< Back to previous page
Organisation
Distributed and Secure Software (DistriNet)
Division
Main organisation:Department of Computer Science
Lifecycle:1 Aug 2020 → Today
Organisation profile:
Distributed and Secure Software (DistriNet)
Keywords:software
Disciplines:Distributed computing
Current researchers
1 - 10 of 116 results
- Wouter Joosen (Responsible)
- Shuaibu Musa Adam (Member)
- Fritz Alder (Member)
- Alicia Andries (Member)
- Angelos Beitis (Member)
- Jonah Bellemans (Member)
- Yolande Berbers (Member)
- Márton Bognár (Member)
- Ilse Bohé (Member)
- Jeroen Boydens (Member)
Projects
1 - 10 of 242
- Trusted Computing for Low End MicrocontrollersFrom14 Mar 2024 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Retrokit - Optimising Machine Retrofitting with Retrokit: A Modular Machine Learning Approach for Edge-Based Condition MonitoringFrom1 Mar 2024 → TodayFunding: IOF - technology validation in lab
- Software Verification in the presence of Resource Revocation using Multi-Modal Separation LogicFrom26 Feb 2024 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Sabbatical Tom Holvoet: Study and verification of vulnerabilities in smart contracts for decentralized software systems in a blockchain environmentFrom12 Feb 2024 → TodayFunding: BOF - mobility
- Sabbatical Tom Holvoet: Study and verification of vulnerabilities in smart contracts for decentralized software systems in a blockchain environmentFrom12 Feb 2024 → TodayFunding: FWO Prices and sabbaticals (before FWO undefined)
- SECDES: By-design cyber secure digital productsFrom1 Feb 2024 → TodayFunding: VLAIO - Flanders' FOOD - COOCK
- Data-driven Analysis of Cybercrime EcosystemsFrom18 Dec 2023 → TodayFunding: BOF - projects
- Optimizing testing strategies to deal with software variabilityFrom26 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- AI-Driven Network Security: Contextual Analysis of Sequential Data for Threat DetectionFrom23 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Towards robust ML-based cybersecurity systemsFrom18 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
Publications
31 - 40 of 1538
- Poster Abstract: Adapting Pretrained Features for Efficient Unsupervised Acoustic Anomaly Detection(2022)
Authors: Sam Michiels, Wouter Joosen, Danny Hughes
Pages: 525 - 526Number of pages: 2 - A computational analysis of driving variations on distributed multiuser driving simulators(2008)
Authors: Ansar-Ul-Haque Yasar, Yolande Berbers, Davy Preuveneers
Pages: 178 - 186 - Inertial sensor-based joint kinematic estimation of the lower limb(2021)
Authors: Ive Weygers, Kurt Claeys, Hans Hallez
- Mixed numerical-experimental analysis of embedding strain sensors in structural adhesive joints(2017)
Authors: Stijn Debruyne, Dirk Vandepitte, Hans Hallez
- Personalizing web-based information systems through context-aware user profiles(2008)
Authors: Manuele Kirsch Pinheiro, Yolande Berbers
Pages: 231 - 238 - Learning-based coordination of distributed component deployment(2008)
Authors: Yves Vanrompay, Peter Rigole, Yolande Berbers
Pages: 1 - 6 - Evolution of context-aware user profiles(2009)
Authors: Jan Thomsen, Yves Vanrompay, Yolande Berbers
Pages: 1 - 6 - Generic reusable concern compositions (GReCCo)(2008)
Authors: Aram Hovsepyan, Stefan Van Baelen, Yolande Berbers, Wouter Joosen, Ina Schieferdecker, Alan Hartman
Pages: 231 - 245 - Three-Layer-Isotropic Skull Conductivity Representation in the EEG Forward Problem using Spherical Head Models(2014)
Authors: Hans Hallez, Bart Vanrumste
- Structuur en organisatie van computersystemen - Deel 3 (9de editie)(2012)
Authors: Bart De Decker