Name
Papers
Collaborators
WOUTER JOOSEN
504
421
Citations 
PageRank 
Referers 
2898
287.70
5383
Referees 
References 
7113
5072
Search Limit
1001000
Title
Citations
PageRank
Year
AsTAR: Sustainable Energy Harvesting for the Internet of Things through Adaptive Task Scheduling00.342022
Adversarial Robustness is Not Enough: Practical Limitations for Securing Facial Authentication00.342022
EH-CRAM: A Sustainable Energy Harvesting Algorithm for LPWANs00.342021
SEQUOIA: A Middleware Supporting Policy-Based Access Control for Search and Aggregation in Data-Driven Applications00.342021
Shared memory protection in a multi-tenant JVM00.342021
CRAM: Robust Medium Access Control for LPWAN using Cryptographic Frequency Hopping00.342020
LINDDUN GO: A Lightweight Approach to Privacy Threat Modeling00.342020
The Never-Ending Story: On the Need for Continuous Privacy Impact Assessment00.342020
Deterministic 40 year battery lifetime through a hybrid perpetual sensing platform (HyPer).00.342020
MicroVault: Reliable Storage Unit for IoT Devices00.342020
You Don't Need a Ledger: Lightweight Decentralized Consensus Between Mobile Web Clients00.342019
Mobile Friendly or Attacker Friendly?: A Large-scale Security Evaluation of Mobile-first Websites.00.342019
Towards Automated Security Design Flaw Detection00.342019
Purchased Fame: Exploring the Ecosystem of Private Blog Networks.00.342019
AutoAttacker: A reinforcement learning approach for black-box adversarial attacks00.342019
Detection of algorithmically generated domain names used by botnets - a dual arms race.30.472019
Performance overhead of container orchestration frameworks for management of multi-tenant database deployments.00.342019
On the Performance Impact of Data Access Middleware for NoSQL Data Stores A Study of the Trade-Off between Performance and Migration Cost.10.352018
Robust Digital Twin Compositions for Industry 4.0 Smart Manufacturing Systems00.342018
Risk-based design security analysis.10.352018
Polyglot Cerberos: Resource Security, Interoperability And Multi-Tenancy For Iot Services On A Multilingual Platform00.342018
Rigging Research Results by Manipulating Top Websites Rankings.20.382018
Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities.00.342018
Automated Feature Extraction for Website Fingerprinting through Deep Learning.10.352017
A Voucher-Based Security Middleware for Secure Business Process Outsourcing.00.342017
One Side-Channel to Bring Them All and in the Darkness Bind Them: Associating Isolated Browsing Sessions.10.352017
A shared multi-stakeholder platform for IoT: poster.00.342017
The Wolf of Name Street: Hijacking Domains Through Their Nameservers.50.422017
μPnP-WAN: Experiences with LoRa and its deployment in DR Congo10.432017
Accelerometer-Based Device Fingerprinting for Multi-factor Mobile Authentication.50.422016
Systematic scalability assessment for feature oriented multi-tenant services30.372016
Feature-Based Variability Management For Scalable Enterprise Applications: Experiences With An E-Payment Case00.342016
Data Protection Compliance Regulations and Implications for Smart Factories of the Future00.342016
SAMURAI: A batch and streaming context architecture for large-scale intelligent applications and environments.110.582016
Towards a container-based architecture for multi-tenant SaaS applications.30.442016
Towards systematically addressing security variability in software product lines.00.342016
Request And Conquer: Exposing Cross-Origin Resource Size50.422016
Security and privacy controls for streaming data in extended intelligent environments.20.362016
Do security patterns really help designers?230.872015
SparkXS: Efficient Access Control for Intelligent and Large-Scale Streaming Data Applications20.372015
Mobile device fingerprinting considered harmful for risk-based authentication80.662015
Continuous evolution of multi-tenant SaaS applications: a customizable dynamic adaptation approach70.442015
Adaptive Performance Isolation Middleware for Multi-tenant SaaS40.392015
On the suitability of black-box performance monitoring for SLA-driven cloud provisioning scenarios.20.422015
SecSess: keeping your session tucked away in your browser10.352015
Protected Web Components: Hiding Sensitive Information in the Shadows10.362015
Advanced monitoring and smart auto-scaling of NoSQL systems00.342015
Model-Driven Software Development of Safety-Critical Avionics Systems: an Experience Report.30.472014
Evolutionary algorithms for classification of malware families through different network behaviors100.922014
Network dialog minimization and network dialog diffing: two novel primitives for network security applications.20.372014
  • 1
  • 2