< Back to previous page
Researcher
Wouter Joosen
- Disciplines:Computer science
Affiliations
- Distributed and Secure Software (DistriNet) (Division)
Responsible
From1 Aug 2020 → Today - Distributed and Secure Software (DistriNet) (Division)
Member
From1 Aug 2020 → Today - Informatics Section (Division)
Member
From1 Oct 1999 → 30 Apr 2020
Projects
1 - 10 of 76
- SECDES: By-design cyber secure digital productsFrom1 Feb 2024 → TodayFunding: VLAIO - Flanders' FOOD - COOCK
- AI-Driven Network Security: Contextual Analysis of Sequential Data for Threat DetectionFrom23 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Privacy engineering methods for software developmentFrom18 Aug 2023 → TodayFunding: BOF - doctoral mandates
- Secure Middleware for Smart Contract Runtime EnvironmentsFrom18 Aug 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Privacy by Design for Learning-based approaches in complex data ecosystemsFrom15 Mar 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Applying Automated Threat Modeling Based on Source CodeFrom22 Nov 2022 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Federated learning for robust, resilient and adaptive protection of systemsFrom1 Nov 2022 → 31 Oct 2023Funding: Activity supporting strategical priorities of the federal government
- Analysis of online tracking and privacy on the webFrom6 Oct 2022 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Cyber-kinetic attacks using Artificial IntelligenceFrom1 Oct 2022 → TodayFunding: Horizon Europe - Civil Security for Society
- Security and AI: Smart access control with AIFrom26 Sep 2022 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
Publications
1 - 10 of 542
- Security and Privacy Policy Bugs in Browser Engines(2024)
Authors: Gertjan Franken, Wouter Joosen, Lieven Desmet
- A study of NoSQL query injection in Neo4j(2024)
Authors: Dimitri Van Landuyt, Wouter Joosen
- A User-centric Approach to API Delegations Enforcing Privacy Policies on OAuth Delegations(2024)
Authors: Pieter Philippaerts, Danny Hughes, Wouter Joosen, Bart De Decker
Pages: 318 - 337 - AndrAS: Automated Attack Surface Extraction for Android Applications(2023)
Authors: Anh-Duy Tran, Koen Yskout, Wouter Joosen
Pages: 406 - 417 - Demonstration of the DPMF for Data Protection Analysis(2023)
Authors: Laurens Sion, Dimitri Van Landuyt, Pierre Dewitte, Peggy Valcke, Wouter Joosen
Pages: 75 - 79Number of pages: 5 - CTAM: a tool for Continuous Threat Analysis and Management(2023)
Authors: Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Stef Verreydt, Wouter Joosen
Pages: 195 - 223 - On the adversarial robustness of full integer quantized TinyML models at the edge(2023)
Authors: Davy Preuveneers, Wouter Joosen
Pages: 7 - 12 - Privacy-Preserving Correlation of Cross-Organizational Cyber Threat Intelligence with Private Graph Intersections(2023)
Authors: Davy Preuveneers, Wouter Joosen
- TC4SE: A High-performance Trusted Channel Mechanism for Secure Enclave-based Trusted Execution Environments(2023)
Authors: Gilang Hamidy, Pieter Philippaerts, Wouter Joosen
Pages: 246 - 264 - Security and Assessment of Biometric Authentication: Attacks, Defenses and Metrics(2023)
Authors: Tim Van hamme, Wouter Joosen, Davy Preuveneers