Search Results - "Joosen, Wouter"
-
1
Predicting Vulnerable Software Components via Text Mining
Published in IEEE transactions on software engineering (01-10-2014)“…This paper presents an approach based on machine learning to predict which components of a software application contain security vulnerabilities. The approach…”
Get full text
Journal Article -
2
Chained Anomaly Detection Models for Federated Learning: An Intrusion Detection Case Study
Published in Applied sciences (01-12-2018)“…The adoption of machine learning and deep learning is on the rise in the cybersecurity domain where these AI methods help strengthen traditional system…”
Get full text
Journal Article -
3
Resource Usage and Performance Trade-offs for Machine Learning Models in Smart Environments
Published in Sensors (Basel, Switzerland) (20-02-2020)“…The application of artificial intelligence enhances the ability of sensor and networking technologies to realize smart systems that sense, monitor and…”
Get full text
Journal Article -
4
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
Published in Requirements engineering (01-03-2011)“…Ready or not, the digitalization of information has come, and privacy is standing out there, possibly at stake. Although digital privacy is an identified…”
Get full text
Journal Article -
5
An Ontology-Based Cybersecurity Framework for AI-Enabled Systems and Applications
Published in Future internet (01-03-2024)“…Ontologies have the potential to play an important role in the cybersecurity landscape as they are able to provide a structured and standardized way to…”
Get full text
Journal Article -
6
Cloud and edge based data analytics for privacy-preserving multi-modal engagement monitoring in the classroom
Published in Information systems frontiers (01-02-2021)“…Learning management systems are service platforms that support the administration and delivery of training programs and educational courses. Prerecorded,…”
Get full text
Journal Article -
7
A Systematic Comparison of Age and Gender Prediction on IMU Sensor-Based Gait Traces
Published in Sensors (Basel, Switzerland) (04-07-2019)“…Sensors provide the foundation of many smart applications and cyber-physical systems by measuring and processing information upon which applications can make…”
Get full text
Journal Article -
8
Trusted Operations on Sensor Data
Published in Sensors (Basel, Switzerland) (27-04-2018)“…The widespread use of mobile devices has allowed the development of participatory sensing systems that capture various types of data using the existing or…”
Get full text
Journal Article -
9
Automated Configuration of NoSQL Performance and Scalability Tactics for Data-Intensive Applications
Published in Informatics (Basel) (08-08-2020)“…This paper presents the architecture, implementation and evaluation of a middleware support layer for NoSQL storage systems. Our middleware automatically…”
Get full text
Journal Article -
10
Vendor-Agnostic Reconfiguration of Kubernetes Clusters in Cloud Federations
Published in Future internet (01-02-2023)“…Kubernetes (K8s) defines standardized APIs for container-based cluster orchestration such that it becomes possible for application managers to deploy their…”
Get full text
Journal Article -
11
Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows
Published in Future internet (01-12-2017)“…Microservices offer a compelling competitive advantage for building data flow systems as a choreography of self-contained data endpoints that each implement a…”
Get full text
Journal Article -
12
Design notations for secure software: a systematic literature review
Published in Software and systems modeling (01-07-2017)“…In the past 10 years, the research community has produced a significant number of design notations to represent security properties and concepts in a design…”
Get full text
Journal Article -
13
A Comprehensive Feature Comparison Study of Open-Source Container Orchestration Frameworks
Published in Applied sciences (01-03-2019)“…(1) Background: Container orchestration frameworks provide support for management ofcomplex distributed applications. Different frameworks have emerged only…”
Get full text
Journal Article -
14
Do Security Patterns Really Help Designers?
Published in 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering (01-05-2015)“…Security patterns are well-known solutions to security-specific problems. They are often claimed to benefit designers without much security expertise. We have…”
Get full text
Conference Proceeding -
15
SCOPE: self-adaptive and policy-based data management middleware for federated clouds
Published in Journal of internet services and applications (2019)“…A federated cloud storage setup which integrates and utilizes storage resources from multiple cloud storage providers has become an increasingly popular and…”
Get full text
Journal Article -
16
SecLooCI: A comprehensive security middleware architecture for shared wireless sensor networks
Published in Ad hoc networks (01-02-2015)“…WSNs are trending towards dynamic environments that enable multiple parties to concurrently deploy and exploit multiple applications on shared nodes. The node…”
Get full text
Journal Article -
17
Managing Feature Compatibility in Kubernetes: Vendor Comparison and Analysis
Published in IEEE access (2020)“…Kubernetes (k8s) is a kind of cluster operating system for cloud-native workloads that has become a de-facto standard for container orchestration. Provided by…”
Get full text
Journal Article -
18
Discriminative training of spiking neural networks organised in columns for stream‐based biometric authentication
Published in IET biometrics (01-09-2022)“…Stream‐based biometric authentication using a novel approach based on spiking neural networks (SNNs) is addressed. SNNs have proven advantages regarding energy…”
Get full text
Journal Article -
19
Aspect-Oriented Software Development in Practice: Tales from AOSD-Europe
Published in Computer (Long Beach, Calif.) (01-02-2010)“…Aspect-oriented software development techniques provide a means to modularize crosscutting concerns in software systems. A survey of industrial projects…”
Get full text
Journal Article -
20
Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersections
Published in Computers & security (01-12-2023)“…Sharing cyber threat intelligence is important because it allows organizations to stay ahead of new and emerging threats, prevent downtime and improve their…”
Get full text
Journal Article