< Back to previous page
Organisation
Distributed and Secure Software (DistriNet)
Division
Main organisation:Department of Computer Science
Lifecycle:1 Aug 2020 → Today
Organisation profile:
Distributed and Secure Software (DistriNet)
Keywords:software
Disciplines:Distributed computing
Current researchers
1 - 10 of 116 results
- Wouter Joosen (Responsible)
- Shuaibu Musa Adam (Member)
- Fritz Alder (Member)
- Alicia Andries (Member)
- Angelos Beitis (Member)
- Jonah Bellemans (Member)
- Yolande Berbers (Member)
- Márton Bognár (Member)
- Ilse Bohé (Member)
- Jeroen Boydens (Member)
Projects
1 - 10 of 242
- Trusted Computing for Low End MicrocontrollersFrom14 Mar 2024 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Retrokit - Optimising Machine Retrofitting with Retrokit: A Modular Machine Learning Approach for Edge-Based Condition MonitoringFrom1 Mar 2024 → TodayFunding: IOF - technology validation in lab
- Software Verification in the presence of Resource Revocation using Multi-Modal Separation LogicFrom26 Feb 2024 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Sabbatical Tom Holvoet: Study and verification of vulnerabilities in smart contracts for decentralized software systems in a blockchain environmentFrom12 Feb 2024 → TodayFunding: BOF - mobility
- Sabbatical Tom Holvoet: Study and verification of vulnerabilities in smart contracts for decentralized software systems in a blockchain environmentFrom12 Feb 2024 → TodayFunding: FWO Prices and sabbaticals (before FWO undefined)
- SECDES: By-design cyber secure digital productsFrom1 Feb 2024 → TodayFunding: VLAIO - Flanders' FOOD - COOCK
- Data-driven Analysis of Cybercrime EcosystemsFrom18 Dec 2023 → TodayFunding: BOF - projects
- Optimizing testing strategies to deal with software variabilityFrom26 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- AI-Driven Network Security: Contextual Analysis of Sequential Data for Threat DetectionFrom23 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Towards robust ML-based cybersecurity systemsFrom18 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
Publications
1271 - 1280 of 1541
- Test-driven development strategies applied to embedded software(2012)
Authors: Piet Cordemans, Jeroen Boydens, Eric Steegmans
Pages: 31 - 42 - Software-based Trusted Computing Architecture for Resource-constrained Internet of Things Devices(2021)
Authors: Mahmoud Ammar, Bruno Crispo
- Network-aware impact determination algorithms for service workflow deployment in hybrid clouds(2012)
Authors: Hendrik Moens, Eddy Truyen, Stefan Walraven, Wouter Joosen, Bart Dhoedt, Filip De Turck
Pages: 28 - 36 - Modelling and simulating large scale vehicular networks for smart context-aware telematic applications(2010)
Authors: Ansar-Ul-Haque Yasar, Davy Preuveneers, Yolande Berbers
Pages: 509 - 530 - Dawn: Dependable networking framework for multimedia-enabled Internet-of-Things(2015)
Authors: Gowri Sankar Ramachandran, Nelson Matthys, Sam Michiels, Wouter Joosen, Danny Hughes
Pages: 211 - 215 - Sensor middleware to support diverse data qualities(2011)
Authors: Pedro Javier del Cid Garcia, Nelson Matthys, Sam Michiels, Christophe Huygens, Wouter Joosen, Danny Hughes
Pages: 673 - 678 - Internet of Things: A context-awareness perspective(2008)
Authors: Davy Preuveneers, Yolande Berbers
Pages: 287 - 307 - Using Multi-Level Security Annotations to Improve Software Assurance(2008)
Authors: Eryk Kulikowski, Riccardo Scandariato, Wouter Joosen
Pages: 471 - 474 - Structuur en Organisatie van Computersystemen - Deel 2(2015)
Authors: Bart De Decker
Number of pages: 111 - Detection of chewing motion using a glasses mounted accelerometer towards monitoring of food intake events in the elderly(2015)
Authors: Gert Mertes, Hans Hallez, Tom Croonenborghs, Bart Vanrumste
Pages: 1 - 5