Organisation
Distributed and Secure Software (DistriNet)
Division
Distributed and Secure Software (DistriNet)
Current researchers
1 - 10 of 118 results
- Wouter Joosen (Responsible)
- Shuaibu Musa Adam (Member)
- Fritz Alder (Member)
- Alicia Andries (Member)
- Angelos Beitis (Member)
- Jonah Bellemans (Member)
- Yolande Berbers (Member)
- Márton Bognár (Member)
- Ilse Bohé (Member)
- Jeroen Boydens (Member)
Projects
1 - 10 of 225
- Sabbatical Tom Holvoet: Study and verification of vulnerabilities in smart contracts for decentralized software systems in a blockchain environmentFrom12 Feb 2024 → TodayFunding: FWO Prices and sabbaticals (before FWO undefined)
- Optimizing testing strategies to deal with software variabilityFrom26 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- AI-Driven Network Security: Contextual Analysis of Sequential Data for Threat DetectionFrom23 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Towards robust ML-based cybersecurity systemsFrom18 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Hardware-software co-designs for end-to-end securityFrom1 Oct 2023 → TodayFunding: FWO junior postdoctoral fellowship
- Certified semi-automated modular formal program verificationFrom1 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Improving the development of web applications with machine learningFrom20 Sep 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- AI-enhanced Software EngineeringFrom15 Sep 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Privacy engineering methods for software developmentFrom18 Aug 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Secure Middleware for Smart Contract Runtime EnvironmentsFrom18 Aug 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
Publications
1 - 10 of 1472
- Using AADL to model a protocol stack(2008)
Authors: Didier Delanote, Stefan Van Baelen, Wouter Joosen, Yolande Berbers
Pages: 277 - 281 - Analysis of sensor network operating system performance throughout the software life cycle(2013)
Authors: Gowri Sankar Ramachandran, Danny Hughes, Sam Michiels, Wouter Joosen
Pages: 211 - 218 - Improving least privilege in software architecture by guided automated compartmentalization(2008)
Authors: Koen Buyens, Bart De Win, Wouter Joosen
Pages: 145 - 150 - Automated Configuration of NoSQL Performance and Scalability Tactics for Data-Intensive Applications(2020)
Authors: Davy Preuveneers, Wouter Joosen
- Security and privacy in vehicular communications: Challenges and opportunities(2017)
Authors: Bruno Crispo
Pages: 13 - 28 - A secure multi-application platform for vehicle telematics(2010)
Authors: Jef Maerien, Sam Michiels, Stefan Van Baelen, Christophe Huygens, Wouter Joosen
Pages: 1 - 5 - Network dialog minimization and network dialog diffing: Two novel primitives for network security applications(2014)
Authors: M. Zubair Rafique, Juan Caballero, Christophe Huygens, Wouter Joosen, Charles N Payne Jr, Adam Hahn, Kevin RB Butler, Micah Sherr
Pages: 166 - 175 - Software Services to Simplify Time Management for IoT Application Development(2021)
Authors: Stefanos Peros, Danny Hughes
- μPnP-Mesh: the plug-and-play mesh network for the internet of things(2015)
Authors: Nelson Matthys, Fan Yang, Wilfried Daniels, Sam Michiels, Wouter Joosen, Danny Hughes
Pages: 311 - 315 - Sasha: A distributed protocol for secure application deployment in shared ad-hoc wireless sensor networks(2011)
Authors: Jef Maerien, Sam Michiels, Christophe Huygens, Wouter Joosen
Pages: 43 - 48