< Back to previous page
Researcher
Wouter Joosen
- Disciplines:Computer science
Affiliations
- Distributed and Secure Software (DistriNet) (Division)
Responsible
From1 Aug 2020 → Today - Distributed and Secure Software (DistriNet) (Division)
Member
From1 Aug 2020 → Today - Informatics Section (Division)
Member
From1 Oct 1999 → 30 Apr 2020
Projects
1 - 10 of 76
- SECDES: By-design cyber secure digital productsFrom1 Feb 2024 → TodayFunding: VLAIO - Flanders' FOOD - COOCK
- AI-Driven Network Security: Contextual Analysis of Sequential Data for Threat DetectionFrom23 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Privacy engineering methods for software developmentFrom18 Aug 2023 → TodayFunding: BOF - doctoral mandates
- Secure Middleware for Smart Contract Runtime EnvironmentsFrom18 Aug 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Privacy by Design for Learning-based approaches in complex data ecosystemsFrom15 Mar 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Applying Automated Threat Modeling Based on Source CodeFrom22 Nov 2022 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Federated learning for robust, resilient and adaptive protection of systemsFrom1 Nov 2022 → TodayFunding: Activity supporting strategical priorities of the federal government
- Analysis of online tracking and privacy on the webFrom6 Oct 2022 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Cyber-kinetic attacks using Artificial IntelligenceFrom1 Oct 2022 → TodayFunding: HORIZON.2.3 - Civil Security for Society
- Security and AI: Smart access control with AIFrom26 Sep 2022 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
Publications
41 - 50 of 545
- An Audit of Facebook’s Political Ad Policy Enforcement(2022)
Authors: Victor Le Pochat, Tom Van Goethem, Wouter Joosen
Pages: 607 - 624 - Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor(2022)
Authors: Vera Rimmer, Tom Van Goethem, Abel Rodríguez Romero, Wouter Joosen
Pages: 314 - 335 - BoboLink: Low Latency and Low Power Communication for Intelligent Environments(2022)
Authors: Jonathan Oostvogels, Sam Michiels, Wouter Joosen, Danny Hughes
Number of pages: 4 - Applying Machine Learning to use security oracles: a case study in virus and malware detection(2022)
Authors: Davy Preuveneers, Emma Lavens, Wouter Joosen
Pages: 240 - 251 - Position Paper: On Advancing Adversarial Malware Generation Using Dynamic Features(2022)
Authors: Mohammadali Shafiei, Vera Rimmer, Ilias Tsingenopoulos, Lieven Desmet, Wouter Joosen
Pages: 15 - 20 - Adversarial machine learning(2022)
Authors: Ilias Tsingenopoulos, Wouter Joosen
Pages: 287 - 312Number of pages: 25 - Intelligent Malware Defenses(2022)
Authors: Vera Rimmer, Wouter Joosen
Pages: 217 - 253Number of pages: 37 - Open-World Network Intrusion Detection(2022)
Authors: Vera Rimmer, Davy Preuveneers, Wouter Joosen
Pages: 254 - 283Number of pages: 30 - AI for Biometric Authentication Systems(2022)
Authors: Tim Van hamme, Giuseppe Garofalo, Sander Joos, Davy Preuveneers, Wouter Joosen
Pages: 156 - 180 - Machine Learning Meets Data Modification(2022)
Authors: Giuseppe Garofalo, Davy Preuveneers, Wouter Joosen
Pages: 130 - 155