< Back to previous page
Researcher
Wouter Joosen
- Disciplines:Computer science
Affiliations
- Distributed and Secure Software (DistriNet) (Division)
Responsible
From1 Aug 2020 → Today - Distributed and Secure Software (DistriNet) (Division)
Member
From1 Aug 2020 → Today - Informatics Section (Division)
Member
From1 Oct 1999 → 30 Apr 2020
Projects
1 - 10 of 76
- SECDES: By-design cyber secure digital productsFrom1 Feb 2024 → TodayFunding: VLAIO - Flanders' FOOD - COOCK
- AI-Driven Network Security: Contextual Analysis of Sequential Data for Threat DetectionFrom23 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Privacy engineering methods for software developmentFrom18 Aug 2023 → TodayFunding: BOF - doctoral mandates
- Secure Middleware for Smart Contract Runtime EnvironmentsFrom18 Aug 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Privacy by Design for Learning-based approaches in complex data ecosystemsFrom15 Mar 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Applying Automated Threat Modeling Based on Source CodeFrom22 Nov 2022 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Federated learning for robust, resilient and adaptive protection of systemsFrom1 Nov 2022 → TodayFunding: Activity supporting strategical priorities of the federal government
- Analysis of online tracking and privacy on the webFrom6 Oct 2022 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Cyber-kinetic attacks using Artificial IntelligenceFrom1 Oct 2022 → TodayFunding: HORIZON.2.3 - Civil Security for Society
- Security and AI: Smart access control with AIFrom26 Sep 2022 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
Publications
471 - 480 of 545
- A graph based approach to supporting software reconfiguration in distributed sensor network applications(2010)
Authors: Danny Hughes, Wouter Horré, Sam Michiels, Wouter Joosen
Pages: 561 - 571 - Improving memory management security for C and C++(2010)
Authors: Yves Younan, Wouter Joosen, Frank Piessens, Hans Van den Eynden
Pages: 57 - 82 - Dynamic composition of cross-organizational features in distributed software systems(2010)
Authors: Stefan Walraven, Bert Lagaisse, Eddy Truyen, Wouter Joosen
Pages: 183 - 197 - QARI: Quality aware software deployment for wireless sensor networks(2010)
Authors: Wouter Horré, Danny Hughes, Sam Michiels, Wouter Joosen
Pages: 642 - 647 - PAriCheck: an efficient pointer arithmetic checker for C programs(2010)
Authors: Yves Younan, Pieter Philippaerts, Frank Piessens, Wouter Joosen
Pages: 145 - 156 - A permission system for secure AOP(2010)
Authors: Wouter De Borger, Bart De Win, Bert Lagaisse, Wouter Joosen
Pages: 205 - 216 - Aspect-based variability model for cross-organizational features in service networks(2010)
Authors: Stefan Walraven, Bert Lagaisse, Eddy Truyen, Wouter Joosen
Pages: 57 - 63 - The MACODO middleware for context-driven dynamic agent organzations(2010)
Authors: Danny Weyns, Robrecht Haesevoets, Alexander Helleboogh, Tom Holvoet, Wouter Joosen
Pages: 3 - Aspect-Oriented Software Development in Practice: Tales from AOSD-Europe(2010)
Authors: Wouter Joosen
Pages: 19 - 26 - The MACODO middleware for context-driven dynamic agent organzations(2010)
Authors: Danny Weyns, Robrecht Haesevoets, Alexander Helleboogh, Tom Holvoet, Wouter Joosen
Pages: 1 - 28