Publicaties
Sharing Machine Learning Models as Indicators of Compromise for Cyber Threat Intelligence KU Leuven
Cyber threat intelligence (CTI) sharing is the collaborative effort of sharing information about cyber attacks to help organizations gain a better understanding of threats and proactively defend their systems and networks from cyber attacks. The challenge that we address is the fact that traditional indicators of compromise (IoC) may not always capture the breath or essence of a cyber security threat or attack campaign, possibly leading to false ...
CryptDICE: Distributed data protection system for secure cloud data storage and computation KU Leuven
Thread-level resource consumption control of tenant custom code in a shared JVM for multi-tenant SaaS KU Leuven
Software-as-a-Service (SaaS) providers commonly support customization of their services to allow them to attract larger tenant bases. The nature of these customizations in practice ranges from anticipated configuration options to sophisticated code extensions. From a SaaS provider viewpoint, the latter category is particularly challenging as it involves executing untrusted tenant custom code in the SaaS production environment. Proper isolation ...
A Workload-driven Document Database Schema Recommender (DBSR) KU Leuven
Database schema design requires careful consideration of the application’s data model, workload, and target database technology to optimize for performance and data size. Traditional normalization schemes used in relational databases minimize data redundancy, whereas NoSQL document-oriented databases favor redundancy and optimize for horizontal scalability and performance.Systematic NoSQL schema design involves multiple dimensions, and a ...
Operationalization of privacy and security requirements for eHealth IoT applications in the context of GDPR and CSL KU Leuven
The Fourth Industrial Revolution imposes a number of unprecedented societal challenges and these are increasingly being addressed through regulation. This, in turn, lays the burden to adopt and implement the different concepts and principles (such as privacy-by-design) with practitioners. However, these concepts and principles are formulated by legal experts in a way that does not allow their direct usage by software engineers and developers, ...
Deterministic 40 Year Battery Lifetime through a Hybrid Perpetual Sensing Platform (HyPer) KU Leuven
The Internet of Things (IoT) has gained significant traction in recent years, resulting in the deployment of billions of devices. These devices offer a typical battery life that ranges from several months to several years, which results in two problems. Batteries must be replaced, increasing maintenance costs, and toxic batteries are abandoned, damaging the environment. Recent advances in battery technology have delivered primary batteries with ...
Automated Configuration of NoSQL Performance and Scalability Tactics for Data-Intensive Applications KU Leuven
This paper presents the architecture, implementation and evaluation of a middleware support layer for NoSQL storage systems. Our middleware automatically selects performance and scalability tactics in terms of application specific workloads. Enterprises are turning to NoSQL storage technologies for their data-intensive computing and analytics applications. Comprehensive benchmarks of different Big Data platforms can help drive decisions which ...