


default search action
Wouter Joosen
Person information
- affiliation: Catholic University of Leuven, Belgium
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
[j114]Laurens Sion
, Dimitri Van Landuyt
, Kim Wuyts
, Wouter Joosen
:
Robust and reusable LINDDUN privacy threat knowledge. Comput. Secur. 154: 104419 (2025)
[j113]Javier Martínez Llamas, Davy Preuveneers, Wouter Joosen:
Certified unlearning for a trustworthy machine learning-based access control administration. Int. J. Inf. Sec. 24(2): 94 (2025)
[j112]Sander Joos
, Tim Van hamme
, Willem Verheyen
, Davy Preuveneers
, Wouter Joosen
:
Triple Down on Robustness: Understanding the Impact of Adversarial Triplet Compositions on Adversarial Robustness. Mach. Learn. Knowl. Extr. 7(1): 14 (2025)
[j111]Stef Verreydt
, Dimitri Van Landuyt
, Wouter Joosen
:
Run-time threat models for systematic and continuous risk assessment. Softw. Syst. Model. 24(5): 1451-1473 (2025)
[j110]Gerald Budigiri
, Christoph Baumann
, Eddy Truyen
, Wouter Joosen
:
Elastic Cross-Layer Orchestration of Network Policies in the Kubernetes Stack. IEEE Trans. Netw. Serv. Manag. 22(2): 2031-2058 (2025)
[c516]Javier Martínez Llamas
, Matthias Van Hoof, Davy Preuveneers
, Wouter Joosen:
Adversarial Robustness of Machine Learning-Based Access Control. ARES (Workshops 1) 2025: 88-105
[c515]Maxime Sateur, Javier Martínez Llamas
, Davy Preuveneers
, Wouter Joosen:
Evaluating Turnstile as a Privacy-Conscious Alternative to reCAPTCHA. ARES (Workshops 2) 2025: 235-252
[c514]Pieter Philippaerts
, Stef Verreydt
, Wouter Joosen
:
Enhanced Threat Modeling and Attack Scenario Generation for OAuth 2.0 Implementations: Data/Toolset paper. CODASPY 2025: 54-59
[c513]Anh-Duy Tran
, Laurens Sion
, Koen Yskout
, Wouter Joosen
:
TerrARA: Automated Security Threat Modeling for Infrastructure as Code. CODASPY 2025: 269-280
[c512]Qianying Liao, Maarten Kesters, Dimitri Van Landuyt
, Wouter Joosen:
Data Chameleon: A Self-adaptive Synthetic Data Management System. DBSec 2025: 44-56
[c511]Jonah Bellemans
, Mario Raciti, Dimitri Van Landuyt
, Laurens Sion, Giampaolo Bella, Lieven Desmet
, Wouter Joosen:
From Cluttered to Clustered: Addressing Privacy Threat Explosion through Automated Clustering. EuroS&P (Workshops) 2025: 231-241
[c510]Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Wouter Joosen:
SAPlugin: Management and Extraction of Software Architecture Descriptions in Visual Paradigm. ICSA Companion 2025: 120-127
[c509]Qianying Liao
, Dimitri Van Landuyt
, Davy Preuveneers, Wouter Joosen:
Towards A Common Task Framework for Distributed Collaborative Machine Learning. ICSTW 2025: 433-437
[c508]Willem Verheyen
, Zafeirakis Georgios, Sander Joos
, Davy Preuveneers
, Wouter Joosen
:
Defying Depth: Exploring the Vulnerability of RGB-D Face Recognition Systems to RGB Attacks. IWBF 2025: 1-6
[c507]Victor Le Pochat
, Cameron Ballard, Lieven Desmet
, Wouter Joosen
, Damon McCoy
, Tobias Lauinger
:
Partnërka in Crime: Characterizing Deceptive Affiliate Marketing Offers. PAM 2025: 405-436
[d3]Jonah Bellemans
, Mario Raciti
, Dimitri Van Landuyt
, Laurens Sion
, Giampaolo Bella
, Lieven Desmet
, Wouter Joosen
:
From Cluttered to Clustered: Addressing Privacy Threat Explosion through Automated Clustering (Supporting materials). Zenodo, 2025
[d2]Laurens Sion
, Dimitri Van Landuyt
, Koen Yskout
, Wouter Joosen
:
SAPlugin: Management and Extraction of Software Architecture Descriptions in Visual Paradigm. Zenodo, 2025
- 2024
[j109]Christof Koolen
, Kim Wuyts, Wouter Joosen, Peggy Valcke
:
From insight to compliance: Appropriate technical and organisational security measures through the lens of cybersecurity maturity models. Comput. Law Secur. Rev. 52: 105914 (2024)
[j108]Dimitri Van Landuyt
, Vincent Wijshoff, Wouter Joosen:
A study of NoSQL query injection in Neo4j. Comput. Secur. 137: 103590 (2024)
[j107]Davy Preuveneers
, Wouter Joosen
:
An Ontology-Based Cybersecurity Framework for AI-Enabled Systems and Applications. Future Internet 16(3): 69 (2024)
[j106]Tim Van hamme
, Giuseppe Garofalo
, Enrique Argones-Rúa
, Davy Preuveneers
, Wouter Joosen:
A Novel Evaluation Framework for Biometric Security: Assessing Guessing Difficulty as a Metric. IEEE Trans. Inf. Forensics Secur. 19: 8369-8384 (2024)
[c506]Dimitri Van Landuyt
, Marie Levrau
, Vincent Reniers
, Wouter Joosen
:
An E-Commerce Benchmark for Evaluating Performance Trade-Offs in Document Stores. DaWaK 2024: 284-290
[c505]Laurens Sion
, Dimitri Van Landuyt
, Wouter Joosen
:
A DPIA Repository for Interdisciplinary Data Protection Research. ESORICS Workshops (1) 2024: 181-192
[c504]Laurens Sion
, Dimitri Van Landuyt
, Wouter Joosen
:
Leveraging the Domain Experts: Specializing Privacy Threat Knowledge. ESORICS Workshops (1) 2024: 534-541
[c503]Pieter Philippaerts
, Jan Vanhoof
, Tom Van Cutsem, Wouter Joosen:
Is Your OAuth Middleware Vulnerable? Evaluating Open-Source Identity Providers' Security. GLOBECOM 2024: 3607-3612
[c502]José Santos, Eddy Truyen, Christoph Baumann, Filip De Turck, Gerald Budigiri, Wouter Joosen:
Towards Intent-Based Scheduling for Performance and Security in Edge-to-Cloud Networks. ICIN 2024: 222-227
[c501]Javier Martínez Llamas, Davy Preuveneers, Wouter Joosen:
Poster: Robust Edge-Based Detection of Bot Attacks Through Federated Learning. SEC 2024: 542-544
[c500]Ilias Tsingenopoulos
, Jacopo Cortellazzi
, Branislav Bosanský
, Simone Aonzo
, Davy Preuveneers
, Wouter Joosen
, Fabio Pierazzi
, Lorenzo Cavallaro
:
How to Train your Antivirus: RL-based Hardening through the Problem Space. RAID 2024: 130-146
[c499]Pieter-Jan Vrielynck
, Tim Van hamme
, Rawad Ghostin
, Bert Lagaisse
, Davy Preuveneers
, Wouter Joosen
:
A Self-Sovereign Identity Approach to Decentralized Access Control with Transitive Delegations. SACMAT 2024
[c498]Dimitri Van Landuyt
, Laurens Sion
, Walewein Philips, Wouter Joosen:
From automation to CI/CD: a comparative evaluation of threat modeling tools. SecDev 2024: 35-45
[c497]Stef Verreydt, Koen Yskout, Laurens Sion, Wouter Joosen:
Threat modeling state of practice in Dutch organizations. SOUPS @ USENIX Security Symposium 2024: 473-486
[c496]Victor Le Pochat, Simon Fernandez, Tom van Goethem, Samaneh Tajalizadehkhoob, Lieven Desmet
, Andrzej Duda
, Wouter Joosen, Maciej Korczynski:
Evaluating the Impact of Design Decisions on Passive DNS-Based Domain Rankings. TMA 2024: 1-11
[c495]Karel Dhondt, Victor Le Pochat, Yana Dimova, Wouter Joosen, Stijn Volckaert:
Swipe Left for Identity Theft: An Analysis of User Data Privacy Risks on Location-based Dating Apps. USENIX Security Symposium 2024
[i13]Jacopo Cortellazzi, Ilias Tsingenopoulos, Branislav Bosanský, Simone Aonzo, Davy Preuveneers, Wouter Joosen, Fabio Pierazzi
, Lorenzo Cavallaro:
How to Train your Antivirus: RL-based Hardening through the Problem-Space. CoRR abs/2402.19027 (2024)- 2023
[j105]Davy Preuveneers, Wouter Joosen:
Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersections. Comput. Secur. 135: 103505 (2023)
[j104]Eddy Truyen
, Hongjie Xie, Wouter Joosen:
Vendor-Agnostic Reconfiguration of Kubernetes Clusters in Cloud Federations. Future Internet 15(2): 63 (2023)
[j103]Yana Dimova, Tom van Goethem, Wouter Joosen:
Everybody's Looking for SSOmething: A large-scale evaluation on the privacy of OAuth authentication on the web. Proc. Priv. Enhancing Technol. 2023(4): 452-467 (2023)
[j102]Absar-Ul-Haque Ahmar
, Emekcan Aras
, Thien Duc Nguyen
, Sam Michiels
, Wouter Joosen
, Danny Hughes
:
Design of a Robust MAC Protocol for LoRa. ACM Trans. Internet Things 4(1): 3:1-3:25 (2023)
[j101]Kristof Jannes
, Emad Heydari Beni
, Bert Lagaisse
, Wouter Joosen
:
BeauForT: Robust Byzantine Fault Tolerance for Client-Centric Mobile Web Applications. IEEE Trans. Parallel Distributed Syst. 34(4): 1241-1252 (2023)
[c494]Willem Verheyen
, Tim Van hamme
, Sander Joos
, Davy Preuveneers
, Wouter Joosen
:
Beware the Doppelgänger: Attacks against Adaptive Thresholds in Facial Recognition Systems. ARES 2023: 18:1-18:11
[c493]Emma Lavens
, Davy Preuveneers
, Wouter Joosen
:
Mitigating undesired interactions between liveness detection components in biometric authentication. ARES 2023: 141:1-141:8
[c492]Gerald Budigiri, Christoph Baumann, Eddy Truyen, Jan Tobias Mühlberg
, Wouter Joosen:
Zero-Cost In-Depth Enforcement of Network Policies for Low-Latency Cloud-Native Systems. CLOUD 2023: 249-261
[c491]Anh-Duy Tran, Koen Yskout
, Wouter Joosen:
Threat Modeling: A Rough Diamond or Fool's Gold? ECSA (Tracks, Workshops and Doctoral Symposium) 2023: 120-129
[c490]Shirin Kalantari, Pieter Philippaerts
, Yana Dimova, Danny Hughes, Wouter Joosen, Bart De Decker:
A User-Centric Approach to API Delegations - Enforcing Privacy Policies on OAuth Delegations. ESORICS (2) 2023: 318-337
[c489]Davy Preuveneers, Javier Martínez Llamas, Irfan Bulut, Enrique Argones-Rúa, Pieter Verfaillie, Vince Demortier, Dimitri Surinx, Wouter Joosen:
On the Use of AutoML for Combating Alert Fatigue in Security Operations Centers. ESORICS Workshops (2) 2023: 609-627
[c488]Javier Martínez Llamas
, Davy Preuveneers, Wouter Joosen:
Effective Machine Learning-based Access Control Administration through Unlearning. EuroS&P Workshops 2023: 50-57
[c487]Tim Van hamme, Giuseppe Garofalo
, Davy Preuveneers, Wouter Joosen:
Masterkey attacks against free-text keystroke dynamics and security implications of demographic factors. EuroS&P 2023: 278-291
[c486]Pieter Philippaerts
, Davy Preuveneers, Wouter Joosen:
Revisiting OAuth 2.0 Compliance: A Two-Year Follow-Up Study. EuroS&P Workshops 2023: 521-525
[c485]Gilang Mentari Hamidy
, Sri Yulianti
, Pieter Philippaerts
, Wouter Joosen
:
TC4SE: A High-Performance Trusted Channel Mechanism for Secure Enclave-Based Trusted Execution Environments. ISC 2023: 246-264
[c484]Davy Preuveneers
, Willem Verheyen
, Sander Joos
, Wouter Joosen
:
On the adversarial robustness of full integer quantized TinyML models at the edge. MIDDLEWEDGE@Middleware 2023: 7-12
[c483]Laurens Sion
, Dimitri Van Landuyt
, Pierre Dewitte
, Peggy Valcke
, Wouter Joosen:
Demonstration of the DPMF for Data Protection Analysis. MoDELS (Companion) 2023: 75-79
[c482]Gilang Mentari Hamidy
, Pieter Philippaerts
, Wouter Joosen
:
T3E: A Practical Solution to Trusted Time in Secure Enclaves. NSS 2023: 305-326
[c481]Anh-Duy Tran
, Koen Yskout
, Wouter Joosen:
AndrAS: Automated Attack Surface Extraction for Android Applications. QRS 2023: 406-417
[c480]Kristof Jannes
, Vincent Reniers
, Wouter Lenaerts
, Bert Lagaisse
, Wouter Joosen
:
DEDACS: Decentralized and dynamic access control for smart contracts in a policy-based manner. SAC 2023: 222-230
[c479]Dimitri Van Landuyt
, Julien Benaouda
, Vincent Reniers
, Ansar Rafique
, Wouter Joosen
:
A Comparative Performance Evaluation of Multi-Model NoSQL Databases and Polyglot Persistence. SAC 2023: 286-293
[c478]Stef Verreydt
, Dimitri Van Landuyt
, Wouter Joosen
:
Expressive and Systematic Risk Assessments with Instance-Centric Threat Models. SAC 2023: 1450-1457
[c477]Tom van Goethem, Iskander Sánchez-Rola, Wouter Joosen:
Scripted Henchmen: Leveraging XS-Leaks for Cross-Site Vulnerability Detection. SP (Workshops) 2023: 371-383
[c476]Victor Le Pochat
, Wouter Joosen
:
Analyzing Cyber Security Research Practices through a Meta-Research Framework. CSET @ USENIX Security Symposium 2023: 64-74
[c475]Gertjan Franken, Tom van Goethem, Lieven Desmet, Wouter Joosen:
A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs. USENIX Security Symposium 2023: 3673-3690
[c474]Yana Dimova
, Mrunmayee Kode
, Shirin Kalantari
, Kim Wuyts
, Wouter Joosen
, Jan Tobias Mühlberg
:
From Privacy Policies to Privacy Threats: A Case Study in Policy-Based Threat Modeling. WPES@CCS 2023: 17-29
[i12]Ilias Tsingenopoulos, Vera Rimmer, Davy Preuveneers, Fabio Pierazzi
, Lorenzo Cavallaro, Wouter Joosen:
Adversarial Markov Games: On Adaptive Decision-Based Attacks and Defenses. CoRR abs/2312.13435 (2023)- 2022
[j100]Enrique Argones-Rúa
, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Discriminative training of spiking neural networks organised in columns for stream-based biometric authentication. IET Biom. 11(5): 485-497 (2022)
[j99]Giuseppe Garofalo
, Tim Van hamme
, Davy Preuveneers
, Wouter Joosen, Aysajan Abidin
, Mustafa A. Mustafa
:
PIVOT: Private and Effective Contact Tracing. IEEE Internet Things J. 9(22): 22466-22489 (2022)
[j98]Vera Rimmer, Theodor Schnitzler, Tom van Goethem, Abel Rodríguez Romero, Wouter Joosen, Katharina Kohls:
Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor. Proc. Priv. Enhancing Technol. 2022(3): 314-335 (2022)
[j97]Dimitri Van Landuyt
, Wouter Joosen:
A descriptive study of assumptions in STRIDE security threat modeling. Softw. Syst. Model. 21(6): 2311-2328 (2022)
[j96]Fan Yang, Ashok Samraj Thangarajan
, Gowri Sankar Ramachandran
, Wouter Joosen, Danny Hughes:
AsTAR: Sustainable Energy Harvesting for the Internet of Things through Adaptive Task Scheduling. ACM Trans. Sens. Networks 18(1): 4:1-4:34 (2022)
[c473]Davy Preuveneers, Wouter Joosen:
Privacy-Preserving Polyglot Sharing and Analysis of Confidential Cyber Threat Intelligence. ARES 2022: 2:1-2:11
[c472]Emma Lavens, Pieter Philippaerts
, Wouter Joosen:
A Quantitative Assessment of the Detection Performance of Web Vulnerability Scanners. ARES 2022: 149:1-149:10
[c471]Tom van Goethem, Gertjan Franken, Iskander Sánchez-Rola, David Dworken, Wouter Joosen:
SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model. AsiaCCS 2022: 784-798
[c470]Karel Dhondt, Victor Le Pochat
, Alexios Voulimeneas
, Wouter Joosen, Stijn Volckaert:
A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks. CCS 2022: 801-814
[c469]Lisa Liu, Gints Engelen, Timothy M. Lynar
, Daryl Essam, Wouter Joosen:
Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018. CNS 2022: 254-262
[c468]Sander Joos
, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Adversarial Robustness is Not Enough: Practical Limitations for Securing Facial Authentication. IWSPA@CODASPY 2022: 2-12
[c467]Joseph Hallett, Simon N. Foley, David Manda, Joseph Gardiner, Dimitri Jonckers, Wouter Joosen, Awais Rashid:
Threat-Driven Dynamic Security Policies for Cyber-Physical Infrastructures. CRITIS 2022: 9-26
[c466]Absar-Ul-Haque Ahmar, Wouter Joosen, Danny Hughes:
Smart-Hop: Low-Latency Multi-hop Networking for LoRa. DCOSS 2022: 17-20
[c465]Dimitri Van Landuyt
, Wouter Joosen
:
A Systematic Survey of Architectural Approaches and Trade-Offs in Data De-identification. ECSA 2022: 66-82
[c464]Pieter-Jan Vrielynck
, Emad Heydari Beni
, Kristof Jannes
, Bert Lagaisse
, Wouter Joosen:
DeFIRED: decentralized authorization with receiver-revocable and refutable delegations. EuroSec@EUROSYS 2022: 57-63
[c463]Davy Preuveneers, Emma Lavens, Wouter Joosen:
Applying Machine Learning to use security oracles: a case study in virus and malware detection. EuroS&P Workshops 2022: 240-251
[c462]Ilias Tsingenopoulos, Davy Preuveneers, Lieven Desmet
, Wouter Joosen:
Captcha me if you can: Imitation Games with Reinforcement Learning. EuroS&P 2022: 719-735
[c461]Zhaoyi Liu, Haoyu Tang, Sam Michiels, Wouter Joosen, Danny Hughes:
Unsupervised Acoustic Anomaly Detection Systems Based on Gaussian Mixture Density Neural Network. EUSIPCO 2022: 259-263
[c460]Alexander van Den Berghe, Koen Yskout
, Wouter Joosen:
A reimagined catalogue of software security patterns. EnCyCriS@ICSE 2022: 25-32
[c459]Stef Verreydt
, Laurens Sion
, Koen Yskout
, Wouter Joosen:
Relationship-based threat modeling. EnCyCriS@ICSE 2022: 41-48
[c458]Mengyao Liu, Jonathan Oostvogels
, Sam Michiels
, Wouter Joosen, Danny Hughes:
BoboLink: Low Latency and Low Power Communication for Intelligent Environments. Intelligent Environments 2022: 1-4
[c457]Zhaoyi Liu
, Sam Michiels
, Wouter Joosen, Danny Hughes:
Poster Abstract: Adapting Pretrained Features for Efficient Unsupervised Acoustic Anomaly Detection. IPSN 2022: 525-526
[c456]Kristof Jannes
, Bert Lagaisse
, Wouter Joosen:
Secure replication for client-centric data stores. DICG@Middleware 2022: 31-36
[c455]Gilang Mentari Hamidy
, Pieter Philippaerts
, Wouter Joosen
:
SecSharp: Towards Efficient Trusted Execution in Managed Languages (Work in Progress). MPLR 2022: 119-127
[c454]Pieter Philippaerts
, Davy Preuveneers, Wouter Joosen:
OAuch: Exploring Security Compliance in the OAuth 2.0 Ecosystem. RAID 2022: 460-481
[c453]Ala'a Al-Momani, Christoph Bösch
, Kim Wuyts
, Laurens Sion
, Wouter Joosen, Frank Kargl:
Mitigation lost in translation: leveraging threat information to improve privacy solution selection. SAC 2022: 1236-1247
[c452]Tom van Goethem, Wouter Joosen:
Towards Improving the Deprecation Process of Web Features through Progressive Web Security. SP (Workshops) 2022: 20-30
[c451]Victor Le Pochat, Laura Edelson, Tom van Goethem, Wouter Joosen, Damon McCoy, Tobias Lauinger:
An Audit of Facebook's Political Ad Policy Enforcement. USENIX Security Symposium 2022: 607-624
[c450]Xander Bouwman, Victor Le Pochat, Pawel Foremski, Tom van Goethem, Carlos Hernandez Gañán, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Wouter Joosen, Michel van Eeten:
Helping hands: Measuring the impact of a large threat intelligence sharing community. USENIX Security Symposium 2022: 1149-1165
[c449]Ilias Tsingenopoulos, Ali Mohammad Shafiei
, Lieven Desmet
, Davy Preuveneers, Wouter Joosen:
Adaptive Malware Control: Decision-Based Attacks in the Problem Space of Dynamic Analysis. WoRMA@AsiaCCS 2022: 3-14
[c448]Ali Mohammad Shafiei
, Vera Rimmer, Ilias Tsingenopoulos, Lieven Desmet
, Wouter Joosen:
Position Paper: On Advancing Adversarial Malware Generation Using Dynamic Features. WoRMA@AsiaCCS 2022: 15-20
[c447]Yana Dimova, Gertjan Franken, Victor Le Pochat
, Wouter Joosen, Lieven Desmet
:
Tracking the Evolution of Cookie-based Tracking on Facebook. WPES@CCS 2022: 181-196
[p11]Giuseppe Garofalo
, Manel Slokom
, Davy Preuveneers, Wouter Joosen, Martha A. Larson:
Machine Learning Meets Data Modification - The Potential of Pre-processing for Privacy Enchancement. Security and Artificial Intelligence 2022: 130-155
[p10]Tim Van hamme, Giuseppe Garofalo
, Sander Joos
, Davy Preuveneers, Wouter Joosen:
AI for Biometric Authentication Systems. Security and Artificial Intelligence 2022: 156-180
[p9]Azqa Nadeem
, Vera Rimmer, Wouter Joosen, Sicco Verwer:
Intelligent Malware Defenses. Security and Artificial Intelligence 2022: 217-253
[p8]Vera Rimmer, Azqa Nadeem
, Sicco Verwer, Davy Preuveneers, Wouter Joosen:
Open-World Network Intrusion Detection. Security and Artificial Intelligence 2022: 254-283
[p7]Carlos Javier Hernández-Castro, Zhuoran Liu, Alex Serban, Ilias Tsingenopoulos, Wouter Joosen:
Adversarial Machine Learning. Security and Artificial Intelligence 2022: 287-312
[d1]Stef Verreydt
, Laurens Sion
, Koen Yskout
, Wouter Joosen
:
Relationship-Based Threat Modeling: Evaluation Data. Zenodo, 2022
- 2021
[j95]Lieven Desmet
, Jan Spooren, Thomas Vissers, Peter Janssen, Wouter Joosen:
Premadoma: An Operational Solution to Prevent Malicious Domain Name Registrations in the .eu TLD. DTRAP 2(1): 2:1-2:24 (2021)
[j94]Majid Makki, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen:
Thread-level resource consumption control of tenant custom code in a shared JVM for multi-tenant SaaS. Future Gener. Comput. Syst. 115: 351-364 (2021)
[j93]Stef Verreydt
, Koen Yskout
, Wouter Joosen:
Security and Privacy Requirements for Electronic Consent: A Systematic Literature Review. ACM Trans. Comput. Heal. 2(2): 16:1-16:24 (2021)
[j92]Ansar Rafique
, Dimitri Van Landuyt
, Emad Heydari Beni
, Bert Lagaisse
, Wouter Joosen:
CryptDICE: Distributed data protection system for secure cloud data storage and computation. Inf. Syst. 96: 101671 (2021)
[j91]Davy Preuveneers
, Giuseppe Garofalo
, Wouter Joosen:
Cloud and edge based data analytics for privacy-preserving multi-modal engagement monitoring in the classroom. Inf. Syst. Frontiers 23(1): 151-164 (2021)
[j90]Davy Preuveneers
, Wouter Joosen:
Sharing Machine Learning Models as Indicators of Compromise for Cyber Threat Intelligence. J. Cybersecur. Priv. 1(1): 140-163 (2021)
[j89]Yana Dimova, Gunes Acar, Lukasz Olejnik, Wouter Joosen, Tom van Goethem:
The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion. Proc. Priv. Enhancing Technol. 2021(3): 394-412 (2021)
[j88]Jonathan Oostvogels
, Fan Yang, Sam Michiels
, Wouter Joosen, Danny Hughes:
Zero-Wire: Low-Latency Wireless Networking with Symbol-Synchronous LEDs. GetMobile Mob. Comput. Commun. 25(1): 34-38 (2021)
[j87]Jasper Bogaerts
, Bert Lagaisse
, Wouter Joosen:
SEQUOIA: A Middleware Supporting Policy-Based Access Control for Search and Aggregation in Data-Driven Applications. IEEE Trans. Dependable Secur. Comput. 18(1): 325-339 (2021)
[j86]Tim Van hamme
, Enrique Argones-Rúa
, Davy Preuveneers
, Wouter Joosen:
On the Security of Biometrics and Fuzzy Commitment Cryptosystems: A Study on Gait Authentication. IEEE Trans. Inf. Forensics Secur. 16: 5211-5224 (2021)
[j85]Emekcan Aras, Stéphane Delbruel, Fan Yang, Wouter Joosen, Danny Hughes:
Chimera: A Low-power Reconfigurable Platform for Internet of Things. ACM Trans. Internet Things 2(2): 10:1-10:25 (2021)
[j84]Kristof Jannes
, Bert Lagaisse
, Wouter Joosen:
OWebSync: Seamless Synchronization of Distributed Web Clients. IEEE Trans. Parallel Distributed Syst. 32(9): 2338-2351 (2021)
[c446]Enrique Argones-Rúa, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Gait Authentication based on Spiking Neural Networks. BIOSIG 2021: 51-60
[c445]Ashok Samraj Thangarajan
, Fan Yang, Wouter Joosen, Sam Michiels
, Danny Hughes:
ReFrAEN: a Reconfigurable Vibration Analysis Framework for Constrained Sensor Nodes. DCOSS 2021: 124-131
[c444]Stefanos Peros, Wouter Joosen, Danny Hughes:
Ermis: a middleware for bridging data collection and data processing in IoT streaming applications. DCOSS 2021: 259-266
[c443]Gerald Budigiri, Christoph Baumann, Jan Tobias Mühlberg
, Eddy Truyen, Wouter Joosen:
Network Policies in Kubernetes: Performance Evaluation and Security Analysis. EuCNC/6G Summit 2021: 407-412
[c442]Laurens Sion
, Dimitri Van Landuyt
, Wouter Joosen:
An Overview of Runtime Data Protection Enforcement Approaches. EuroS&P Workshops 2021: 351-358
[c441]Martijn Sauwens
, Kristof Jannes
, Bert Lagaisse
, Wouter Joosen:
SCEW: Programmable BFT-Consensus with Smart Contracts for Client-Centric P2P Web Applications. PaPoC@EuroSys 2021: 2:1-2:7
[c440]Martijn Sauwens, Emad Heydari Beni
, Kristof Jannes
, Bert Lagaisse
, Wouter Joosen:
ThunQ: A Distributed and Deep Authorization Middleware for Early and Lazy Policy Enforcement in Microservice Applications. ICSOC 2021: 204-220
[c439]Kristof Jannes
, Bert Lagaisse
, Wouter Joosen:
Seamless Synchronization for Collaborative Web Services. ICSOC Workshops 2021: 311-314
[c438]Majid Makki, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen:
Shared memory protection in a multi-tenant JVM. MPLR 2021: 1-15
[c437]Emad Heydari Beni
, Eddy Truyen, Bert Lagaisse
, Wouter Joosen, Jordy Dieltjens:
Reducing cold starts during elastic scaling of containers in kubernetes. SAC 2021: 60-68
[c436]Ala'a Al-Momani, Kim Wuyts
, Laurens Sion
, Frank Kargl, Wouter Joosen, Benjamin Erb, Christoph Bösch
:
Land of the lost: privacy patterns' forgotten properties: enhancing selection-support for privacy patterns. SAC 2021: 1217-1225
[c435]Dimitri Van Landuyt
, Liliana Pasquale, Laurens Sion
, Wouter Joosen:
Threat modeling at run time: the case for reflective and adaptive threat management (NIER track). SEAMS@ICSE 2021: 203-209
[c434]Laurens Sion
, Dimitri Van Landuyt
, Koen Yskout
, Stef Verreydt
, Wouter Joosen:
Automated Threat Analysis and Management in a Continuous Integration Pipeline. SecDev 2021: 30-37
[c433]Fan Yang, Ashok Samraj Thangarajan
, Sam Michiels
, Wouter Joosen, Danny Hughes:
Morphy: Software Defined Charge Storage for the IoT. SenSys 2021: 248-260
[c432]Gints Engelen
, Vera Rimmer, Wouter Joosen:
Troubleshooting an Intrusion Detection Dataset: the CICIDS2017 Case Study. SP (Workshops) 2021: 7-12
[c431]Gertjan Franken
, Tom van Goethem, Wouter Joosen:
Reading Between the Lines: An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems. SP 2021: 1730-1747
[c430]Oleksandr Tomashchuk
, Dimitri Van Landuyt
, Wouter Joosen:
The architectural divergence problem in security and privacy of eHealth IoT product lines. SPLC (A) 2021: 114-119
[c429]Casper Claesen, Ansar Rafique, Dimitri Van Landuyt
, Wouter Joosen:
A YCSB Workload for Benchmarking Hotspot Object Behaviour in NoSQL Databases. TPCTC 2021: 1-16
[c428]Davy Preuveneers, Sander Joos
, Wouter Joosen:
AuthGuide: Analyzing Security, Privacy and Usability Trade-Offs in Multi-factor Authentication. TrustBus 2021: 155-170
[c427]Absar-Ul-Haque Ahmar
, Thien Duc Nguyen
, Wouter Joosen, Danny Hughes:
EH-CRAM: A Sustainable Energy Harvesting Algorithm for LPWANs. WCNC 2021: 1-7
[p6]Steven Furnell
, Paul S. Haskell-Dowland
, Manish Agrawal
, Richard L. Baskerville
, Anirban Basu
, Matt Bishop
, Jorge Cuéllar, Sara Foresti
, Lynn Futcher
, Nurit Gal-Oz
, Tejaswini (Teju) Herath
, Christian Damsgaard Jensen
, Allen C. Johnston
, Wouter Joosen, Giovanni Livraga
, Javier López
, Stephen Marsh, Fabio Martinelli, Fabio Massacci
, Aljosa Pasic
, Stef Schinagl
, Abbas Shahim, Kerry-Lynn Thomson
, Jaideep Vaidya
, Tony Vance
, Merrill Warkentin
:
Information Security and Privacy - Challenges and Outlook. IFIP's Exciting First 60+ Years 2021: 383-401
[i11]Yana Dimova, Gunes Acar, Lukasz Olejnik, Wouter Joosen, Tom van Goethem:
The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion. CoRR abs/2102.09301 (2021)- 2020
[j83]Eddy Truyen
, Nane Kratzke
, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen:
Managing Feature Compatibility in Kubernetes: Vendor Comparison and Analysis. IEEE Access 8: 228420-228439 (2020)
[j82]Laurens Sion
, Pierre Dewitte
, Dimitri Van Landuyt
, Kim Wuyts
, Peggy Valcke
, Wouter Joosen:
DPMF: A Modeling Framework for Data Protection by Design. Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model. 15: 10:1-10:53 (2020)
[j81]Davy Preuveneers
, Wouter Joosen:
Automated Configuration of NoSQL Performance and Scalability Tactics for Data-Intensive Applications. Informatics 7(3): 29 (2020)
[j80]Davy Preuveneers
, Wouter Joosen, Jorge Bernal Bernabé
, Antonio F. Skarmeta
:
Distributed Security Framework for Reliable Threat Intelligence Sharing. Secur. Commun. Networks 2020: 8833765:1-8833765:15 (2020)
[j79]Davy Preuveneers
, Ilias Tsingenopoulos
, Wouter Joosen:
Resource Usage and Performance Trade-offs for Machine Learning Models in Smart Environments. Sensors 20(4): 1176 (2020)
[j78]Stefanos Peros, Stéphane Delbruel, Sam Michiels
, Wouter Joosen, Danny Hughes:
Simplifying CPS Application Development through Fine-grained, Automatic Timeout Predictions. ACM Trans. Internet Things 1(3): 18:1-18:30 (2020)
[c426]Sepideh Pouyanrad, Jan Tobias Mühlberg
, Wouter Joosen:
SCFMSP: static detection of side channels in MSP430 programs. ARES 2020: 21:1-21:10
[c425]Oleksandr Tomashchuk
, Yuan Li, Dimitri Van Landuyt
, Wouter Joosen:
Operationalization of Privacy and Security Requirements for eHealth IoT Applications in the Context of GDPR and CSL. APF 2020: 143-160
[c424]Absar-Ul-Haque Ahmar
, Emekcan Aras, Thien Duc Nguyen
, Sam Michiels
, Wouter Joosen, Danny Hughes:
CRAM: Robust Medium Access Control for LPWAN using Cryptographic Frequency Hopping. DCOSS 2020: 95-102
[c423]Emekcan Aras, Mahmoud Ammar
, Fan Yang, Wouter Joosen, Danny Hughes:
MicroVault: Reliable Storage Unit for IoT Devices. DCOSS 2020: 132-140
[c422]Vincent Reniers
, Dimitri Van Landuyt
, Ansar Rafique
, Wouter Joosen
:
A Workload-Driven Document Database Schema Recommender (DBSR). ER 2020: 471-484
[c421]Dimitri Van Landuyt
, Laurens Sion
, Pierre Dewitte
, Wouter Joosen:
The Bigger Picture: Approaches to Inter-organizational Data Protection Impact Assessment. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 283-293
[c420]Kim Wuyts
, Laurens Sion
, Wouter Joosen:
LINDDUN GO: A Lightweight Approach to Privacy Threat Modeling. EuroS&P Workshops 2020: 302-309
[c419]Laurens Sion
, Dimitri Van Landuyt
, Wouter Joosen:
The Never-Ending Story: On the Need for Continuous Privacy Impact Assessment. EuroS&P Workshops 2020: 314-317
[c418]Giuseppe Garofalo
, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
A Siamese Adversarial Anonymizer for Data Minimization in Biometric Applications. EuroS&P Workshops 2020: 334-343
[c417]Koen Yskout
, Thomas Heyman, Dimitri Van Landuyt
, Laurens Sion
, Kim Wuyts
, Wouter Joosen:
Threat modeling: from infancy to maturity. ICSE (NIER) 2020: 9-12
[c416]Laurens Sion
, Koen Yskout
, Dimitri Van Landuyt
, Alexander van Den Berghe, Wouter Joosen:
Security Threat Modeling: Are Data Flow Diagrams Enough? ICSE (Workshops) 2020: 254-257
[c415]Ashok Samraj Thangarajan
, Fan Yang, Wouter Joosen, Danny Hughes:
Deterministic 40 year battery lifetime through a hybrid perpetual sensing platform (HyPer). IOT 2020: 11:1-11:8
[c414]Eddy Truyen, Bert Lagaisse
, Wouter Joosen, Arnout Hoebreckx, Cédric De Dycker:
Flexible Migration in Blue-Green Deployments within a Fixed Cost. WOC@Middleware 2020: 13-18
[c413]Stefanos Peros, Emekcan Aras, Wouter Joosen, Danny Hughes:
Kairos: a self-configuring approach for short and accurate event timeouts in IoT. MobiQuitous 2020: 347-356
[c412]Victor Le Pochat, Tim Van hamme, Sourena Maroofi, Tom van Goethem, Davy Preuveneers, Andrzej Duda, Wouter Joosen, Maciej Korczynski:
A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints. NDSS 2020
[c411]Eddy Truyen, André Jacobs, Stef Verreydt
, Emad Heydari Beni
, Bert Lagaisse
, Wouter Joosen:
Feasibility of container orchestration for adaptive performance isolation in multi-tenant SaaS applications. SAC 2020: 162-169
[c410]Vincent Reniers, Yuan Gao, Ren Zhang
, Paolo Viviani
, Akash Madhusudan
, Bert Lagaisse
, Svetla Nikova
, Dimitri Van Landuyt
, Riccardo Lombardi, Bart Preneel
, Wouter Joosen:
Authenticated and auditable data sharing via smart contract. SAC 2020: 324-331
[c409]Dimitri Van Landuyt
, Wouter Joosen:
A descriptive study of assumptions made in LINDDUN privacy threat elicitation. SAC 2020: 1280-1287
[c408]Tom van Goethem, Christina Pöpper, Wouter Joosen, Mathy Vanhoef
:
Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections. USENIX Security Symposium 2020: 1985-2002
[i10]Eddy Truyen, Dimitri Van Landuyt, Davy Preuveneers, Bert Lagaisse, Wouter Joosen:
A Comprehensive Feature Comparison Study of Open-Source Container Orchestration Frameworks. CoRR abs/2002.02806 (2020)
[i9]Giuseppe Garofalo, Tim Van hamme, Davy Preuveneers, Wouter Joosen, Aysajan Abidin, Mustafa A. Mustafa:
Striking the Balance: Effective yet Privacy Friendly Contact Tracing. IACR Cryptol. ePrint Arch. 2020: 559 (2020)
2010 – 2019
- 2019
[j77]Gertjan Franken
, Tom van Goethem, Wouter Joosen:
Exposing Cookie Policy Flaws Through an Extensive Evaluation of Browsers and Their Extensions. IEEE Secur. Priv. 17(4): 25-34 (2019)
[j76]Vincent Reniers, Dimitri Van Landuyt
, Ansar Rafique, Wouter Joosen:
Object to NoSQL Database Mappers (ONDM): A systematic survey and comparison of frameworks. Inf. Syst. 85: 1-20 (2019)
[j75]Ansar Rafique
, Dimitri Van Landuyt
, Eddy Truyen, Vincent Reniers, Wouter Joosen:
SCOPE: self-adaptive and policy-based data management middleware for federated clouds. J. Internet Serv. Appl. 10(1): 2:1-2:19 (2019)
[j74]Emad Heydari Beni
, Bert Lagaisse
, Wouter Joosen:
Infracomposer: Policy-driven adaptive and reflective middleware for the cloudification of simulation & optimization workflows. J. Syst. Archit. 95: 36-46 (2019)
[j73]Tim Van hamme, Giuseppe Garofalo
, Enrique Argones-Rúa
, Davy Preuveneers
, Wouter Joosen:
A Systematic Comparison of Age and Gender Prediction on IMU Sensor-Based Gait Traces. Sensors 19(13): 2945 (2019)
[c407]Jan Spooren, Thomas Vissers, Peter Janssen, Wouter Joosen, Lieven Desmet
:
Premadoma: an operational solution for DNS registries to prevent malicious domain registrations. ACSAC 2019: 557-567
[c406]Tom van Goethem, Victor Le Pochat
, Wouter Joosen:
Mobile Friendly or Attacker Friendly?: A Large-scale Security Evaluation of Mobile-first Websites. AsiaCCS 2019: 206-213
[c405]Tom van Goethem, Najmeh Miramirkhani, Wouter Joosen, Nick Nikiforakis:
Purchased Fame: Exploring the Ecosystem of Private Blog Networks. AsiaCCS 2019: 366-378
[c404]Dimitri Van Landuyt
, Luuk Raaijmakers, Ansar Rafique, Wouter Joosen:
Continuous and Client-centric Trust Monitoring in Multi-cloud Storage. CLOSER 2019: 100-110
[c403]Stefanos Peros, Stéphane Delbruel
, Sam Michiels
, Wouter Joosen, Danny Hughes:
Khronos: Middleware for Simplified Time Management in CPS. DEBS 2019: 127-138
[c402]Davy Preuveneers, Wouter Joosen:
Edge-Based and Privacy-Preserving Multi-Modal Monitoring of Student Engagement in Online Learning Environments. EDGE 2019: 18-20
[c401]Dimitri Van Landuyt
, Laurens Sion
, Emiel Vandeloo, Wouter Joosen:
On the Applicability of Security and Privacy Threat Modeling for Blockchain Applications. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 195-203
[c400]Davy Preuveneers, Wouter Joosen:
Towards Multi-party Policy-based Access Control in Federations of Cloud and Edge Microservices. EuroS&P Workshops 2019: 29-38
[c399]Ilias Tsingenopoulos, Davy Preuveneers, Wouter Joosen:
AutoAttacker: A reinforcement learning approach for black-box adversarial attacks. EuroS&P Workshops 2019: 229-237
[c398]Kristof Jannes
, Bert Lagaisse
, Wouter Joosen:
The Web Browser as Distributed Application Server: Towards Decentralized Web Applications in the Edge. EdgeSys@EuroSys 2019: 7-11
[c397]Fan Yang, Ashok Samraj Thangarajan, Wouter Joosen, Christophe Huygens, Danny Hughes, Gowri Sankar Ramachandran, Bhaskar Krishnamachari:
AsTAR: Sustainable Battery Free Energy Harvesting for Heterogeneous Platforms and Dynamic Environments. EWSN 2019: 71-82
[c396]Emekcan Aras, Stéphane Delbruel, Fan Yang, Wouter Joosen, Danny Hughes:
A Low-Power Hardware Platform for Smart Environment as a Call for More Flexibility and Re-Usability. EWSN 2019: 194-205
[c395]Davy Preuveneers, Wouter Joosen:
TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE. FPS 2019: 172-188
[c394]Jan Spooren, Davy Preuveneers, Wouter Joosen:
PPG2Live: Using dual PPG for active authentication and liveness detection. ICB 2019: 1-6
[c393]Laurens Sion
, Pierre Dewitte
, Dimitri Van Landuyt
, Kim Wuyts
, Ivo Emanuilov
, Peggy Valcke
, Wouter Joosen:
An Architectural View for Data Protection by Design. ICSA 2019: 11-20
[c392]Majid Makki, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen:
Thread-Level CPU and Memory Usage Control of Custom Code in Multi-tenant SaaS. ICSOC 2019: 267-282
[c391]Laurens Sion
, Katja Tuma
, Riccardo Scandariato, Koen Yskout
, Wouter Joosen:
Towards Automated Security Design Flaw Detection. ASE Workshops 2019: 49-56
[c390]Kristof Jannes
, Bert Lagaisse
, Wouter Joosen:
You Don't Need a Ledger: Lightweight Decentralized Consensus Between Mobile Web Clients. SERIAL@Middleware 2019: 3-8
[c389]Matthijs Kaminski, Eddy Truyen, Emad Heydari Beni
, Bert Lagaisse
, Wouter Joosen:
A framework for black-box SLO tuning of multi-tenant applications in Kubernetes. WOC@Middleware 2019: 7-12
[c388]Stef Verreydt
, Emad Heydari Beni
, Eddy Truyen, Bert Lagaisse
, Wouter Joosen:
Leveraging Kubernetes for adaptive and cost-efficient resource management. WOC@Middleware 2019: 37-42
[c387]Emad Heydari Beni
, Bert Lagaisse
, Wouter Joosen, Abdelrahaman Aly, Michael Brackx:
DataBlinder: A distributed data protection middleware supporting search and computation on encrypted data. Middleware Industry 2019: 50-57
[c386]Victor Le Pochat, Tom van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczynski, Wouter Joosen:
Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. NDSS 2019
[c385]Victor Le Pochat
, Tom van Goethem, Wouter Joosen:
Funny Accents: Exploring Genuine Interest in Internationalized Domain Names. PAM 2019: 178-194
[c384]Giuseppe Garofalo
, Davy Preuveneers, Wouter Joosen:
Data Privatizer for Biometric Applications and Online Identity Management. Privacy and Identity Management 2019: 209-225
[c383]Eddy Truyen, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen:
Performance overhead of container orchestration frameworks for management of multi-tenant database deployments. SAC 2019: 156-159
[c382]Vincent Reniers, Dimitri Van Landuyt
, Paolo Viviani
, Bert Lagaisse
, Riccardo Lombardi, Wouter Joosen:
Analysis of architectural variants for auditable blockchain-based private data sharing. SAC 2019: 346-354
[c381]Pierre Dewitte
, Kim Wuyts
, Laurens Sion
, Dimitri Van Landuyt
, Ivo Emanuilov
, Peggy Valcke
, Wouter Joosen:
A comparison of system description models for data protection by design. SAC 2019: 1512-1515
[c380]Jan Spooren, Davy Preuveneers, Lieven Desmet
, Peter Janssen, Wouter Joosen:
Detection of algorithmically generated domain names used by botnets: a dual arms race. SAC 2019: 1916-1923
[c379]Laurens Sion
, Dimitri Van Landuyt
, Kim Wuyts
, Wouter Joosen:
Privacy Risk Assessment for Data Subject-Aware Threat Modeling. IEEE Symposium on Security and Privacy Workshops 2019: 64-71
[c378]Kim Wuyts
, Laurens Sion
, Dimitri Van Landuyt
, Wouter Joosen:
Knowledge is Power: Systematic Reuse of Privacy Knowledge for Threat Elicitation. IEEE Symposium on Security and Privacy Workshops 2019: 80-83
[c377]Victor Le Pochat
, Tom van Goethem, Wouter Joosen:
A Smörgåsbord of Typos: Exploring International Keyboard Layout Typosquatting. IEEE Symposium on Security and Privacy Workshops 2019: 187-192
[c376]Thomas Vissers, Peter Janssen, Wouter Joosen, Lieven Desmet
:
Assessing the Effectiveness of Domain Blacklisting Against Malicious DNS Registrations. IEEE Symposium on Security and Privacy Workshops 2019: 199-204
[c375]Majid Makki, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen:
Journal first presentation of a comparative study of workflow customization strategies: quality implications for multi-tenant SaaS. SPLC (A) 2019: 7:1
[c374]Oleksandr Tomashchuk
, Dimitri Van Landuyt
, Daniel Pletea, Kim Wuyts
, Wouter Joosen:
A Data Utility-Driven Benchmark for De-identification Methods. TrustBus 2019: 63-77
[c373]Gertjan Franken, Tom van Goethem, Wouter Joosen:
Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies. USENIX ATC 2019
[c372]Victor Le Pochat, Tom van Goethem, Wouter Joosen:
Evaluating the Long-term Effects of Parameters on the Characteristics of the Tranco Top Sites Ranking. CSET @ USENIX Security Symposium 2019
[c371]Absar-Ul-Haque Ahmar
, Emekcan Aras, Wouter Joosen, Danny Hughes:
Towards More Scalable and Secure LPWAN Networks Using Cryptographic Frequency Hopping. Wireless Days 2019: 1-4- 2018
[j72]Wito Delnat, Thomas Heyman, Wouter Joosen, Davy Preuveneers, Ansar Rafique, Eddy Truyen, Dimitri Van Landuyt
:
K8-Scalar: a workbench to compare autoscalers for container-orchestrated services (Artifact). Dagstuhl Artifacts Ser. 4(1): 03:1-03:6 (2018)
[j71]Davy Preuveneers
, Wouter Joosen, Elisabeth Ilie Zudor
:
Policy reconciliation for access control in dynamic cross-enterprise collaborations. Enterp. Inf. Syst. 12(3): 279-299 (2018)
[j70]Ansar Rafique
, Dimitri Van Landuyt
, Wouter Joosen:
PERSIST: Policy-Based Data Management Middleware for Multi-Tenant SaaS Leveraging Federated Cloud Storage. J. Grid Comput. 16(2): 165-194 (2018)
[j69]Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Managing distributed trust relationships for multi-modal authentication. J. Inf. Secur. Appl. 40: 258-270 (2018)
[j68]Majid Makki, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen:
A comparative study of workflow customization strategies: Quality implications for multi-tenant SaaS. J. Syst. Softw. 144: 423-438 (2018)
[j67]Hassaan Janjua
, Wouter Joosen, Sam Michiels
, Danny Hughes:
Trusted Operations on Sensor Data. Sensors 18(5): 1364 (2018)
[j66]Ansar Rafique, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen:
On the Performance Impact of Data Access Middleware for NoSQL Data Stores A Study of the Trade-Off between Performance and Migration Cost. IEEE Trans. Cloud Comput. 6(3): 843-856 (2018)
[c370]Eddy Truyen, Matt Bruzek, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen:
Evaluation of Container Orchestration Systems for Deploying and Managing NoSQL Database Clusters. IEEE CLOUD 2018: 468-475
[c369]Tim Van hamme, Enrique Argones-Rúa, Davy Preuveneers, Wouter Joosen:
Gait template protection using HMM-UBM. BIOSIG 2018: 1-8
[c368]Davy Preuveneers, Wouter Joosen, Elisabeth Ilie Zudor
:
Robust Digital Twin Compositions for Industry 4.0 Smart Manufacturing Systems. EDOC Workshops 2018: 69-78
[c367]Victor Le Pochat
, Tom van Goethem, Wouter Joosen:
Idea: Visual Analytics for Web Security. ESSoS 2018: 124-132
[c366]Laurens Sion
, Kim Wuyts
, Koen Yskout
, Dimitri Van Landuyt
, Wouter Joosen:
Interaction-Based Privacy Threat Elicitation. EuroS&P Workshops 2018: 79-86
[c365]Stefanos Peros, Hassaan Janjua
, Sven Akkermans
, Wouter Joosen, Danny Hughes:
Dynamic QoS support for IoT backhaul networks through SDN. FMEC 2018: 187-192
[c364]Laurens Sion
, Dimitri Van Landuyt
, Koen Yskout
, Wouter Joosen:
SPARTA: Security & Privacy Architecture Through Risk-Driven Threat Assessment. ICSA Companion 2018: 89-92
[c363]Laurens Sion
, Koen Yskout
, Dimitri Van Landuyt
, Wouter Joosen:
Risk-based design security analysis. SEAD@ICSE 2018: 11-18
[c362]Wito Delnat, Eddy Truyen, Ansar Rafique, Dimitri Van Landuyt
, Wouter Joosen:
K8-scalar: a workbench to compare autoscalers for container-orchestrated database clusters. SEAMS@ICSE 2018: 33-39
[c361]Alexander van Den Berghe, Koen Yskout
, Wouter Joosen:
Security patterns 2.0: towards security patterns based on security building blocks. SEAD@ICSE 2018: 45-48
[c360]Laurens Sion
, Koen Yskout
, Dimitri Van Landuyt
, Wouter Joosen:
Knowledge-enriched security and privacy threat modeling. ICSE (Companion Volume) 2018: 290-291
[c359]Dimitri Jonckers, Bert Lagaisse
, Wouter Joosen:
Expect the unexpected: Towards a middleware for policy adaptation in IoT platforms. M4IoT@Middleware 2018: 7-10
[c358]Ashok Samraj Thangarajan
, Fan Yang
, Wouter Joosen, Danny Hughes:
Real-time Distributed In-Situ Benchmarking of Energy Harvesting IoT Devices. M4IoT@Middleware 2018: 19-24
[c357]Sven Akkermans, Bruno Crispo, Wouter Joosen, Danny Hughes:
Polyglot CerberOS: Resource Security, Interoperability and Multi-Tenancy for IoT Services on a Multilingual Platform. MobiQuitous 2018: 59-68
[c356]Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom van Goethem, Wouter Joosen:
Automated Website Fingerprinting through Deep Learning. NDSS 2018
[c355]Majid Makki, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen, Nick Hofstede:
Transparent IO access control for application-level tenant isolation. SAC 2018: 143-150
[c354]Kim Wuyts
, Dimitri Van Landuyt
, Aram Hovsepyan, Wouter Joosen:
Effective and efficient privacy threat modeling through domain refinements. SAC 2018: 1175-1178
[c353]Laurens Sion
, Koen Yskout
, Dimitri Van Landuyt
, Wouter Joosen:
Solution-aware data flow diagrams for security threat modeling. SAC 2018: 1425-1432
[c352]Alexander van Den Berghe, Koen Yskout
, Riccardo Scandariato, Wouter Joosen:
A Lingua Franca for Security by Design. SecDev 2018: 69-76
[c351]Gertjan Franken, Tom van Goethem, Wouter Joosen:
Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies. USENIX Security Symposium 2018: 151-168
[c350]Giuseppe Garofalo, Vera Rimmer, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Fishy Faces: Crafting Adversarial Images to Poison Face Authentication. WOOT @ USENIX Security Symposium 2018
[c349]Sven Akkermans, Stefanos Peros, Nicolas J. Small, Wouter Joosen, Danny Hughes:
Supporting IoT Application Middleware on Edge and Cloud Infrastructures. ZEUS 2018: 40-46
[i8]Tim Van hamme, Vera Rimmer, Davy Preuveneers, Wouter Joosen, Mustafa A. Mustafa
, Aysajan Abidin, Enrique Argones-Rúa:
Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities. CoRR abs/1802.07233 (2018)
[i7]Victor Le Pochat, Tom van Goethem, Wouter Joosen:
Rigging Research Results by Manipulating Top Websites Rankings. CoRR abs/1806.01156 (2018)- 2017
[j65]Davy Preuveneers
, Wouter Joosen:
Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows. Future Internet 9(4): 58 (2017)
[j64]Davy Preuveneers
, Wouter Joosen, Elisabeth Ilie Zudor
:
Trustworthy data-driven networked production for customer-centric plants. Ind. Manag. Data Syst. 117(10): 2305-2324 (2017)
[j63]Vincent Reniers
, Ansar Rafique, Dimitri Van Landuyt
, Wouter Joosen:
Object-NoSQL Database Mappers: a benchmark study on the performance overhead. J. Internet Serv. Appl. 8(1): 1:1-1:16 (2017)
[j62]Davy Preuveneers
, Wouter Joosen:
QoC2 Breaker: intelligent software circuit breakers for fault-tolerant distributed context-aware applications. J. Reliab. Intell. Environ. 3(1): 5-20 (2017)
[j61]Jan Spooren, Davy Preuveneers
, Wouter Joosen:
Leveraging Battery Usage from Mobile Devices for Active Authentication. Mob. Inf. Syst. 2017: 1367064:1-1367064:14 (2017)
[j60]Alexander van Den Berghe, Riccardo Scandariato, Koen Yskout
, Wouter Joosen:
Design notations for secure software: a systematic literature review. Softw. Syst. Model. 16(3): 809-831 (2017)
[c348]Vincent Reniers, Dimitri Van Landuyt
, Ansar Rafique, Wouter Joosen:
Schema design support for semi-structured data: Finding the sweet spot between NF and De-NF. IEEE BigData 2017: 2921-2930
[c347]Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczynski, Arman Noroozian, Rainer Böhme, Tyler Moore
, Wouter Joosen, Michel van Eeten:
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting. CCS 2017: 553-567
[c346]Thomas Vissers, Timothy Barron, Tom van Goethem, Wouter Joosen, Nick Nikiforakis:
The Wolf of Name Street: Hijacking Domains Through Their Nameservers. CCS 2017: 957-970
[c345]Gowri Sankar Ramachandran
, Fan Yang
, Piers W. Lawrence, Sam Michiels
, Wouter Joosen, Danny Hughes:
μPnP-WAN: Experiences with LoRa and its deployment in DR Congo. COMSNETS 2017: 63-70
[c344]Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Improving Resilience of Behaviometric Based Continuous Authentication with Multiple Accelerometers. DBSec 2017: 473-485
[c343]Ping Chen, Jonas Visschers
, Cedric Verstraete, Letizia Paoli
, Christophe Huygens
, Lieven Desmet
, Wouter Joosen:
The relationship between the cost of cybercrime and web security posture: a case study on Belgian companies. ECSA (Companion) 2017: 115-120
[c342]Majid Makki, Dimitri Van Landuyt
, Wouter Joosen:
Towards PaaS Offering of BPMN 2.0 Engines: A Proposal for Service-Level Tenant Isolation. ESOCC Workshops 2017: 5-19
[c341]Jasper Bogaerts, Bert Lagaisse
, Wouter Joosen:
SEQUOIA: Scalable Policy-Based Access Control for Search Operations in Data-Driven Applications. ESSoS 2017: 1-18
[c340]Emad Heydari Beni
, Bert Lagaisse
, Ren Zhang, Danny De Cock, Filipe Beato, Wouter Joosen:
A Voucher-Based Security Middleware for Secure Business Process Outsourcing. ESSoS 2017: 19-35
[c339]Ansar Rafique, Dimitri Van Landuyt
, Vincent Reniers, Wouter Joosen:
Towards an Adaptive Middleware for Efficient Multi-Cloud Data Storage. CCB@EuroSys 2017: 4:1-4:6
[c338]Alexander van Den Berghe, Koen Yskout
, Riccardo Scandariato, Wouter Joosen:
A Model for Provably Secure Software Design. FormaliSE@ICSE 2017: 3-9
[c337]Koen Yskout
, Dimitri Van Landuyt
, Wouter Joosen:
Towards a Platform for Empirical Software Design Studies. ECASE@ICSE 2017: 3-7
[c336]Dimitri Van Landuyt
, Fatih Gey, Eddy Truyen, Wouter Joosen:
Middleware for Dynamic Upgrade Activation and Compensations in Multi-tenant SaaS. ICSOC 2017: 340-348
[c335]Tim Van hamme, Davy Preuveneers, Wouter Joosen:
A dynamic decision fusion middleware for trustworthy context-aware IoT applications. M4IoT@Middleware 2017: 1-6
[c334]Emad Heydari Beni
, Bert Lagaisse
, Wouter Joosen:
Adaptive and reflective middleware for the cloudification of simulation & optimization workflows. ARM@Middleware 2017: 2:1-2:6
[c333]Dimitri Jonckers, Aram Hovsepyan, Bert Lagaisse
, Wouter Joosen:
A shared multi-stakeholder platform for IoT: poster. Middleware Posters and Demos 2017: 5-6
[c332]Wilfried Daniels, Danny Hughes, Mahmoud Ammar
, Bruno Crispo, Nelson Matthys, Wouter Joosen:
SμV - the security microvisor: a virtualisation-based security middleware for the internet of things. Middleware Industry 2017: 36-42
[c331]Emekcan Aras, Nicolas J. Small, Gowri Sankar Ramachandran
, Stéphane Delbruel
, Wouter Joosen, Danny Hughes:
Selective Jamming of LoRaWAN using Commodity Hardware. MobiQuitous 2017: 363-372
[c330]Hassaan Janjua
, Wouter Joosen, Sam Michiels
, Danny Hughes:
Trusted Operations On Mobile Phones. MobiQuitous 2017: 452-459
[c329]Nicolas J. Small, Sven Akkermans
, Wouter Joosen, Danny Hughes:
Niflheim: An end-to-end middleware for applications on a multi-tier IoT infrastructure. NCA 2017: 209-216
[c328]Laurens Sion
, Koen Yskout
, Riccardo Scandariato, Wouter Joosen:
A Modular Meta-model for Security Solutions. Programming 2017: 16:1-16:5
[c327]Thomas Vissers, Jan Spooren, Pieter Agten, Dirk Jumpertz, Peter Janssen, Marc Van Wesemael, Frank Piessens, Wouter Joosen, Lieven Desmet
:
Exploring the Ecosystem of Malicious Domain Registrations in the .eu TLD. RAID 2017: 472-493
[c326]Davy Preuveneers, Bavo Goosens, Wouter Joosen:
Enhanced fraud detection as a service supporting merchant-specific runtime customization. SAC 2017: 72-76
[c325]Ansar Rafique, Dimitri Van Landuyt
, Vincent Reniers, Wouter Joosen:
Towards scalable and dynamic data encryption for multi-tenant SaaS. SAC 2017: 411-416
[c324]Davy Preuveneers, Wouter Joosen, Elisabeth Ilie Zudor
:
Identity management for cyber-physical production workflows and individualized manufacturing in industry 4.0. SAC 2017: 1452-1455
[c323]Gabriele Vassallo, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Privacy-Preserving Behavioral Authentication on Smartphones. HumanSys@SenSys 2017: 1-6
[c322]Sven Akkermans, Nicolas J. Small, Wouter Joosen, Danny Hughes:
Niflheim: End-to-End Middleware for Applications Across all Tiers of the IoT. SenSys 2017: 41:1-41:2
[c321]Ansar Rafique, Dimitri Van Landuyt
, Vincent Reniers, Wouter Joosen:
Leveraging NoSQL for Scalable and Dynamic Data Encryption in Multi-tenant SaaS. TrustCom/BigDataSE/ICESS 2017: 885-892
[c320]Tom van Goethem, Wouter Joosen:
One Side-Channel to Bring Them All and in the Darkness Bind Them: Associating Isolated Browsing Sessions. WOOT 2017
[c319]Vincent Reniers, Dimitri Van Landuyt
, Ansar Rafique, Wouter Joosen:
On the State of NoSQL Benchmarks. ICPE Companion 2017: 107-112
[p5]Davy Preuveneers, Arun Ramakrishnan, Tim Van hamme, Vera Rimmer, Yolande Berbers, Wouter Joosen:
A Survey on Applying Machine Learning Techniques for Behavioral Awareness. State of the Art in AI Applied to Ambient Intelligence 2017: 1-34
[i6]Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom van Goethem, Wouter Joosen:
Automated Feature Extraction for Website Fingerprinting through Deep Learning. CoRR abs/1708.06376 (2017)
[i5]Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczynski, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten:
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting. CoRR abs/1708.06693 (2017)
[i4]Emekcan Aras, Nicolas J. Small, Gowri Sankar Ramachandran, Stéphane Delbruel, Wouter Joosen, Danny Hughes:
Selective Jamming of LoRaWAN using Commodity Hardware. CoRR abs/1712.02141 (2017)- 2016
[j59]Davy Preuveneers, Yolande Berbers, Wouter Joosen:
SAMURAI: A batch and streaming context architecture for large-scale intelligent applications and environments. J. Ambient Intell. Smart Environ. 8(1): 63-78 (2016)
[j58]Davy Preuveneers, Wouter Joosen:
Security and privacy controls for streaming data in extended intelligent environments. J. Ambient Intell. Smart Environ. 8(4): 467-483 (2016)
[j57]Gowri Sankar Ramachandran
, José Proença
, Wilfried Daniels, Mario Pickavet
, Dimitri Staessens, Christophe Huygens
, Wouter Joosen, Danny Hughes:
Hitch Hiker 2.0: a binding model with flexible data aggregation for the Internet-of-Things. J. Internet Serv. Appl. 7(1): 4:1-4:15 (2016)
[j56]Davy Preuveneers, Wouter Joosen:
Semantic analysis and verification of context-driven adaptive applications in intelligent environments. J. Reliab. Intell. Environ. 2(2): 53-73 (2016)
[j55]Davy Preuveneers, Thomas Heyman, Yolande Berbers, Wouter Joosen:
Systematic scalability assessment for feature oriented multi-tenant services. J. Syst. Softw. 116: 162-176 (2016)
[j54]Christophe Huygens
, Nelson Matthys, Wouter Joosen:
Optimizing resource and data security in shared sensor networks. Secur. Commun. Networks 9(2): 149-165 (2016)
[c318]Gowri Sankar Ramachandran
, Nelson Matthys, Wilfried Daniels, Wouter Joosen, Danny Hughes:
Building Dynamic and Dependable Component-Based Internet-of-Things Applications with Dawn. CBSE 2016: 97-106
[c317]Aram Hovsepyan, Riccardo Scandariato, Wouter Joosen:
Is Newer Always Better?: The Case of Vulnerability Prediction Models. ESEM 2016: 26:1-26:6
[c316]Tom van Goethem, Wout Scheepers, Davy Preuveneers, Wouter Joosen:
Accelerometer-Based Device Fingerprinting for Multi-factor Mobile Authentication. ESSoS 2016: 106-121
[c315]Jasper Bogaerts, Bert Lagaisse
, Wouter Joosen:
Idea: Supporting Policy-Based Access Control on Database Systems. ESSoS 2016: 251-259
[c314]Majid Makki, Dimitri Van Landuyt
, Wouter Joosen:
Automated regression testing of BPMN 2.0 processes: a capture and replay framework for continuous delivery. GPCE 2016: 178-189
[c313]Davy Preuveneers, Nayyab Zia Naqvi, Arun Ramakrishnan, Yolande Berbers, Wouter Joosen:
Adaptive Dissemination for Mobile Electronic Health Record Applications with Proactive Situational Awareness. HICSS 2016: 3229-3238
[c312]Davy Preuveneers, Thomas Heyman, Yolande Berbers, Wouter Joosen:
Feature-Based Variability Management for Scalable Enterprise Applications: Experiences with an E-Payment Case. HICSS 2016: 5793-5802
[c311]Sven Akkermans
, Rafael Bachiller, Nelson Matthys, Wouter Joosen, Danny Hughes, Malisa Vucinic
:
Towards efficient publish-subscribe middleware in the IoT with IPv6 multicast. ICC 2016: 1-6
[c310]Fatih Gey, Dimitri Van Landuyt
, Wouter Joosen:
Evolving multi-tenant SaaS applications through self-adaptive upgrade enactment and tenant mediation. SEAMS@ICSE 2016: 151-157
[c309]Davy Preuveneers, Wouter Joosen, Elisabeth Ilie Zudor
:
Data Protection Compliance Regulations and Implications for Smart Factories of the Future. Intelligent Environments 2016: 40-47
[c308]Fan Yang
, Gowri Sankar Ramachandran
, Piers W. Lawrence, Sam Michiels
, Wouter Joosen, Danny Hughes:
μPnP-WAN: Wide area plug and play sensing and actuation with LoRa. ISOCC 2016: 225-226
[c307]Klaas Thoelen, Nicolas J. Small
, Sam Michiels
, Wouter Joosen, Danny Hughes:
Component-based Orchestration of Dynamic IaaS Applications. ARM@Middleware 2016: 2:1-2:6
[c306]Eddy Truyen, Dimitri Van Landuyt
, Vincent Reniers, Ansar Rafique, Bert Lagaisse
, Wouter Joosen:
Towards a container-based architecture for multi-tenant SaaS applications. ARM@Middleware 2016: 6:1-6:6
[c305]M. Zubair Rafique, Tom van Goethem, Wouter Joosen, Christophe Huygens, Nick Nikiforakis:
It's Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services. NDSS 2016
[c304]Davy Preuveneers, Wouter Joosen:
Privacy-enabled remote health monitoring applications for resource constrained wearable devices. SAC 2016: 119-124
[c303]Majid Makki, Dimitri Van Landuyt
, Stefan Walraven, Wouter Joosen:
Scalable and manageable customization of workflows in multi-tenant SaaS offerings. SAC 2016: 432-439
[c302]Ping Chen, Christophe Huygens
, Lieven Desmet
, Wouter Joosen:
Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware. SEC 2016: 323-336
[c301]Nelson Matthys, Fan Yang
, Wilfried Daniels, Wouter Joosen, Danny Hughes:
Demonstration of MicroPnP: The Zero-Configuration Wireless Sensing and Actuation Platform. SECON 2016: 1-2
[c300]Majid Makki, Dimitri Van Landuyt, Wouter Joosen:
Automated workflow regression testing for multi-tenant SaaS: integrated support in self-service configuration dashboard. A-TEST@SIGSOFT FSE 2016: 70-73
[c299]Laurens Sion
, Dimitri Van Landuyt
, Wouter Joosen, Gjalt de Jong:
Systematic quality trade-off support in the software product-line configuration process. SPLC 2016: 164-173
[c298]Laurens Sion
, Dimitri Van Landuyt
, Koen Yskout
, Wouter Joosen:
Towards systematically addressing security variability in software product lines. SPLC 2016: 342-343
[c297]Tom van Goethem, Mathy Vanhoef, Frank Piessens, Wouter Joosen:
Request and Conquer: Exposing Cross-Origin Resource Size. USENIX Security Symposium 2016: 447-462
[c296]Ping Chen, Lieven Desmet
, Christophe Huygens
, Wouter Joosen:
Longitudinal Study of the Use of Client-side Security Mechanisms on the European Web. WWW (Companion Volume) 2016: 457-462- 2015
[j53]Jef Maerien, Sam Michiels
, Danny Hughes, Christophe Huygens
, Wouter Joosen:
SecLooCI: A comprehensive security middleware architecture for shared wireless sensor networks. Ad Hoc Networks 25: 141-169 (2015)
[j52]Philippe De Ryck, Nick Nikiforakis, Lieven Desmet
, Frank Piessens, Wouter Joosen:
Protected Web Components: Hiding Sensitive Information in the Shadows. IT Prof. 17(1): 36-43 (2015)
[j51]Stefan Walraven, Dimitri Van Landuyt
, Ansar Rafique, Bert Lagaisse
, Wouter Joosen:
PaaSHopper: Policy-driven middleware for multi-PaaS environments. J. Internet Serv. Appl. 6(1): 2:1-2:14 (2015)
[j50]Riccardo Scandariato, Kim Wuyts
, Wouter Joosen:
A descriptive study of Microsoft's threat modeling technique. Requir. Eng. 20(2): 163-180 (2015)
[c295]Maarten Decat, Bert Lagaisse
, Wouter Joosen:
Scalable and Secure Concurrent Evaluation of History-based Access Control Policies. ACSAC 2015: 281-290
[c294]Jasper Bogaerts, Maarten Decat, Bert Lagaisse
, Wouter Joosen:
Entity-Based Access Control: supporting more expressive access control policies. ACSAC 2015: 291-300
[c293]Ansar Rafique, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen:
Policy-Driven Data Management Middleware for Multi-cloud Storage in Multi-tenant SaaS. BDC 2015: 78-84
[c292]Maarten Decat, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
On the Need for Federated Authorization in Cross-organizational e-Health Platforms. HEALTHINF 2015: 540-545
[c291]Wilfried Daniels, José Proença
, Dave Clarke, Wouter Joosen, Danny Hughes:
Refraction: Low-Cost Management of Reflective Meta-Data in Pervasive Component-Based Applications. CBSE 2015: 27-36
[c290]Gowri Sankar Ramachandran
, Wilfried Daniels, José Proença
, Sam Michiels
, Wouter Joosen, Danny Hughes, Barry Porter
:
Hitch Hiker: A Remote Binding Model with Priority Based Data Aggregation for Wireless Sensor Networks. CBSE 2015: 43-48
[c289]Tom van Goethem, Wouter Joosen, Nick Nikiforakis:
The Clock is Still Ticking: Timing Attacks in the Modern Web. CCS 2015: 1382-1393
[c288]Thomas Vissers, Tom van Goethem, Wouter Joosen, Nick Nikiforakis:
Maneuvering Around Clouds: Bypassing Cloud-based Security Providers. CCS 2015: 1530-1541
[c287]Steven Van Acker, Daniel Hausknecht, Wouter Joosen, Andrei Sabelfeld:
Password Meters and Generators on the Web: From Large-Scale Empirical Study to Getting It Right. CODASPY 2015: 253-262
[c286]Maarten Decat, Jasper Moeys, Bert Lagaisse, Wouter Joosen:
Improving Reuse of Attribute-Based Access Control Policies Using Policy Templates. ESSoS 2015: 196-210
[c285]Jan Spooren, Davy Preuveneers, Wouter Joosen:
Mobile device fingerprinting considered harmful for risk-based authentication. EUROSEC 2015: 6:1-6:6
[c284]Fan Yang
, Nelson Matthys, Rafael Bachiller, Sam Michiels, Wouter Joosen, Danny Hughes:
μPnP: plug and play peripherals for the internet of things. EuroSys 2015: 25:1-25:14
[c283]Dimitri Van Landuyt
, Wouter Joosen:
On the Role of Early Architectural Assumptions in Quality Attribute Scenarios: A Qualitative and Quantitative Study. TwinPeaks@ICSE 2015: 9-15
[c282]Fatih Gey, Dimitri Van Landuyt
, Wouter Joosen, Viviane Jonckers:
Continuous Evolution of Multi-tenant SaaS Applications: A Customizable Dynamic Adaptation Approach. PESOS@ICSE 2015: 10-16
[c281]Laurens Sion
, Koen Yskout
, Alexander van Den Berghe, Riccardo Scandariato, Wouter Joosen:
MASC: Modelling Architectural Security Concerns. MiSE@ICSE 2015: 36-41
[c280]Koen Yskout
, Riccardo Scandariato, Wouter Joosen:
Do Security Patterns Really Help Designers? ICSE (1) 2015: 292-302
[c279]Davy Preuveneers, Wouter Joosen:
Change Impact Analysis for Context-Aware Applications in Intelligent Environments. Intelligent Environments (Workshops) 2015: 70-81
[c278]Davy Preuveneers, Wouter Joosen:
SparkXS: Efficient Access Control for Intelligent and Large-Scale Streaming Data Applications. Intelligent Environments 2015: 96-103
[c277]Emad Heydari Beni
, Bert Lagaisse
, Wouter Joosen:
WF-Interop: Adaptive and Reflective REST Interfaces for Interoperability between Workflow Engines. ARM@Middleware 2015: 1:1-1:6
[c276]Wilfried Daniels, Fan Yang
, Nelson Matthys, Wouter Joosen, Danny Hughes:
Demo: Enabling Plug-and-Play for the Internet of Things. Middleware Posters and Demos 2015: 2:1-2:2
[c275]Arnaud Schoonjans, Bert Lagaisse
, Wouter Joosen:
Advanced monitoring and smart auto-scaling of NoSQL systems. Middleware Doctoral Symposium 2015: 3:1-3:4
[c274]Arnaud Schoonjans, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen:
On the suitability of black-box performance monitoring for SLA-driven cloud provisioning scenarios. ARM@Middleware 2015: 6:1-6:6
[c273]Wilfried Daniels, José Proença
, Nelson Matthys, Wouter Joosen, Danny Hughes:
Tomography: lowering management overhead for distributed component-based applications. M4IoT@Middleware 2015: 13-18
[c272]Gowri Sankar Ramachandran
, Nelson Matthys, Sam Michiels
, Wouter Joosen, Danny Hughes:
Dawn: Dependable Networking Framework for Multimedia-enabled Internet-of-Things. MoMM 2015: 211-215
[c271]Rafael Bachiller, Nelson Matthys, Javier del Cid, Wouter Joosen, Danny Hughes, Kristof Van Laerhoven
:
@migo: A Comprehensive Middleware Solution for Participatory Sensing Applications. NCA 2015: 1-8
[c270]Klaas Thoelen, Wouter Joosen, Danny Hughes:
Putting Sense inside Sensor Systems: A Coordinated Approach to Messaging. NCA 2015: 22-26
[c269]Pieter Agten, Wouter Joosen, Frank Piessens, Nick Nikiforakis:
Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse. NDSS 2015
[c268]Thomas Vissers, Wouter Joosen, Nick Nikiforakis:
Parking Sensors: Analyzing and Detecting Parked Domains. NDSS 2015
[c267]Maarten Decat, Jasper Bogaerts, Bert Lagaisse
, Wouter Joosen:
Amusa: middleware for efficient access control management of multi-tenant SaaS applications. SAC 2015: 2141-2148
[c266]Philippe De Ryck, Lieven Desmet
, Frank Piessens, Wouter Joosen:
SecSess: keeping your session tucked away in your browser. SAC 2015: 2171-2176
[c265]Davy Preuveneers, Wouter Joosen:
SmartAuth: dynamic context fingerprinting for continuous user authentication. SAC 2015: 2185-2191
[c264]Dimitri Van Landuyt
, Stefan Walraven, Wouter Joosen:
Variability middleware for multi-tenant SaaS applications: a research roadmap for service lines. SPLC 2015: 211-215
[c263]Ansar Rafique, Dimitri Van Landuyt
, Wouter Joosen:
Expressive Data Storage Policies for Multi-cloud Storage Configurations. SYNASC 2015: 329-336
[c262]Fatih Gey, Dimitri Van Landuyt
, Wouter Joosen:
Middleware for Customizable Multi-staged Dynamic Upgrades of Multi-tenant SaaS Applications. UCC 2015: 102-111
[c261]Stefan Walraven, Wouter De Borger, Bart Van Brabant, Bert Lagaisse
, Dimitri Van Landuyt
, Wouter Joosen:
Adaptive Performance Isolation Middleware for Multi-tenant SaaS. UCC 2015: 112-121
[c260]Nelson Matthys, Fan Yang
, Wilfried Daniels, Sam Michiels
, Wouter Joosen, Danny Hughes, Thomas Watteyne:
μPnP-Mesh: The plug-and-play mesh network for the Internet of Things. WF-IoT 2015: 311-315
[c259]Nick Nikiforakis, Wouter Joosen, Benjamin Livshits:
PriVaricator: Deceiving Fingerprinters with Little White Lies. WWW 2015: 820-830
[e6]Ivan Beschastnikh, Wouter Joosen:
Proceedings of the Doctoral Symposium of the 16th International Middleware Conference, Middleware Doct Symposium 2015, Vancouver, BC, Canada, December 7-11, 2015. ACM 2015, ISBN 978-1-4503-3728-1 [contents]- 2014
[j49]Stefan Walraven, Eddy Truyen, Wouter Joosen:
Comparing PaaS offerings in light of SaaS development - A comparison of PaaS platforms based on a practical case study. Computing 96(8): 669-724 (2014)
[j48]Caren Crowley, Wilfried Daniels, Rafael Bachiller, Wouter Joosen, Danny Hughes:
Increasing user participation: An exploratory study of querying on the Facebook and Twitter platforms. First Monday 19(8) (2014)
[j47]Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna:
On the Workings and Current Practices of Web-Based Device Fingerprinting. IEEE Secur. Priv. 12(3): 28-36 (2014)
[j46]Aram Hovsepyan, Riccardo Scandariato, Maximilian Steff, Wouter Joosen:
Design Churn as Predictor of Vulnerabilities? Int. J. Secur. Softw. Eng. 5(3): 16-31 (2014)
[j45]Dries Geebelen, Kristof Geebelen, Eddy Truyen, Sam Michiels
, Johan A. K. Suykens
, Joos Vandewalle, Wouter Joosen:
QoS prediction for web service compositions using kernel-based quantile estimation with online adaptation of the constant offset. Inf. Sci. 268: 397-424 (2014)
[j44]Maarten Decat, Bert Lagaisse
, Wouter Joosen:
Middleware for efficient and confidentiality-aware federation of access control policies. J. Internet Serv. Appl. 5(1): 1:1-1:15 (2014)
[j43]Hendrik Moens, Eddy Truyen, Stefan Walraven, Wouter Joosen, Bart Dhoedt, Filip De Turck
:
Cost-Effective Feature Placement of Customizable Multi-Tenant Applications in the Cloud. J. Netw. Syst. Manag. 22(4): 517-558 (2014)
[j42]Stefan Walraven, Dimitri Van Landuyt
, Eddy Truyen, Koen Handekyn, Wouter Joosen:
Efficient customization of multi-tenant Software-as-a-Service applications with service lines. J. Syst. Softw. 91: 48-62 (2014)
[j41]Kim Wuyts
, Riccardo Scandariato, Wouter Joosen:
Empirical evaluation of a privacy-focused threat modeling methodology. J. Syst. Softw. 96: 122-138 (2014)
[j40]Marko van Dooren, Bart Jacobs
, Wouter Joosen:
Modular type checking of anchored exception declarations. Sci. Comput. Program. 87: 44-61 (2014)
[j39]Koen Yskout
, Riccardo Scandariato, Wouter Joosen:
Change patterns - Co-evolving requirements and architecture. Softw. Syst. Model. 13(2): 625-648 (2014)
[j38]Riccardo Scandariato, James Walden
, Aram Hovsepyan, Wouter Joosen:
Predicting Vulnerable Software Components via Text Mining. IEEE Trans. Software Eng. 40(10): 993-1006 (2014)
[c258]M. Zubair Rafique, Juan Caballero, Christophe Huygens
, Wouter Joosen:
Network dialog minimization and network dialog diffing: two novel primitives for network security applications. ACSAC 2014: 166-175
[c257]Pedro Javier del Cid, Danny Hughes, Sam Michiels
, Wouter Joosen:
Ensuring application integrity in shared sensing environments. CBSE 2014: 149-158
[c256]Steven Van Acker, Nick Nikiforakis, Lieven Desmet
, Frank Piessens, Wouter Joosen:
Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets. AsiaCCS 2014: 525-530
[c255]Tom van Goethem, Frank Piessens, Wouter Joosen, Nick Nikiforakis:
Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals. CCS 2014: 918-929
[c254]Dimitri Van Landuyt
, Wouter Joosen:
Modularizing Early Architectural Assumptions in Scenario-Based Requirements. FASE 2014: 170-184
[c253]Thomas Heyman, Davy Preuveneers, Wouter Joosen:
Scalar: Systematic Scalability Analysis with the Universal Scalability Law. FiCloud 2014: 497-504
[c252]Thomas Heyman, Davy Preuveneers, Wouter Joosen:
Scalability Analysis of the OpenAM Access Control System with the Universal Scalability Law. FiCloud 2014: 505-512
[c251]M. Zubair Rafique, Ping Chen, Christophe Huygens
, Wouter Joosen:
Evolutionary algorithms for classification of malware families through different network behaviors. GECCO 2014: 1167-1174
[c250]Danny Hughes, Caren Crowley, Wilfried Daniels, Rafael Bachiller, Wouter Joosen:
User-Rank: Generic Query Optimization for Participatory Social Applications. HICSS 2014: 1874-1883
[c249]Ansar Rafique, Stefan Walraven, Bert Lagaisse
, Tom Desair, Wouter Joosen:
Towards portability and interoperability support in middleware for hybrid clouds. INFOCOM Workshops 2014: 7-12
[c248]Nick Nikiforakis, Marco Balduzzi, Lieven Desmet, Frank Piessens, Wouter Joosen:
Soundsquatting: Uncovering the Use of Homophones in Domain Squatting. ISC 2014: 291-308
[c247]Bart Van Brabant, Wouter Joosen:
Configuration management as a multi-cloud enabler. CCB@Middleware 2014: 1:1-1:3
[c246]Jef Maerien, Sam Michiels
, Christophe Huygens
, Danny Hughes, Wouter Joosen:
Enabling resource sharing in heterogeneous wireless sensor networks. M4IoT@Middleware 2014: 7-12
[c245]Fatih Gey, Dimitri Van Landuyt, Stefan Walraven, Wouter Joosen:
Feature Models at Run Time: Feature Middleware for Multi-tenant SaaS applications. Models@run.time 2014: 21-30
[c244]Aram Hovsepyan, Dimitri Van Landuyt, Steven Op de beeck, Sam Michiels, Wouter Joosen, Gustavo Rangel, Javier Fernandez Briones, Jan Depauw:
Model-Driven Software Development of Safety-Critical Avionics Systems: an Experience Report. MD2P2@MoDELS 2014: 28-37
[c243]Pieter-Jan Maenhaut
, Hendrik Moens, Maarten Decat, Jasper Bogaerts, Bert Lagaisse
, Wouter Joosen, Veerle Ongenae, Filip De Turck:
Characterizing the performance of tenant data management in multi-tenant cloud authorization systems. NOMS 2014: 1-8
[c242]Davy Preuveneers, Wouter Joosen:
Federated Privileged Identity Management for Break-the-Glass: A Case Study with OpenAM. PAHI 2014: 37-52
[c241]Thomas Heyman, Davy Preuveneers, Wouter Joosen:
Scalar: A Distributed Scalability Analysis Framework. QEST 2014: 241-244
[c240]Dimitri Van Landuyt
, Steven Op de beeck, Aram Hovsepyan, Sam Michiels
, Wouter Joosen, Sven Meynckens, Gjalt de Jong, Olivier Barais
, Mathieu Acher:
Towards managing variability in the safety design of an automotive hall effect sensor. SPLC 2014: 304-309
[c239]Tom van Goethem, Ping Chen, Nick Nikiforakis, Lieven Desmet, Wouter Joosen:
Large-Scale Security Analysis of the Web: Challenges and Findings. TRUST 2014: 110-126
[c238]Nick Nikiforakis, Federico Maggi
, Gianluca Stringhini, M. Zubair Rafique, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna, Stefano Zanero
:
Stranger danger: exploring the ecosystem of ad-based URL shortening services. WWW 2014: 51-62
[p4]Riccardo Scandariato, Federica Paci, Le Minh Sang Tran, Katsiaryna Labunets, Koen Yskout
, Fabio Massacci
, Wouter Joosen:
Empirical Assessment of Security Requirements and Architecture: Lessons Learned. Engineering Secure Future Internet Services and Systems 2014: 35-64
[e5]Wouter Joosen, Fabio Martinelli, Thomas Heyman:
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), Munich, Germany, February 26, 2014. CEUR Workshop Proceedings 1298, CEUR-WS.org 2014 [contents]
[e4]Wouter Joosen, Luís Veiga:
Proceedings of the 11th Middleware Doctoral Symposium 2014, Bordeaux, France, December 8-9, 2014. ACM 2014, ISBN 978-1-4503-3221-7 [contents]
[e3]Maritta Heisel, Wouter Joosen, Javier López, Fabio Martinelli:
Engineering Secure Future Internet Services and Systems - Current Research. Lecture Notes in Computer Science 8431, Springer 2014, ISBN 978-3-319-07451-1 [contents]
[i3]Francesco Gadaleta, Nick Nikiforakis, Jan Tobias Mühlberg, Wouter Joosen:
HyperForce: Hypervisor-enForced Execution of Security-Critical Code. CoRR abs/1405.5648 (2014)
[i2]Francesco Gadaleta, Nick Nikiforakis, Yves Younan, Wouter Joosen:
Hello rootKitty: A lightweight invariance-enforcing framework. CoRR abs/1405.5651 (2014)
[i1]Francesco Gadaleta, Raoul Strackx, Nick Nikiforakis, Frank Piessens, Wouter Joosen:
On the effectiveness of virtualization-based security. CoRR abs/1405.6058 (2014)- 2013
[j37]Koen Buyens, Riccardo Scandariato, Wouter Joosen:
Least privilege analysis in software architectures. Softw. Syst. Model. 12(2): 331-348 (2013)
[j36]Stefan Walraven, Bert Lagaisse
, Eddy Truyen, Wouter Joosen:
Policy-driven customization of cross-organizational features in distributed service systems. Softw. Pract. Exp. 43(10): 1145-1163 (2013)
[j35]Steven Op de beeck, Marko van Dooren, Bert Lagaisse
, Wouter Joosen:
Modularity and Variability of Distributed Software Architectures through Multi-view Refinement of AO-Connectors. LNCS Trans. Aspect Oriented Softw. Dev. 10: 109-147 (2013)
[c237]Philippe De Ryck, Nick Nikiforakis, Lieven Desmet
, Wouter Joosen:
TabShots: client-side detection of tabnabbing attacks. AsiaCCS 2013: 447-456
[c236]Nick Nikiforakis, Frank Piessens, Wouter Joosen:
HeapSentry: Kernel-Assisted Protection against Heap Overflows. DIMVA 2013: 177-196
[c235]Davy Preuveneers, Yolande Berbers, Wouter Joosen:
The Future of Mobile E-health Application Development: Exploring HTML5 for Context-aware Diabetes Monitoring. EUSPN/ICTH 2013: 351-359
[c234]Jef Maerien, Sam Michiels, Christophe Huygens, Danny Hughes, Wouter Joosen:
Access Control in Multi-party Wireless Sensor Networks. EWSN 2013: 34-49
[c233]Bart Van Brabant, Wouter Joosen:
A framework for integrated configuration management tools. IM 2013: 534-540
[c232]Pieter-Jan Maenhaut, Hendrik Moens, Marino Verheye, Piet Verhoeve, Stefan Walraven, Eddy Truyen, Wouter Joosen, Veerle Ongenae, Filip De Turck:
Migrating medical communications software to a multi-tenant cloud environment. IM 2013: 900-903
[c231]Wilfried Daniels, Bart Van Brabant, Danny Hughes, Wouter Joosen:
Automated allocation and configuration of dual stack IP networks. IM 2013: 1148-1153
[c230]Riccardo Scandariato, James Walden
, Wouter Joosen:
Static analysis versus penetration testing: A controlled experiment. ISSRE 2013: 451-460
[c229]Tom Desair, Wouter Joosen, Bert Lagaisse
, Ansar Rafique, Stefan Walraven:
Policy-driven middleware for heterogeneous, hybrid cloud platforms. ARM@Middleware 2013: 2:1-2:6
[c228]Maarten Decat, Bert Lagaisse
, Wouter Joosen, Bruno Crispo:
Introducing concurrency in policy-based access control. MW4NextGen@Middleware 2013: 3:1-3:6
[c227]Klaas Thoelen, Davy Preuveneers, Sam Michiels
, Wouter Joosen, Danny Hughes:
Types in Their Prime: Sub-typing of Data in Resource Constrained Environments. MobiQuitous 2013: 250-261
[c226]Wilfried Daniels, Pedro Javier del Cid Garcia, Wouter Joosen, Danny Hughes:
Safe Reparametrization of Component-Based WSNs. MobiQuitous 2013: 524-536
[c225]Wilfried Daniels, Pedro Javier del Cid, Danny Hughes, Sam Michiels
, Chris Blondia, Wouter Joosen:
Composition-Safe re-parametrization in Distributed Component-based WSN Applications. NCA 2013: 153-156
[c224]Gowri Sankar Ramachandran
, Sam Michiels
, Wouter Joosen, Danny Hughes, Barry Porter:
Analysis of Sensor Network Operating System Performance Throughout the Software Life Cycle. NCA 2013: 211-218
[c223]Pedro Javier del Cid, Nelson Matthys, Danny Hughes, Sam Michiels
, Wouter Joosen:
ACS: Specifying "Smart" Applications Using Sense-Process-Consume Flows. NCA 2013: 251-254
[c222]Maarten Decat, Bert Lagaisse
, Dimitri Van Landuyt
, Bruno Crispo, Wouter Joosen:
Federated Authorization for Software-as-a-Service Applications. OTM Conferences 2013: 342-359
[c221]Fatih Gey, Stefan Walraven, Dimitri Van Landuyt
, Wouter Joosen:
Building a Customizable Business-Process-as-a-Service Application with Current State-of-Practice. SC@STAF 2013: 113-127
[c220]Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna:
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting. IEEE Symposium on Security and Privacy 2013: 541-555
[c219]Danny Hughes, Eduardo Canete, Wilfried Daniels, Gowri Sankar Ramachandran
, James Meneghello, Nelson Matthys, Jef Maerien, Sam Michiels
, Christophe Huygens
, Wouter Joosen, Maarten Wijnants, Wim Lamotte, Erik Hulsmans, Bart Lannoo, Ingrid Moerman:
Energy aware software evolution for Wireless Sensor Networks. WOWMOM 2013: 1-9
[c218]Nick Nikiforakis, Steven Van Acker, Wannes Meert, Lieven Desmet, Frank Piessens, Wouter Joosen:
Bitsquatting: exploiting bit-flips for fun, or profit? WWW 2013: 989-998- 2012
[j34]Pedro Javier del Cid, Danny Hughes, Sam Michiels
, Wouter Joosen:
Applying a metadata level for concurrency in wireless sensor networks. Concurr. Comput. Pract. Exp. 24(16): 1953-1962 (2012)
[j33]Yves Younan, Wouter Joosen, Frank Piessens:
Runtime countermeasures for code injection attacks against C and C++ programs. ACM Comput. Surv. 44(3): 17:1-17:28 (2012)
[j32]Bernard Spitz, Riccardo Scandariato, Wouter Joosen:
Extraction of an Architectural Model for Least Privilege Analysis. Int. J. Secur. Softw. Eng. 3(4): 27-44 (2012)
[j31]Wouter Joosen, Bert Lagaisse
, Eddy Truyen, Koen Handekyn:
Towards application driven security dashboards in future middleware. J. Internet Serv. Appl. 3(1): 107-115 (2012)
[j30]Klaas Thoelen, Danny Hughes, Nelson Matthys, Lei Fang, Simon Dobson
, Yizhou Qiang, Wei Bai, Ka Lok Man, Sheng-Uei Guan, Davy Preuveneers, Sam Michiels
, Christophe Huygens
, Wouter Joosen:
A reconfigurable component model with semantic type system for dynamic WSN applications. J. Internet Serv. Appl. 3(3): 277-290 (2012)
[j29]Dimitri Van Landuyt
, Steven Op de beeck, Eddy Truyen, Wouter Joosen:
Domain-Driven Discovery of Stable Abstractions for Pointcut Interfaces. LNCS Trans. Aspect Oriented Softw. Dev. 9: 1-52 (2012)
[c217]Dimitri Van Landuyt
, Eddy Truyen, Wouter Joosen:
On the modularity impact of architectural assumptions. NEMARA@AOSD 2012: 13-16
[c216]Wouter De Borger, Bert Lagaisse
, Wouter Joosen:
A domain specific aspect language for run-time inspection. DSAL@AOSD 2012: 33-36
[c215]Marko van Dooren, Eric Steegmans, Wouter Joosen:
An object-oriented framework for aspect-oriented languages. AOSD 2012: 215-226
[c214]Steven Op de beeck, Marko van Dooren, Bert Lagaisse
, Wouter Joosen:
Multi-view refinement of AO-connectors in distributed software systems. AOSD 2012: 251-262
[c213]Steven Van Acker, Nick Nikiforakis, Lieven Desmet, Wouter Joosen, Frank Piessens:
FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications. AsiaCCS 2012: 12-13
[c212]Nick Nikiforakis, Luca Invernizzi, Alexandros Kapravelos, Steven Van Acker, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna:
You are what you include: large-scale evaluation of remote javascript inclusions. CCS 2012: 736-747
[c211]Hendrik Moens, Eddy Truyen, Stefan Walraven, Wouter Joosen, Bart Dhoedt, Filip De Turck:
Network-aware impact determination algorithms for service workflow deployment in hybrid clouds. CNSM 2012: 28-36
[c210]Rafael Bachiller, Danny Hughes, Sam Michiels
, Wouter Joosen:
Enabling Massive Scale Sensing with the @LooCI Mobile Sensing Framework. CSE 2012: 461-468
[c209]Philippe De Ryck, Nick Nikiforakis, Lieven Desmet
, Frank Piessens, Wouter Joosen:
Serene: Self-Reliant Client-Side Protection against Session Fixation. DAIS 2012: 59-72
[c208]Jef Maerien, Pieter Agten, Christophe Huygens
, Wouter Joosen:
FAMoS: A Flexible Active Monitoring Service for Wireless Sensor Networks. DAIS 2012: 104-117
[c207]Maarten Decat, Bert Lagaisse, Wouter Joosen:
Federated Authorization for SaaS applications. ESSoS Doctoral Symposium 2012: 43-48
[c206]Caren Crowley, Sam Michiels
, Wouter Joosen:
Show me the money The importance of network effects for mobile application business models. ICIN 2012: 164-170
[c205]Koen Yskout
, Riccardo Scandariato, Wouter Joosen:
Does organizing security patterns focus architectural choices? ICSE 2012: 617-627
[c204]Alexander van Den Berghe, Jan Van Haaren, Stefan Van Baelen, Yolande Berbers, Wouter Joosen:
Towards an Automated Pattern Selection Procedure in Software Models. ILP (Late Breaking Papers) 2012: 68-73
[c203]Rafael Bachiller, Danny Hughes, Sam Michiels
, Wouter Joosen:
Users as reconfigurable elements in distributed sensing applications. MidSens 2012: 4
[c202]Maarten Decat, Bert Lagaisse
, Wouter Joosen:
Toward efficient and confidentiality-aware federation of access control policies. MW4NG@Middleware 2012: 4:1-4:6
[c201]Stefan Walraven, Tanguy Monheim, Eddy Truyen, Wouter Joosen:
Towards performance isolation in multi-tenant SaaS applications. MW4NG@Middleware 2012: 6:1-6:6
[c200]Danny Hughes, Klaas Thoelen, Jef Maerien, Nelson Matthys, Wouter Horré, Javier del Cid, Christophe Huygens
, Sam Michiels
, Wouter Joosen:
LooCI: The Loosely-coupled Component Infrastructure. NCA 2012: 236-243
[c199]Syed Rehan Afzal, Christophe Huygens
, Wouter Joosen:
DiFiSec: An Adaptable Multi-level Security Framework for Event-Driven Communication in Wireless Sensor Networks. NCA 2012: 263-271
[c198]Klaas Thoelen, Danny Hughes, Sam Michiels
, Wouter Joosen:
StIgMa: Status information management for evolvable wireless sensor networks. NESEA 2012: 1-7
[c197]Hendrik Moens, Eddy Truyen, Stefan Walraven, Wouter Joosen, Bart Dhoedt, Filip De Turck:
Feature placement algorithms for high-variability applications in cloud environments. NOMS 2012: 17-24
[c196]Hendrik Moens, Eddy Truyen, Stefan Walraven, Wouter Joosen, Bart Dhoedt, Filip De Turck:
Developing and managing customizable Software as a Service using feature model conversion. NOMS 2012: 1295-1302
[c195]Nick Nikiforakis, Steven Van Acker, Frank Piessens, Wouter Joosen:
Exploring the Ecosystem of Referrer-Anonymizing Services. Privacy Enhancing Technologies 2012: 259-278
[c194]Nelson Matthys, Christophe Huygens
, Danny Hughes, Sam Michiels
, Wouter Joosen:
A Component and Policy-Based Approach for Efficient Sensor Network Reconfiguration. POLICY 2012: 53-60
[c193]Eddy Truyen, Nicolás Cardozo, Stefan Walraven, Jorge Vallejos, Engineer Bainomugisha, Sebastian Günther, Theo D'Hondt, Wouter Joosen:
Context-oriented programming for customizable SaaS applications. SAC 2012: 418-425
[c192]Francesco Gadaleta, Nick Nikiforakis, Jan Tobias Mühlberg
, Wouter Joosen:
HyperForce: Hypervisor-enForced Execution of Security-Critical Code. SEC 2012: 126-137
[c191]Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen:
A Security Analysis of Emerging Web Standards - HTML5 and Friends, from Specification to Implementation. SECRYPT 2012: 257-262
[c190]Thomas Heyman, Riccardo Scandariato, Wouter Joosen:
Reusable Formal Models for Secure Software Architectures. WICSA/ECSA 2012: 41-50
[c189]Dimitri Van Landuyt
, Eddy Truyen, Wouter Joosen:
Documenting Early Architectural Assumptions in Scenario-Based Requirements. WICSA/ECSA 2012: 329-333
[p3]Wouter De Borger, Bert Lagaisse
, Wouter Joosen:
Traceability Between Run-Time and Development Time Abstractions - A Case Study on AOSD and Debugging. Software and Systems Traceability 2012: 277-298- 2011
[j28]Kim Wuyts, Riccardo Scandariato, Griet Verhenneman, Wouter Joosen:
Integrating Patient Consent in e-Health Access Control. Int. J. Secur. Softw. Eng. 2(2): 1-24 (2011)
[j27]Danny Hughes, Jo Ueyama
, Eduardo M. Mendiondo
, Nelson Matthys, Wouter Horré, Sam Michiels
, Christophe Huygens
, Wouter Joosen, Ka Lok Man, Sheng-Uei Guan:
A middleware platform to support river monitoring using wireless sensor networks. J. Braz. Comput. Soc. 17(2): 85-102 (2011)
[j26]Wouter Horré, Sam Michiels
, Wouter Joosen, Danny Hughes:
Advanced Sensor Network Software Deployment using Application-level Quality Goals. J. Softw. 6(4): 528-535 (2011)
[j25]Mina Deng, Kim Wuyts
, Riccardo Scandariato, Bart Preneel
, Wouter Joosen:
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir. Eng. 16(1): 3-32 (2011)
[j24]Maarten Bynens, Eddy Truyen, Wouter Joosen:
A System of Patterns for Reusable Aspect Libraries. LNCS Trans. Aspect Oriented Softw. Dev. 8: 46-107 (2011)
[j23]Yves Younan, Pieter Philippaerts
, Frank Piessens, Wouter Joosen, Sven Lachmund, Thomas Walter:
Filter-resistant code injection on ARM. J. Comput. Virol. 7(3): 173-188 (2011)
[c188]John Wilander, Nick Nikiforakis, Yves Younan, Mariam Kamkar, Wouter Joosen:
RIPE: runtime intrusion prevention evaluator. ACSAC 2011: 41-50
[c187]Steven Van Acker, Philippe De Ryck, Lieven Desmet
, Frank Piessens, Wouter Joosen:
WebJail: least-privilege integration of third-party components in web mashups. ACSAC 2011: 307-316
[c186]Bart Van Brabant, Wouter Joosen:
Integrated management of network and security devices in IT infrastructures. CNSM 2011: 1-5
[c185]Klaas Thoelen, Sam Michiels
, Wouter Joosen:
On-demand attribute-based service discovery for mobile WSANs. COMSWARE 2011: 7
[c184]Aram Hovsepyan, Riccardo Scandariato, Stefan Van Baelen, Wouter Joosen, Serge Demeyer
:
Preserving Aspects via Automation: A Maintainability Study. ESEM 2011: 315-324
[c183]Philippe De Ryck, Lieven Desmet
, Wouter Joosen, Frank Piessens:
Automatic and Precise Client-Side Protection against CSRF Attacks. ESORICS 2011: 100-116
[c182]Nick Nikiforakis, Wannes Meert
, Yves Younan, Martin Johns
, Wouter Joosen:
SessionShield: Lightweight Protection against Session Hijacking. ESSoS 2011: 87-100
[c181]Philippe De Ryck, Lieven Desmet
, Wouter Joosen:
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications. ESSoS 2011: 114-127
[c180]Tom Goovaerts, Lieven Desmet
, Wouter Joosen:
Scalable Authorization Middleware for Service Oriented Architectures. ESSoS 2011: 221-233
[c179]Nick Nikiforakis, Wouter Joosen, Martin Johns
:
Abusing locality in shared web hosting. EUROSEC 2011: 2
[c178]Wouter Joosen, Javier López
, Fabio Martinelli, Fabio Massacci
:
Engineering Secure Future Internet Services. Future Internet Assembly 2011: 177-192
[c177]Isabelle Perseil, Laurent Pautet, Jean-François Rolland, Mamoun Filali, Didier Delanote, Stefan Van Baelen, Wouter Joosen, Yolande Berbers, Frédéric Mallet
, Dominique Bertrand, Sébastien Faucou
, Abdelhafid Zitouni, Mahmoud Boufaïda, Lionel Seinturier, Joël Champeau, Thomas Abdoul, Peter H. Feiler, Chokri Mraidha
, Sébastien Gérard:
An Efficient Modeling and Execution Framework for Complex Systems Development. ICECCS 2011: 317-331
[c176]Koen Buyens, Riccardo Scandariato, Wouter Joosen:
Composition of least privilege analysis results in software architectures (position paper). SESS@ICSE 2011: 29-35
[c175]Francesco Gadaleta, Nick Nikiforakis, Yves Younan, Wouter Joosen:
Hello rootKitty: A Lightweight Invariance-Enforcing Framework. ISC 2011: 213-228
[c174]Pedro Javier del Cid, Nelson Matthys, Christophe Huygens
, Sam Michiels
, Wouter Joosen, Danny Hughes:
Sensor Middleware to Support Diverse Data Qualities. ITNG 2011: 673-676
[c173]Christophe Huygens
, Nelson Matthys, Jef Maerien, Wouter Joosen, Danny Hughes:
Building blocks for secure multiparty federated wireless sensor networks. IWCMC 2011: 2021-2027
[c172]Nick Nikiforakis, Marco Balduzzi, Steven Van Acker, Wouter Joosen, Davide Balzarotti:
Exposing the Lack of Privacy in File Hosting Services. LEET 2011
[c171]Bart Van Brabant, Joris Peeraer, Wouter Joosen:
Fine-grained Access-control for the Puppet Configuration Language. LISA 2011
[c170]Jef Maerien, Sam Michiels
, Christophe Huygens
, Wouter Joosen:
SASHA: A Distributed Protocol for Secure Application Deployment in Shared Ad-Hoc Wireless Sensor Networks. MASS 2011: 43-48
[c169]Wouter De Borger, Bert Lagaisse
, Wouter Joosen:
Inspection of distributed and composed systems. Middleware Doctoral Symposium 2011: 1:1-1:3
[c168]Nelson Matthys, Sam Michiels
, Wouter Joosen, Christophe Scholliers
, Coen De Roover
, Wouter Amerijckx, Theo D'Hondt:
Language and middleware support for dynamism in wireless sensor and actuator network applications. MidSens 2011: 2
[c167]Gabriela Gheorghe, Bruno Crispo, Roberto Carbone
, Lieven Desmet
, Wouter Joosen:
Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement. Middleware 2011: 350-369
[c166]Stefan Walraven, Eddy Truyen, Wouter Joosen:
A Middleware Layer for Flexible and Cost-Efficient Multi-tenant Applications. Middleware 2011: 370-389
[c165]Wouter De Borger, Bert Lagaisse
, Wouter Joosen:
A Generic Solution for Agile Run-Time Inspection Middleware. Middleware 2011: 451-470
[c164]Maarten Bynens, Eddy Truyen, Wouter Joosen:
A Sequence of Patterns for Reusable Aspect Libraries with Easy Configuration. SC@TOOLS 2011: 68-83
[e2]Shmuel Katz, Mira Mezini, Christa Schwanninger, Wouter Joosen:
Transactions on Aspect-Oriented Software Development VIII. Lecture Notes in Computer Science 6580, Springer 2011, ISBN 978-3-642-22030-2 [contents]- 2010
[j22]Awais Rashid
, Thomas Cottenier, Phil Greenwood, Ruzanna Chitchyan
, Regine Meunier, Roberta Coelho, Mario Südholt, Wouter Joosen:
Aspect-Oriented Software Development in Practice: Tales from AOSD-Europe. Computer 43(2): 19-26 (2010)
[j21]Daniel Hughes, Klaas Thoelen, Wouter Horré, Nelson Matthys, Javier del Cid, Sam Michiels
, Christophe Huygens
, Wouter Joosen, Jo Ueyama
:
Building Wireless Sensor Network Applications with LooCI. Int. J. Mob. Comput. Multim. Commun. 2(4): 38-64 (2010)
[j20]Yves Younan, Wouter Joosen, Frank Piessens, Hans Van den Eynden:
Improving Memory Management Security for C and C++. Int. J. Secur. Softw. Eng. 1(2): 57-82 (2010)
[j19]Christophe Huygens
, Danny Hughes, Bert Lagaisse
, Wouter Joosen:
Streamlining Development for Networked Embedded Systems Using Multiple Paradigms. IEEE Softw. 27(5): 45-52 (2010)
[j18]Danny Weyns
, Robrecht Haesevoets, Alexander Helleboogh, Tom Holvoet
, Wouter Joosen:
The MACODO middleware for context-driven dynamic agent organizations. ACM Trans. Auton. Adapt. Syst. 5(1): 3:1-3:28 (2010)
[j17]Dimitri Van Landuyt
, Eddy Truyen, Wouter Joosen:
Discovery of Stable Abstractions for Aspect-Oriented Composition in the Car Crash Management Domain. LNCS Trans. Aspect Oriented Softw. Dev. 7: 375-422 (2010)
[c163]Aram Hovsepyan, Riccardo Scandariato, Stefan Van Baelen, Yolande Berbers, Wouter Joosen:
From aspect-oriented models to aspect-oriented code?: the maintenance perspective. AOSD 2010: 85-96
[c162]Wouter De Borger, Bart De Win, Bert Lagaisse
, Wouter Joosen:
A permission system for secure AOP. AOSD 2010: 205-216
[c161]Robrecht Haesevoets, Danny Weyns
, Mário Henrique Cruz Torres, Alexander Helleboogh, Tom Holvoet
, Wouter Joosen:
A Middleware Model in Alloy for Supply Chain-Wide Agent Interactions. AOSE 2010: 189-204
[c160]Yves Younan, Pieter Philippaerts
, Lorenzo Cavallaro
, R. Sekar, Frank Piessens, Wouter Joosen:
PAriCheck: an efficient pointer arithmetic checker for C programs. AsiaCCS 2010: 145-156
[c159]Thomas Heyman, Riccardo Scandariato, Wouter Joosen:
Security in Context: Analysis and Refinement of Software Architectures. COMPSAC 2010: 161-170
[c158]Stefan Walraven, Bert Lagaisse
, Eddy Truyen, Wouter Joosen:
Dynamic Composition of Cross-Organizational Features in Distributed Software Systems. DAIS 2010: 183-197
[c157]Nick Nikiforakis, Yves Younan, Wouter Joosen:
HProxy: Client-Side Detection of SSL Stripping Attacks. DIMVA 2010: 200-218
[c156]Riccardo Scandariato, Koen Buyens, Wouter Joosen:
Automated Detection of Least Privilege Violations in Software Architectures. ECSA 2010: 150-165
[c155]Francesco Gadaleta, Yves Younan, Wouter Joosen:
BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks. ESSoS 2010: 1-17
[c154]Philippe De Ryck, Lieven Desmet, Thomas Heyman, Frank Piessens, Wouter Joosen:
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests. ESSoS 2010: 18-34
[c153]Kristof Geebelen, Eryk Kulikowski, Eddy Truyen, Wouter Joosen:
A MVC Framework for Policy-Based Adaptation of Workflow Processes: A Case Study on Confidentiality. ICWS 2010: 401-408
[c152]Wouter Horré, Sam Michiels
, Wouter Joosen, Danny Hughes:
QARI: Quality Aware Software Deployment for Wireless Sensor Networks. ITNG 2010: 642-647
[c151]Thomas Delaet, Wouter Joosen, Bart Van Brabant:
A Survey of System Configuration Tools. LISA 2010
[c150]Klaas Thoelen, Nelson Matthys, Wouter Horré, Christophe Huygens
, Wouter Joosen, Danny Hughes, Lei Fang, Sheng-Uei Guan:
Supporting reconfiguration and re-use through self-describing component interfaces. MidSens 2010: 29-34
[c149]Christophe Huygens
, Nelson Matthys, Wouter Joosen:
Optimized Resource Access Control in Shared Sensor Networks. MobiSec 2010: 105-116
[c148]Javier del Cid, Sam Michiels
, Wouter Joosen, Danny Hughes:
Middleware for resource sharing in multi-purpose Wireless Sensor Networks. NESEA 2010: 1-8
[c147]Kevin Lee
, David Murray
, Danny Hughes, Wouter Joosen:
Extending sensor networks into the Cloud using Amazon Web Services. NESEA 2010: 1-7
[c146]Philippe De Ryck, Maarten Decat, Lieven Desmet
, Frank Piessens, Wouter Joosen:
Security of Web Mashups: A Survey. NordSec 2010: 223-238
[c145]Nelson Matthys, Syed Rehan Afzal, Christophe Huygens
, Sam Michiels
, Wouter Joosen, Danny Hughes:
Towards fine-grained and application-centric access control for wireless sensor networks. SAC 2010: 793-794
[c144]Bart Van Brabant, Thomas Delaet, Wouter Joosen:
Authorizing and directing configuration updates in contemporary it infrastructures. SafeConfig 2010: 79-82
[c143]Pedro Javier del Cid, Nelson Matthys, Danny Hughes, Sam Michiels
, Wouter Joosen:
Resource Management Middleware to Support Self Managing Wireless Sensor Networks. SASO Workshops 2010: 251-255
[c142]Nelson Matthys, Christophe Huygens
, Danny Hughes, Jo Ueyama
, Sam Michiels
, Wouter Joosen:
Policy-Driven Tailoring of Sensor Networks. S-CUBE 2010: 20-35
[c141]Klaas Thoelen, Sam Michiels
, Wouter Joosen:
Middleware for Adaptive Group Communication in Wireless Sensor Networks. S-CUBE 2010: 59-74
[c140]Pedro Javier del Cid, Daniel Hughes, Sam Michiels
, Wouter Joosen:
Expressing and Configuring Quality of Data in Multi-purpose Wireless Sensor Networks. S-CUBE 2010: 91-106
[c139]Jef Maerien, Sam Michiels
, Stefan Van Baelen, Christophe Huygens
, Wouter Joosen:
A Secure Multi-Application Platform for Vehicle Telematics. VTC Fall 2010: 1-5
[c138]Jef Maerien, Sam Michiels
, Christophe Huygens
, Wouter Joosen:
MASY: MAnagement of Secret keYs for federated mobile wireless sensor networks. WiMob 2010: 121-128
2000 – 2009
- 2009
[j16]Bart De Win, Riccardo Scandariato, Koen Buyens, Johan Grégoire, Wouter Joosen:
On the secure software development process: CLASP, SDL and Touchpoints compared. Inf. Softw. Technol. 51(7): 1152-1171 (2009)
[c137]Koen Buyens, Bart De Win, Wouter Joosen:
Identifying and Resolving Least Privilege Violations in Software Architectures. ARES 2009: 232-239
[c136]Thomas Heyman, Riccardo Scandariato, Wouter Joosen:
Risk-Driven Architectural Decomposition. ARES 2009: 363-368
[c135]Yves Younan, Frank Piessens, Wouter Joosen:
Protecting Global and Static Variables from Buffer Overflow Attacks. ARES 2009: 798-803
[c134]Kim Wuyts
, Riccardo Scandariato, Bart De Decker, Wouter Joosen:
Linking Privacy Solutions to Developer Goals. ARES 2009: 847-852
[c133]Maarten Bynens, Wouter Joosen:
Towards a pattern language for aspect-based design. PLATE@AOSD 2009: 13-15
[c132]Dimitri Van Landuyt
, Steven Op de beeck, Eddy Truyen, Wouter Joosen:
Domain-driven discovery of stable abstractions for pointcut interfaces. AOSD 2009: 75-86
[c131]Wouter De Borger, Bert Lagaisse
, Wouter Joosen:
A generic and reflective debugging architecture to support runtime visibility and traceability of aspects. AOSD 2009: 173-184
[c130]Klaas Thoelen, Sam Michiels, Wouter Joosen, Koen Vangheluwe, Katja Verbeeck:
A sensor middleware and agent-based communication platform for supply-chain management. AAMAS (2) 2009: 1409-1410
[c129]Wim Maes, Thomas Heyman, Lieven Desmet
, Wouter Joosen:
Browser protection against cross-site request forgery. SecuCode@CCS 2009: 3-10
[c128]Yves Younan, Pieter Philippaerts
, Frank Piessens, Wouter Joosen, Sven Lachmund, Thomas Walter:
Filter-resistant code injection on ARM. CCS 2009: 11-20
[c127]Koen Buyens, Riccardo Scandariato, Wouter Joosen:
Measuring the interplay of security principles in software architectures. ESEM 2009: 554-563
[c126]Francesco Gadaleta, Yves Younan, Bart Jacobs
, Wouter Joosen, Erik De Neve, Nils Beosier:
Instruction-level countermeasures against stack-based buffer overflow attacks. VDTS@EuroSys 2009: 7-12
[c125]Lieven Desmet
, Wouter Joosen, Fabio Massacci
, Katsiaryna Naliuka, Pieter Philippaerts
, Frank Piessens, Ida Sri Rejeki Siahaan
, Dries Vanoverberghe:
A Security Architecture for Web 2.0 Applications. Future Internet Assembly 2009: 35-46
[c124]Frans Sanen, Eddy Truyen, Wouter Joosen:
Problem-Solution Feature Interactions as Configuration Knowledge in Distributed Runtime Adaptations. ICFI 2009: 166-175
[c123]Frans Sanen, Eddy Truyen, Wouter Joosen:
Mapping problem-space to solution-space features: a feature interaction approach. GPCE 2009: 167-176
[c122]Dimitri Van Landuyt
, Eddy Truyen, Wouter Joosen:
Automating the discovery of stable domain abstractions for reusable aspects. EA@ICSE 2009: 1-7
[c121]Koen Buyens, Bart De Win, Wouter Joosen:
Resolving least privilege violations in software architectures. SESS@ICSE 2009: 9-16
[c120]Robrecht Haesevoets, Danny Weyns
, Tom Holvoet
, Wouter Joosen:
A formal model for self-adaptive and self-healing organizations. SEAMS 2009: 116-125
[c119]Syed Rehan Afzal, Christophe Huygens
, Wouter Joosen:
Extending middleware frameworks for Wireless Sensor Networks. ICUMT 2009: 1-7
[c118]Christophe Huygens
, Wouter Joosen:
Federated and Shared Use of Sensor Networks through Security Middleware. ITNG 2009: 1005-1011
[c117]Thomas Delaet, Wouter Joosen:
Managing your content with CIMPLE - a content-centric storage interface. LCN 2009: 491-498
[c116]Bart Van Brabant, Thomas Delaet, Wouter Joosen:
Federated Access Control and Workflow Enforcement in Systems Configuration. LISA 2009: 129-143
[c115]Pedro Javier del Cid, Danny Hughes, Jo Ueyama
, Sam Michiels
, Wouter Joosen:
DARMA: adaptable service and resource management for wireless sensor networks. MidSens 2009: 1-6
[c114]Nelson Matthys, Christophe Huygens
, Danny Hughes, Sam Michiels
, Wouter Joosen:
Flexible integration of data qualities in wireless sensor networks. MidSens 2009: 31-36
[c113]Danny Hughes, Klaas Thoelen, Wouter Horré, Nelson Matthys, Javier del Cid, Sam Michiels
, Christophe Huygens
, Wouter Joosen:
LooCI: a loosely-coupled component infrastructure for networked embedded systems. MoMM 2009: 195-203
[c112]Wouter Horré, Kevin Lee
, Danny Hughes, Sam Michiels
, Wouter Joosen:
A Graph Based Approach to Supporting Reconfiguration in Wireless Sensor Networks. NetCoM 2009: 326-331
[c111]Nelson Matthys, Danny Hughes, Sam Michiels
, Christophe Huygens
, Wouter Joosen:
Fine-Grained Tailoring of Component Behaviour for Embedded Systems. SEUS 2009: 156-167
[c110]Aram Hovsepyan, Stefan Van Baelen, Yolande Berbers, Wouter Joosen:
Specifying and Composing Concerns Expressed in Domain-Specific Modeling Languages. TOOLS (47) 2009: 116-135
[c109]Robrecht Haesevoets, Eddy Truyen, Tom Holvoet
, Wouter Joosen:
Weaving the Fabric of the Control Loop through Aspects. SOAR 2009: 38-65
[c108]Lieven Desmet
, Wouter Joosen, Fabio Massacci
, Katsiaryna Naliuka, Pieter Philippaerts
, Frank Piessens, Dries Vanoverberghe:
The S3MS.NET Run Time Monitor: Tool Demonstration. BYTECODE@ETAPS 2009: 153-159
[p2]Bart De Win, Tom Goovaerts, Wouter Joosen, Pieter Philippaerts
, Frank Piessens, Yves Younan:
Security Middleware for Mobile Applications. Middleware for Network Eccentric and Mobile Applications 2009: 265-284- 2008
[j15]Wouter Horré, Sam Michiels
, Wouter Joosen, Pierre Verbaeten:
DAVIM: Adaptable Middleware for Sensor Networks. IEEE Distributed Syst. Online 9(1) (2008)
[j14]Lieven Desmet
, Wouter Joosen, Fabio Massacci
, Pieter Philippaerts
, Frank Piessens, Ida Sri Rejeki Siahaan
, Dries Vanoverberghe:
Security-by-contract on the .NET platform. Inf. Secur. Tech. Rep. 13(1): 25-32 (2008)
[j13]Lieven Desmet
, Pierre Verbaeten, Wouter Joosen, Frank Piessens:
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies. IEEE Trans. Software Eng. 34(1): 50-64 (2008)
[c107]Kim Wuyts
, Riccardo Scandariato, Geert Claeys, Wouter Joosen:
Hardening XDS-Based Architectures. ARES 2008: 18-25
[c106]Thomas Heyman, Riccardo Scandariato, Christophe Huygens
, Wouter Joosen:
Using Security Patterns to Combine Security Metrics. ARES 2008: 1156-1163
[c105]Koen Yskout
, Riccardo Scandariato, Bart De Win, Wouter Joosen:
Transforming Security Requirements into Architecture. ARES 2008: 1421-1428
[c104]Eddy Truyen, Wouter Joosen:
Towards an aspect-oriented architecture for self-adaptive frameworks. ACP4IS@AOSD 2008: 9:1-9:8
[c103]Eddy Truyen, Nico Janssens, Frans Sanen, Wouter Joosen:
Support for distributed adaptations in aspect-oriented middleware. AOSD 2008: 120-131
[c102]Klaas Thoelen, Sam Michiels, Wouter Joosen:
Tracking and tracing containers through distributed sensor middleware. Autonomics 2008: 25
[c101]Aram Hovsepyan, Stefan Van Baelen, Yolande Berbers, Wouter Joosen:
Generic Reusable Concern Compositions. ECMDA-FA 2008: 231-245
[c100]Frans Sanen, Eddy Truyen, Wouter Joosen:
Modeling Context-Dependent Aspect Interference Using Default Logics. RAM-SE 2008: 15-20
[c99]Eddy Truyen, Wouter Joosen:
A reference model for cross-organizational coordination architectures. EDOCW 2008: 252-263
[c98]Nelson Matthys, Sam Michiels, Wouter Joosen, Pierre Verbaeten:
Policy-based management of middleware for distributed sensor applications. MiNEMA 2008: 15-17
[c97]Eryk Kylikowski, Riccardo Scandariato, Wouter Joosen:
Using Multi-Level Security Annotations to Improve Software Assurance. HASE 2008: 471-474
[c96]Didier Delanote, Stefan Van Baelen, Wouter Joosen, Yolande Berbers:
Using AADL to Model a Protocol Stack. ICECCS 2008: 277-281
[c95]Thomas Delaet, Paul Anderson, Wouter Joosen:
Managing Real-World System Configurations with Constraints. ICN 2008: 594-601
[c94]Danny Weyns, Robrecht Haesevoets, Bart Van Eylen, Alexander Helleboogh, Tom Holvoet, Wouter Joosen:
Endogenous versus exogenous self-management. SEAMS 2008: 41-48
[c93]Nelson Matthys, Wouter Joosen:
Towards policy-based management of sensor networks. MidSens 2008: 13-18
[c92]Tom Goovaerts, Bart De Win, Wouter Joosen:
A comparison of two approaches for achieving flexible and adaptive security middleware. Middleware Security 2008: 19-24
[c91]Kristof Geebelen, Sam Michiels
, Wouter Joosen:
Dynamic reconfiguration using template based web service composition. MW4SOC 2008: 49-54
[c90]Koen Yskout, Bart De Win, Wouter Joosen:
Transforming Security Audit Requirements into a Software Architecture. MODSEC@MoDELS 2008
[c89]Robrecht Haesevoets, Danny Weyns
, Tom Holvoet
, Wouter Joosen, Paul Valckenaers:
Hierarchical Organizations and a Supporting Software Architecture for Floating Car Data. SASO Workshops 2008: 31-36
[c88]Koen Buyens, Bart De Win, Wouter Joosen:
Improving Least Privilege in Software Architecture by Guided Automated Compartmentalization. WOSIS 2008: 145-150
[c87]Paul Grace
, Bert Lagaisse
, Eddy Truyen, Wouter Joosen:
A Reflective Framework for Fine-Grained Adaptation of Aspect-Oriented Compositions. SC@ETAPS 2008: 215-230
[c86]Mina Deng, Riccardo Scandariato, Danny De Cock, Bart Preneel
, Wouter Joosen:
Identity in federated electronic healthcare. Wireless Days 2008: 1-5
[e1]Wouter Joosen:
Proceedings of the 2008 Workshop on Next Generation Aspect Oriented Middleware, NAOMI@AOSD 2008, Brussels, Belgium, April 1, 2008. ACM 2008, ISBN 978-1-60558-148-4 [contents]- 2007
[c85]Koen Buyens, Bart De Win, Wouter Joosen:
Empirical and statistical analysis of risk analysis-driven techniques for threat management. ARES 2007: 1034-1041
[c84]Davy Preuveneers, Julien Pauty, Dimitri Van Landuyt
, Yolande Berbers, Wouter Joosen:
Comparative Evaluation of Converged Service-Oriented Architectures. AINA Workshops (1) 2007: 989-994
[c83]Maarten Bynens, Bert Lagaisse
, Wouter Joosen, Eddy Truyen:
The elementary pointcut pattern. BPAOSD@AOSD 2007: 2
[c82]Koen Buyens, Sam Michiels
, Wouter Joosen:
A Software Architecture to Facilitate the Creation of DRM Systems. CCNC 2007: 955-959
[c81]Lieven Desmet
, Wouter Joosen, Fabio Massacci
, Katsiaryna Naliuka, Pieter Philippaerts
, Frank Piessens, Dries Vanoverberghe:
A flexible security architecture to support third-party applications on mobile devices. CSAW 2007: 19-28
[c80]Koen Buyens, Riccardo Scandariato, Wouter Joosen:
Process Activities Supporting Security Principles. COMPSAC (2) 2007: 281-292
[c79]Tom Goovaerts, Bart De Win, Wouter Joosen:
A Flexible Architecture for Enforcing and Composing Policies in a Service-Oriented Environment. DAIS 2007: 253-266
[c78]Frans Sanen, Eddy Truyen, Wouter Joosen:
Managing Concern Interactions in Middleware. DAIS 2007: 267-283
[c77]Robrecht Haesevoets, Bart Van Eylen, Danny Weyns
, Alexander Helleboogh, Tom Holvoet
, Wouter Joosen:
Managing Agent Interactions with Context-Driven Dynamic Organizations. EEMMAS 2007: 166-186
[c76]Nico Janssens, Eddy Truyen, Frans Sanen, Wouter Joosen:
Adding dynamic reconfiguration support to JBoss AOP. MAI 2007: 1-8
[c75]Kris Verlaenen, Wouter Joosen, Pierre Verbaeten:
Arriclides: An Architecture Integrating Clinical Decision Support Models. HICSS 2007: 135
[c74]Johan Grégoire, Koen Buyens, Bart De Win, Riccardo Scandariato, Wouter Joosen:
On the Secure Software Development Process: CLASP and SDL Compared. SESS@ICSE 2007: 1
[c73]Thomas Heyman, Koen Yskout
, Riccardo Scandariato, Wouter Joosen:
An Analysis of the Security Patterns Landscape. SESS@ICSE 2007: 3
[c72]Kris Verlaenen, Bart De Win, Wouter Joosen:
Towards simplified specification of policies in different domains. Integrated Network Management 2007: 20-29
[c71]Thomas Delaet, Wouter Joosen:
PoDIM: A Language for High-Level Configuration Management. LISA 2007: 261-273
[c70]Paul Grace
, Eddy Truyen, Bert Lagaisse
, Wouter Joosen:
The case for aspect-oriented reflective middleware. ARM 2007: 2
[c69]Wouter Horré, Sam Michiels
, Nelson Matthys, Wouter Joosen, Pierre Verbaeten:
On the integration of sensor networks and general purpose IT infrastructure. MidSens 2007: 7-12
[c68]Bert Vanhooff, Dhouha Ayed, Stefan Van Baelen, Wouter Joosen, Yolande Berbers:
UniTI: A Unified Transformation Infrastructure. MoDELS 2007: 31-45
[c67]Bert Lagaisse, Eddy Truyen, Wouter Joosen:
Multi-stage Aspect-Oriented Composition of Component-Based Applications. OTM Conferences (1) 2007: 630-647
[c66]Kris Verlaenen, Bart De Win, Wouter Joosen:
Policy Analysis Using a Hybrid Semantic Reasoning Engine. POLICY 2007: 193-200
[c65]Liesje Demuynck, Bart De Decker, Wouter Joosen:
A Credential-Based System for the Anonymous Delegation of Rights. SEC 2007: 169-180
[c64]Tom Goovaerts, Bart De Win, Wouter Joosen:
Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies. REM@ESORICS 2007: 31-43- 2006
[j12]Tine Verhanneman, Frank Piessens, Bart De Win, Eddy Truyen, Wouter Joosen:
A Modular Access Control Service for Supporting Application-Specific Policies. IEEE Distributed Syst. Online 7(6) (2006)
[j11]


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID