< Back to previous page
Researcher
Wouter Joosen
- Disciplines:Computer science
Affiliations
- Distributed and Secure Software (DistriNet) (Division)
Responsible
From1 Aug 2020 → Today - Distributed and Secure Software (DistriNet) (Division)
Member
From1 Aug 2020 → Today - Informatics Section (Division)
Member
From1 Oct 1999 → 30 Apr 2020
Projects
1 - 10 of 76
- SECDES: By-design cyber secure digital productsFrom1 Feb 2024 → TodayFunding: VLAIO - Flanders' FOOD - COOCK
- AI-Driven Network Security: Contextual Analysis of Sequential Data for Threat DetectionFrom23 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Privacy engineering methods for software developmentFrom18 Aug 2023 → TodayFunding: BOF - doctoral mandates
- Secure Middleware for Smart Contract Runtime EnvironmentsFrom18 Aug 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Privacy by Design for Learning-based approaches in complex data ecosystemsFrom15 Mar 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Applying Automated Threat Modeling Based on Source CodeFrom22 Nov 2022 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Federated learning for robust, resilient and adaptive protection of systemsFrom1 Nov 2022 → TodayFunding: Activity supporting strategical priorities of the federal government
- Analysis of online tracking and privacy on the webFrom6 Oct 2022 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Cyber-kinetic attacks using Artificial IntelligenceFrom1 Oct 2022 → TodayFunding: HORIZON.2.3 - Civil Security for Society
- Security and AI: Smart access control with AIFrom26 Sep 2022 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
Publications
31 - 40 of 545
- A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks(2022)
Authors: Karel Dhondt, Victor Le Pochat, Alex Voulimeneas, Wouter Joosen, Stijn Volckaert
Pages: 801 - 814 - OAuch: Exploring Security Compliance in the OAuth 2.0 Ecosystem(2022)
Authors: Pieter Philippaerts, Davy Preuveneers, Wouter Joosen
Pages: 460 - 481 - Unsupervised Acoustic Anomaly Detection Systems Based on Gaussian Mixture Density Neural Network(2022)
Authors: Sam Michiels, Wouter Joosen, Danny Hughes
Pages: 259 - 263Number of pages: 4 - A Systematic Survey of Architectural Approaches and Trade-Offs in Data De-identification(2022)
Authors: Dimitri Van Landuyt, Wouter Joosen
Pages: 66 - 82 - Design of a Robust MAC Protocol for LoRa(2022)
Authors: Sam Michiels, Wouter Joosen, Danny Hughes
- SecSharp: Towards Efficient Trusted Execution in Managed Languages (Work in Progress)(2022)
Authors: Gilang Hamidy, Pieter Philippaerts, Wouter Joosen
Pages: 119 - 127 - Discriminative training of spiking neural networks organised in columns for stream-based biometric authentication(2022)
Authors: Enrique Argones Rúa, Tim Van hamme, Davy Preuveneers, Wouter Joosen
Pages: 485 - 497 - Seamless Synchronization for Collaborative Web Services(2022)
Authors: Kristof Jannes, Bert Lagaisse, Wouter Joosen
Pages: 311 - 314Number of pages: 4 - A Quantitative Assessment of the Detection Performance of Web Vulnerability Scanners(2022)
Authors: Emma Lavens, Pieter Philippaerts, Wouter Joosen
Pages: 1 - 10 - Helping hands: Measuring the impact of a large threat intelligence sharing community(2022)
Authors: Victor Le Pochat, Tom Van Goethem, Wouter Joosen
Pages: 1149 - 1165