
An Architectural View for Data Protection by Design. ICSA 2019: 11-20 - [c391]Majid Makki, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
Thread-Level CPU and Memory Usage Control of Custom Code in Multi-tenant SaaS. ICSOC 2019: 267-282 - [c390]Laurens Sion, Katja Tuma, Riccardo Scandariato, Koen Yskout, Wouter Joosen:
Towards Automated Security Design Flaw Detection. ASE Workshops 2019: 49-56 - [c389]Kristof Jannes, Bert Lagaisse, Wouter Joosen:
You Don't Need a Ledger: Lightweight Decentralized Consensus Between Mobile Web Clients. SERIAL@Middleware 2019: 3-8 - [c388]Matthijs Kaminski, Eddy Truyen, Emad Heydari Beni, Bert Lagaisse, Wouter Joosen:
A framework for black-box SLO tuning of multi-tenant applications in Kubernetes. WOC@Middleware 2019: 7-12 - [c387]Stef Verreydt, Emad Heydari Beni, Eddy Truyen, Bert Lagaisse, Wouter Joosen:
Leveraging Kubernetes for adaptive and cost-efficient resource management. WOC@Middleware 2019: 37-42 - [c386]Emad Heydari Beni, Bert Lagaisse, Wouter Joosen, Abdelrahaman Aly, Michael Brackx:
DataBlinder: A distributed data protection middleware supporting search and computation on encrypted data. Middleware Industry 2019: 50-57 - [c385]Victor Le Pochat, Tom van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczynski, Wouter Joosen:
Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. NDSS 2019 - [c384]Victor Le Pochat, Tom van Goethem, Wouter Joosen:
Funny Accents: Exploring Genuine Interest in Internationalized Domain Names. PAM 2019: 178-194 - [c383]Giuseppe Garofalo, Davy Preuveneers, Wouter Joosen:
Data Privatizer for Biometric Applications and Online Identity Management. Privacy and Identity Management 2019: 209-225 - [c382]Eddy Truyen, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
Performance overhead of container orchestration frameworks for management of multi-tenant database deployments. SAC 2019: 156-159 - [c381]Vincent Reniers, Dimitri Van Landuyt, Paolo Viviani, Bert Lagaisse, Riccardo Lombardi, Wouter Joosen:
Analysis of architectural variants for auditable blockchain-based private data sharing. SAC 2019: 346-354 - [c380]Pierre Dewitte, Kim Wuyts, Laurens Sion, Dimitri Van Landuyt, Ivo Emanuilov, Peggy Valcke, Wouter Joosen:
A comparison of system description models for data protection by design. SAC 2019: 1512-1515 - [c379]Jan Spooren, Davy Preuveneers, Lieven Desmet, Peter Janssen, Wouter Joosen:
Detection of algorithmically generated domain names used by botnets: a dual arms race. SAC 2019: 1916-1923 - [c378]Laurens Sion, Dimitri Van Landuyt, Kim Wuyts, Wouter Joosen:
Privacy Risk Assessment for Data Subject-Aware Threat Modeling. IEEE Symposium on Security and Privacy Workshops 2019: 64-71 - [c377]Kim Wuyts, Laurens Sion, Dimitri Van Landuyt, Wouter Joosen:
Knowledge is Power: Systematic Reuse of Privacy Knowledge for Threat Elicitation. IEEE Symposium on Security and Privacy Workshops 2019: 80-83 - [c376]Victor Le Pochat, Tom van Goethem, Wouter Joosen:
A Smörgåsbord of Typos: Exploring International Keyboard Layout Typosquatting. IEEE Symposium on Security and Privacy Workshops 2019: 187-192 - [c375]Thomas Vissers, Peter Janssen, Wouter Joosen, Lieven Desmet:
Assessing the Effectiveness of Domain Blacklisting Against Malicious DNS Registrations. IEEE Symposium on Security and Privacy Workshops 2019: 199-204 - [c374]Majid Makki, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
Journal first presentation of a comparative study of workflow customization strategies: quality implications for multi-tenant SaaS. SPLC (A) 2019: 7:1 - [c373]Oleksandr Tomashchuk, Dimitri Van Landuyt, Daniel Pletea, Kim Wuyts, Wouter Joosen:
A Data Utility-Driven Benchmark for De-identification Methods. TrustBus 2019: 63-77 - [c372]Gertjan Franken, Tom van Goethem, Wouter Joosen:
Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies. USENIX ATC 2019 - [c371]Victor Le Pochat, Tom van Goethem, Wouter Joosen:
Evaluating the Long-term Effects of Parameters on the Characteristics of the Tranco Top Sites Ranking. CSET @ USENIX Security Symposium 2019 - [c370]Absar-Ul-Haque Ahmar, Emekcan Aras, Wouter Joosen, Danny Hughes:
Towards More Scalable and Secure LPWAN Networks Using Cryptographic Frequency Hopping. Wireless Days 2019: 1-4 - 2018
- [j72]Wito Delnat, Thomas Heyman, Wouter Joosen, Davy Preuveneers, Ansar Rafique, Eddy Truyen, Dimitri Van Landuyt:
K8-Scalar: a workbench to compare autoscalers for container-orchestrated services (Artifact). Dagstuhl Artifacts Ser. 4(1): 03:1-03:6 (2018) - [j71]Davy Preuveneers, Wouter Joosen, Elisabeth Ilie Zudor:
Policy reconciliation for access control in dynamic cross-enterprise collaborations. Enterp. Inf. Syst. 12(3): 279-299 (2018) - [j70]Ansar Rafique, Dimitri Van Landuyt, Wouter Joosen:
PERSIST: Policy-Based Data Management Middleware for Multi-Tenant SaaS Leveraging Federated Cloud Storage. J. Grid Comput. 16(2): 165-194 (2018) - [j69]Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Managing distributed trust relationships for multi-modal authentication. J. Inf. Secur. Appl. 40: 258-270 (2018) - [j68]Majid Makki, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
A comparative study of workflow customization strategies: Quality implications for multi-tenant SaaS. J. Syst. Softw. 144: 423-438 (2018) - [j67]Hassaan Janjua, Wouter Joosen, Sam Michiels, Danny Hughes:
Trusted Operations on Sensor Data. Sensors 18(5): 1364 (2018) - [j66]Ansar Rafique, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
On the Performance Impact of Data Access Middleware for NoSQL Data Stores A Study of the Trade-Off between Performance and Migration Cost. IEEE Trans. Cloud Comput. 6(3): 843-856 (2018) - [c369]Eddy Truyen, Matt Bruzek, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
Evaluation of Container Orchestration Systems for Deploying and Managing NoSQL Database Clusters. IEEE CLOUD 2018: 468-475 - [c368]Tim Van hamme, Enrique Argones-Rúa, Davy Preuveneers, Wouter Joosen:
Gait template protection using HMM-UBM. BIOSIG 2018: 1-8 - [c367]Davy Preuveneers, Wouter Joosen, Elisabeth Ilie Zudor:
Robust Digital Twin Compositions for Industry 4.0 Smart Manufacturing Systems. EDOC Workshops 2018: 69-78 - [c366]Victor Le Pochat, Tom van Goethem, Wouter Joosen:
Idea: Visual Analytics for Web Security. ESSoS 2018: 124-132 - [c365]Laurens Sion, Kim Wuyts, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen:
Interaction-Based Privacy Threat Elicitation. EuroS&P Workshops 2018: 79-86 - [c364]Stefanos Peros, Hassaan Janjua, Sven Akkermans, Wouter Joosen, Danny Hughes:
Dynamic QoS support for IoT backhaul networks through SDN. FMEC 2018: 187-192 - [c363]Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Wouter Joosen:
SPARTA: Security & Privacy Architecture Through Risk-Driven Threat Assessment. ICSA Companion 2018: 89-92 - [c362]Laurens Sion, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen:
Risk-based design security analysis. SEAD@ICSE 2018: 11-18 - [c361]Wito Delnat, Eddy Truyen, Ansar Rafique, Dimitri Van Landuyt, Wouter Joosen:
K8-scalar: a workbench to compare autoscalers for container-orchestrated database clusters. SEAMS@ICSE 2018: 33-39 - [c360]Alexander van Den Berghe, Koen Yskout, Wouter Joosen:
Security patterns 2.0: towards security patterns based on security building blocks. SEAD@ICSE 2018: 45-48 - [c359]Laurens Sion, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen:
Knowledge-enriched security and privacy threat modeling. ICSE (Companion Volume) 2018: 290-291 - [c358]Dimitri Jonckers, Bert Lagaisse, Wouter Joosen:
Expect the unexpected: Towards a middleware for policy adaptation in IoT platforms. M4IoT@Middleware 2018: 7-10 - [c357]Ashok Samraj Thangarajan, Fan Yang, Wouter Joosen, Danny Hughes:
Real-time Distributed In-Situ Benchmarking of Energy Harvesting IoT Devices. M4IoT@Middleware 2018: 19-24 - [c356]Sven Akkermans, Bruno Crispo, Wouter Joosen, Danny Hughes:
Polyglot CerberOS: Resource Security, Interoperability and Multi-Tenancy for IoT Services on a Multilingual Platform. MobiQuitous 2018: 59-68 - [c355]Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom van Goethem, Wouter Joosen:
Automated Website Fingerprinting through Deep Learning. NDSS 2018 - [c354]Majid Makki, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen, Nick Hofstede:
Transparent IO access control for application-level tenant isolation. SAC 2018: 143-150 - [c353]Kim Wuyts, Dimitri Van Landuyt, Aram Hovsepyan, Wouter Joosen:
Effective and efficient privacy threat modeling through domain refinements. SAC 2018: 1175-1178 - [c352]Laurens Sion, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen:
Solution-aware data flow diagrams for security threat modeling. SAC 2018: 1425-1432 - [c351]Alexander van Den Berghe, Koen Yskout, Riccardo Scandariato, Wouter Joosen:
A Lingua Franca for Security by Design. SecDev 2018: 69-76 - [c350]Gertjan Franken, Tom van Goethem, Wouter Joosen:
Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies. USENIX Security Symposium 2018: 151-168 - [c349]Giuseppe Garofalo, Vera Rimmer, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Fishy Faces: Crafting Adversarial Images to Poison Face Authentication. WOOT @ USENIX Security Symposium 2018 - [c348]Sven Akkermans, Stefanos Peros, Nicolas J. Small, Wouter Joosen, Danny Hughes:
Supporting IoT Application Middleware on Edge and Cloud Infrastructures. ZEUS 2018: 40-46 - [i8]Tim Van hamme, Vera Rimmer, Davy Preuveneers, Wouter Joosen, Mustafa A. Mustafa, Aysajan Abidin, Enrique Argones-Rúa:
Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities. CoRR abs/1802.07233 (2018) - [i7]Victor Le Pochat, Tom van Goethem, Wouter Joosen:
Rigging Research Results by Manipulating Top Websites Rankings. CoRR abs/1806.01156 (2018) - 2017
- [j65]Davy Preuveneers, Wouter Joosen:
Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows. Future Internet 9(4): 58 (2017) - [j64]Davy Preuveneers, Wouter Joosen, Elisabeth Ilie Zudor:
Trustworthy data-driven networked production for customer-centric plants. Ind. Manag. Data Syst. 117(10): 2305-2324 (2017) - [j63]Vincent Reniers, Ansar Rafique, Dimitri Van Landuyt, Wouter Joosen:
Object-NoSQL Database Mappers: a benchmark study on the performance overhead. J. Internet Serv. Appl. 8(1): 1:1-1:16 (2017) - [j62]Davy Preuveneers, Wouter Joosen:
QoC2 Breaker: intelligent software circuit breakers for fault-tolerant distributed context-aware applications. J. Reliab. Intell. Environ. 3(1): 5-20 (2017) - [j61]Jan Spooren, Davy Preuveneers, Wouter Joosen:
Leveraging Battery Usage from Mobile Devices for Active Authentication. Mob. Inf. Syst. 2017: 1367064:1-1367064:14 (2017) - [j60]Alexander van Den Berghe, Riccardo Scandariato, Koen Yskout, Wouter Joosen:
Design notations for secure software: a systematic literature review. Softw. Syst. Model. 16(3): 809-831 (2017) - [c347]Vincent Reniers, Dimitri Van Landuyt, Ansar Rafique, Wouter Joosen:
Schema design support for semi-structured data: Finding the sweet spot between NF and De-NF. IEEE BigData 2017: 2921-2930 - [c346]Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczynski, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten:
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting. CCS 2017: 553-567 - [c345]Thomas Vissers, Timothy Barron, Tom van Goethem, Wouter Joosen, Nick Nikiforakis:
The Wolf of Name Street: Hijacking Domains Through Their Nameservers. CCS 2017: 957-970 - [c344]Gowri Sankar Ramachandran, Fan Yang, Piers W. Lawrence, Sam Michiels, Wouter Joosen, Danny Hughes:
μPnP-WAN: Experiences with LoRa and its deployment in DR Congo. COMSNETS 2017: 63-70 - [c343]Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Improving Resilience of Behaviometric Based Continuous Authentication with Multiple Accelerometers. DBSec 2017: 473-485 - [c342]Ping Chen, Jonas Visschers, Cedric Verstraete, Letizia Paoli, Christophe Huygens, Lieven Desmet, Wouter Joosen:
The relationship between the cost of cybercrime and web security posture: a case study on Belgian companies. ECSA (Companion) 2017: 115-120 - [c341]Majid Makki, Dimitri Van Landuyt, Wouter Joosen:
Towards PaaS Offering of BPMN 2.0 Engines: A Proposal for Service-Level Tenant Isolation. ESOCC Workshops 2017: 5-19 - [c340]Jasper Bogaerts, Bert Lagaisse, Wouter Joosen:
SEQUOIA: Scalable Policy-Based Access Control for Search Operations in Data-Driven Applications. ESSoS 2017: 1-18 - [c339]Emad Heydari Beni, Bert Lagaisse, Ren Zhang, Danny De Cock, Filipe Beato, Wouter Joosen:
A Voucher-Based Security Middleware for Secure Business Process Outsourcing. ESSoS 2017: 19-35 - [c338]Ansar Rafique, Dimitri Van Landuyt, Vincent Reniers, Wouter Joosen:
Towards an Adaptive Middleware for Efficient Multi-Cloud Data Storage. CCB@EuroSys 2017: 4:1-4:6 - [c337]Alexander van Den Berghe, Koen Yskout, Riccardo Scandariato, Wouter Joosen:
A Model for Provably Secure Software Design. FormaliSE@ICSE 2017: 3-9 - [c336]Koen Yskout, Dimitri Van Landuyt, Wouter Joosen:
Towards a Platform for Empirical Software Design Studies. ECASE@ICSE 2017: 3-7 - [c335]Dimitri Van Landuyt, Fatih Gey, Eddy Truyen, Wouter Joosen:
Middleware for Dynamic Upgrade Activation and Compensations in Multi-tenant SaaS. ICSOC 2017: 340-348 - [c334]Tim Van hamme, Davy Preuveneers, Wouter Joosen:
A dynamic decision fusion middleware for trustworthy context-aware IoT applications. M4IoT@Middleware 2017: 1-6 - [c333]Emad Heydari Beni, Bert Lagaisse, Wouter Joosen:
Adaptive and reflective middleware for the cloudification of simulation & optimization workflows. ARM@Middleware 2017: 2:1-2:6 - [c332]Dimitri Jonckers, Aram Hovsepyan, Bert Lagaisse, Wouter Joosen:
A shared multi-stakeholder platform for IoT: poster. Middleware Posters and Demos 2017: 5-6 - [c331]Wilfried Daniels, Danny Hughes, Mahmoud Ammar, Bruno Crispo, Nelson Matthys, Wouter Joosen:
SμV - the security microvisor: a virtualisation-based security middleware for the internet of things. Middleware Industry 2017: 36-42 - [c330]Emekcan Aras, Nicolas J. Small, Gowri Sankar Ramachandran, Stéphane Delbruel, Wouter Joosen, Danny Hughes:
Selective Jamming of LoRaWAN using Commodity Hardware. MobiQuitous 2017: 363-372 - [c329]Hassaan Janjua, Wouter Joosen, Sam Michiels, Danny Hughes:
Trusted Operations On Mobile Phones. MobiQuitous 2017: 452-459 - [c328]Nicolas J. Small, Sven Akkermans, Wouter Joosen, Danny Hughes:
Niflheim: An end-to-end middleware for applications on a multi-tier IoT infrastructure. NCA 2017: 209-216 - [c327]Laurens Sion, Koen Yskout, Riccardo Scandariato, Wouter Joosen:
A Modular Meta-model for Security Solutions. Programming 2017: 16:1-16:5 - [c326]Thomas Vissers, Jan Spooren, Pieter Agten, Dirk Jumpertz, Peter Janssen, Marc Van Wesemael, Frank Piessens, Wouter Joosen, Lieven Desmet:
Exploring the Ecosystem of Malicious Domain Registrations in the .eu TLD. RAID 2017: 472-493 - [c325]Davy Preuveneers, Bavo Goosens, Wouter Joosen:
Enhanced fraud detection as a service supporting merchant-specific runtime customization. SAC 2017: 72-76 - [c324]Ansar Rafique, Dimitri Van Landuyt, Vincent Reniers, Wouter Joosen:
Towards scalable and dynamic data encryption for multi-tenant SaaS. SAC 2017: 411-416 - [c323]Davy Preuveneers, Wouter Joosen, Elisabeth Ilie Zudor:
Identity management for cyber-physical production workflows and individualized manufacturing in industry 4.0. SAC 2017: 1452-1455 - [c322]Gabriele Vassallo, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Privacy-Preserving Behavioral Authentication on Smartphones. HumanSys@SenSys 2017: 1-6 - [c321]Sven Akkermans, Nicolas J. Small, Wouter Joosen, Danny Hughes:
Niflheim: End-to-End Middleware for Applications Across all Tiers of the IoT. SenSys 2017: 41:1-41:2 - [c320]Ansar Rafique, Dimitri Van Landuyt, Vincent Reniers, Wouter Joosen:
Leveraging NoSQL for Scalable and Dynamic Data Encryption in Multi-tenant SaaS. TrustCom/BigDataSE/ICESS 2017: 885-892 - [c319]Tom van Goethem, Wouter Joosen:
One Side-Channel to Bring Them All and in the Darkness Bind Them: Associating Isolated Browsing Sessions. WOOT 2017 - [c318]Vincent Reniers, Dimitri Van Landuyt, Ansar Rafique, Wouter Joosen:
On the State of NoSQL Benchmarks. ICPE Companion 2017: 107-112 - [p5]Davy Preuveneers, Arun Ramakrishnan, Tim Van hamme, Vera Rimmer, Yolande Berbers, Wouter Joosen:
A Survey on Applying Machine Learning Techniques for Behavioral Awareness. State of the Art in AI Applied to Ambient Intelligence 2017: 1-34 - [i6]Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom van Goethem, Wouter Joosen:
Automated Feature Extraction for Website Fingerprinting through Deep Learning. CoRR abs/1708.06376 (2017) - [i5]Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczynski, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten:
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting. CoRR abs/1708.06693 (2017) - [i4]Emekcan Aras, Nicolas J. Small, Gowri Sankar Ramachandran, Stéphane Delbruel, Wouter Joosen, Danny Hughes:
Selective Jamming of LoRaWAN using Commodity Hardware. CoRR abs/1712.02141 (2017) - 2016
- [j59]Davy Preuveneers, Yolande Berbers, Wouter Joosen:
SAMURAI: A batch and streaming context architecture for large-scale intelligent applications and environments. J. Ambient Intell. Smart Environ. 8(1): 63-78 (2016) - [j58]Davy Preuveneers, Wouter Joosen:
Security and privacy controls for streaming data in extended intelligent environments. J. Ambient Intell. Smart Environ. 8(4): 467-483 (2016) - [j57]Gowri Sankar Ramachandran, José Proença, Wilfried Daniels, Mario Pickavet, Dimitri Staessens, Christophe Huygens, Wouter Joosen, Danny Hughes:
Hitch Hiker 2.0: a binding model with flexible data aggregation for the Internet-of-Things. J. Internet Serv. Appl. 7(1): 4:1-4:15 (2016) - [j56]Davy Preuveneers, Wouter Joosen:
Semantic analysis and verification of context-driven adaptive applications in intelligent environments. J. Reliab. Intell. Environ. 2(2): 53-73 (2016) - [j55]Davy Preuveneers, Thomas Heyman, Yolande Berbers, Wouter Joosen:
Systematic scalability assessment for feature oriented multi-tenant services. J. Syst. Softw. 116: 162-176 (2016) - [j54]Christophe Huygens, Nelson Matthys, Wouter Joosen:
Optimizing resource and data security in shared sensor networks. Secur. Commun. Networks 9(2): 149-165 (2016) - [c317]Gowri Sankar Ramachandran, Nelson Matthys, Wilfried Daniels, Wouter Joosen, Danny Hughes:
Building Dynamic and Dependable Component-Based Internet-of-Things Applications with Dawn. CBSE 2016: 97-106 - [c316]Aram Hovsepyan, Riccardo Scandariato, Wouter Joosen:
Is Newer Always Better?: The Case of Vulnerability Prediction Models. ESEM 2016: 26:1-26:6 - [c315]Tom van Goethem, Wout Scheepers, Davy Preuveneers, Wouter Joosen:
Accelerometer-Based Device Fingerprinting for Multi-factor Mobile Authentication. ESSoS 2016: 106-121 - [c314]Jasper Bogaerts, Bert Lagaisse, Wouter Joosen:
Idea: Supporting Policy-Based Access Control on Database Systems. ESSoS 2016: 251-259 - [c313]Majid Makki, Dimitri Van Landuyt, Wouter Joosen:
Automated regression testing of BPMN 2.0 processes: a capture and replay framework for continuous delivery. GPCE 2016: 178-189 - [c312]Davy Preuveneers, Nayyab Zia Naqvi, Arun Ramakrishnan, Yolande Berbers, Wouter Joosen:
Adaptive Dissemination for Mobile Electronic Health Record Applications with Proactive Situational Awareness. HICSS 2016: 3229-3238 - [c311]Davy Preuveneers, Thomas Heyman, Yolande Berbers, Wouter Joosen:
Feature-Based Variability Management for Scalable Enterprise Applications: Experiences with an E-Payment Case. HICSS 2016: 5793-5802 - [c310]Sven Akkermans, Rafael Bachiller, Nelson Matthys, Wouter Joosen, Danny Hughes, Malisa Vucinic:
Towards efficient publish-subscribe middleware in the IoT with IPv6 multicast. ICC 2016: 1-6 - [c309]Fatih Gey, Dimitri Van Landuyt, Wouter Joosen:
Evolving multi-tenant SaaS applications through self-adaptive upgrade enactment and tenant mediation. SEAMS@ICSE 2016: 151-157 - [c308]Davy Preuveneers, Wouter Joosen, Elisabeth Ilie Zudor:
Data Protection Compliance Regulations and Implications for Smart Factories of the Future. Intelligent Environments 2016: 40-47 - [c307]Fan Yang, Gowri Sankar Ramachandran, Piers W. Lawrence, Sam Michiels, Wouter Joosen, Danny Hughes:
μPnP-WAN: Wide area plug and play sensing and actuation with LoRa. ISOCC 2016: 225-226 - [c306]Klaas Thoelen, Nicolas J. Small, Sam Michiels, Wouter Joosen, Danny Hughes:
Component-based Orchestration of Dynamic IaaS Applications. ARM@Middleware 2016: 2:1-2:6 - [c305]Eddy Truyen, Dimitri Van Landuyt, Vincent Reniers, Ansar Rafique, Bert Lagaisse, Wouter Joosen:
Towards a container-based architecture for multi-tenant SaaS applications. ARM@Middleware 2016: 6:1-6:6 - [c304]M. Zubair Rafique, Tom van Goethem, Wouter Joosen, Christophe Huygens, Nick Nikiforakis:
It's Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services. NDSS 2016 - [c303]Davy Preuveneers, Wouter Joosen:
Privacy-enabled remote health monitoring applications for resource constrained wearable devices. SAC 2016: 119-124 - [c302]Majid Makki, Dimitri Van Landuyt, Stefan Walraven, Wouter Joosen:
Scalable and manageable customization of workflows in multi-tenant SaaS offerings. SAC 2016: 432-439 - [c301]Ping Chen, Christophe Huygens, Lieven Desmet, Wouter Joosen:
Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware. SEC 2016: 323-336 - [c300]Nelson Matthys, Fan Yang, Wilfried Daniels, Wouter Joosen, Danny Hughes:
Demonstration of MicroPnP: The Zero-Configuration Wireless Sensing and Actuation Platform. SECON 2016: 1-2 - [c299]Majid Makki, Dimitri Van Landuyt, Wouter Joosen:
Automated workflow regression testing for multi-tenant SaaS: integrated support in self-service configuration dashboard. A-TEST@SIGSOFT FSE 2016: 70-73 - [c298]Laurens Sion, Dimitri Van Landuyt, Wouter Joosen, Gjalt de Jong:
Systematic quality trade-off support in the software product-line configuration process. SPLC 2016: 164-173 - [c297]Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Wouter Joosen:
Towards systematically addressing security variability in software product lines. SPLC 2016: 342-343 - [c296]Tom van Goethem, Mathy Vanhoef, Frank Piessens, Wouter Joosen:
Request and Conquer: Exposing Cross-Origin Resource Size. USENIX Security Symposium 2016: 447-462 - [c295]Ping Chen, Lieven Desmet, Christophe Huygens, Wouter Joosen:
Longitudinal Study of the Use of Client-side Security Mechanisms on the European Web. WWW (Companion Volume) 2016: 457-462 - 2015
- [j53]Jef Maerien, Sam Michiels, Danny Hughes, Christophe Huygens, Wouter Joosen:
SecLooCI: A comprehensive security middleware architecture for shared wireless sensor networks. Ad Hoc Networks 25: 141-169 (2015) - [j52]Philippe De Ryck, Nick Nikiforakis, Lieven Desmet, Frank Piessens, Wouter Joosen:
Protected Web Components: Hiding Sensitive Information in the Shadows. IT Prof. 17(1): 36-43 (2015) - [j51]Stefan Walraven, Dimitri Van Landuyt, Ansar Rafique, Bert Lagaisse, Wouter Joosen:
PaaSHopper: Policy-driven middleware for multi-PaaS environments. J. Internet Serv. Appl. 6(1): 2:1-2:14 (2015) - [j50]Riccardo Scandariato, Kim Wuyts, Wouter Joosen:
A descriptive study of Microsoft's threat modeling technique. Requir. Eng. 20(2): 163-180 (2015) - [c294]Maarten Decat, Bert Lagaisse, Wouter Joosen:
Scalable and Secure Concurrent Evaluation of History-based Access Control Policies. ACSAC 2015: 281-290 - [c293]Jasper Bogaerts, Maarten Decat, Bert Lagaisse, Wouter Joosen:
Entity-Based Access Control: supporting more expressive access control policies. ACSAC 2015: 291-300 - [c292]Ansar Rafique, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
Policy-Driven Data Management Middleware for Multi-cloud Storage in Multi-tenant SaaS. BDC 2015: 78-84 - [c291]Maarten Decat, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
On the Need for Federated Authorization in Cross-organizational e-Health Platforms. HEALTHINF 2015: 540-545 - [c290]Wilfried Daniels, José Proença, Dave Clarke, Wouter Joosen, Danny Hughes:
Refraction: Low-Cost Management of Reflective Meta-Data in Pervasive Component-Based Applications. CBSE 2015: 27-36 - [c289]Gowri Sankar Ramachandran, Wilfried Daniels, José Proença, Sam Michiels, Wouter Joosen, Danny Hughes, Barry Porter:
Hitch Hiker: A Remote Binding Model with Priority Based Data Aggregation for Wireless Sensor Networks. CBSE 2015: 43-48 - [c288]Tom van Goethem, Wouter Joosen, Nick Nikiforakis:
The Clock is Still Ticking: Timing Attacks in the Modern Web. CCS 2015: 1382-1393 - [c287]Thomas Vissers, Tom van Goethem, Wouter Joosen, Nick Nikiforakis:
Maneuvering Around Clouds: Bypassing Cloud-based Security Providers. CCS 2015: 1530-1541 - [c286]Steven Van Acker, Daniel Hausknecht, Wouter Joosen, Andrei Sabelfeld:
Password Meters and Generators on the Web: From Large-Scale Empirical Study to Getting It Right. CODASPY 2015: 253-262 - [c285]Maarten Decat, Jasper Moeys, Bert Lagaisse, Wouter Joosen:
Improving Reuse of Attribute-Based Access Control Policies Using Policy Templates. ESSoS 2015: 196-210 - [c284]Jan Spooren, Davy Preuveneers, Wouter Joosen:
Mobile device fingerprinting considered harmful for risk-based authentication. EUROSEC 2015: 6:1-6:6 - [c283]Fan Yang, Nelson Matthys, Rafael Bachiller, Sam Michiels, Wouter Joosen, Danny Hughes:
μPnP: plug and play peripherals for the internet of things. EuroSys 2015: 25:1-25:14 - [c282]Dimitri Van Landuyt, Wouter Joosen:
On the Role of Early Architectural Assumptions in Quality Attribute Scenarios: A Qualitative and Quantitative Study. TwinPeaks@ICSE 2015: 9-15 - [c281]Fatih Gey, Dimitri Van Landuyt, Wouter Joosen, Viviane Jonckers:
Continuous Evolution of Multi-tenant SaaS Applications: A Customizable Dynamic Adaptation Approach. PESOS@ICSE 2015: 10-16 - [c280]Laurens Sion, Koen Yskout, Alexander van Den Berghe, Riccardo Scandariato, Wouter Joosen:
MASC: Modelling Architectural Security Concerns. MiSE@ICSE 2015: 36-41 - [c279]Koen Yskout, Riccardo Scandariato, Wouter Joosen:
Do Security Patterns Really Help Designers? ICSE (1) 2015: 292-302 - [c278]Davy Preuveneers, Wouter Joosen:
Change Impact Analysis for Context-Aware Applications in Intelligent Environments. Intelligent Environments (Workshops) 2015: 70-81 - [c277]Davy Preuveneers, Wouter Joosen:
SparkXS: Efficient Access Control for Intelligent and Large-Scale Streaming Data Applications. Intelligent Environments 2015: 96-103 - [c276]Emad Heydari Beni, Bert Lagaisse, Wouter Joosen:
WF-Interop: Adaptive and Reflective REST Interfaces for Interoperability between Workflow Engines. ARM@Middleware 2015: 1:1-1:6 - [c275]Wilfried Daniels, Fan Yang, Nelson Matthys, Wouter Joosen, Danny Hughes:
Demo: Enabling Plug-and-Play for the Internet of Things. Middleware Posters and Demos 2015: 2:1-2:2 - [c274]Arnaud Schoonjans, Bert Lagaisse, Wouter Joosen:
Advanced monitoring and smart auto-scaling of NoSQL systems. Middleware Doctoral Symposium 2015: 3:1-3:4 - [c273]Arnaud Schoonjans, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
On the suitability of black-box performance monitoring for SLA-driven cloud provisioning scenarios. ARM@Middleware 2015: 6:1-6:6 - [c272]Wilfried Daniels, José Proença, Nelson Matthys, Wouter Joosen, Danny Hughes:
Tomography: lowering management overhead for distributed component-based applications. M4IoT@Middleware 2015: 13-18 - [c271]Gowri Sankar Ramachandran, Nelson Matthys, Sam Michiels, Wouter Joosen, Danny Hughes:
Dawn: Dependable Networking Framework for Multimedia-enabled Internet-of-Things. MoMM 2015: 211-215 - [c270]Rafael Bachiller, Nelson Matthys, Javier del Cid, Wouter Joosen, Danny Hughes, Kristof Van Laerhoven:
@migo: A Comprehensive Middleware Solution for Participatory Sensing Applications. NCA 2015: 1-8 - [c269]Klaas Thoelen, Wouter Joosen, Danny Hughes:
Putting Sense inside Sensor Systems: A Coordinated Approach to Messaging. NCA 2015: 22-26 - [c268]Pieter Agten, Wouter Joosen, Frank Piessens, Nick Nikiforakis:
Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse. NDSS 2015 - [c267]Thomas Vissers, Wouter Joosen, Nick Nikiforakis:
Parking Sensors: Analyzing and Detecting Parked Domains. NDSS 2015 - [c266]Maarten Decat, Jasper Bogaerts, Bert Lagaisse, Wouter Joosen:
Amusa: middleware for efficient access control management of multi-tenant SaaS applications. SAC 2015: 2141-2148 - [c265]Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen:
SecSess: keeping your session tucked away in your browser. SAC 2015: 2171-2176 - [c264]Davy Preuveneers, Wouter Joosen:
SmartAuth: dynamic context fingerprinting for continuous user authentication. SAC 2015: 2185-2191 - [c263]Dimitri Van Landuyt, Stefan Walraven, Wouter Joosen:
Variability middleware for multi-tenant SaaS applications: a research roadmap for service lines. SPLC 2015: 211-215 - [c262]Ansar Rafique, Dimitri Van Landuyt, Wouter Joosen:
Expressive Data Storage Policies for Multi-cloud Storage Configurations. SYNASC 2015: 329-336 - [c261]Fatih Gey, Dimitri Van Landuyt, Wouter Joosen:
Middleware for Customizable Multi-staged Dynamic Upgrades of Multi-tenant SaaS Applications. UCC 2015: 102-111 - [c260]Stefan Walraven, Wouter De Borger, Bart Van Brabant, Bert Lagaisse, Dimitri Van Landuyt, Wouter Joosen:
Adaptive Performance Isolation Middleware for Multi-tenant SaaS. UCC 2015: 112-121 - [c259]Nelson Matthys, Fan Yang, Wilfried Daniels, Sam Michiels, Wouter Joosen, Danny Hughes, Thomas Watteyne:
μPnP-Mesh: The plug-and-play mesh network for the Internet of Things. WF-IoT 2015: 311-315 - [c258]Nick Nikiforakis, Wouter Joosen, Benjamin Livshits:
PriVaricator: Deceiving Fingerprinters with Little White Lies. WWW 2015: 820-830 - [e6]Ivan Beschastnikh, Wouter Joosen:
Proceedings of the Doctoral Symposium of the 16th International Middleware Conference, Middleware Doct Symposium 2015, Vancouver, BC, Canada, December 7-11, 2015. ACM 2015, ISBN 978-1-4503-3728-1 [contents] - 2014
- [j49]Stefan Walraven, Eddy Truyen, Wouter Joosen:
Comparing PaaS offerings in light of SaaS development - A comparison of PaaS platforms based on a practical case study. Computing 96(8): 669-724 (2014) - [j48]Caren Crowley, Wilfried Daniels, Rafael Bachiller, Wouter Joosen, Danny Hughes:
Increasing user participation: An exploratory study of querying on the Facebook and Twitter platforms. First Monday 19(8) (2014) - [j47]Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna:
On the Workings and Current Practices of Web-Based Device Fingerprinting. IEEE Secur. Priv. 12(3): 28-36 (2014) - [j46]Aram Hovsepyan, Riccardo Scandariato, Maximilian Steff, Wouter Joosen:
Design Churn as Predictor of Vulnerabilities? Int. J. Secur. Softw. Eng. 5(3): 16-31 (2014) - [j45]Dries Geebelen, Kristof Geebelen, Eddy Truyen, Sam Michiels, Johan A. K. Suykens, Joos Vandewalle, Wouter Joosen:
QoS prediction for web service compositions using kernel-based quantile estimation with online adaptation of the constant offset. Inf. Sci. 268: 397-424 (2014) - [j44]Maarten Decat, Bert Lagaisse, Wouter Joosen:
Middleware for efficient and confidentiality-aware federation of access control policies. J. Internet Serv. Appl. 5(1): 1:1-1:15 (2014) - [j43]Hendrik Moens, Eddy Truyen, Stefan Walraven, Wouter Joosen, Bart Dhoedt, Filip De Turck:
Cost-Effective Feature Placement of Customizable Multi-Tenant Applications in the Cloud. J. Netw. Syst. Manag. 22(4): 517-558 (2014) - [j42]Stefan Walraven, Dimitri Van Landuyt, Eddy Truyen, Koen Handekyn, Wouter Joosen:
Efficient customization of multi-tenant Software-as-a-Service applications with service lines. J. Syst. Softw. 91: 48-62 (2014) - [j41]Kim Wuyts, Riccardo Scandariato, Wouter Joosen:
Empirical evaluation of a privacy-focused threat modeling methodology. J. Syst. Softw. 96: 122-138 (2014) - [j40]Marko van Dooren, Bart Jacobs, Wouter Joosen:
Modular type checking of anchored exception declarations. Sci. Comput. Program. 87: 44-61 (2014) - [j39]Koen Yskout, Riccardo Scandariato, Wouter Joosen:
Change patterns - Co-evolving requirements and architecture. Softw. Syst. Model. 13(2): 625-648 (2014) - [j38]Riccardo Scandariato, James Walden, Aram Hovsepyan, Wouter Joosen:
Predicting Vulnerable Software Components via Text Mining. IEEE Trans. Software Eng. 40(10): 993-1006 (2014) - [c257]M. Zubair Rafique, Juan Caballero, Christophe Huygens, Wouter Joosen:
Network dialog minimization and network dialog diffing: two novel primitives for network security applications. ACSAC 2014: 166-175 - [c256]Pedro Javier del Cid, Danny Hughes, Sam Michiels, Wouter Joosen:
Ensuring application integrity in shared sensing environments. CBSE 2014: 149-158 - [c255]Steven Van Acker, Nick Nikiforakis, Lieven Desmet, Frank Piessens, Wouter Joosen:
Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets. AsiaCCS 2014: 525-530 - [c254]Tom van Goethem, Frank Piessens, Wouter Joosen, Nick Nikiforakis:
Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals. CCS 2014: 918-929 - [c253]Dimitri Van Landuyt, Wouter Joosen:
Modularizing Early Architectural Assumptions in Scenario-Based Requirements. FASE 2014: 170-184 - [c252]Thomas Heyman, Davy Preuveneers, Wouter Joosen:
Scalar: Systematic Scalability Analysis with the Universal Scalability Law. FiCloud 2014: 497-504 - [c251]Thomas Heyman, Davy Preuveneers, Wouter Joosen:
Scalability Analysis of the OpenAM Access Control System with the Universal Scalability Law. FiCloud 2014: 505-512 - [c250]M. Zubair Rafique, Ping Chen, Christophe Huygens, Wouter Joosen:
Evolutionary algorithms for classification of malware families through different network behaviors. GECCO 2014: 1167-1174 - [c249]Danny Hughes, Caren Crowley, Wilfried Daniels, Rafael Bachiller, Wouter Joosen:
User-Rank: Generic Query Optimization for Participatory Social Applications. HICSS 2014: 1874-1883 - [c248]Ansar Rafique, Stefan Walraven, Bert Lagaisse, Tom Desair, Wouter Joosen:
Towards portability and interoperability support in middleware for hybrid clouds. INFOCOM Workshops 2014: 7-12 - [c247]Nick Nikiforakis, Marco Balduzzi, Lieven Desmet, Frank Piessens, Wouter Joosen:
Soundsquatting: Uncovering the Use of Homophones in Domain Squatting. ISC 2014: 291-308 - [c246]Bart Van Brabant, Wouter Joosen:
Configuration management as a multi-cloud enabler. CCB@Middleware 2014: 1:1-1:3 - [c245]Jef Maerien, Sam Michiels, Christophe Huygens, Danny Hughes, Wouter Joosen:
Enabling resource sharing in heterogeneous wireless sensor networks. M4IoT@Middleware 2014: 7-12 - [c244]Fatih Gey, Dimitri Van Landuyt, Stefan Walraven, Wouter Joosen:
Feature Models at Run Time: Feature Middleware for Multi-tenant SaaS applications. Models@run.time 2014: 21-30 - [c243]Aram Hovsepyan, Dimitri Van Landuyt, Steven Op de beeck, Sam Michiels, Wouter Joosen, Gustavo Rangel, Javier Fernandez Briones, Jan Depauw:
Model-Driven Software Development of Safety-Critical Avionics Systems: an Experience Report. MD2P2@MoDELS 2014: 28-37 - [c242]Pieter-Jan Maenhaut, Hendrik Moens, Maarten Decat, Jasper Bogaerts, Bert Lagaisse, Wouter Joosen, Veerle Ongenae, Filip De Turck:
Characterizing the performance of tenant data management in multi-tenant cloud authorization systems. NOMS 2014: 1-8 - [c241]Davy Preuveneers, Wouter Joosen:
Federated Privileged Identity Management for Break-the-Glass: A Case Study with OpenAM. PAHI 2014: 37-52 - [c240]Thomas Heyman, Davy Preuveneers, Wouter Joosen:
Scalar: A Distributed Scalability Analysis Framework. QEST 2014: 241-244 - [c239]Dimitri Van Landuyt, Steven Op de beeck, Aram Hovsepyan, Sam Michiels, Wouter Joosen, Sven Meynckens, Gjalt de Jong, Olivier Barais, Mathieu Acher:
Towards managing variability in the safety design of an automotive hall effect sensor. SPLC 2014: 304-309 - [c238]Tom van Goethem, Ping Chen, Nick Nikiforakis, Lieven Desmet, Wouter Joosen:
Large-Scale Security Analysis of the Web: Challenges and Findings. TRUST 2014: 110-126 - [c237]Nick Nikiforakis, Federico Maggi, Gianluca Stringhini, M. Zubair Rafique, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna, Stefano Zanero:
Stranger danger: exploring the ecosystem of ad-based URL shortening services. WWW 2014: 51-62 - [p4]Riccardo Scandariato, Federica Paci, Le Minh Sang Tran, Katsiaryna Labunets, Koen Yskout, Fabio Massacci, Wouter Joosen:
Empirical Assessment of Security Requirements and Architecture: Lessons Learned. Engineering Secure Future Internet Services and Systems 2014: 35-64 - [e5]Wouter Joosen, Fabio Martinelli, Thomas Heyman:
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), Munich, Germany, February 26, 2014. CEUR Workshop Proceedings 1298, CEUR-WS.org 2014 [contents] - [e4]Wouter Joosen, Luís Veiga:
Proceedings of the 11th Middleware Doctoral Symposium 2014, Bordeaux, France, December 8-9, 2014. ACM 2014, ISBN 978-1-4503-3221-7 [contents] - [e3]Maritta Heisel, Wouter Joosen, Javier López, Fabio Martinelli:
Engineering Secure Future Internet Services and Systems - Current Research. Lecture Notes in Computer Science 8431, Springer 2014, ISBN 978-3-319-07451-1 [contents] - [i3]Francesco Gadaleta, Nick Nikiforakis, Jan Tobias Mühlberg, Wouter Joosen:
HyperForce: Hypervisor-enForced Execution of Security-Critical Code. CoRR abs/1405.5648 (2014) - [i2]Francesco Gadaleta, Nick Nikiforakis, Yves Younan, Wouter Joosen:
Hello rootKitty: A lightweight invariance-enforcing framework. CoRR abs/1405.5651 (2014) - [i1]Francesco Gadaleta, Raoul Strackx, Nick Nikiforakis, Frank Piessens, Wouter Joosen:
On the effectiveness of virtualization-based security. CoRR abs/1405.6058 (2014) - 2013
- [j37]Koen Buyens, Riccardo Scandariato, Wouter Joosen:
Least privilege analysis in software architectures. Softw. Syst. Model. 12(2): 331-348 (2013) - [j36]Stefan Walraven, Bert Lagaisse, Eddy Truyen, Wouter Joosen:
Policy-driven customization of cross-organizational features in distributed service systems. Softw. Pract. Exp. 43(10): 1145-1163 (2013) - [j35]Steven Op de beeck, Marko van Dooren, Bert Lagaisse, Wouter Joosen:
Modularity and Variability of Distributed Software Architectures through Multi-view Refinement of AO-Connectors. LNCS Trans. Aspect Oriented Softw. Dev. 10: 109-147 (2013) - [c236]Philippe De Ryck, Nick Nikiforakis, Lieven Desmet, Wouter Joosen:
TabShots: client-side detection of tabnabbing attacks. AsiaCCS 2013: 447-456 - [c235]Nick Nikiforakis, Frank Piessens, Wouter Joosen:
HeapSentry: Kernel-Assisted Protection against Heap Overflows. DIMVA 2013: 177-196 - [c234]Davy Preuveneers, Yolande Berbers, Wouter Joosen:
The Future of Mobile E-health Application Development: Exploring HTML5 for Context-aware Diabetes Monitoring. EUSPN/ICTH 2013: 351-359 - [c233]Jef Maerien, Sam Michiels, Christophe Huygens, Danny Hughes, Wouter Joosen:
Access Control in Multi-party Wireless Sensor Networks. EWSN 2013: 34-49 - [c232]Bart Van Brabant, Wouter Joosen:
A framework for integrated configuration management tools. IM 2013: 534-540 - [c231]Pieter-Jan Maenhaut, Hendrik Moens, Marino Verheye, Piet Verhoeve, Stefan Walraven, Eddy Truyen, Wouter Joosen, Veerle Ongenae, Filip De Turck:
Migrating medical communications software to a multi-tenant cloud environment. IM 2013: 900-903 - [c230]Wilfried Daniels, Bart Van Brabant, Danny Hughes, Wouter Joosen:
Automated allocation and configuration of dual stack IP networks. IM 2013: 1148-1153 - [c229]Riccardo Scandariato, James Walden, Wouter Joosen:
Static analysis versus penetration testing: A controlled experiment. ISSRE 2013: 451-460 - [c228]Tom Desair, Wouter Joosen, Bert Lagaisse, Ansar Rafique, Stefan Walraven:
Policy-driven middleware for heterogeneous, hybrid cloud platforms. ARM@Middleware 2013: 2:1-2:6 - [c227]Maarten Decat, Bert Lagaisse, Wouter Joosen, Bruno Crispo:
Introducing concurrency in policy-based access control. MW4NextGen@Middleware 2013: 3:1-3:6 - [c226]Klaas Thoelen, Davy Preuveneers, Sam Michiels, Wouter Joosen, Danny Hughes:
Types in Their Prime: Sub-typing of Data in Resource Constrained Environments. MobiQuitous 2013: 250-261 - [c225]Wilfried Daniels, Pedro Javier del Cid Garcia, Wouter Joosen, Danny Hughes:
Safe Reparametrization of Component-Based WSNs. MobiQuitous 2013: 524-536 - [c224]Wilfried Daniels, Pedro Javier del Cid, Danny Hughes, Sam Michiels, Chris Blondia, Wouter Joosen:
Composition-Safe re-parametrization in Distributed Component-based WSN Applications. NCA 2013: 153-156 - [c223]Gowri Sankar Ramachandran, Sam Michiels, Wouter Joosen, Danny Hughes, Barry Porter:
Analysis of Sensor Network Operating System Performance Throughout the Software Life Cycle. NCA 2013: 211-218 - [c222]Pedro Javier del Cid, Nelson Matthys, Danny Hughes, Sam Michiels, Wouter Joosen:
ACS: Specifying "Smart" Applications Using Sense-Process-Consume Flows. NCA 2013: 251-254 - [c221]Maarten Decat, Bert Lagaisse, Dimitri Van Landuyt, Bruno Crispo, Wouter Joosen:
Federated Authorization for Software-as-a-Service Applications. OTM Conferences 2013: 342-359 - [c220]Fatih Gey, Stefan Walraven, Dimitri Van Landuyt, Wouter Joosen:
Building a Customizable Business-Process-as-a-Service Application with Current State-of-Practice. SC@STAF 2013: 113-127 - [c219]Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna:
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting. IEEE Symposium on Security and Privacy 2013: 541-555 - [c218]Danny Hughes, Eduardo Canete, Wilfried Daniels, Gowri Sankar Ramachandran, James Meneghello, Nelson Matthys, Jef Maerien, Sam Michiels, Christophe Huygens, Wouter Joosen, Maarten Wijnants, Wim Lamotte, Erik Hulsmans, Bart Lannoo, Ingrid Moerman:
Energy aware software evolution for Wireless Sensor Networks. WOWMOM 2013: 1-9 - [c217]Nick Nikiforakis, Steven Van Acker, Wannes Meert, Lieven Desmet, Frank Piessens, Wouter Joosen:
Bitsquatting: exploiting bit-flips for fun, or profit? WWW 2013: 989-998 - 2012
- [j34]Pedro Javier del Cid, Danny Hughes, Sam Michiels, Wouter Joosen:
Applying a metadata level for concurrency in wireless sensor networks. Concurr. Comput. Pract. Exp. 24(16): 1953-1962 (2012) - [j33]Yves Younan, Wouter Joosen, Frank Piessens:
Runtime countermeasures for code injection attacks against C and C++ programs. ACM Comput. Surv. 44(3): 17:1-17:28 (2012) - [j32]Bernard Spitz, Riccardo Scandariato, Wouter Joosen:
Extraction of an Architectural Model for Least Privilege Analysis. Int. J. Secur. Softw. Eng. 3(4): 27-44 (2012) - [j31]Wouter Joosen, Bert Lagaisse, Eddy Truyen, Koen Handekyn:
Towards application driven security dashboards in future middleware. J. Internet Serv. Appl. 3(1): 107-115 (2012) - [j30]Klaas Thoelen, Danny Hughes, Nelson Matthys, Lei Fang, Simon Dobson, Yizhou Qiang, Wei Bai, Ka Lok Man, Sheng-Uei Guan, Davy Preuveneers, Sam Michiels, Christophe Huygens, Wouter Joosen:
A reconfigurable component model with semantic type system for dynamic WSN applications. J. Internet Serv. Appl. 3(3): 277-290 (2012) - [j29]Dimitri Van Landuyt, Steven Op de beeck, Eddy Truyen, Wouter Joosen:
Domain-Driven Discovery of Stable Abstractions for Pointcut Interfaces. LNCS Trans. Aspect Oriented Softw. Dev. 9: 1-52 (2012) - [c216]Dimitri Van Landuyt, Eddy Truyen, Wouter Joosen:
On the modularity impact of architectural assumptions. NEMARA@AOSD 2012: 13-16 - [c215]Wouter De Borger, Bert Lagaisse, Wouter Joosen:
A domain specific aspect language for run-time inspection. DSAL@AOSD 2012: 33-36 - [c214]Marko van Dooren, Eric Steegmans, Wouter Joosen:
An object-oriented framework for aspect-oriented languages. AOSD 2012: 215-226 - [c213]Steven Op de beeck, Marko van Dooren, Bert Lagaisse, Wouter Joosen:
Multi-view refinement of AO-connectors in distributed software systems. AOSD 2012: 251-262 - [c212]Steven Van Acker, Nick Nikiforakis, Lieven Desmet, Wouter Joosen, Frank Piessens:
FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications. AsiaCCS 2012: 12-13 - [c211]Nick Nikiforakis, Luca Invernizzi, Alexandros Kapravelos, Steven Van Acker, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna:
You are what you include: large-scale evaluation of remote javascript inclusions. CCS 2012: 736-747 - [c210]Hendrik Moens, Eddy Truyen, Stefan Walraven, Wouter Joosen, Bart Dhoedt, Filip De Turck:
Network-aware impact determination algorithms for service workflow deployment in hybrid clouds. CNSM 2012: 28-36 - [c209]Rafael Bachiller, Danny Hughes, Sam Michiels, Wouter Joosen:
Enabling Massive Scale Sensing with the @LooCI Mobile Sensing Framework. CSE 2012: 461-468 - [c208]Philippe De Ryck, Nick Nikiforakis, Lieven Desmet, Frank Piessens, Wouter Joosen:
Serene: Self-Reliant Client-Side Protection against Session Fixation. DAIS 2012: 59-72 - [c207]Jef Maerien, Pieter Agten, Christophe Huygens, Wouter Joosen:
FAMoS: A Flexible Active Monitoring Service for Wireless Sensor Networks. DAIS 2012: 104-117 - [c206]Caren Crowley, Sam Michiels, Wouter Joosen:
Show me the money The importance of network effects for mobile application business models. ICIN 2012: 164-170 - [c205]Koen Yskout, Riccardo Scandariato, Wouter Joosen:
Does organizing security patterns focus architectural choices? ICSE 2012: 617-627 - [c204]Alexander van Den Berghe, Jan Van Haaren, Stefan Van Baelen, Yolande Berbers, Wouter Joosen:
Towards an Automated Pattern Selection Procedure in Software Models. ILP (Late Breaking Papers) 2012: 68-73 - [c203]Rafael Bachiller, Danny Hughes, Sam Michiels, Wouter Joosen:
Users as reconfigurable elements in distributed sensing applications. MidSens 2012: 4 - [c202]Maarten Decat, Bert Lagaisse, Wouter Joosen:
Toward efficient and confidentiality-aware federation of access control policies. MW4NG@Middleware 2012: 4:1-4:6 - [c201]Stefan Walraven, Tanguy Monheim, Eddy Truyen, Wouter Joosen:
Towards performance isolation in multi-tenant SaaS applications. MW4NG@Middleware 2012: 6:1-6:6 - [c200]Danny Hughes, Klaas Thoelen, Jef Maerien, Nelson Matthys, Wouter Horré, Javier del Cid, Christophe Huygens, Sam Michiels, Wouter Joosen:
LooCI: The Loosely-coupled Component Infrastructure. NCA 2012: 236-243 - [c199]Syed Rehan Afzal, Christophe Huygens, Wouter Joosen:
DiFiSec: An Adaptable Multi-level Security Framework for Event-Driven Communication in Wireless Sensor Networks. NCA 2012: 263-271 - [c198]Klaas Thoelen, Danny Hughes, Sam Michiels, Wouter Joosen:
StIgMa: Status information management for evolvable wireless sensor networks. NESEA 2012: 1-7 - [c197]Hendrik Moens, Eddy Truyen, Stefan Walraven, Wouter Joosen, Bart Dhoedt, Filip De Turck:
Feature placement algorithms for high-variability applications in cloud environments. NOMS 2012: 17-24 - [c196]Hendrik Moens, Eddy Truyen, Stefan Walraven, Wouter Joosen, Bart Dhoedt, Filip De Turck:
Developing and managing customizable Software as a Service using feature model conversion. NOMS 2012: 1295-1302 - [c195]Nick Nikiforakis, Steven Van Acker, Frank Piessens, Wouter Joosen:
Exploring the Ecosystem of Referrer-Anonymizing Services. Privacy Enhancing Technologies 2012: 259-278 - [c194]Nelson Matthys, Christophe Huygens, Danny Hughes, Sam Michiels, Wouter Joosen:
A Component and Policy-Based Approach for Efficient Sensor Network Reconfiguration. POLICY 2012: 53-60 - [c193]Eddy Truyen, Nicolás Cardozo, Stefan Walraven, Jorge Vallejos, Engineer Bainomugisha, Sebastian Günther, Theo D'Hondt, Wouter Joosen:
Context-oriented programming for customizable SaaS applications. SAC 2012: 418-425 - [c192]Francesco Gadaleta, Nick Nikiforakis, Jan Tobias Mühlberg, Wouter Joosen:
HyperForce: Hypervisor-enForced Execution of Security-Critical Code. SEC 2012: 126-137 - [c191]Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen:
A Security Analysis of Emerging Web Standards - HTML5 and Friends, from Specification to Implementation. SECRYPT 2012: 257-262 - [c190]Thomas Heyman, Riccardo Scandariato, Wouter Joosen:
Reusable Formal Models for Secure Software Architectures. WICSA/ECSA 2012: 41-50 - [c189]Dimitri Van Landuyt, Eddy Truyen, Wouter Joosen:
Documenting Early Architectural Assumptions in Scenario-Based Requirements. WICSA/ECSA 2012: 329-333 - [p3]Wouter De Borger, Bert Lagaisse, Wouter Joosen:
Traceability Between Run-Time and Development Time Abstractions - A Case Study on AOSD and Debugging. Software and Systems Traceability 2012: 277-298 - 2011
- [j28]Kim Wuyts, Riccardo Scandariato, Griet Verhenneman, Wouter Joosen:
Integrating Patient Consent in e-Health Access Control. Int. J. Secur. Softw. Eng. 2(2): 1-24 (2011) - [j27]Danny Hughes, Jo Ueyama, Eduardo M. Mendiondo, Nelson Matthys, Wouter Horré, Sam Michiels, Christophe Huygens, Wouter Joosen, Ka Lok Man, Sheng-Uei Guan:
A middleware platform to support river monitoring using wireless sensor networks. J. Braz. Comput. Soc. 17(2): 85-102 (2011) - [j26]Wouter Horré, Sam Michiels, Wouter Joosen, Danny Hughes:
Advanced Sensor Network Software Deployment using Application-level Quality Goals. J. Softw. 6(4): 528-535 (2011) - [j25]Mina Deng, Kim Wuyts, Riccardo Scandariato, Bart Preneel, Wouter Joosen:
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir. Eng. 16(1): 3-32 (2011) - [j24]Maarten Bynens, Eddy Truyen, Wouter Joosen:
A System of Patterns for Reusable Aspect Libraries. LNCS Trans. Aspect Oriented Softw. Dev. 8: 46-107 (2011) - [j23]Yves Younan, Pieter Philippaerts, Frank Piessens, Wouter Joosen, Sven Lachmund, Thomas Walter:
Filter-resistant code injection on ARM. J. Comput. Virol. 7(3): 173-188 (2011) - [c188]John Wilander, Nick Nikiforakis, Yves Younan, Mariam Kamkar, Wouter Joosen:
RIPE: runtime intrusion prevention evaluator. ACSAC 2011: 41-50 - [c187]Steven Van Acker, Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen:
WebJail: least-privilege integration of third-party components in web mashups. ACSAC 2011: 307-316 - [c186]Bart Van Brabant, Wouter Joosen:
Integrated management of network and security devices in IT infrastructures. CNSM 2011: 1-5 - [c185]Klaas Thoelen, Sam Michiels, Wouter Joosen:
On-demand attribute-based service discovery for mobile WSANs. COMSWARE 2011: 7 - [c184]Aram Hovsepyan, Riccardo Scandariato, Stefan Van Baelen, Wouter Joosen, Serge Demeyer:
Preserving Aspects via Automation: A Maintainability Study. ESEM 2011: 315-324 - [c183]Philippe De Ryck, Lieven Desmet, Wouter Joosen, Frank Piessens:
Automatic and Precise Client-Side Protection against CSRF Attacks. ESORICS 2011: 100-116 - [c182]Nick Nikiforakis, Wannes Meert, Yves Younan, Martin Johns, Wouter Joosen:
SessionShield: Lightweight Protection against Session Hijacking. ESSoS 2011: 87-100 - [c181]Philippe De Ryck, Lieven Desmet, Wouter Joosen:
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications. ESSoS 2011: 114-127 - [c180]Tom Goovaerts, Lieven Desmet, Wouter Joosen:
Scalable Authorization Middleware for Service Oriented Architectures. ESSoS 2011: 221-233 - [c179]Nick Nikiforakis, Wouter Joosen, Martin Johns:
Abusing locality in shared web hosting. EUROSEC 2011: 2 - [c178]Wouter Joosen, Javier López, Fabio Martinelli, Fabio Massacci:
Engineering Secure Future Internet Services. Future Internet Assembly 2011: 177-192 - [c177]Isabelle Perseil, Laurent Pautet, Jean-François Rolland, Mamoun Filali, Didier Delanote, Stefan Van Baelen, Wouter Joosen, Yolande Berbers, Frédéric Mallet, Dominique Bertrand, Sébastien Faucou, Abdelhafid Zitouni, Mahmoud Boufaïda, Lionel Seinturier, Joël Champeau, Thomas Abdoul, Peter H. Feiler, Chokri Mraidha, Sébastien Gérard:
An Efficient Modeling and Execution Framework for Complex Systems Development. ICECCS 2011: 317-331 - [c176]Koen Buyens, Riccardo Scandariato, Wouter Joosen:
Composition of least privilege analysis results in software architectures (position paper). SESS@ICSE 2011: 29-35 - [c175]Francesco Gadaleta, Nick Nikiforakis, Yves Younan, Wouter Joosen:
Hello rootKitty: A Lightweight Invariance-Enforcing Framework. ISC 2011: 213-228 - [c174]Pedro Javier del Cid, Nelson Matthys, Christophe Huygens, Sam Michiels, Wouter Joosen, Danny Hughes:
Sensor Middleware to Support Diverse Data Qualities. ITNG 2011: 673-676 - [c173]Christophe Huygens, Nelson Matthys, Jef Maerien, Wouter Joosen, Danny Hughes:
Building blocks for secure multiparty federated wireless sensor networks. IWCMC 2011: 2021-2027 - [c172]Nick Nikiforakis, Marco Balduzzi, Steven Van Acker, Wouter Joosen, Davide Balzarotti:
Exposing the Lack of Privacy in File Hosting Services. LEET 2011 - [c171]Bart Van Brabant, Joris Peeraer, Wouter Joosen:
Fine-grained Access-control for the Puppet Configuration Language. LISA 2011 - [c170]Jef Maerien, Sam Michiels, Christophe Huygens, Wouter Joosen:
SASHA: A Distributed Protocol for Secure Application Deployment in Shared Ad-Hoc Wireless Sensor Networks. MASS 2011: 43-48 - [c169]Wouter De Borger, Bert Lagaisse, Wouter Joosen:
Inspection of distributed and composed systems. Middleware Doctoral Symposium 2011: 1:1-1:3 - [c168]Nelson Matthys, Sam Michiels, Wouter Joosen, Christophe Scholliers, Coen De Roover, Wouter Amerijckx, Theo D'Hondt:
Language and middleware support for dynamism in wireless sensor and actuator network applications. MidSens 2011: 2 - [c167]Gabriela Gheorghe, Bruno Crispo, Roberto Carbone, Lieven Desmet, Wouter Joosen:
Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement. Middleware 2011: 350-369 - [c166]Stefan Walraven, Eddy Truyen, Wouter Joosen:
A Middleware Layer for Flexible and Cost-Efficient Multi-tenant Applications. Middleware 2011: 370-389 - [c165]Wouter De Borger, Bert Lagaisse, Wouter Joosen:
A Generic Solution for Agile Run-Time Inspection Middleware. Middleware 2011: 451-470 - [c164]Maarten Bynens, Eddy Truyen, Wouter Joosen:
A Sequence of Patterns for Reusable Aspect Libraries with Easy Configuration. SC@TOOLS 2011: 68-83 - [e2]Shmuel Katz, Mira Mezini, Christa Schwanninger, Wouter Joosen:
Transactions on Aspect-Oriented Software Development VIII. Lecture Notes in Computer Science 6580, Springer 2011, ISBN 978-3-642-22030-2 [contents] - 2010
- [j22]Awais Rashid, Thomas Cottenier, Phil Greenwood, Ruzanna Chitchyan, Regine Meunier, Roberta Coelho, Mario Südholt, Wouter Joosen:
Aspect-Oriented Software Development in Practice: Tales from AOSD-Europe. Computer 43(2): 19-26 (2010) - [j21]Daniel Hughes, Klaas Thoelen, Wouter Horré, Nelson Matthys, Javier del Cid, Sam Michiels, Christophe Huygens, Wouter Joosen, Jo Ueyama:
Building Wireless Sensor Network Applications with LooCI. Int. J. Mob. Comput. Multim. Commun. 2(4): 38-64 (2010) - [j20]Yves Younan, Wouter Joosen, Frank Piessens, Hans Van den Eynden:
Improving Memory Management Security for C and C++. Int. J. Secur. Softw. Eng. 1(2): 57-82 (2010) - [j19]Christophe Huygens, Danny Hughes, Bert Lagaisse, Wouter Joosen:
Streamlining Development for Networked Embedded Systems Using Multiple Paradigms. IEEE Softw. 27(5): 45-52 (2010) - [j18]Danny Weyns, Robrecht Haesevoets, Alexander Helleboogh, Tom Holvoet, Wouter Joosen:
The MACODO middleware for context-driven dynamic agent organizations. ACM Trans. Auton. Adapt. Syst. 5(1): 3:1-3:28 (2010) - [j17]Dimitri Van Landuyt, Eddy Truyen, Wouter Joosen:
Discovery of Stable Abstractions for Aspect-Oriented Composition in the Car Crash Management Domain. LNCS Trans. Aspect Oriented Softw. Dev. 7: 375-422 (2010) - [c163]Aram Hovsepyan, Riccardo Scandariato, Stefan Van Baelen, Yolande Berbers, Wouter Joosen:
From aspect-oriented models to aspect-oriented code?: the maintenance perspective. AOSD 2010: 85-96 - [c162]Wouter De Borger, Bart De Win, Bert Lagaisse, Wouter Joosen:
A permission system for secure AOP. AOSD 2010: 205-216 - [c161]Robrecht Haesevoets, Danny Weyns, Mário Henrique Cruz Torres, Alexander Helleboogh, Tom Holvoet, Wouter Joosen:
A Middleware Model in Alloy for Supply Chain-Wide Agent Interactions. AOSE 2010: 189-204 - [c160]Yves Younan, Pieter Philippaerts, Lorenzo Cavallaro, R. Sekar, Frank Piessens, Wouter Joosen:
PAriCheck: an efficient pointer arithmetic checker for C programs. AsiaCCS 2010: 145-156 - [c159]Thomas Heyman, Riccardo Scandariato, Wouter Joosen:
Security in Context: Analysis and Refinement of Software Architectures. COMPSAC 2010: 161-170 - [c158]Stefan Walraven, Bert Lagaisse, Eddy Truyen, Wouter Joosen:
Dynamic Composition of Cross-Organizational Features in Distributed Software Systems. DAIS 2010: 183-197 - [c157]Nick Nikiforakis, Yves Younan, Wouter Joosen:
HProxy: Client-Side Detection of SSL Stripping Attacks. DIMVA 2010: 200-218 - [c156]Riccardo Scandariato, Koen Buyens, Wouter Joosen:
Automated Detection of Least Privilege Violations in Software Architectures. ECSA 2010: 150-165 - [c155]Francesco Gadaleta, Yves Younan, Wouter Joosen:
BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks. ESSoS 2010: 1-17 - [c154]Philippe De Ryck, Lieven Desmet, Thomas Heyman, Frank Piessens, Wouter Joosen:
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests. ESSoS 2010: 18-34 - [c153]Kristof Geebelen, Eryk Kulikowski, Eddy Truyen, Wouter Joosen:
A MVC Framework for Policy-Based Adaptation of Workflow Processes: A Case Study on Confidentiality. ICWS 2010: 401-408 - [c152]Wouter Horré, Sam Michiels, Wouter Joosen, Danny Hughes:
QARI: Quality Aware Software Deployment for Wireless Sensor Networks. ITNG 2010: 642-647 - [c151]Thomas Delaet, Wouter Joosen, Bart Van Brabant:
A Survey of System Configuration Tools. LISA 2010 - [c150]Klaas Thoelen, Nelson Matthys, Wouter Horré, Christophe Huygens, Wouter Joosen, Danny Hughes, Lei Fang, Sheng-Uei Guan:
Supporting reconfiguration and re-use through self-describing component interfaces. MidSens 2010: 29-34 - [c149]Christophe Huygens, Nelson Matthys, Wouter Joosen:
Optimized Resource Access Control in Shared Sensor Networks. MobiSec 2010: 105-116 - [c148]Javier del Cid, Sam Michiels, Wouter Joosen, Danny Hughes:
Middleware for resource sharing in multi-purpose Wireless Sensor Networks. NESEA 2010: 1-8 - [c147]Kevin Lee, David Murray, Danny Hughes, Wouter Joosen:
Extending sensor networks into the Cloud using Amazon Web Services. NESEA 2010: 1-7 - [c146]Philippe De Ryck, Maarten Decat, Lieven Desmet, Frank Piessens, Wouter Joosen:
Security of Web Mashups: A Survey. NordSec 2010: 223-238 - [c145]Nelson Matthys, Syed Rehan Afzal, Christophe Huygens, Sam Michiels, Wouter Joosen, Danny Hughes:
Towards fine-grained and application-centric access control for wireless sensor networks. SAC 2010: 793-794 - [c144]Bart Van Brabant, Thomas Delaet, Wouter Joosen:
Authorizing and directing configuration updates in contemporary it infrastructures. SafeConfig 2010: 79-82 - [c143]Pedro Javier del Cid, Nelson Matthys, Danny Hughes, Sam Michiels, Wouter Joosen:
Resource Management Middleware to Support Self Managing Wireless Sensor Networks. SASO Workshops 2010: 251-255 - [c142]Nelson Matthys, Christophe Huygens, Danny Hughes, Jo Ueyama, Sam Michiels, Wouter Joosen:
Policy-Driven Tailoring of Sensor Networks. S-CUBE 2010: 20-35 - [c141]Klaas Thoelen, Sam Michiels, Wouter Joosen:
Middleware for Adaptive Group Communication in Wireless Sensor Networks. S-CUBE 2010: 59-74 - [c140]Pedro Javier del Cid, Daniel Hughes, Sam Michiels, Wouter Joosen:
Expressing and Configuring Quality of Data in Multi-purpose Wireless Sensor Networks. S-CUBE 2010: 91-106 - [c139]Jef Maerien, Sam Michiels, Stefan Van Baelen, Christophe Huygens, Wouter Joosen:
A Secure Multi-Application Platform for Vehicle Telematics. VTC Fall 2010: 1-5 - [c138]Jef Maerien, Sam Michiels, Christophe Huygens, Wouter Joosen:
MASY: MAnagement of Secret keYs for federated mobile wireless sensor networks. WiMob 2010: 121-128
2000 – 2009
- 2009
- [j16]Bart De Win, Riccardo Scandariato, Koen Buyens, Johan Grégoire, Wouter Joosen:
On the secure software development process: CLASP, SDL and Touchpoints compared. Inf. Softw. Technol. 51(7): 1152-1171 (2009) - [c137]Koen Buyens, Bart De Win, Wouter Joosen:
Identifying and Resolving Least Privilege Violations in Software Architectures. ARES 2009: 232-239 - [c136]Thomas Heyman, Riccardo Scandariato, Wouter Joosen:
Risk-Driven Architectural Decomposition. ARES 2009: 363-368 - [c135]Yves Younan, Frank Piessens, Wouter Joosen:
Protecting Global and Static Variables from Buffer Overflow Attacks. ARES 2009: 798-803 - [c134]Kim Wuyts, Riccardo Scandariato, Bart De Decker, Wouter Joosen:
Linking Privacy Solutions to Developer Goals. ARES 2009: 847-852 - [c133]Maarten Bynens, Wouter Joosen:
Towards a pattern language for aspect-based design. PLATE@AOSD 2009: 13-15 - [c132]Dimitri Van Landuyt, Steven Op de beeck, Eddy Truyen, Wouter Joosen:
Domain-driven discovery of stable abstractions for pointcut interfaces. AOSD 2009: 75-86 - [c131]Wouter De Borger, Bert Lagaisse, Wouter Joosen:
A generic and reflective debugging architecture to support runtime visibility and traceability of aspects. AOSD 2009: 173-184 - [c130]Klaas Thoelen, Sam Michiels, Wouter Joosen, Koen Vangheluwe, Katja Verbeeck:
A sensor middleware and agent-based communication platform for supply-chain management. AAMAS (2) 2009: 1409-1410 - [c129]Wim Maes, Thomas Heyman, Lieven Desmet, Wouter Joosen:
Browser protection against cross-site request forgery. SecuCode@CCS 2009: 3-10 - [c128]Yves Younan, Pieter Philippaerts, Frank Piessens, Wouter Joosen, Sven Lachmund, Thomas Walter:
Filter-resistant code injection on ARM. CCS 2009: 11-20 - [c127]Koen Buyens, Riccardo Scandariato, Wouter Joosen:
Measuring the interplay of security principles in software architectures. ESEM 2009: 554-563 - [c126]Francesco Gadaleta, Yves Younan, Bart Jacobs, Wouter Joosen, Erik De Neve, Nils Beosier:
Instruction-level countermeasures against stack-based buffer overflow attacks. VDTS@EuroSys 2009: 7-12 - [c125]Lieven Desmet, Wouter Joosen, Fabio Massacci, Katsiaryna Naliuka, Pieter Philippaerts, Frank Piessens, Ida Sri Rejeki Siahaan, Dries Vanoverberghe:
A Security Architecture for Web 2.0 Applications. Future Internet Assembly 2009: 35-46 - [c124]Frans Sanen, Eddy Truyen, Wouter Joosen:
Problem-Solution Feature Interactions as Configuration Knowledge in Distributed Runtime Adaptations. ICFI 2009: 166-175 - [c123]Frans Sanen, Eddy Truyen, Wouter Joosen:
Mapping problem-space to solution-space features: a feature interaction approach. GPCE 2009: 167-176 - [c122]Dimitri Van Landuyt, Eddy Truyen, Wouter Joosen:
Automating the discovery of stable domain abstractions for reusable aspects. EA@ICSE 2009: 1-7 - [c121]Koen Buyens, Bart De Win, Wouter Joosen:
Resolving least privilege violations in software architectures. SESS@ICSE 2009: 9-16 - [c120]Robrecht Haesevoets, Danny Weyns, Tom Holvoet, Wouter Joosen:
A formal model for self-adaptive and self-healing organizations. SEAMS 2009: 116-125 - [c119]Syed Rehan Afzal, Christophe Huygens, Wouter Joosen:
Extending middleware frameworks for Wireless Sensor Networks. ICUMT 2009: 1-7 - [c118]Christophe Huygens, Wouter Joosen:
Federated and Shared Use of Sensor Networks through Security Middleware. ITNG 2009: 1005-1011 - [c117]Thomas Delaet, Wouter Joosen:
Managing your content with CIMPLE - a content-centric storage interface. LCN 2009: 491-498 - [c116]Bart Van Brabant, Thomas Delaet, Wouter Joosen:
Federated Access Control and Workflow Enforcement in Systems Configuration. LISA 2009: 129-143 - [c115]Pedro Javier del Cid, Danny Hughes, Jo Ueyama, Sam Michiels, Wouter Joosen:
DARMA: adaptable service and resource management for wireless sensor networks. MidSens 2009: 1-6 - [c114]Nelson Matthys, Christophe Huygens, Danny Hughes, Sam Michiels, Wouter Joosen:
Flexible integration of data qualities in wireless sensor networks. MidSens 2009: 31-36 - [c113]Danny Hughes, Klaas Thoelen, Wouter Horré, Nelson Matthys, Javier del Cid, Sam Michiels, Christophe Huygens, Wouter Joosen:
LooCI: a loosely-coupled component infrastructure for networked embedded systems. MoMM 2009: 195-203 - [c112]Wouter Horré, Kevin Lee, Danny Hughes, Sam Michiels, Wouter Joosen:
A Graph Based Approach to Supporting Reconfiguration in Wireless Sensor Networks. NetCoM 2009: 326-331 - [c111]Nelson Matthys, Danny Hughes, Sam Michiels, Christophe Huygens, Wouter Joosen:
Fine-Grained Tailoring of Component Behaviour for Embedded Systems. SEUS 2009: 156-167 - [c110]Aram Hovsepyan, Stefan Van Baelen, Yolande Berbers, Wouter Joosen:
Specifying and Composing Concerns Expressed in Domain-Specific Modeling Languages. TOOLS (47) 2009: 116-135 - [c109]Robrecht Haesevoets, Eddy Truyen, Tom Holvoet, Wouter Joosen:
Weaving the Fabric of the Control Loop through Aspects. SOAR 2009: 38-65 - [c108]Lieven Desmet, Wouter Joosen, Fabio Massacci, Katsiaryna Naliuka, Pieter Philippaerts, Frank Piessens, Dries Vanoverberghe:
The S3MS.NET Run Time Monitor: Tool Demonstration. BYTECODE@ETAPS 2009: 153-159 - [p2]Bart De Win, Tom Goovaerts, Wouter Joosen, Pieter Philippaerts, Frank Piessens, Yves Younan:
Security Middleware for Mobile Applications. Middleware for Network Eccentric and Mobile Applications 2009: 265-284 - 2008
- [j15]Wouter Horré, Sam Michiels, Wouter Joosen, Pierre Verbaeten:
DAVIM: Adaptable Middleware for Sensor Networks. IEEE Distributed Syst. Online 9(1) (2008) - [j14]Lieven Desmet, Wouter Joosen, Fabio Massacci, Pieter Philippaerts, Frank Piessens, Ida Sri Rejeki Siahaan, Dries Vanoverberghe:
Security-by-contract on the .NET platform. Inf. Secur. Tech. Rep. 13(1): 25-32 (2008) - [j13]Lieven Desmet, Pierre Verbaeten, Wouter Joosen, Frank Piessens:
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies. IEEE Trans. Software Eng. 34(1): 50-64 (2008) - [c107]Kim Wuyts, Riccardo Scandariato, Geert Claeys, Wouter Joosen:
Hardening XDS-Based Architectures. ARES 2008: 18-25 - [c106]Thomas Heyman, Riccardo Scandariato, Christophe Huygens, Wouter Joosen:
Using Security Patterns to Combine Security Metrics. ARES 2008: 1156-1163 - [c105]Koen Yskout, Riccardo Scandariato, Bart De Win, Wouter Joosen:
Transforming Security Requirements into Architecture. ARES 2008: 1421-1428 - [c104]Eddy Truyen, Wouter Joosen:
Towards an aspect-oriented architecture for self-adaptive frameworks. ACP4IS@AOSD 2008: 9:1-9:8 - [c103]Eddy Truyen, Nico Janssens, Frans Sanen, Wouter Joosen:
Support for distributed adaptations in aspect-oriented middleware. AOSD 2008: 120-131 - [c102]Klaas Thoelen, Sam Michiels, Wouter Joosen:
Tracking and tracing containers through distributed sensor middleware. Autonomics 2008: 25 - [c101]Aram Hovsepyan, Stefan Van Baelen, Yolande Berbers, Wouter Joosen:
Generic Reusable Concern Compositions. ECMDA-FA 2008: 231-245 - [c100]Frans Sanen, Eddy Truyen, Wouter Joosen:
Modeling Context-Dependent Aspect Interference Using Default Logics. RAM-SE 2008: 15-20 - [c99]Eddy Truyen, Wouter Joosen:
A reference model for cross-organizational coordination architectures. EDOCW 2008: 252-263 - [c98]Nelson Matthys, Sam Michiels, Wouter Joosen, Pierre Verbaeten:
Policy-based management of middleware for distributed sensor applications. MiNEMA 2008: 15-17 - [c97]Eryk Kylikowski, Riccardo Scandariato, Wouter Joosen:
Using Multi-Level Security Annotations to Improve Software Assurance. HASE 2008: 471-474 - [c96]Didier Delanote, Stefan Van Baelen, Wouter Joosen, Yolande Berbers:
Using AADL to Model a Protocol Stack. ICECCS 2008: 277-281 - [c95]Thomas Delaet, Paul Anderson, Wouter Joosen:
Managing Real-World System Configurations with Constraints. ICN 2008: 594-601 - [c94]Danny Weyns, Robrecht Haesevoets, Bart Van Eylen, Alexander Helleboogh, Tom Holvoet, Wouter Joosen:
Endogenous versus exogenous self-management. SEAMS 2008: 41-48 - [c93]Nelson Matthys, Wouter Joosen:
Towards policy-based management of sensor networks. MidSens 2008: 13-18 - [c92]Tom Goovaerts, Bart De Win, Wouter Joosen:
A comparison of two approaches for achieving flexible and adaptive security middleware. Middleware Security 2008: 19-24 - [c91]Kristof Geebelen, Sam Michiels, Wouter Joosen:
Dynamic reconfiguration using template based web service composition. MW4SOC 2008: 49-54 - [c90]Koen Yskout, Bart De Win, Wouter Joosen:
Transforming Security Audit Requirements into a Software Architecture. MODSEC@MoDELS 2008 - [c89]Robrecht Haesevoets, Danny Weyns, Tom Holvoet, Wouter Joosen, Paul Valckenaers:
Hierarchical Organizations and a Supporting Software Architecture for Floating Car Data. SASO Workshops 2008: 31-36 - [c88]Koen Buyens, Bart De Win, Wouter Joosen:
Improving Least Privilege in Software Architecture by Guided Automated Compartmentalization. WOSIS 2008: 145-150 - [c87]Paul Grace, Bert Lagaisse, Eddy Truyen, Wouter Joosen:
A Reflective Framework for Fine-Grained Adaptation of Aspect-Oriented Compositions. SC@ETAPS 2008: 215-230 - [c86]Mina Deng, Riccardo Scandariato, Danny De Cock, Bart Preneel, Wouter Joosen:
Identity in federated electronic healthcare. Wireless Days 2008: 1-5 - [e1]Wouter Joosen:
Proceedings of the 2008 Workshop on Next Generation Aspect Oriented Middleware, NAOMI@AOSD 2008, Brussels, Belgium, April 1, 2008. ACM 2008, ISBN 978-1-60558-148-4 [contents] - 2007
- [c85]Koen Buyens, Bart De Win, Wouter Joosen:
Empirical and statistical analysis of risk analysis-driven techniques for threat management. ARES 2007: 1034-1041 - [c84]Davy Preuveneers, Julien Pauty, Dimitri Van Landuyt, Yolande Berbers, Wouter Joosen:
Comparative Evaluation of Converged Service-Oriented Architectures. AINA Workshops (1) 2007: 989-994 - [c83]Maarten Bynens, Bert Lagaisse, Wouter Joosen, Eddy Truyen:
The elementary pointcut pattern. BPAOSD@AOSD 2007: 2 - [c82]Koen Buyens, Sam Michiels, Wouter Joosen:
A Software Architecture to Facilitate the Creation of DRM Systems. CCNC 2007: 955-959 - [c81]Lieven Desmet, Wouter Joosen, Fabio Massacci, Katsiaryna Naliuka, Pieter Philippaerts, Frank Piessens, Dries Vanoverberghe:
A flexible security architecture to support third-party applications on mobile devices. CSAW 2007: 19-28 - [c80]Koen Buyens, Riccardo Scandariato, Wouter Joosen:
Process Activities Supporting Security Principles. COMPSAC (2) 2007: 281-292 - [c79]Tom Goovaerts, Bart De Win, Wouter Joosen:
A Flexible Architecture for Enforcing and Composing Policies in a Service-Oriented Environment. DAIS 2007: 253-266 - [c78]Frans Sanen, Eddy Truyen, Wouter Joosen:
Managing Concern Interactions in Middleware. DAIS 2007: 267-283 - [c77]Robrecht Haesevoets, Bart Van Eylen, Danny Weyns, Alexander Helleboogh, Tom Holvoet, Wouter Joosen:
Managing Agent Interactions with Context-Driven Dynamic Organizations. EEMMAS 2007: 166-186 - [c76]Nico Janssens, Eddy Truyen, Frans Sanen, Wouter Joosen:
Adding dynamic reconfiguration support to JBoss AOP. MAI 2007: 1-8 - [c75]Kris Verlaenen, Wouter Joosen, Pierre Verbaeten:
Arriclides: An Architecture Integrating Clinical Decision Support Models. HICSS 2007: 135 - [c74]Johan Grégoire, Koen Buyens, Bart De Win, Riccardo Scandariato, Wouter Joosen:
On the Secure Software Development Process: CLASP and SDL Compared. SESS@ICSE 2007: 1 - [c73]Thomas Heyman, Koen Yskout, Riccardo Scandariato, Wouter Joosen:
An Analysis of the Security Patterns Landscape. SESS@ICSE 2007: 3 - [c72]Kris Verlaenen, Bart De Win, Wouter Joosen:
Towards simplified specification of policies in different domains. Integrated Network Management 2007: 20-29 - [c71]Thomas Delaet, Wouter Joosen:
PoDIM: A Language for High-Level Configuration Management. LISA 2007: 261-273 - [c70]Paul Grace, Eddy Truyen, Bert Lagaisse, Wouter Joosen:
The case for aspect-oriented reflective middleware. ARM 2007: 2 - [c69]Wouter Horré, Sam Michiels, Nelson Matthys, Wouter Joosen, Pierre Verbaeten:
On the integration of sensor networks and general purpose IT infrastructure. MidSens 2007: 7-12 - [c68]Bert Vanhooff, Dhouha Ayed, Stefan Van Baelen, Wouter Joosen, Yolande Berbers:
UniTI: A Unified Transformation Infrastructure. MoDELS 2007: 31-45 - [c67]Bert Lagaisse, Eddy Truyen, Wouter Joosen:
Multi-stage Aspect-Oriented Composition of Component-Based Applications. OTM Conferences (1) 2007: 630-647 - [c66]Kris Verlaenen, Bart De Win, Wouter Joosen:
Policy Analysis Using a Hybrid Semantic Reasoning Engine. POLICY 2007: 193-200 - [c65]Liesje Demuynck, Bart De Decker, Wouter Joosen:
A Credential-Based System for the Anonymous Delegation of Rights. SEC 2007: 169-180 - [c64]Tom Goovaerts, Bart De Win, Wouter Joosen:
Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies. REM@ESORICS 2007: 31-43 - 2006
- [j12]Tine Verhanneman, Frank Piessens, Bart De Win, Eddy Truyen, Wouter Joosen:
A Modular Access Control Service for Supporting Application-Specific Policies. IEEE Distributed Syst. Online 7(6) (2006) - [j11]Johan Brichau, Ruzanna Chitchyan, Siobhán Clarke, Ellie D'Hondt, Alessandro Garcia, Michael Haupt, Wouter Joosen, Shmuel Katz, Jacques Noyé, Awais Rashid, Mario Südholt:
A Model Curriculum for Aspect-Oriented Software Development. IEEE Softw. 23(6): 53-61 (2006) - [j10]Eddy Truyen, Wouter Joosen:
Run-Time and Atomic Weaving of Distributed Aspects. LNCS Trans. Aspect Oriented Softw. Dev. 2: 147-181 (2006) - [c63]Yves Younan, Davide Pozza, Frank Piessens, Wouter Joosen:
Extended Protection against Stack Smashing Attacks without Performance Loss. ACSAC 2006: 429-438 - [c62]Mathieu Braem, Kris Verlaenen, Niels Joncheere, Wim Vanderperren, Ragnhild Van Der Straeten, Eddy Truyen, Wouter Joosen, Viviane Jonckers:
Isolating Process-Level Concerns Using Padus. Business Process Management 2006: 113-128 - [c61]Riccardo Scandariato, Bart De Win, Wouter Joosen:
Towards a measuring framework for security properties of software. QoP 2006: 27-30 - [c60]Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten:
Bridging the gap between web application firewalls and web applications. FMSE 2006: 67-77 - [c59]Adriaan Moors, Frank Piessens, Wouter Joosen:
An object-oriented approach to datatype-generic programming. ICFP-WGP 2006: 96-106 - [c58]Yves Younan, Wouter Joosen, Frank Piessens:
Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic. ICICS 2006: 379-398 - [c57]Bart De Win, Frank Piessens, Wouter Joosen:
How secure is AOP and what can we do about it? SESS@ICSE 2006: 27-34 - [c56]Sam Michiels, Wouter Horré, Wouter Joosen, Pierre Verbaeten:
DAViM: a dynamically adaptable virtual machine for sensor networks. MidSens 2006: 7-12 - [c55]Bert Lagaisse, Wouter Joosen:
True and Transparent Distributed Composition of Aspect-Components. Middleware 2006: 42-61 - [c54]Bert Vanhooff, Stefan Van Baelen, Aram Hovsepyan, Wouter Joosen, Yolande Berbers:
Towards a Transformation Chain Modeling Language. SAMOS 2006: 39-48 - [c53]Aram Hovsepyan, Stefan Van Baelen, Bert Vanhooff, Wouter Joosen, Yolande Berbers:
Key Research Challenges for Successfully Applying MDD Within Real-Time Embedded Software Development. SAMOS 2006: 49-58 - [c52]Thomas Heyman, Bart De Win, Christophe Huygens, Wouter Joosen:
Improving Intrusion Detection through Alert Verification. WOSIS 2006: 207-216 - [c51]Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten:
Static Verification of Indirect Data Sharing in Loosely-coupled Component Systems. SC@ETAPS 2006: 34-49 - [c50]Maarten Bynens, Bart De Win, Wouter Joosen, Bart Theeten:
Ontology-Based Discovery of Data-Driven Services. SOSE 2006: 175-178 - 2005
- [j9]Nico Janssens, Wouter Joosen, Pierre Verbaeten:
NeCoMan: Middleware for Safe Distributed-Service Adaptation in Programmable Networks. IEEE Distributed Syst. Online 6(7) (2005) - [j8]Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen:
Requirements traceability to support evolution of access control. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-7 (2005) - [j7]Bart De Win, Frank Piessens, Jan Smans, Wouter Joosen:
Towards a unifying view on security contracts. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-7 (2005) - [j6]Tom Mahieu, Pierre Verbaeten, Wouter Joosen:
A Session Layer Concept for Overlay Networks. Wirel. Pers. Commun. 35(1-2): 111-121 (2005) - [c49]Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen:
Uniform Application-level Access Control Enforcement of Organizationwide Policies. ACSAC 2005: 431-440 - [c48]Bert Lagaisse, Wouter Joosen:
Component-Based Open Middleware Supporting Aspect-Oriented Software Composition. CBSE 2005: 139-154 - [c47]Tom Goovaerts, Bart De Win, Bart De Decker, Wouter Joosen:
Assessment of Palm OS Susceptibility to Malicious Code Threats. Communications and Multimedia Security 2005: 240-249 - [c46]Sam Michiels, Kristof Verslype, Wouter Joosen, Bart De Decker:
Towards a software architecture for DRM. Digital Rights Management Workshop 2005: 65-74 - [c45]Sam Michiels, Nico Janssens, Wouter Joosen, Pierre Verbaeten:
Decentralized cooperative management: a bottom-up approach. IADIS AC 2005: 401-408 - [c44]Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen:
Requirements traceability to support evolution of access control. SESS@ICSE 2005: 1-7 - [c43]Bart De Win, Frank Piessens, Jan Smans, Wouter Joosen:
Towards a unifying view on security contracts. SESS@ICSE 2005: 1-7 - [c42]Yves Younan, Wouter Joosen, Frank Piessens:
A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks. IWIA 2005: 3-20 - [p1]Sam Michiels, Nico Janssens, Lieven Desmet, Tom Mahieu, Wouter Joosen, Pierre Verbaeten:
Connecting Embedded Devices Using a Component Platform for Adaptable Protocol Stacks. Component-Based Software Development for Embedded Systems 2005: 185-208 - 2004
- [j5]Frank Piessens, Bart Jacobs, Eddy Truyen, Wouter Joosen:
Support for Metadata-driven Selection of Run-time Services in .NET is Promising but Immature. J. Object Technol. 3(2): 27-35 (2004) - [c41]Lieven Desmet, Bart Jacobs, Frank Piessens, Wouter Joosen:
A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components. Communications and Multimedia Security 2004: 125-130 - [c40]Lieven Desmet, Bart Jacobs, Frank Piessens, Wouter Joosen:
Threat Modelling for Web Services Based Web Applications. Communications and Multimedia Security 2004: 131-144 - [c39]Sam Michiels, Lieven Desmet, Wouter Joosen, Pierre Verbaeten:
The DiPS+ Software Architecture for Self-healing Protocol Stacks. WICSA 2004: 233-242 - [c38]Lieven Desmet, Nico Janssens, Sam Michiels, Frank Piessens, Wouter Joosen, Pierre Verbaeten:
Towards preserving correctness in self-managed software systems. WOSS 2004: 34-38 - 2003
- [j4]Frank Piessens, Bart Jacobs, Wouter Joosen:
Software security: experiments on the .NET common language run-time and the shared source common language infrastructure. IEE Proc. Softw. 150(5): 303-307 (2003) - [c37]Tine Verhanneman, Liesbeth Jaco, Bart De Win, Frank Piessens, Wouter Joosen:
Adaptable Access Control Policies for Medical Information Systems. DAIS 2003: 133-140 - 2002
- [c36]Eddy Truyen, Wouter Joosen, Pierre Verbaeten:
Consistency Management in the Presence of Simultaneous Client-Specific Views. ICSM 2002: 501-510 - 2001
- [c35]Eddy Truyen, Bart Vanhaute, Wouter Joosen, Pierre Verbaeten, Bo Nørregaard Jørgensen:
A Dynamic Customization Model for Distributed Component-Based Systems. ICDCS Workshops 2001: 147-156 - [c34]Eddy Truyen, Bart Vanhaute, Wouter Joosen, Pierre Verbaeten, Bo Nørregaard Jørgensen:
Dynamic and Selective Combination of Extensions in Component-Based Applications. ICSE 2001: 233-242 - 2000
- [c33]Eddy Truyen, Bert Robben, Bart Vanhaute, Tim Coninx, Wouter Joosen, Pierre Verbaeten:
Portable Support for Transparent Thread Migration in Java. ASA/MA 2000: 29-43 - [c32]Bo Nørregaard Jørgensen, Eddy Truyen, Frank Matthijs, Wouter Joosen:
Customization of Object Request Brokers by Application Specific Policies. Middleware 2000: 144-163 - [c31]Bart De Win, Jan Van den Bergh, Frank Matthijs, Bart De Decker, Wouter Joosen:
A Security Architecture for Electronic Commerce Applications. SEC 2000: 491-500 - [c30]Bo Nørregaard Jørgensen, Eddy Truyen, Wouter Joosen:
Customization of Component-Based Object Request Brokers through Dynamic Reconfiguration. TOOLS (33) 2000: 181-194
1990 – 1999
- 1999
- [c29]Yolande Berbers, Bert Robben, Wouter Joosen, Kris Hermans:
Event System Providing a Service for Filtering and Correlating Events. Applied Informatics 1999: 289-292 - [c28]Bo Nørregaard Jørgensen, Wouter Joosen:
Standardizing Component Interaction Patterns in Product-Lines Architectures. ECOOP Workshops 1999: 197 - [c27]Bert Robben, Bart Vanhaute, Wouter Joosen, Pierre Verbaeten:
Non-functional Policies. Reflection 1999: 74-92 - [c26]Frank Matthijs, Peter Kenens, Wouter Joosen, Pierre Verbaeten:
Networking and Reflection: A Strong Combination. Reflection 1999: 141-143 - [c25]Bo Nørregaard Jørgensen, Wouter Joosen:
Classifying Component Interaction in Product-Line Architectures. TOOLS (32) 1999: 66-77 - 1998
- [c24]Bert Robben, Wouter Joosen, Frank Matthijs, Bart Vanhaute, Pierre Verbaeten:
Components for Non-Functional Requirements. ECOOP Workshops 1998: 151-152 - [c23]Eddy Truyen, Bert Robben, Peter Kenens, Frank Matthijs, Sam Michiels, Wouter Joosen, Pierre Verbaeten:
Open Implementation of a Mobile Communication System. ECOOP Workshops 1998: 315-316 - [c22]Bert Robben, Wouter Joosen, Frank Matthijs, Bart Vanhaute, Pierre Verbaeten:
A Metaobject Protocol for Correlate. ECOOP Workshops 1998: 367-368 - [c21]Peter Kenens, Sam Michiels, Frank Matthijs, Bert Robben, Eddy Truyen, Bart Vanhaute, Wouter Joosen, Pierre Verbaeten:
An AOP Case with Static and Dynamic Aspects. ECOOP Workshops 1998: 428-430 - [c20]Bo Nørregaard Jørgensen, Wouter Joosen:
Dynamic Scheduling of Object Invocations in Distributed Object Oriented Real-Time Systems. ECOOP Workshops 1998: 503-506 - [c19]Romain Slootmaekers, Henk Van Wulpen, Wouter Joosen:
Modelling Genetic Search Agents with a Concurrent Object-Oriented Language. HPCN Europe 1998: 843-853 - 1997
- [c18]Frank Matthijs, Wouter Joosen, Bert Robben, Bart Vanhaute, Pierre Verbaeten:
Multi-level Patterns. ECOOP Workshops 1997: 112-115 - [c17]Wouter Joosen, Bert Robben, Henk Van Wulpen, Pierre Verbaeten:
Experiences with an Object-Oriented Parallel Language: The CORRELATE Project. ISCOPE 1997: 73-80 - [c16]Wouter Joosen, Stijn Bijnens, Frank Matthijs, Bert Robben, Johan Van Oeyen, Pierre Verbaeten:
Building Multi-Agent Systems with CORRELATE. MAAMAW 1997: 197-209 - [c15]Yolande Berbers, Bart De Decker, Wouter Joosen, Frank Matthijs, Bert Robben:
Management of Events in a multi-agent system. PDPTA 1997: 1141-1150 - 1996
- [c14]Wouter Joosen, Stijn Bijnens, Johan Van Oeyen, Bert Robben, Frank Matthijs, Pierre Verbaeten, John W. Perram:
Affordable Overhead in CORRELATE: Comparing two MD Simulators. HPCN Europe 1996: 219-227 - [c13]Yolande Berbers, Bart De Decker, Wouter Joosen:
Infrastructure for mobile agents. ACM SIGOPS European Workshop 1996: 173-180 - 1995
- [c12]Wouter Joosen, Stijn Bijnens, Bert Robben, Johan Van Oeyen, Pierre Verbaeten:
Flexible load balancing software for parallel applications in a time-sharing environment. HPCN Europe 1995: 398-406 - 1994
- [c11]Stijn Bijnens, Wouter Joosen, Pierre Verbaeten:
Sender-Initated and Receiver-Initated Coordination in a Global Object Space. ECOOP Workshop 1994: 14-28 - [c10]Stijn Bijnens, Wouter Joosen, Pierre Verbaeten:
Observation of a Global Object Space on a Distributed Memory Machine. HICSS (2) 1994: 615-624 - [c9]Robert Bywater, Wouter Joosen, Stijn Bijnens, Pierre Verbaeten, Thomas Larsen, John W. Perram:
Object-Oriented Simulation Software for Drug Design. HPCN 1994: 189-196 - [c8]Stijn Bijnens, Wouter Joosen, Pierre Verbaeten:
Language Constructs for Coordination in an Agent Space. MAAMAW 1994: 90-105 - [c7]Thomas Larsen, Wouter Joosen, John W. Perram:
The Object-Oriented Development of a Parallel Application in Polymer Dynamics. PARA 1994: 344-348 - [c6]Wouter Joosen, Jan Pollet, Pierre Verbaeten:
The Efficient Management Of Task Clusters In A Dynamic Load Balancer. PDP 1994: 285-290 - 1993
- [j3]Wouter Joosen, Stijn Bijnens, Pierre Verbaeten:
A reusable load balancer for parallel search problems. Microprocess. Microprogramming 38(1-5): 205-212 (1993) - [c5]Stijn Bijnens, Wouter Joosen, Pierre Verbaeten:
A Reflective Invocation Scheme to Realise Advanced Object Management. ECOOP Workshop 1993: 139-151 - [c4]Stijn Bijnens, Wouter Joosen, Yolande Berbers:
Load balanced parallel program verification on a shared memory machine. PDP 1993: 161-168 - 1992
- [c3]Yolande Berbers, Wouter Joosen, Pierre Verbaeten:
Object-orientation as an appropriate paradigm for high-performance environments for scientific computing. ACM SIGOPS European Workshop 1992 - 1990
- [j2]Wouter Joosen, Pierre Verbaeten:
On the use of process migration in distributed systems. Microprocessing and Microprogramming 28(1-5): 49-52 (1990) - [j1]Wouter Joosen, Yolande Berbers, Pierre Verbaeten:
Dynamic load balancing in transputer applications with geometric parallelism. Microprocessing and Microprogramming 30(1-5): 77-84 (1990) - [c2]Yolande Berbers, Wouter Joosen, Pierre Verbaeten:
On the use of load balancing mechanisms for fault tolerance support. ACM SIGOPS European Workshop 1990
1980 – 1989
- 1988
- [c1]Yolande Berbers, Wouter Joosen, Pierre Verbaeten:
A general purpose distributed operating system for a hypercube. ACM SIGOPS European Workshop 1988
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-22 21:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint