default search action
Wouter Joosen
Person information
- affiliation: Catholic University of Leuven, Belgium
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j109]Christof Koolen, Kim Wuyts, Wouter Joosen, Peggy Valcke:
From insight to compliance: Appropriate technical and organisational security measures through the lens of cybersecurity maturity models. Comput. Law Secur. Rev. 52: 105914 (2024) - [j108]Dimitri Van Landuyt, Vincent Wijshoff, Wouter Joosen:
A study of NoSQL query injection in Neo4j. Comput. Secur. 137: 103590 (2024) - [j107]Davy Preuveneers, Wouter Joosen:
An Ontology-Based Cybersecurity Framework for AI-Enabled Systems and Applications. Future Internet 16(3): 69 (2024) - [j106]Tim Van hamme, Giuseppe Garofalo, Enrique Argones-Rúa, Davy Preuveneers, Wouter Joosen:
A Novel Evaluation Framework for Biometric Security: Assessing Guessing Difficulty as a Metric. IEEE Trans. Inf. Forensics Secur. 19: 8369-8384 (2024) - [c501]Dimitri Van Landuyt, Marie Levrau, Vincent Reniers, Wouter Joosen:
An E-Commerce Benchmark for Evaluating Performance Trade-Offs in Document Stores. DaWaK 2024: 284-290 - [c500]José Santos, Eddy Truyen, Christoph Baumann, Filip De Turck, Gerald Budigiri, Wouter Joosen:
Towards Intent-Based Scheduling for Performance and Security in Edge-to-Cloud Networks. ICIN 2024: 222-227 - [c499]Ilias Tsingenopoulos, Jacopo Cortellazzi, Branislav Bosanský, Simone Aonzo, Davy Preuveneers, Wouter Joosen, Fabio Pierazzi, Lorenzo Cavallaro:
How to Train your Antivirus: RL-based Hardening through the Problem Space. RAID 2024: 130-146 - [c498]Pieter-Jan Vrielynck, Tim Van hamme, Rawad Ghostin, Bert Lagaisse, Davy Preuveneers, Wouter Joosen:
A Self-Sovereign Identity Approach to Decentralized Access Control with Transitive Delegations. SACMAT 2024 - [c497]Dimitri Van Landuyt, Laurens Sion, Walewein Philips, Wouter Joosen:
From automation to CI/CD: a comparative evaluation of threat modeling tools. SecDev 2024: 35-45 - [c496]Stef Verreydt, Koen Yskout, Laurens Sion, Wouter Joosen:
Threat modeling state of practice in Dutch organizations. SOUPS @ USENIX Security Symposium 2024: 473-486 - [c495]Victor Le Pochat, Simon Fernandez, Tom van Goethem, Samaneh Tajalizadehkhoob, Lieven Desmet, Andrzej Duda, Wouter Joosen, Maciej Korczynski:
Evaluating the Impact of Design Decisions on Passive DNS-Based Domain Rankings. TMA 2024: 1-11 - [c494]Karel Dhondt, Victor Le Pochat, Yana Dimova, Wouter Joosen, Stijn Volckaert:
Swipe Left for Identity Theft: An Analysis of User Data Privacy Risks on Location-based Dating Apps. USENIX Security Symposium 2024 - [i13]Jacopo Cortellazzi, Ilias Tsingenopoulos, Branislav Bosanský, Simone Aonzo, Davy Preuveneers, Wouter Joosen, Fabio Pierazzi, Lorenzo Cavallaro:
How to Train your Antivirus: RL-based Hardening through the Problem-Space. CoRR abs/2402.19027 (2024) - 2023
- [j105]Davy Preuveneers, Wouter Joosen:
Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersections. Comput. Secur. 135: 103505 (2023) - [j104]Eddy Truyen, Hongjie Xie, Wouter Joosen:
Vendor-Agnostic Reconfiguration of Kubernetes Clusters in Cloud Federations. Future Internet 15(2): 63 (2023) - [j103]Yana Dimova, Tom van Goethem, Wouter Joosen:
Everybody's Looking for SSOmething: A large-scale evaluation on the privacy of OAuth authentication on the web. Proc. Priv. Enhancing Technol. 2023(4): 452-467 (2023) - [j102]Absar-Ul-Haque Ahmar, Emekcan Aras, Thien Duc Nguyen, Sam Michiels, Wouter Joosen, Danny Hughes:
Design of a Robust MAC Protocol for LoRa. ACM Trans. Internet Things 4(1): 3:1-3:25 (2023) - [j101]Kristof Jannes, Emad Heydari Beni, Bert Lagaisse, Wouter Joosen:
BeauForT: Robust Byzantine Fault Tolerance for Client-Centric Mobile Web Applications. IEEE Trans. Parallel Distributed Syst. 34(4): 1241-1252 (2023) - [c493]Willem Verheyen, Tim Van hamme, Sander Joos, Davy Preuveneers, Wouter Joosen:
Beware the Doppelgänger: Attacks against Adaptive Thresholds in Facial Recognition Systems. ARES 2023: 18:1-18:11 - [c492]Emma Lavens, Davy Preuveneers, Wouter Joosen:
Mitigating undesired interactions between liveness detection components in biometric authentication. ARES 2023: 141:1-141:8 - [c491]Gerald Budigiri, Christoph Baumann, Eddy Truyen, Jan Tobias Mühlberg, Wouter Joosen:
Zero-Cost In-Depth Enforcement of Network Policies for Low-Latency Cloud-Native Systems. CLOUD 2023: 249-261 - [c490]Anh-Duy Tran, Koen Yskout, Wouter Joosen:
Threat Modeling: A Rough Diamond or Fool's Gold? ECSA (Tracks, Workshops and Doctoral Symposium) 2023: 120-129 - [c489]Shirin Kalantari, Pieter Philippaerts, Yana Dimova, Danny Hughes, Wouter Joosen, Bart De Decker:
A User-Centric Approach to API Delegations - Enforcing Privacy Policies on OAuth Delegations. ESORICS (2) 2023: 318-337 - [c488]Davy Preuveneers, Javier Martínez Llamas, Irfan Bulut, Enrique Argones-Rúa, Pieter Verfaillie, Vince Demortier, Dimitri Surinx, Wouter Joosen:
On the Use of AutoML for Combating Alert Fatigue in Security Operations Centers. ESORICS Workshops (2) 2023: 609-627 - [c487]Javier Martínez Llamas, Davy Preuveneers, Wouter Joosen:
Effective Machine Learning-based Access Control Administration through Unlearning. EuroS&P Workshops 2023: 50-57 - [c486]Tim Van hamme, Giuseppe Garofalo, Davy Preuveneers, Wouter Joosen:
Masterkey attacks against free-text keystroke dynamics and security implications of demographic factors. EuroS&P 2023: 278-291 - [c485]Pieter Philippaerts, Davy Preuveneers, Wouter Joosen:
Revisiting OAuth 2.0 Compliance: A Two-Year Follow-Up Study. EuroS&P Workshops 2023: 521-525 - [c484]Gilang Mentari Hamidy, Sri Yulianti, Pieter Philippaerts, Wouter Joosen:
TC4SE: A High-Performance Trusted Channel Mechanism for Secure Enclave-Based Trusted Execution Environments. ISC 2023: 246-264 - [c483]Davy Preuveneers, Willem Verheyen, Sander Joos, Wouter Joosen:
On the adversarial robustness of full integer quantized TinyML models at the edge. MIDDLEWEDGE@Middleware 2023: 7-12 - [c482]Laurens Sion, Dimitri Van Landuyt, Pierre Dewitte, Peggy Valcke, Wouter Joosen:
Demonstration of the DPMF for Data Protection Analysis. MoDELS (Companion) 2023: 75-79 - [c481]Gilang Mentari Hamidy, Pieter Philippaerts, Wouter Joosen:
T3E: A Practical Solution to Trusted Time in Secure Enclaves. NSS 2023: 305-326 - [c480]Anh-Duy Tran, Koen Yskout, Wouter Joosen:
AndrAS: Automated Attack Surface Extraction for Android Applications. QRS 2023: 406-417 - [c479]Kristof Jannes, Vincent Reniers, Wouter Lenaerts, Bert Lagaisse, Wouter Joosen:
DEDACS: Decentralized and dynamic access control for smart contracts in a policy-based manner. SAC 2023: 222-230 - [c478]Dimitri Van Landuyt, Julien Benaouda, Vincent Reniers, Ansar Rafique, Wouter Joosen:
A Comparative Performance Evaluation of Multi-Model NoSQL Databases and Polyglot Persistence. SAC 2023: 286-293 - [c477]Stef Verreydt, Dimitri Van Landuyt, Wouter Joosen:
Expressive and Systematic Risk Assessments with Instance-Centric Threat Models. SAC 2023: 1450-1457 - [c476]Tom van Goethem, Iskander Sánchez-Rola, Wouter Joosen:
Scripted Henchmen: Leveraging XS-Leaks for Cross-Site Vulnerability Detection. SP (Workshops) 2023: 371-383 - [c475]Victor Le Pochat, Wouter Joosen:
Analyzing Cyber Security Research Practices through a Meta-Research Framework. CSET @ USENIX Security Symposium 2023: 64-74 - [c474]Gertjan Franken, Tom van Goethem, Lieven Desmet, Wouter Joosen:
A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs. USENIX Security Symposium 2023: 3673-3690 - [c473]Yana Dimova, Mrunmayee Kode, Shirin Kalantari, Kim Wuyts, Wouter Joosen, Jan Tobias Mühlberg:
From Privacy Policies to Privacy Threats: A Case Study in Policy-Based Threat Modeling. WPES@CCS 2023: 17-29 - [i12]Ilias Tsingenopoulos, Vera Rimmer, Davy Preuveneers, Fabio Pierazzi, Lorenzo Cavallaro, Wouter Joosen:
Adversarial Markov Games: On Adaptive Decision-Based Attacks and Defenses. CoRR abs/2312.13435 (2023) - 2022
- [j100]Enrique Argones-Rúa, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Discriminative training of spiking neural networks organised in columns for stream-based biometric authentication. IET Biom. 11(5): 485-497 (2022) - [j99]Giuseppe Garofalo, Tim Van hamme, Davy Preuveneers, Wouter Joosen, Aysajan Abidin, Mustafa A. Mustafa:
PIVOT: Private and Effective Contact Tracing. IEEE Internet Things J. 9(22): 22466-22489 (2022) - [j98]Vera Rimmer, Theodor Schnitzler, Tom van Goethem, Abel Rodríguez Romero, Wouter Joosen, Katharina Kohls:
Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor. Proc. Priv. Enhancing Technol. 2022(3): 314-335 (2022) - [j97]Dimitri Van Landuyt, Wouter Joosen:
A descriptive study of assumptions in STRIDE security threat modeling. Softw. Syst. Model. 21(6): 2311-2328 (2022) - [j96]Fan Yang, Ashok Samraj Thangarajan, Gowri Sankar Ramachandran, Wouter Joosen, Danny Hughes:
AsTAR: Sustainable Energy Harvesting for the Internet of Things through Adaptive Task Scheduling. ACM Trans. Sens. Networks 18(1): 4:1-4:34 (2022) - [c472]Davy Preuveneers, Wouter Joosen:
Privacy-Preserving Polyglot Sharing and Analysis of Confidential Cyber Threat Intelligence. ARES 2022: 2:1-2:11 - [c471]Emma Lavens, Pieter Philippaerts, Wouter Joosen:
A Quantitative Assessment of the Detection Performance of Web Vulnerability Scanners. ARES 2022: 149:1-149:10 - [c470]Tom van Goethem, Gertjan Franken, Iskander Sánchez-Rola, David Dworken, Wouter Joosen:
SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model. AsiaCCS 2022: 784-798 - [c469]Karel Dhondt, Victor Le Pochat, Alexios Voulimeneas, Wouter Joosen, Stijn Volckaert:
A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks. CCS 2022: 801-814 - [c468]Lisa Liu, Gints Engelen, Timothy M. Lynar, Daryl Essam, Wouter Joosen:
Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018. CNS 2022: 254-262 - [c467]Sander Joos, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Adversarial Robustness is Not Enough: Practical Limitations for Securing Facial Authentication. IWSPA@CODASPY 2022: 2-12 - [c466]Joseph Hallett, Simon N. Foley, David Manda, Joseph Gardiner, Dimitri Jonckers, Wouter Joosen, Awais Rashid:
Threat-Driven Dynamic Security Policies for Cyber-Physical Infrastructures. CRITIS 2022: 9-26 - [c465]Absar-Ul-Haque Ahmar, Wouter Joosen, Danny Hughes:
Smart-Hop: Low-Latency Multi-hop Networking for LoRa. DCOSS 2022: 17-20 - [c464]Dimitri Van Landuyt, Wouter Joosen:
A Systematic Survey of Architectural Approaches and Trade-Offs in Data De-identification. ECSA 2022: 66-82 - [c463]Pieter-Jan Vrielynck, Emad Heydari Beni, Kristof Jannes, Bert Lagaisse, Wouter Joosen:
DeFIRED: decentralized authorization with receiver-revocable and refutable delegations. EuroSec@EUROSYS 2022: 57-63 - [c462]Davy Preuveneers, Emma Lavens, Wouter Joosen:
Applying Machine Learning to use security oracles: a case study in virus and malware detection. EuroS&P Workshops 2022: 240-251 - [c461]Ilias Tsingenopoulos, Davy Preuveneers, Lieven Desmet, Wouter Joosen:
Captcha me if you can: Imitation Games with Reinforcement Learning. EuroS&P 2022: 719-735 - [c460]Zhaoyi Liu, Haoyu Tang, Sam Michiels, Wouter Joosen, Danny Hughes:
Unsupervised Acoustic Anomaly Detection Systems Based on Gaussian Mixture Density Neural Network. EUSIPCO 2022: 259-263 - [c459]Alexander van Den Berghe, Koen Yskout, Wouter Joosen:
A reimagined catalogue of software security patterns. EnCyCriS@ICSE 2022: 25-32 - [c458]Stef Verreydt, Laurens Sion, Koen Yskout, Wouter Joosen:
Relationship-based threat modeling. EnCyCriS@ICSE 2022: 41-48 - [c457]Mengyao Liu, Jonathan Oostvogels, Sam Michiels, Wouter Joosen, Danny Hughes:
BoboLink: Low Latency and Low Power Communication for Intelligent Environments. Intelligent Environments 2022: 1-4 - [c456]Zhaoyi Liu, Sam Michiels, Wouter Joosen, Danny Hughes:
Poster Abstract: Adapting Pretrained Features for Efficient Unsupervised Acoustic Anomaly Detection. IPSN 2022: 525-526 - [c455]Kristof Jannes, Bert Lagaisse, Wouter Joosen:
Secure replication for client-centric data stores. DICG@Middleware 2022: 31-36 - [c454]Gilang Mentari Hamidy, Pieter Philippaerts, Wouter Joosen:
SecSharp: Towards Efficient Trusted Execution in Managed Languages (Work in Progress). MPLR 2022: 119-127 - [c453]Pieter Philippaerts, Davy Preuveneers, Wouter Joosen:
OAuch: Exploring Security Compliance in the OAuth 2.0 Ecosystem. RAID 2022: 460-481 - [c452]Ala'a Al-Momani, Christoph Bösch, Kim Wuyts, Laurens Sion, Wouter Joosen, Frank Kargl:
Mitigation lost in translation: leveraging threat information to improve privacy solution selection. SAC 2022: 1236-1247 - [c451]Tom van Goethem, Wouter Joosen:
Towards Improving the Deprecation Process of Web Features through Progressive Web Security. SP (Workshops) 2022: 20-30 - [c450]Victor Le Pochat, Laura Edelson, Tom van Goethem, Wouter Joosen, Damon McCoy, Tobias Lauinger:
An Audit of Facebook's Political Ad Policy Enforcement. USENIX Security Symposium 2022: 607-624 - [c449]Xander Bouwman, Victor Le Pochat, Pawel Foremski, Tom van Goethem, Carlos Hernandez Gañán, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Wouter Joosen, Michel van Eeten:
Helping hands: Measuring the impact of a large threat intelligence sharing community. USENIX Security Symposium 2022: 1149-1165 - [c448]Ilias Tsingenopoulos, Ali Mohammad Shafiei, Lieven Desmet, Davy Preuveneers, Wouter Joosen:
Adaptive Malware Control: Decision-Based Attacks in the Problem Space of Dynamic Analysis. WoRMA@AsiaCCS 2022: 3-14 - [c447]Ali Mohammad Shafiei, Vera Rimmer, Ilias Tsingenopoulos, Lieven Desmet, Wouter Joosen:
Position Paper: On Advancing Adversarial Malware Generation Using Dynamic Features. WoRMA@AsiaCCS 2022: 15-20 - [c446]Yana Dimova, Gertjan Franken, Victor Le Pochat, Wouter Joosen, Lieven Desmet:
Tracking the Evolution of Cookie-based Tracking on Facebook. WPES@CCS 2022: 181-196 - [p11]Giuseppe Garofalo, Manel Slokom, Davy Preuveneers, Wouter Joosen, Martha A. Larson:
Machine Learning Meets Data Modification - The Potential of Pre-processing for Privacy Enchancement. Security and Artificial Intelligence 2022: 130-155 - [p10]Tim Van hamme, Giuseppe Garofalo, Sander Joos, Davy Preuveneers, Wouter Joosen:
AI for Biometric Authentication Systems. Security and Artificial Intelligence 2022: 156-180 - [p9]Azqa Nadeem, Vera Rimmer, Wouter Joosen, Sicco Verwer:
Intelligent Malware Defenses. Security and Artificial Intelligence 2022: 217-253 - [p8]Vera Rimmer, Azqa Nadeem, Sicco Verwer, Davy Preuveneers, Wouter Joosen:
Open-World Network Intrusion Detection. Security and Artificial Intelligence 2022: 254-283 - [p7]Carlos Javier Hernández-Castro, Zhuoran Liu, Alex Serban, Ilias Tsingenopoulos, Wouter Joosen:
Adversarial Machine Learning. Security and Artificial Intelligence 2022: 287-312 - [d1]Stef Verreydt, Laurens Sion, Koen Yskout, Wouter Joosen:
Relationship-Based Threat Modeling: Evaluation Data. Zenodo, 2022 - 2021
- [j95]Lieven Desmet, Jan Spooren, Thomas Vissers, Peter Janssen, Wouter Joosen:
Premadoma: An Operational Solution to Prevent Malicious Domain Name Registrations in the .eu TLD. DTRAP 2(1): 2:1-2:24 (2021) - [j94]Majid Makki, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
Thread-level resource consumption control of tenant custom code in a shared JVM for multi-tenant SaaS. Future Gener. Comput. Syst. 115: 351-364 (2021) - [j93]Stef Verreydt, Koen Yskout, Wouter Joosen:
Security and Privacy Requirements for Electronic Consent: A Systematic Literature Review. ACM Trans. Comput. Heal. 2(2): 16:1-16:24 (2021) - [j92]Ansar Rafique, Dimitri Van Landuyt, Emad Heydari Beni, Bert Lagaisse, Wouter Joosen:
CryptDICE: Distributed data protection system for secure cloud data storage and computation. Inf. Syst. 96: 101671 (2021) - [j91]Davy Preuveneers, Giuseppe Garofalo, Wouter Joosen:
Cloud and edge based data analytics for privacy-preserving multi-modal engagement monitoring in the classroom. Inf. Syst. Frontiers 23(1): 151-164 (2021) - [j90]Davy Preuveneers, Wouter Joosen:
Sharing Machine Learning Models as Indicators of Compromise for Cyber Threat Intelligence. J. Cybersecur. Priv. 1(1): 140-163 (2021) - [j89]Yana Dimova, Gunes Acar, Lukasz Olejnik, Wouter Joosen, Tom van Goethem:
The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion. Proc. Priv. Enhancing Technol. 2021(3): 394-412 (2021) - [j88]Jonathan Oostvogels, Fan Yang, Sam Michiels, Wouter Joosen, Danny Hughes:
Zero-Wire: Low-Latency Wireless Networking with Symbol-Synchronous LEDs. GetMobile Mob. Comput. Commun. 25(1): 34-38 (2021) - [j87]Jasper Bogaerts, Bert Lagaisse, Wouter Joosen:
SEQUOIA: A Middleware Supporting Policy-Based Access Control for Search and Aggregation in Data-Driven Applications. IEEE Trans. Dependable Secur. Comput. 18(1): 325-339 (2021) - [j86]Tim Van hamme, Enrique Argones-Rúa, Davy Preuveneers, Wouter Joosen:
On the Security of Biometrics and Fuzzy Commitment Cryptosystems: A Study on Gait Authentication. IEEE Trans. Inf. Forensics Secur. 16: 5211-5224 (2021) - [j85]Emekcan Aras, Stéphane Delbruel, Fan Yang, Wouter Joosen, Danny Hughes:
Chimera: A Low-power Reconfigurable Platform for Internet of Things. ACM Trans. Internet Things 2(2): 10:1-10:25 (2021) - [j84]Kristof Jannes, Bert Lagaisse, Wouter Joosen:
OWebSync: Seamless Synchronization of Distributed Web Clients. IEEE Trans. Parallel Distributed Syst. 32(9): 2338-2351 (2021) - [c445]Enrique Argones-Rúa, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Gait Authentication based on Spiking Neural Networks. BIOSIG 2021: 51-60 - [c444]Ashok Samraj Thangarajan, Fan Yang, Wouter Joosen, Sam Michiels, Danny Hughes:
ReFrAEN: a Reconfigurable Vibration Analysis Framework for Constrained Sensor Nodes. DCOSS 2021: 124-131 - [c443]Stefanos Peros, Wouter Joosen, Danny Hughes:
Ermis: a middleware for bridging data collection and data processing in IoT streaming applications. DCOSS 2021: 259-266 - [c442]Gerald Budigiri, Christoph Baumann, Jan Tobias Mühlberg, Eddy Truyen, Wouter Joosen:
Network Policies in Kubernetes: Performance Evaluation and Security Analysis. EuCNC/6G Summit 2021: 407-412 - [c441]Laurens Sion, Dimitri Van Landuyt, Wouter Joosen:
An Overview of Runtime Data Protection Enforcement Approaches. EuroS&P Workshops 2021: 351-358 - [c440]Martijn Sauwens, Kristof Jannes, Bert Lagaisse, Wouter Joosen:
SCEW: Programmable BFT-Consensus with Smart Contracts for Client-Centric P2P Web Applications. PaPoC@EuroSys 2021: 2:1-2:7 - [c439]Martijn Sauwens, Emad Heydari Beni, Kristof Jannes, Bert Lagaisse, Wouter Joosen:
ThunQ: A Distributed and Deep Authorization Middleware for Early and Lazy Policy Enforcement in Microservice Applications. ICSOC 2021: 204-220 - [c438]Kristof Jannes, Bert Lagaisse, Wouter Joosen:
Seamless Synchronization for Collaborative Web Services. ICSOC Workshops 2021: 311-314 - [c437]Majid Makki, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
Shared memory protection in a multi-tenant JVM. MPLR 2021: 1-15 - [c436]Emad Heydari Beni, Eddy Truyen, Bert Lagaisse, Wouter Joosen, Jordy Dieltjens:
Reducing cold starts during elastic scaling of containers in kubernetes. SAC 2021: 60-68 - [c435]Ala'a Al-Momani, Kim Wuyts, Laurens Sion, Frank Kargl, Wouter Joosen, Benjamin Erb, Christoph Bösch:
Land of the lost: privacy patterns' forgotten properties: enhancing selection-support for privacy patterns. SAC 2021: 1217-1225 - [c434]Dimitri Van Landuyt, Liliana Pasquale, Laurens Sion, Wouter Joosen:
Threat modeling at run time: the case for reflective and adaptive threat management (NIER track). SEAMS@ICSE 2021: 203-209 - [c433]Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Stef Verreydt, Wouter Joosen:
Automated Threat Analysis and Management in a Continuous Integration Pipeline. SecDev 2021: 30-37 - [c432]Fan Yang, Ashok Samraj Thangarajan, Sam Michiels, Wouter Joosen, Danny Hughes:
Morphy: Software Defined Charge Storage for the IoT. SenSys 2021: 248-260 - [c431]Gints Engelen, Vera Rimmer, Wouter Joosen:
Troubleshooting an Intrusion Detection Dataset: the CICIDS2017 Case Study. SP (Workshops) 2021: 7-12 - [c430]Gertjan Franken, Tom van Goethem, Wouter Joosen:
Reading Between the Lines: An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems. SP 2021: 1730-1747 - [c429]Oleksandr Tomashchuk, Dimitri Van Landuyt, Wouter Joosen:
The architectural divergence problem in security and privacy of eHealth IoT product lines. SPLC (A) 2021: 114-119 - [c428]Casper Claesen, Ansar Rafique, Dimitri Van Landuyt, Wouter Joosen:
A YCSB Workload for Benchmarking Hotspot Object Behaviour in NoSQL Databases. TPCTC 2021: 1-16 - [c427]Davy Preuveneers, Sander Joos, Wouter Joosen:
AuthGuide: Analyzing Security, Privacy and Usability Trade-Offs in Multi-factor Authentication. TrustBus 2021: 155-170 - [c426]Absar-Ul-Haque Ahmar, Thien Duc Nguyen,