< Back to previous page
Organisation
Distributed and Secure Software (DistriNet)
Division
Main organisation:Department of Computer Science
Lifecycle:1 Aug 2020 → Today
Organisation profile:
Distributed and Secure Software (DistriNet)
Keywords:software
Disciplines:Distributed computing
Current researchers
1 - 10 of 116 results
- Wouter Joosen (Responsible)
- Shuaibu Musa Adam (Member)
- Fritz Alder (Member)
- Alicia Andries (Member)
- Angelos Beitis (Member)
- Jonah Bellemans (Member)
- Yolande Berbers (Member)
- Márton Bognár (Member)
- Ilse Bohé (Member)
- Jeroen Boydens (Member)
Projects
1 - 10 of 242
- Trusted Computing for Low End MicrocontrollersFrom14 Mar 2024 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Retrokit - Optimising Machine Retrofitting with Retrokit: A Modular Machine Learning Approach for Edge-Based Condition MonitoringFrom1 Mar 2024 → TodayFunding: IOF - technology validation in lab
- Software Verification in the presence of Resource Revocation using Multi-Modal Separation LogicFrom26 Feb 2024 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Sabbatical Tom Holvoet: Study and verification of vulnerabilities in smart contracts for decentralized software systems in a blockchain environmentFrom12 Feb 2024 → TodayFunding: BOF - mobility
- Sabbatical Tom Holvoet: Study and verification of vulnerabilities in smart contracts for decentralized software systems in a blockchain environmentFrom12 Feb 2024 → TodayFunding: FWO Prices and sabbaticals (before FWO undefined)
- SECDES: By-design cyber secure digital productsFrom1 Feb 2024 → TodayFunding: VLAIO - Flanders' FOOD - COOCK
- Data-driven Analysis of Cybercrime EcosystemsFrom18 Dec 2023 → TodayFunding: BOF - projects
- Optimizing testing strategies to deal with software variabilityFrom26 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- AI-Driven Network Security: Contextual Analysis of Sequential Data for Threat DetectionFrom23 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Towards robust ML-based cybersecurity systemsFrom18 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
Publications
1 - 10 of 1537
- Dynamic reconfiguration using template based web service composition(2008)
Authors: Kristof Geebelen, Sam Michiels, Wouter Joosen
Pages: 49 - 54 - Building wireless sensor network applications with LooCI(2010)
Authors: Danny Hughes, Klaas Thoelen, Wouter Horré, Nelson Matthys, Pedro Javier del Cid Garcia, Sam Michiels, Christophe Huygens, Wouter Joosen
Pages: 38 - 64 - An Efficient, Anonymous and Unlinkable Incentives Scheme(2015)
Authors: Andreas Put, Bart De Decker
Pages: 1 - 20 - Efficient decision making algorithms for adaptive applications(2009)
Authors: Yves Vanrompay, Yolande Berbers
Pages: 13 - 18 - Configuration management as a multi-cloud enabler(2014)
Authors: Bart Vanbrabant, Wouter Joosen, Yehia Elkhatib, Stefan Walraven
Pages: 1:1 - 1:1 - Towards a transfer learning based approach for monitoring fitness levels(2013)
Authors: Davy Preuveneers
Pages: 33 - 43 - Formal analysis of policies in wireless sensor network applications(2012)
Authors: Marco Patrignani, Nelson Matthys, Jose Paiva Proenca, Danny Hughes, Dave Clarke
Pages: 21 - 28 - Instruction-level countermeasures against stack-based buffer overflow attacks(2009)
Authors: Francesco Gadaleta, Yves Younan, Bart Jacobs, Wouter Joosen
Pages: 7 - 12 - Combining planning and model checking to get guarantees on the behavior of safety-critical UAV systems(2018)
Authors: Hoang Tung Dinh, Tom Holvoet
Pages: 152 - 155Number of pages: 155 - Adversarial machine learning(2022)
Authors: Ilias Tsingenopoulos, Wouter Joosen
Pages: 287 - 312Number of pages: 25