< Back to previous page
Researcher
Wouter Joosen
- Disciplines:Computer science
Affiliations
- Distributed and Secure Software (DistriNet) (Division)
Responsible
From1 Aug 2020 → Today - Distributed and Secure Software (DistriNet) (Division)
Member
From1 Aug 2020 → Today - Informatics Section (Division)
Member
From1 Oct 1999 → 30 Apr 2020
Projects
41 - 50 of 76
- Deployment Efficiency and Data Security for the CloudFrom23 Sep 2016 → 18 Nov 2021Funding: Own budget, for example: patrimony, inscription fees, gifts
- An effective access control service for SaaS that supports domain-specific access control patternsFrom1 Apr 2016 → 31 Mar 2018Funding: IWT / VLAIO personal funding - innovation mandates
- Actions for Excellence in Smart Cyber-Physical Systems applications through exploitation of Big Data in the context of Production Control and LogisticsFrom1 Jan 2016 → 31 Dec 2018Funding: H2020 - European Institute of Innovation and Technology
- Dynamic policy rules for Shared CPS Infrastructure being attacked.From1 Jan 2016 → 31 Dec 2020Funding: FWO research project (including WEAVE projects)
- Software Technologies for Multi-Tenant Internet of Things PlatformsFrom10 Aug 2015 → 15 Apr 2019Funding: Own budget, for example: patrimony, inscription fees, gifts
- Automated Threat Analysis for Security and PrivacyFrom3 Aug 2015 → 19 Oct 2020Funding: Own budget, for example: patrimony, inscription fees, gifts
- Workflow-driven Multi-tenant SaaS: Customization Middleware and Quality ImplicationsFrom1 Jun 2015 → 21 Oct 2021Funding: Own budget, for example: patrimony, inscription fees, gifts
- DeCoMAdS: Deployment and Configuration Middleware for Adaptive Software-as-a-Service.From1 Jan 2015 → 31 Dec 2018Funding: SBO (Strategic basic research)
- DNS Abuse and Active Authentication: Applications of Machine Learning in Cyber SecurityFrom10 Nov 2014 → 12 Jun 2020Funding: Own budget, for example: patrimony, inscription fees, gifts
- Large-scale analysis of attack techniques on Internet domain namesFrom2 Sep 2014 → 24 Aug 2018Funding: Own budget, for example: patrimony, inscription fees, gifts
Publications
1 - 10 of 545
- Cross-Layer Management of Security Policies in Cloud-Native Networking(2024)
Authors: Gerald Budigiri, Wouter Joosen, Eddy Truyen
- Security and Privacy Policy Bugs in Browser Engines(2024)
Authors: Gertjan Franken, Wouter Joosen, Lieven Desmet
- A study of NoSQL query injection in Neo4j(2024)
Authors: Dimitri Van Landuyt, Wouter Joosen
- A User-centric Approach to API Delegations Enforcing Privacy Policies on OAuth Delegations(2024)
Authors: Pieter Philippaerts, Danny Hughes, Wouter Joosen, Bart De Decker
Pages: 318 - 337 - AndrAS: Automated Attack Surface Extraction for Android Applications(2023)
Authors: Anh-Duy Tran, Koen Yskout, Wouter Joosen
Pages: 406 - 417 - Demonstration of the DPMF for Data Protection Analysis(2023)
Authors: Laurens Sion, Dimitri Van Landuyt, Pierre Dewitte, Peggy Valcke, Wouter Joosen
Pages: 75 - 79Number of pages: 5 - CTAM: a tool for Continuous Threat Analysis and Management(2023)
Authors: Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Stef Verreydt, Wouter Joosen
Pages: 195 - 223 - On the adversarial robustness of full integer quantized TinyML models at the edge(2023)
Authors: Davy Preuveneers, Wouter Joosen
Pages: 7 - 12 - Privacy-Preserving Correlation of Cross-Organizational Cyber Threat Intelligence with Private Graph Intersections(2023)
Authors: Davy Preuveneers, Wouter Joosen
- TC4SE: A High-performance Trusted Channel Mechanism for Secure Enclave-based Trusted Execution Environments(2023)
Authors: Gilang Hamidy, Pieter Philippaerts, Wouter Joosen
Pages: 246 - 264