Search Results - "Joosen, Wouter"

Refine Results
  1. 1

    Predicting Vulnerable Software Components via Text Mining by Scandariato, Riccardo, Walden, James, Hovsepyan, Aram, Joosen, Wouter

    Published in IEEE transactions on software engineering (01-10-2014)
    “…This paper presents an approach based on machine learning to predict which components of a software application contain security vulnerabilities. The approach…”
    Get full text
    Journal Article
  2. 2

    Chained Anomaly Detection Models for Federated Learning: An Intrusion Detection Case Study by Preuveneers, Davy, Rimmer, Vera, Tsingenopoulos, Ilias, Spooren, Jan, Joosen, Wouter, Ilie-Zudor, Elisabeth

    Published in Applied sciences (01-12-2018)
    “…The adoption of machine learning and deep learning is on the rise in the cybersecurity domain where these AI methods help strengthen traditional system…”
    Get full text
    Journal Article
  3. 3

    Resource Usage and Performance Trade-offs for Machine Learning Models in Smart Environments by Preuveneers, Davy, Tsingenopoulos, Ilias, Joosen, Wouter

    Published in Sensors (Basel, Switzerland) (20-02-2020)
    “…The application of artificial intelligence enhances the ability of sensor and networking technologies to realize smart systems that sense, monitor and…”
    Get full text
    Journal Article
  4. 4

    A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements by Deng, Mina, Wuyts, Kim, Scandariato, Riccardo, Preneel, Bart, Joosen, Wouter

    Published in Requirements engineering (01-03-2011)
    “…Ready or not, the digitalization of information has come, and privacy is standing out there, possibly at stake. Although digital privacy is an identified…”
    Get full text
    Journal Article
  5. 5

    An Ontology-Based Cybersecurity Framework for AI-Enabled Systems and Applications by Preuveneers, Davy, Joosen, Wouter

    Published in Future internet (01-03-2024)
    “…Ontologies have the potential to play an important role in the cybersecurity landscape as they are able to provide a structured and standardized way to…”
    Get full text
    Journal Article
  6. 6

    Cloud and edge based data analytics for privacy-preserving multi-modal engagement monitoring in the classroom by Preuveneers, Davy, Garofalo, Giuseppe, Joosen, Wouter

    Published in Information systems frontiers (01-02-2021)
    “…Learning management systems are service platforms that support the administration and delivery of training programs and educational courses. Prerecorded,…”
    Get full text
    Journal Article
  7. 7

    A Systematic Comparison of Age and Gender Prediction on IMU Sensor-Based Gait Traces by Van Hamme, Tim, Garofalo, Giuseppe, Argones Rúa, Enrique, Preuveneers, Davy, Joosen, Wouter

    Published in Sensors (Basel, Switzerland) (04-07-2019)
    “…Sensors provide the foundation of many smart applications and cyber-physical systems by measuring and processing information upon which applications can make…”
    Get full text
    Journal Article
  8. 8

    Trusted Operations on Sensor Data by Janjua, Hassaan, Joosen, Wouter, Michiels, Sam, Hughes, Danny

    Published in Sensors (Basel, Switzerland) (27-04-2018)
    “…The widespread use of mobile devices has allowed the development of participatory sensing systems that capture various types of data using the existing or…”
    Get full text
    Journal Article
  9. 9

    Automated Configuration of NoSQL Performance and Scalability Tactics for Data-Intensive Applications by Preuveneers, Davy, Joosen, Wouter

    Published in Informatics (Basel) (08-08-2020)
    “…This paper presents the architecture, implementation and evaluation of a middleware support layer for NoSQL storage systems. Our middleware automatically…”
    Get full text
    Journal Article
  10. 10

    Vendor-Agnostic Reconfiguration of Kubernetes Clusters in Cloud Federations by Truyen, Eddy, Xie, Hongjie, Joosen, Wouter

    Published in Future internet (01-02-2023)
    “…Kubernetes (K8s) defines standardized APIs for container-based cluster orchestration such that it becomes possible for application managers to deploy their…”
    Get full text
    Journal Article
  11. 11

    Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows by Preuveneers, Davy, Joosen, Wouter

    Published in Future internet (01-12-2017)
    “…Microservices offer a compelling competitive advantage for building data flow systems as a choreography of self-contained data endpoints that each implement a…”
    Get full text
    Journal Article
  12. 12

    Design notations for secure software: a systematic literature review by van den Berghe, Alexander, Scandariato, Riccardo, Yskout, Koen, Joosen, Wouter

    Published in Software and systems modeling (01-07-2017)
    “…In the past 10 years, the research community has produced a significant number of design notations to represent security properties and concepts in a design…”
    Get full text
    Journal Article
  13. 13

    A Comprehensive Feature Comparison Study of Open-Source Container Orchestration Frameworks by Truyen, Eddy, Landuyt, Dimitri Van, Preuveneers, Davy, Lagaisse, Bert, Joosen, Wouter

    Published in Applied sciences (01-03-2019)
    “…(1) Background: Container orchestration frameworks provide support for management ofcomplex distributed applications. Different frameworks have emerged only…”
    Get full text
    Journal Article
  14. 14

    Do Security Patterns Really Help Designers? by Yskout, Koen, Scandariato, Riccardo, Joosen, Wouter

    “…Security patterns are well-known solutions to security-specific problems. They are often claimed to benefit designers without much security expertise. We have…”
    Get full text
    Conference Proceeding
  15. 15

    SCOPE: self-adaptive and policy-based data management middleware for federated clouds by Rafique, Ansar, Van Landuyt, Dimitri, Truyen, Eddy, Reniers, Vincent, Joosen, Wouter

    “…A federated cloud storage setup which integrates and utilizes storage resources from multiple cloud storage providers has become an increasingly popular and…”
    Get full text
    Journal Article
  16. 16

    SecLooCI: A comprehensive security middleware architecture for shared wireless sensor networks by Maerien, Jef, Michiels, Sam, Hughes, Danny, Huygens, Christophe, Joosen, Wouter

    Published in Ad hoc networks (01-02-2015)
    “…WSNs are trending towards dynamic environments that enable multiple parties to concurrently deploy and exploit multiple applications on shared nodes. The node…”
    Get full text
    Journal Article
  17. 17

    Managing Feature Compatibility in Kubernetes: Vendor Comparison and Analysis by Truyen, Eddy, Kratzke, Nane, Van Landuyt, Dimitri, Lagaisse, Bert, Joosen, Wouter

    Published in IEEE access (2020)
    “…Kubernetes (k8s) is a kind of cluster operating system for cloud-native workloads that has become a de-facto standard for container orchestration. Provided by…”
    Get full text
    Journal Article
  18. 18

    Discriminative training of spiking neural networks organised in columns for stream‐based biometric authentication by Argones Rúa, Enrique, hamme, Tim, Preuveneers, Davy, Joosen, Wouter

    Published in IET biometrics (01-09-2022)
    “…Stream‐based biometric authentication using a novel approach based on spiking neural networks (SNNs) is addressed. SNNs have proven advantages regarding energy…”
    Get full text
    Journal Article
  19. 19

    Aspect-Oriented Software Development in Practice: Tales from AOSD-Europe by Rashid, A., Cottenier, T., Greenwood, P., Chitchyan, R., Meunier, R., Coelho, R., Sudholt, M., Joosen, W.

    Published in Computer (Long Beach, Calif.) (01-02-2010)
    “…Aspect-oriented software development techniques provide a means to modularize crosscutting concerns in software systems. A survey of industrial projects…”
    Get full text
    Journal Article
  20. 20

    Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersections by Preuveneers, Davy, Joosen, Wouter

    Published in Computers & security (01-12-2023)
    “…Sharing cyber threat intelligence is important because it allows organizations to stay ahead of new and emerging threats, prevent downtime and improve their…”
    Get full text
    Journal Article