default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
- Wouter Joosen
Catholic University of Leuven, Belgium
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 639 matches
- 2024
- Christof Koolen, Kim Wuyts, Wouter Joosen, Peggy Valcke:
From insight to compliance: Appropriate technical and organisational security measures through the lens of cybersecurity maturity models. Comput. Law Secur. Rev. 52: 105914 (2024) - Dimitri Van Landuyt, Vincent Wijshoff, Wouter Joosen:
A study of NoSQL query injection in Neo4j. Comput. Secur. 137: 103590 (2024) - Davy Preuveneers, Wouter Joosen:
An Ontology-Based Cybersecurity Framework for AI-Enabled Systems and Applications. Future Internet 16(3): 69 (2024) - Tim Van hamme, Giuseppe Garofalo, Enrique Argones-Rúa, Davy Preuveneers, Wouter Joosen:
A Novel Evaluation Framework for Biometric Security: Assessing Guessing Difficulty as a Metric. IEEE Trans. Inf. Forensics Secur. 19: 8369-8384 (2024) - Dimitri Van Landuyt, Marie Levrau, Vincent Reniers, Wouter Joosen:
An E-Commerce Benchmark for Evaluating Performance Trade-Offs in Document Stores. DaWaK 2024: 284-290 - José Santos, Eddy Truyen, Christoph Baumann, Filip De Turck, Gerald Budigiri, Wouter Joosen:
Towards Intent-Based Scheduling for Performance and Security in Edge-to-Cloud Networks. ICIN 2024: 222-227 - Ilias Tsingenopoulos, Jacopo Cortellazzi, Branislav Bosanský, Simone Aonzo, Davy Preuveneers, Wouter Joosen, Fabio Pierazzi, Lorenzo Cavallaro:
How to Train your Antivirus: RL-based Hardening through the Problem Space. RAID 2024: 130-146 - Pieter-Jan Vrielynck, Tim Van hamme, Rawad Ghostin, Bert Lagaisse, Davy Preuveneers, Wouter Joosen:
A Self-Sovereign Identity Approach to Decentralized Access Control with Transitive Delegations. SACMAT 2024 - Stef Verreydt, Koen Yskout, Laurens Sion, Wouter Joosen:
Threat modeling state of practice in Dutch organizations. SOUPS @ USENIX Security Symposium 2024: 473-486 - Victor Le Pochat, Simon Fernandez, Tom van Goethem, Samaneh Tajalizadehkhoob, Lieven Desmet, Andrzej Duda, Wouter Joosen, Maciej Korczynski:
Evaluating the Impact of Design Decisions on Passive DNS-Based Domain Rankings. TMA 2024: 1-11 - Karel Dhondt, Victor Le Pochat, Yana Dimova, Wouter Joosen, Stijn Volckaert:
Swipe Left for Identity Theft: An Analysis of User Data Privacy Risks on Location-based Dating Apps. USENIX Security Symposium 2024 - Jacopo Cortellazzi, Ilias Tsingenopoulos, Branislav Bosanský, Simone Aonzo, Davy Preuveneers, Wouter Joosen, Fabio Pierazzi, Lorenzo Cavallaro:
How to Train your Antivirus: RL-based Hardening through the Problem-Space. CoRR abs/2402.19027 (2024) - 2023
- Davy Preuveneers, Wouter Joosen:
Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersections. Comput. Secur. 135: 103505 (2023) - Eddy Truyen, Hongjie Xie, Wouter Joosen:
Vendor-Agnostic Reconfiguration of Kubernetes Clusters in Cloud Federations. Future Internet 15(2): 63 (2023) - Yana Dimova, Tom van Goethem, Wouter Joosen:
Everybody's Looking for SSOmething: A large-scale evaluation on the privacy of OAuth authentication on the web. Proc. Priv. Enhancing Technol. 2023(4): 452-467 (2023) - Absar-Ul-Haque Ahmar, Emekcan Aras, Thien Duc Nguyen, Sam Michiels, Wouter Joosen, Danny Hughes:
Design of a Robust MAC Protocol for LoRa. ACM Trans. Internet Things 4(1): 3:1-3:25 (2023) - Kristof Jannes, Emad Heydari Beni, Bert Lagaisse, Wouter Joosen:
BeauForT: Robust Byzantine Fault Tolerance for Client-Centric Mobile Web Applications. IEEE Trans. Parallel Distributed Syst. 34(4): 1241-1252 (2023) - Emma Lavens, Davy Preuveneers, Wouter Joosen:
Mitigating undesired interactions between liveness detection components in biometric authentication. ARES 2023: 141:1-141:8 - Willem Verheyen, Tim Van hamme, Sander Joos, Davy Preuveneers, Wouter Joosen:
Beware the Doppelgänger: Attacks against Adaptive Thresholds in Facial Recognition Systems. ARES 2023: 18:1-18:11 - Gerald Budigiri, Christoph Baumann, Eddy Truyen, Jan Tobias Mühlberg, Wouter Joosen:
Zero-Cost In-Depth Enforcement of Network Policies for Low-Latency Cloud-Native Systems. CLOUD 2023: 249-261 - Anh-Duy Tran, Koen Yskout, Wouter Joosen:
Threat Modeling: A Rough Diamond or Fool's Gold? ECSA (Tracks, Workshops and Doctoral Symposium) 2023: 120-129 - Shirin Kalantari, Pieter Philippaerts, Yana Dimova, Danny Hughes, Wouter Joosen, Bart De Decker:
A User-Centric Approach to API Delegations - Enforcing Privacy Policies on OAuth Delegations. ESORICS (2) 2023: 318-337 - Davy Preuveneers, Javier Martínez Llamas, Irfan Bulut, Enrique Argones-Rúa, Pieter Verfaillie, Vince Demortier, Dimitri Surinx, Wouter Joosen:
On the Use of AutoML for Combating Alert Fatigue in Security Operations Centers. ESORICS Workshops (2) 2023: 609-627 - Javier Martínez Llamas, Davy Preuveneers, Wouter Joosen:
Effective Machine Learning-based Access Control Administration through Unlearning. EuroS&P Workshops 2023: 50-57 - Pieter Philippaerts, Davy Preuveneers, Wouter Joosen:
Revisiting OAuth 2.0 Compliance: A Two-Year Follow-Up Study. EuroS&P Workshops 2023: 521-525 - Tim Van hamme, Giuseppe Garofalo, Davy Preuveneers, Wouter Joosen:
Masterkey attacks against free-text keystroke dynamics and security implications of demographic factors. EuroS&P 2023: 278-291 - Gilang Mentari Hamidy, Sri Yulianti, Pieter Philippaerts, Wouter Joosen:
TC4SE: A High-Performance Trusted Channel Mechanism for Secure Enclave-Based Trusted Execution Environments. ISC 2023: 246-264 - Davy Preuveneers, Willem Verheyen, Sander Joos, Wouter Joosen:
On the adversarial robustness of full integer quantized TinyML models at the edge. MIDDLEWEDGE@Middleware 2023: 7-12 - Laurens Sion, Dimitri Van Landuyt, Pierre Dewitte, Peggy Valcke, Wouter Joosen:
Demonstration of the DPMF for Data Protection Analysis. MoDELS (Companion) 2023: 75-79 - Gilang Mentari Hamidy, Pieter Philippaerts, Wouter Joosen:
T3E: A Practical Solution to Trusted Time in Secure Enclaves. NSS 2023: 305-326
skipping 609 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-03 17:46 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint