< Back to previous page
Researcher
Wouter Joosen
- Disciplines:Computer science
Affiliations
- Distributed and Secure Software (DistriNet) (Division)
Responsible
From1 Aug 2020 → Today - Distributed and Secure Software (DistriNet) (Division)
Member
From1 Aug 2020 → Today - Informatics Section (Division)
Member
From1 Oct 1999 → 30 Apr 2020
Projects
51 - 60 of 76
- Middleware for Data Management in Multi-CloudFrom3 Mar 2014 → 18 Feb 2019Funding: Own budget, for example: patrimony, inscription fees, gifts
- Middleware Support for Dynamic Sensing Applications.From6 Jan 2014 → 20 Jun 2018Funding: IWT personal funding - strategic basic research grants
- Application-level authorization for multi-organizational softwareFrom9 Dec 2013 → 31 Aug 2018Funding: Own budget, for example: patrimony, inscription fees, gifts
- ADaptive DIstributed SoftwareFrom1 Oct 2013 → 30 Sep 2018Funding: BOF - Concerted Research Project from 1994
- From ad-hoc code development to code reuse through middleware for networked embedded control systems.From1 Oct 2013 → 30 Sep 2017Funding: IOF - Industrial Research Fund
- Model-Driven Software Engineering for Adaptive Software-as-a-Service (SaaS).From1 Jul 2013 → 30 Jun 2023Funding: IOF - Industrial Research Fund, IOF - mandates
- SaaS4Cloud.From1 Oct 2012 → 30 Sep 2016Funding: Own budget, for example: patrimony, inscription fees, gifts
- SMILE: A Security-Centric, Formally-Founded Modelling Language for HumansFrom4 Jun 2012 → 9 Mar 2020Funding: Own budget, for example: patrimony, inscription fees, gifts
- iSPEC: Intelligent SuPer-Elastic Clouds.From1 Jan 2012 → 31 Dec 2017Funding: FWO research project
- Dynamic Adaptation Techniques for Large-scale Distributed SystemsFrom6 Sep 2011 → 10 Mar 2017Funding: Own budget, for example: patrimony, inscription fees, gifts
Publications
1 - 10 of 545
- Cross-Layer Management of Security Policies in Cloud-Native Networking(2024)
Authors: Gerald Budigiri, Wouter Joosen, Eddy Truyen
- Security and Privacy Policy Bugs in Browser Engines(2024)
Authors: Gertjan Franken, Wouter Joosen, Lieven Desmet
- A study of NoSQL query injection in Neo4j(2024)
Authors: Dimitri Van Landuyt, Wouter Joosen
- A User-centric Approach to API Delegations Enforcing Privacy Policies on OAuth Delegations(2024)
Authors: Pieter Philippaerts, Danny Hughes, Wouter Joosen, Bart De Decker
Pages: 318 - 337 - AndrAS: Automated Attack Surface Extraction for Android Applications(2023)
Authors: Anh-Duy Tran, Koen Yskout, Wouter Joosen
Pages: 406 - 417 - Demonstration of the DPMF for Data Protection Analysis(2023)
Authors: Laurens Sion, Dimitri Van Landuyt, Pierre Dewitte, Peggy Valcke, Wouter Joosen
Pages: 75 - 79Number of pages: 5 - CTAM: a tool for Continuous Threat Analysis and Management(2023)
Authors: Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Stef Verreydt, Wouter Joosen
Pages: 195 - 223 - On the adversarial robustness of full integer quantized TinyML models at the edge(2023)
Authors: Davy Preuveneers, Wouter Joosen
Pages: 7 - 12 - Privacy-Preserving Correlation of Cross-Organizational Cyber Threat Intelligence with Private Graph Intersections(2023)
Authors: Davy Preuveneers, Wouter Joosen
- TC4SE: A High-performance Trusted Channel Mechanism for Secure Enclave-based Trusted Execution Environments(2023)
Authors: Gilang Hamidy, Pieter Philippaerts, Wouter Joosen
Pages: 246 - 264