< Back to previous page
Researcher
Wouter Joosen
- Disciplines:Computer science
Affiliations
- Distributed and Secure Software (DistriNet) (Division)
Responsible
From1 Aug 2020 → Today - Distributed and Secure Software (DistriNet) (Division)
Member
From1 Aug 2020 → Today - Informatics Section (Division)
Member
From1 Oct 1999 → 30 Apr 2020
Projects
1 - 10 of 76
- SECDES: By-design cyber secure digital productsFrom1 Feb 2024 → TodayFunding: VLAIO - Flanders' FOOD - COOCK
- AI-Driven Network Security: Contextual Analysis of Sequential Data for Threat DetectionFrom23 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Privacy engineering methods for software developmentFrom18 Aug 2023 → TodayFunding: BOF - doctoral mandates
- Secure Middleware for Smart Contract Runtime EnvironmentsFrom18 Aug 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Privacy by Design for Learning-based approaches in complex data ecosystemsFrom15 Mar 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Applying Automated Threat Modeling Based on Source CodeFrom22 Nov 2022 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Federated learning for robust, resilient and adaptive protection of systemsFrom1 Nov 2022 → TodayFunding: Activity supporting strategical priorities of the federal government
- Analysis of online tracking and privacy on the webFrom6 Oct 2022 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Cyber-kinetic attacks using Artificial IntelligenceFrom1 Oct 2022 → TodayFunding: HORIZON.2.3 - Civil Security for Society
- Security and AI: Smart access control with AIFrom26 Sep 2022 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
Publications
11 - 20 of 545
- Security and Assessment of Biometric Authentication: Attacks, Defenses and Metrics(2023)
Authors: Tim Van hamme, Wouter Joosen, Davy Preuveneers
- Client-centric Replication for the Decentralized Web(2023)
Authors: Kristof Jannes, Wouter Joosen, Bert Lagaisse
- Mitigating undesired interactions between liveness detection components in biometric authentication(2023)
Authors: Emma Lavens, Davy Preuveneers, Wouter Joosen
Pages: 1 - 8 - Beware the Doppelgänger: Attacks against Adaptive Thresholds in Facial Recognition Systems(2023)
Authors: Willem Verheyen, Tim Van hamme, Sander Joos, Davy Preuveneers, Wouter Joosen
Number of pages: 24 - Analyzing Cyber Security Research Practices through a Meta-Research Framework(2023)
Authors: Victor Le Pochat, Wouter Joosen
Pages: 64 - 74 - T3E: A Practical Solution to Trusted Time in Secure Enclaves(2023)
Authors: Gilang Hamidy, Pieter Philippaerts, Wouter Joosen
Pages: 305 - 326Number of pages: 22 - Revisiting OAuth 2.0 Compliance: A Two-Year Follow-Up Study(2023)
Authors: Pieter Philippaerts, Davy Preuveneers, Wouter Joosen
Pages: 521 - 525 - Masterkey attacks against free-text keystroke dynamics and security implications of demographic factors(2023)
Authors: Tim Van hamme, Giuseppe Garofalo, Davy Preuveneers, Wouter Joosen
Pages: 278 - 291 - A Comparative Performance Evaluation of Multi-Model NoSQL Databases and Polyglot Persistence(2023)
Authors: Dimitri Van Landuyt, Wouter Joosen
Pages: 286 - 293Number of pages: 8 - Sound Data Sets and Methods for Web Security Research(2023)
Authors: Victor Le Pochat, Wouter Joosen, Lieven Desmet