Organisation
Distributed and Secure Software (DistriNet)
Division
Distributed and Secure Software (DistriNet)
Current researchers
1 - 10 of 117 results
- Wouter Joosen (Responsible)
- Shuaibu Musa Adam (Member)
- Fritz Alder (Member)
- Alicia Andries (Member)
- Angelos Beitis (Member)
- Jonah Bellemans (Member)
- Yolande Berbers (Member)
- Márton Bognár (Member)
- Ilse Bohé (Member)
- Jeroen Boydens (Member)
Projects
1 - 10 of 241
- Trusted Computing for Low End MicrocontrollersFrom14 Mar 2024 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Software Verification in the presence of Resource Revocation using Multi-Modal Separation LogicFrom26 Feb 2024 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Sabbatical Tom Holvoet: Study and verification of vulnerabilities in smart contracts for decentralized software systems in a blockchain environmentFrom12 Feb 2024 → TodayFunding: BOF - mobility
- Sabbatical Tom Holvoet: Study and verification of vulnerabilities in smart contracts for decentralized software systems in a blockchain environmentFrom12 Feb 2024 → TodayFunding: FWO Prices and sabbaticals (before FWO undefined)
- SECDES: By-design cyber secure digital productsFrom1 Feb 2024 → TodayFunding: VLAIO - Flanders' FOOD - COOCK
- Data-driven Analysis of Cybercrime EcosystemsFrom18 Dec 2023 → TodayFunding: BOF - projects
- Optimizing testing strategies to deal with software variabilityFrom26 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- AI-Driven Network Security: Contextual Analysis of Sequential Data for Threat DetectionFrom23 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Towards robust ML-based cybersecurity systemsFrom18 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Machine learning operations strategies for condition monitoring at the edgeFrom5 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
Publications
41 - 50 of 1541
- Bubble: a Javascript engine level countermeasure against heap-spraying attacks(2010)
Authors: Francesco Gadaleta, Yves Younan, Wouter Joosen
Pages: 1 - 17Number of pages: 17 - PhD Forum: Trust Management for Context-aware Access Control Systems in IoT(2021)
Authors: Bart De Decker
Pages: 909 - 910Number of pages: 2 - Exploring the security vulnerabilities of LoRa(2017)
Authors: Emekcan Aras, Gowri Sankar Ramachandran, Piers W. Lawrence, Danny Hughes
Pages: 361 - 366 - Coordinating wind turbines and flexible consumers with cooperative and competitive agents(2016)
Authors: Kristof Coninx, Tom Holvoet
Pages: 1407 - 1408 - A MVC framework for policy-based adaptation of workflow processes: A case study on confidentiality(2010)
Authors: Kristof Geebelen, Eryk Kulikowski, Eddy Truyen, Wouter Joosen
Pages: 401 - 408 - DMVX: Secure and Efficient Multi-Variant Execution in a Distributed Setting(2021)
Authors: Alex Voulimeneas, Stijn Volckaert
Pages: 41 - 47 - Accelerometer-based device fingerprinting for multi-factor mobile authentication(2016)
Authors: Tom Van Goethem, Davy Preuveneers, Wouter Joosen
Pages: 106 - 121 - Design of a Robust MAC Protocol for LoRa(2022)
Authors: Sam Michiels, Wouter Joosen, Danny Hughes
- PIVOT: Private and Effective Contact Tracing(2022)
Authors: Giuseppe Garofalo, Tim Van hamme, Davy Preuveneers, Wouter Joosen, Aysajan Aishajiang, Mustafa Mustafa
Pages: 22466 - 22489 - NuCiA - Nurse call simulation in agent environments(2010)
Authors: Tim Vermeulen, Koen Vangheluwe, Joris Maervoet, Katja Verbeeck, Piet Verhoeve, Brecht Stubbe, Gerrit K Janssens, Katrien Ramaekers, An Caris
Pages: 276 - 279