


Остановите войну!
for scientists:


default search action
Wouter Joosen
Person information

- affiliation: Catholic University of Leuven, Belgium
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j102]Eddy Truyen
, Hongjie Xie, Wouter Joosen:
Vendor-Agnostic Reconfiguration of Kubernetes Clusters in Cloud Federations. Future Internet 15(2): 63 (2023) - [j101]Yana Dimova, Tom van Goethem, Wouter Joosen:
Everybody's Looking for SSOmething: A large-scale evaluation on the privacy of OAuth authentication on the web. Proc. Priv. Enhancing Technol. 2023(4): 452-467 (2023) - [j100]Absar-Ul-Haque Ahmar
, Emekcan Aras
, Thien Duc Nguyen
, Sam Michiels
, Wouter Joosen
, Danny Hughes
:
Design of a Robust MAC Protocol for LoRa. ACM Trans. Internet Things 4(1): 3:1-3:25 (2023) - [j99]Kristof Jannes
, Emad Heydari Beni
, Bert Lagaisse
, Wouter Joosen
:
BeauForT: Robust Byzantine Fault Tolerance for Client-Centric Mobile Web Applications. IEEE Trans. Parallel Distributed Syst. 34(4): 1241-1252 (2023) - [c484]Willem Verheyen
, Tim Van hamme
, Sander Joos
, Davy Preuveneers
, Wouter Joosen
:
Beware the Doppelgänger: Attacks against Adaptive Thresholds in Facial Recognition Systems. ARES 2023: 18:1-18:11 - [c483]Emma Lavens
, Davy Preuveneers
, Wouter Joosen
:
Mitigating undesired interactions between liveness detection components in biometric authentication. ARES 2023: 141:1-141:8 - [c482]Javier Martínez Llamas, Davy Preuveneers, Wouter Joosen:
Effective Machine Learning-based Access Control Administration through Unlearning. EuroS&P Workshops 2023: 50-57 - [c481]Tim Van hamme, Giuseppe Garofalo, Davy Preuveneers, Wouter Joosen:
Masterkey attacks against free-text keystroke dynamics and security implications of demographic factors. EuroS&P 2023: 278-291 - [c480]Pieter Philippaerts, Davy Preuveneers, Wouter Joosen:
Revisiting OAuth 2.0 Compliance: A Two-Year Follow-Up Study. EuroS&P Workshops 2023: 521-525 - [c479]Gilang Mentari Hamidy
, Pieter Philippaerts
, Wouter Joosen
:
T3E: A Practical Solution to Trusted Time in Secure Enclaves. NSS 2023: 305-326 - [c478]Kristof Jannes
, Vincent Reniers
, Wouter Lenaerts
, Bert Lagaisse
, Wouter Joosen
:
DEDACS: Decentralized and dynamic access control for smart contracts in a policy-based manner. SAC 2023: 222-230 - [c477]Dimitri Van Landuyt
, Julien Benaouda
, Vincent Reniers
, Ansar Rafique
, Wouter Joosen
:
A Comparative Performance Evaluation of Multi-Model NoSQL Databases and Polyglot Persistence. SAC 2023: 286-293 - [c476]Stef Verreydt
, Dimitri Van Landuyt
, Wouter Joosen
:
Expressive and Systematic Risk Assessments with Instance-Centric Threat Models. SAC 2023: 1450-1457 - [c475]Tom van Goethem, Iskander Sánchez-Rola, Wouter Joosen:
Scripted Henchmen: Leveraging XS-Leaks for Cross-Site Vulnerability Detection. SP (Workshops) 2023: 371-383 - [c474]Gertjan Franken, Tom van Goethem, Lieven Desmet, Wouter Joosen:
A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs. USENIX Security Symposium 2023 - [c473]Victor Le Pochat
, Wouter Joosen
:
Analyzing Cyber Security Research Practices through a Meta-Research Framework. CSET @ USENIX Security Symposium 2023: 64-74 - 2022
- [j98]Enrique Argones-Rúa
, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Discriminative training of spiking neural networks organised in columns for stream-based biometric authentication. IET Biom. 11(5): 485-497 (2022) - [j97]Giuseppe Garofalo
, Tim Van hamme
, Davy Preuveneers
, Wouter Joosen, Aysajan Abidin
, Mustafa A. Mustafa
:
PIVOT: Private and Effective Contact Tracing. IEEE Internet Things J. 9(22): 22466-22489 (2022) - [j96]Vera Rimmer, Theodor Schnitzler, Tom van Goethem, Abel Rodríguez Romero, Wouter Joosen, Katharina Kohls:
Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor. Proc. Priv. Enhancing Technol. 2022(3): 314-335 (2022) - [j95]Dimitri Van Landuyt
, Wouter Joosen:
A descriptive study of assumptions in STRIDE security threat modeling. Softw. Syst. Model. 21(6): 2311-2328 (2022) - [j94]Fan Yang, Ashok Samraj Thangarajan, Gowri Sankar Ramachandran
, Wouter Joosen, Danny Hughes:
AsTAR: Sustainable Energy Harvesting for the Internet of Things through Adaptive Task Scheduling. ACM Trans. Sens. Networks 18(1): 4:1-4:34 (2022) - [c472]Davy Preuveneers, Wouter Joosen:
Privacy-Preserving Polyglot Sharing and Analysis of Confidential Cyber Threat Intelligence. ARES 2022: 2:1-2:11 - [c471]Emma Lavens, Pieter Philippaerts
, Wouter Joosen:
A Quantitative Assessment of the Detection Performance of Web Vulnerability Scanners. ARES 2022: 149:1-149:10 - [c470]Tom van Goethem, Gertjan Franken, Iskander Sánchez-Rola, David Dworken, Wouter Joosen:
SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model. AsiaCCS 2022: 784-798 - [c469]Karel Dhondt, Victor Le Pochat
, Alexios Voulimeneas
, Wouter Joosen, Stijn Volckaert:
A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks. CCS 2022: 801-814 - [c468]Lisa Liu, Gints Engelen, Timothy M. Lynar, Daryl Essam, Wouter Joosen:
Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018. CNS 2022: 254-262 - [c467]Sander Joos
, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Adversarial Robustness is Not Enough: Practical Limitations for Securing Facial Authentication. IWSPA@CODASPY 2022: 2-12 - [c466]Joseph Hallett, Simon N. Foley, David Manda, Joseph Gardiner, Dimitri Jonckers, Wouter Joosen, Awais Rashid:
Threat-Driven Dynamic Security Policies for Cyber-Physical Infrastructures. CRITIS 2022: 9-26 - [c465]Absar-Ul-Haque Ahmar, Wouter Joosen, Danny Hughes:
Smart-Hop: Low-Latency Multi-hop Networking for LoRa. DCOSS 2022: 17-20 - [c464]Dimitri Van Landuyt
, Wouter Joosen
:
A Systematic Survey of Architectural Approaches and Trade-Offs in Data De-identification. ECSA 2022: 66-82 - [c463]Pieter-Jan Vrielynck
, Emad Heydari Beni
, Kristof Jannes
, Bert Lagaisse
, Wouter Joosen:
DeFIRED: decentralized authorization with receiver-revocable and refutable delegations. EuroSec@EUROSYS 2022: 57-63 - [c462]Davy Preuveneers, Emma Lavens, Wouter Joosen:
Applying Machine Learning to use security oracles: a case study in virus and malware detection. EuroS&P Workshops 2022: 240-251 - [c461]Ilias Tsingenopoulos, Davy Preuveneers, Lieven Desmet
, Wouter Joosen:
Captcha me if you can: Imitation Games with Reinforcement Learning. EuroS&P 2022: 719-735 - [c460]Zhaoyi Liu, Haoyu Tang, Sam Michiels, Wouter Joosen, Danny Hughes:
Unsupervised Acoustic Anomaly Detection Systems Based on Gaussian Mixture Density Neural Network. EUSIPCO 2022: 259-263 - [c459]Alexander van Den Berghe, Koen Yskout
, Wouter Joosen:
A reimagined catalogue of software security patterns. EnCyCriS@ICSE 2022: 25-32 - [c458]Stef Verreydt, Laurens Sion, Koen Yskout
, Wouter Joosen:
Relationship-based threat modeling. EnCyCriS@ICSE 2022: 41-48 - [c457]Mengyao Liu, Jonathan Oostvogels, Sam Michiels
, Wouter Joosen, Danny Hughes:
BoboLink: Low Latency and Low Power Communication for Intelligent Environments. Intelligent Environments 2022: 1-4 - [c456]Zhaoyi Liu, Sam Michiels
, Wouter Joosen, Danny Hughes:
Poster Abstract: Adapting Pretrained Features for Efficient Unsupervised Acoustic Anomaly Detection. IPSN 2022: 525-526 - [c455]Kristof Jannes
, Bert Lagaisse
, Wouter Joosen:
Secure replication for client-centric data stores. DICG@Middleware 2022: 31-36 - [c454]Gilang Mentari Hamidy
, Pieter Philippaerts
, Wouter Joosen
:
SecSharp: Towards Efficient Trusted Execution in Managed Languages (Work in Progress). MPLR 2022: 119-127 - [c453]Pieter Philippaerts
, Davy Preuveneers, Wouter Joosen:
OAuch: Exploring Security Compliance in the OAuth 2.0 Ecosystem. RAID 2022: 460-481 - [c452]Ala'a Al-Momani, Christoph Bösch, Kim Wuyts
, Laurens Sion, Wouter Joosen, Frank Kargl:
Mitigation lost in translation: leveraging threat information to improve privacy solution selection. SAC 2022: 1236-1247 - [c451]Tom van Goethem, Wouter Joosen:
Towards Improving the Deprecation Process of Web Features through Progressive Web Security. SP (Workshops) 2022: 20-30 - [c450]Victor Le Pochat, Laura Edelson, Tom van Goethem, Wouter Joosen, Damon McCoy, Tobias Lauinger:
An Audit of Facebook's Political Ad Policy Enforcement. USENIX Security Symposium 2022: 607-624 - [c449]Xander Bouwman, Victor Le Pochat, Pawel Foremski, Tom van Goethem, Carlos Hernandez Gañán, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Wouter Joosen, Michel van Eeten:
Helping hands: Measuring the impact of a large threat intelligence sharing community. USENIX Security Symposium 2022: 1149-1165 - [c448]Ilias Tsingenopoulos, Ali Mohammad Shafiei
, Lieven Desmet
, Davy Preuveneers, Wouter Joosen:
Adaptive Malware Control: Decision-Based Attacks in the Problem Space of Dynamic Analysis. WoRMA@AsiaCCS 2022: 3-14 - [c447]Ali Mohammad Shafiei
, Vera Rimmer, Ilias Tsingenopoulos, Lieven Desmet
, Wouter Joosen:
Position Paper: On Advancing Adversarial Malware Generation Using Dynamic Features. WoRMA@AsiaCCS 2022: 15-20 - [c446]Yana Dimova, Gertjan Franken, Victor Le Pochat
, Wouter Joosen, Lieven Desmet
:
Tracking the Evolution of Cookie-based Tracking on Facebook. WPES@CCS 2022: 181-196 - [p11]Giuseppe Garofalo
, Manel Slokom, Davy Preuveneers, Wouter Joosen, Martha A. Larson:
Machine Learning Meets Data Modification - The Potential of Pre-processing for Privacy Enchancement. Security and Artificial Intelligence 2022: 130-155 - [p10]Tim Van hamme, Giuseppe Garofalo
, Sander Joos
, Davy Preuveneers, Wouter Joosen:
AI for Biometric Authentication Systems. Security and Artificial Intelligence 2022: 156-180 - [p9]Azqa Nadeem
, Vera Rimmer, Wouter Joosen, Sicco Verwer:
Intelligent Malware Defenses. Security and Artificial Intelligence 2022: 217-253 - [p8]Vera Rimmer, Azqa Nadeem
, Sicco Verwer, Davy Preuveneers, Wouter Joosen:
Open-World Network Intrusion Detection. Security and Artificial Intelligence 2022: 254-283 - [p7]Carlos Javier Hernández-Castro, Zhuoran Liu, Alex Serban, Ilias Tsingenopoulos, Wouter Joosen:
Adversarial Machine Learning. Security and Artificial Intelligence 2022: 287-312 - [d1]Stef Verreydt
, Laurens Sion
, Koen Yskout
, Wouter Joosen
:
Relationship-Based Threat Modeling: Evaluation Data. Zenodo, 2022 - 2021
- [j93]Majid Makki, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen:
Thread-level resource consumption control of tenant custom code in a shared JVM for multi-tenant SaaS. Future Gener. Comput. Syst. 115: 351-364 (2021) - [j92]Stef Verreydt, Koen Yskout
, Wouter Joosen:
Security and Privacy Requirements for Electronic Consent: A Systematic Literature Review. ACM Trans. Comput. Heal. 2(2): 16:1-16:24 (2021) - [j91]Ansar Rafique
, Dimitri Van Landuyt
, Emad Heydari Beni
, Bert Lagaisse
, Wouter Joosen:
CryptDICE: Distributed data protection system for secure cloud data storage and computation. Inf. Syst. 96: 101671 (2021) - [j90]Davy Preuveneers
, Giuseppe Garofalo
, Wouter Joosen:
Cloud and edge based data analytics for privacy-preserving multi-modal engagement monitoring in the classroom. Inf. Syst. Frontiers 23(1): 151-164 (2021) - [j89]Yana Dimova, Gunes Acar, Lukasz Olejnik, Wouter Joosen, Tom van Goethem:
The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion. Proc. Priv. Enhancing Technol. 2021(3): 394-412 (2021) - [j88]Jonathan Oostvogels
, Fan Yang, Sam Michiels
, Wouter Joosen, Danny Hughes:
Zero-Wire: Low-Latency Wireless Networking with Symbol-Synchronous LEDs. GetMobile Mob. Comput. Commun. 25(1): 34-38 (2021) - [j87]Jasper Bogaerts
, Bert Lagaisse
, Wouter Joosen:
SEQUOIA: A Middleware Supporting Policy-Based Access Control for Search and Aggregation in Data-Driven Applications. IEEE Trans. Dependable Secur. Comput. 18(1): 325-339 (2021) - [j86]Tim Van hamme
, Enrique Argones-Rúa
, Davy Preuveneers
, Wouter Joosen:
On the Security of Biometrics and Fuzzy Commitment Cryptosystems: A Study on Gait Authentication. IEEE Trans. Inf. Forensics Secur. 16: 5211-5224 (2021) - [j85]Emekcan Aras, Stéphane Delbruel, Fan Yang, Wouter Joosen, Danny Hughes:
Chimera: A Low-power Reconfigurable Platform for Internet of Things. ACM Trans. Internet Things 2(2): 10:1-10:25 (2021) - [j84]Kristof Jannes
, Bert Lagaisse
, Wouter Joosen:
OWebSync: Seamless Synchronization of Distributed Web Clients. IEEE Trans. Parallel Distributed Syst. 32(9): 2338-2351 (2021) - [c445]Enrique Argones-Rúa, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Gait Authentication based on Spiking Neural Networks. BIOSIG 2021: 51-60 - [c444]Ashok Samraj Thangarajan, Fan Yang, Wouter Joosen, Sam Michiels
, Danny Hughes:
ReFrAEN: a Reconfigurable Vibration Analysis Framework for Constrained Sensor Nodes. DCOSS 2021: 124-131 - [c443]Stefanos Peros, Wouter Joosen, Danny Hughes:
Ermis: a middleware for bridging data collection and data processing in IoT streaming applications. DCOSS 2021: 259-266 - [c442]Gerald Budigiri, Christoph Baumann, Jan Tobias Mühlberg
, Eddy Truyen, Wouter Joosen:
Network Policies in Kubernetes: Performance Evaluation and Security Analysis. EuCNC/6G Summit 2021: 407-412 - [c441]Laurens Sion, Dimitri Van Landuyt
, Wouter Joosen:
An Overview of Runtime Data Protection Enforcement Approaches. EuroS&P Workshops 2021: 351-358 - [c440]Martijn Sauwens
, Kristof Jannes
, Bert Lagaisse
, Wouter Joosen:
SCEW: Programmable BFT-Consensus with Smart Contracts for Client-Centric P2P Web Applications. PaPoC@EuroSys 2021: 2:1-2:7 - [c439]Martijn Sauwens, Emad Heydari Beni
, Kristof Jannes
, Bert Lagaisse
, Wouter Joosen:
ThunQ: A Distributed and Deep Authorization Middleware for Early and Lazy Policy Enforcement in Microservice Applications. ICSOC 2021: 204-220 - [c438]Kristof Jannes
, Bert Lagaisse
, Wouter Joosen:
Seamless Synchronization for Collaborative Web Services. ICSOC Workshops 2021: 311-314 - [c437]Majid Makki, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen:
Shared memory protection in a multi-tenant JVM. MPLR 2021: 1-15 - [c436]Emad Heydari Beni
, Eddy Truyen, Bert Lagaisse
, Wouter Joosen, Jordy Dieltjens:
Reducing cold starts during elastic scaling of containers in kubernetes. SAC 2021: 60-68 - [c435]Ala'a Al-Momani, Kim Wuyts
, Laurens Sion, Frank Kargl, Wouter Joosen, Benjamin Erb, Christoph Bösch
:
Land of the lost: privacy patterns' forgotten properties: enhancing selection-support for privacy patterns. SAC 2021: 1217-1225 - [c434]Dimitri Van Landuyt
, Liliana Pasquale, Laurens Sion, Wouter Joosen:
Threat modeling at run time: the case for reflective and adaptive threat management (NIER track). SEAMS@ICSE 2021: 203-209 - [c433]Laurens Sion, Dimitri Van Landuyt
, Koen Yskout
, Stef Verreydt, Wouter Joosen:
Automated Threat Analysis and Management in a Continuous Integration Pipeline. SecDev 2021: 30-37 - [c432]Fan Yang, Ashok Samraj Thangarajan, Sam Michiels
, Wouter Joosen, Danny Hughes:
Morphy: Software Defined Charge Storage for the IoT. SenSys 2021: 248-260 - [c431]Gints Engelen
, Vera Rimmer, Wouter Joosen:
Troubleshooting an Intrusion Detection Dataset: the CICIDS2017 Case Study. SP (Workshops) 2021: 7-12 - [c430]Gertjan Franken
, Tom van Goethem, Wouter Joosen:
Reading Between the Lines: An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems. SP 2021: 1730-1747 - [c429]Oleksandr Tomashchuk
, Dimitri Van Landuyt
, Wouter Joosen:
The architectural divergence problem in security and privacy of eHealth IoT product lines. SPLC (A) 2021: 114-119 - [c428]Casper Claesen, Ansar Rafique, Dimitri Van Landuyt
, Wouter Joosen:
A YCSB Workload for Benchmarking Hotspot Object Behaviour in NoSQL Databases. TPCTC 2021: 1-16 - [c427]Davy Preuveneers, Sander Joos
, Wouter Joosen:
AuthGuide: Analyzing Security, Privacy and Usability Trade-Offs in Multi-factor Authentication. TrustBus 2021: 155-170 - [c426]Absar-Ul-Haque Ahmar
, Thien Duc Nguyen
, Wouter Joosen, Danny Hughes:
EH-CRAM: A Sustainable Energy Harvesting Algorithm for LPWANs. WCNC 2021: 1-7 - [p6]Steven Furnell
, Paul S. Haskell-Dowland
, Manish Agrawal
, Richard L. Baskerville
, Anirban Basu
, Matt Bishop
, Jorge Cuéllar, Sara Foresti
, Lynn Futcher
, Nurit Gal-Oz
, Teju Herath
, Christian Damsgaard Jensen
, Allen C. Johnston
, Wouter Joosen, Giovanni Livraga
, Javier López
, Stephen Marsh, Fabio Martinelli, Fabio Massacci
, Aljosa Pasic
, Stef Schinagl
, Abbas Shahim, Kerry-Lynn Thomson
, Jaideep Vaidya
, Tony Vance
, Merrill Warkentin
:
Information Security and Privacy - Challenges and Outlook. IFIP's Exciting First 60+ Years 2021: 383-401 - [i11]Yana Dimova, Gunes Acar, Lukasz Olejnik, Wouter Joosen, Tom van Goethem:
The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion. CoRR abs/2102.09301 (2021) - 2020
- [j83]Eddy Truyen
, Nane Kratzke
, Dimitri Van Landuyt
, Bert Lagaisse
, Wouter Joosen:
Managing Feature Compatibility in Kubernetes: Vendor Comparison and Analysis. IEEE Access 8: 228420-228439 (2020) - [j82]Laurens Sion, Pierre Dewitte, Dimitri Van Landuyt
, Kim Wuyts
, Peggy Valcke
, Wouter Joosen:
DPMF: A Modeling Framework for Data Protection by Design. Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model. 15: 10:1-10:53 (2020) - [j81]Davy Preuveneers
, Wouter Joosen:
Automated Configuration of NoSQL Performance and Scalability Tactics for Data-Intensive Applications. Informatics 7(3): 29 (2020) - [j80]Davy Preuveneers
, Wouter Joosen, Jorge Bernal Bernabé
, Antonio F. Skarmeta
:
Distributed Security Framework for Reliable Threat Intelligence Sharing. Secur. Commun. Networks 2020: 8833765:1-8833765:15 (2020) - [j79]Davy Preuveneers
, Ilias Tsingenopoulos
, Wouter Joosen:
Resource Usage and Performance Trade-offs for Machine Learning Models in Smart Environments. Sensors 20(4): 1176 (2020) - [j78]Stefanos Peros, Stéphane Delbruel, Sam Michiels
, Wouter Joosen, Danny Hughes:
Simplifying CPS Application Development through Fine-grained, Automatic Timeout Predictions. ACM Trans. Internet Things 1(3): 18:1-18:30 (2020) - [c425]Sepideh Pouyanrad, Jan Tobias Mühlberg
, Wouter Joosen:
SCFMSP: static detection of side channels in MSP430 programs. ARES 2020: 21:1-21:10 - [c424]Oleksandr Tomashchuk
, Yuan Li, Dimitri Van Landuyt
, Wouter Joosen:
Operationalization of Privacy and Security Requirements for eHealth IoT Applications in the Context of GDPR and CSL. APF 2020: 143-160 - [c423]Absar-Ul-Haque Ahmar
, Emekcan Aras, Thien Duc Nguyen
, Sam Michiels
, Wouter Joosen, Danny Hughes:
CRAM: Robust Medium Access Control for LPWAN using Cryptographic Frequency Hopping. DCOSS 2020: 95-102 - [c422]Emekcan Aras, Mahmoud Ammar
, Fan Yang, Wouter Joosen, Danny Hughes:
MicroVault: Reliable Storage Unit for IoT Devices. DCOSS 2020: 132-140 - [c421]Vincent Reniers
, Dimitri Van Landuyt
, Ansar Rafique
, Wouter Joosen
:
A Workload-Driven Document Database Schema Recommender (DBSR). ER 2020: 471-484 - [c420]Dimitri Van Landuyt
, Laurens Sion, Pierre Dewitte, Wouter Joosen:
The Bigger Picture: Approaches to Inter-organizational Data Protection Impact Assessment. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 283-293 - [c419]Kim Wuyts
, Laurens Sion, Wouter Joosen:
LINDDUN GO: A Lightweight Approach to Privacy Threat Modeling. EuroS&P Workshops 2020: 302-309 - [c418]Laurens Sion
, Dimitri Van Landuyt
, Wouter Joosen:
The Never-Ending Story: On the Need for Continuous Privacy Impact Assessment. EuroS&P Workshops 2020: 314-317 - [c417]Giuseppe Garofalo
, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
A Siamese Adversarial Anonymizer for Data Minimization in Biometric Applications. EuroS&P Workshops 2020: 334-343 - [c416]Koen Yskout
, Thomas Heyman, Dimitri Van Landuyt
, Laurens Sion
, Kim Wuyts
, Wouter Joosen:
Threat modeling: from infancy to maturity. ICSE (NIER) 2020: 9-12 - [c415]Laurens Sion
, Koen Yskout
, Dimitri Van Landuyt
, Alexander van Den Berghe, Wouter Joosen:
Security Threat Modeling: Are Data Flow Diagrams Enough? ICSE (Workshops) 2020: 254-257 - [c414]Ashok Samraj Thangarajan, Fan Yang, Wouter Joosen, Danny Hughes:
Deterministic 40 year battery lifetime through a hybrid perpetual sensing platform (HyPer). IOT 2020: 11:1-11:8 - [c413]Eddy Truyen, Bert Lagaisse
, Wouter Joosen, Arnout Hoebreckx, Cédric De Dycker:
Flexible Migration in Blue-Green Deployments within a Fixed Cost. WOC@Middleware 2020: 13-18 - [c412]Stefanos Peros, Emekcan Aras, Wouter Joosen, Danny Hughes:
Kairos: a self-configuring approach for short and accurate event timeouts in IoT. MobiQuitous 2020: 347-356 - [c411]Victor Le Pochat, Tim Van hamme, Sourena Maroofi, Tom van Goethem, Davy Preuveneers, Andrzej Duda, Wouter Joosen, Maciej Korczynski:
A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints. NDSS 2020 - [c410]Eddy Truyen, André Jacobs, Stef Verreydt, Emad Heydari Beni
, Bert Lagaisse
, Wouter Joosen:
Feasibility of container orchestration for adaptive performance isolation in multi-tenant SaaS applications. SAC 2020: 162-169 - [c409]Vincent Reniers, Yuan Gao, Ren Zhang
, Paolo Viviani
, Akash Madhusudan
, Bert Lagaisse
, Svetla Nikova
, Dimitri Van Landuyt
, Riccardo Lombardi, Bart Preneel
, Wouter Joosen:
Authenticated and auditable data sharing via smart contract. SAC 2020: 324-331 - [c408]Dimitri Van Landuyt
, Wouter Joosen:
A descriptive study of assumptions made in LINDDUN privacy threat elicitation. SAC 2020: 1280-1287 - [c407]Tom van Goethem, Christina Pöpper, Wouter Joosen, Mathy Vanhoef
:
Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections. USENIX Security Symposium 2020: 1985-2002