< Back to previous page
Organisation
Distributed and Secure Software (DistriNet)
Division
Main organisation:Department of Computer Science
Lifecycle:1 Aug 2020 → Today
Organisation profile:
Distributed and Secure Software (DistriNet)
Keywords:software
Disciplines:Distributed computing
Current researchers
1 - 10 of 118 results
- Wouter Joosen (Responsible)
- Shuaibu Musa Adam (Member)
- Fritz Alder (Member)
- Alicia Andries (Member)
- Angelos Beitis (Member)
- Jonah Bellemans (Member)
- Yolande Berbers (Member)
- Márton Bognár (Member)
- Ilse Bohé (Member)
- Jeroen Boydens (Member)
Projects
1 - 10 of 242
- Trusted Computing for Low End MicrocontrollersFrom14 Mar 2024 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Retrokit - Optimising Machine Retrofitting with Retrokit: A Modular Machine Learning Approach for Edge-Based Condition MonitoringFrom1 Mar 2024 → TodayFunding: IOF - technology validation in lab
- Software Verification in the presence of Resource Revocation using Multi-Modal Separation LogicFrom26 Feb 2024 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Sabbatical Tom Holvoet: Study and verification of vulnerabilities in smart contracts for decentralized software systems in a blockchain environmentFrom12 Feb 2024 → TodayFunding: BOF - mobility
- Sabbatical Tom Holvoet: Study and verification of vulnerabilities in smart contracts for decentralized software systems in a blockchain environmentFrom12 Feb 2024 → TodayFunding: FWO Prices and sabbaticals (before FWO undefined)
- SECDES: By-design cyber secure digital productsFrom1 Feb 2024 → TodayFunding: VLAIO - Flanders' FOOD - COOCK
- Data-driven Analysis of Cybercrime EcosystemsFrom18 Dec 2023 → TodayFunding: BOF - projects
- Optimizing testing strategies to deal with software variabilityFrom26 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- AI-Driven Network Security: Contextual Analysis of Sequential Data for Threat DetectionFrom23 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Towards robust ML-based cybersecurity systemsFrom18 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
Publications
11 - 20 of 1540
- Access control in multi-party wireless sensor networks(2013)
Authors: Jef Maerien, Sam Michiels, Christophe Huygens, Danny Hughes, Wouter Joosen
Pages: 34 - 49 - A system of patterns for reusable aspect libraries(2011)
Authors: Maarten Bynens, Eddy Truyen, Wouter Joosen, S Katz, M Mezini, C Schwanninger, W Joosen
Pages: 46 - 107 - Evolving wireless sensor network behavior through adaptability points in middleware architectures(2011)
Authors: Pedro Javier del Cid Garcia, Danny Hughes, Sam Michiels, Wouter Joosen
Pages: 1 - 13 - µC-SemPS: Energy-efficient semantic publish/subscribe for battery-powered systems(2010)
Authors: Davy Preuveneers, Yolande Berbers
Pages: 1 - 12 - The spec# programming system: Challenges and directions(2008)
Authors: Bart Jacobs
Pages: 144 - 152Number of pages: 9 - Advances in Practical Applications of Agents, Multi-Agent Systems, and Trustworthiness(2020)
Authors: Yves Demazeau, Tom Holvoet, Juan M Corchado, Stefania Costantini
- Managing your content with CIMPLE - a content-centric storage interface(2009)
Authors: Thomas Delaet, Wouter Joosen
Pages: 491 - 498 - A graph based approach to supporting software reconfiguration in distributed sensor network applications(2010)
Authors: Danny Hughes, Wouter Horré, Sam Michiels, Wouter Joosen
Pages: 561 - 571 - Optimizing resource use in multi-purpose WSNs(2011)
Authors: Pedro Javier del Cid Garcia, Sam Michiels, Wouter Joosen
Pages: 395 - 397 - Collaborating agents for adaptation to mobile users(2009)
Authors: Yolande Berbers
Pages: 250 - 276