Onderzoeker
Stef Verreydt
- Disciplines:Computersysteembeveiliging
Affiliaties
- Gedistribueerde en Veilige Software (DistriNet) (Afdeling)
Lid
Vanaf1 aug 2020 → Heden - Afdeling Informatica (Afdeling)
Lid
Vanaf15 sep 2019 → 4 aug 2020
Publicaties
1 - 9 van 9
- Testing and Practical Implementation of a User-Friendly Personalized and Long-Term Electronic Informed Consent Prototype in Clinical Research: Mixed Methods Study(2023)
Auteurs: David Geerts, Koen Yskout, Stef Verreydt, Pascal Borry, Liese Barbier, Isabelle Huys
- CTAM: a tool for Continuous Threat Analysis and Management(2023)
Auteurs: Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Stef Verreydt, Wouter Joosen
Pagina's: 195 - 223 - Expressive and Systematic Risk Assessments with Instance-Centric Threat Models(2023)
Auteurs: Stef Verreydt, Dimitri Van Landuyt, Wouter Joosen
Pagina's: 1450 - 1457Aantal pagina's: 8 - Using provocative design to foster electronic informed consent innovation(2022)
Auteurs: Evelien De Sutter, Stef Verreydt, Koen Yskout, David Geerts, Pascal Borry, Marc Ferrante, Bart Van Der Schueren, Isabelle Huys
- Relationship-Based Threat Modeling(2022)
Auteurs: Stef Verreydt, Laurens Sion, Koen Yskout, Wouter Joosen
Pagina's: 41 - 48Aantal pagina's: 8 - Security and Privacy Requirements for Electronic Consent: A Systematic Literature Review(2021)
Auteurs: Stef Verreydt, Koen Yskout, Wouter Joosen
Pagina's: 1 - 24 - Automated Threat Analysis and Management in a Continuous Integration Pipeline(2021)
Auteurs: Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Stef Verreydt, Wouter Joosen
Pagina's: 30 - 37 - Feasibility of container orchestration for adaptive performance isolation in multi-tenant SaaS applications(2020)
Auteurs: Eddy Truyen, Stef Verreydt, Emad Heydari Beni, Bert Lagaisse, Wouter Joosen
Pagina's: 162 - 169 - Leveraging Kubernetes for adaptive and cost-efficient resource management(2019)
Auteurs: Stef Verreydt, Emad Heydari Beni, Eddy Truyen, Bert Lagaisse, Wouter Joosen
Pagina's: 37 - 42