Wouter Joosen
#133,384
Most Influential Person Now
Wouter Joosen's AcademicInfluence.com Rankings
Wouter Joosencomputer-science Degrees
Computer Science
#5986
World Rank
#6313
Historical Rank
Software Engineering
#167
World Rank
#168
Historical Rank
Database
#3109
World Rank
#3240
Historical Rank

Download Badge
Computer Science
Wouter Joosen's Degrees
- PhD Computer Science KU Leuven
- Masters Computer Science KU Leuven
- Bachelors Computer Science KU Leuven
Similar Degrees You Can Earn
Why Is Wouter Joosen Influential?
(Suggest an Edit or Addition)Wouter Joosen's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements (2011) (419)
- Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting (2013) (418)
- Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation (2018) (302)
- You are what you include: large-scale evaluation of remote javascript inclusions (2012) (288)
- Predicting Vulnerable Software Components via Text Mining (2014) (255)
- Automated Website Fingerprinting through Deep Learning (2017) (201)
- Portable Support for Transparent Thread Migration in Java (2000) (141)
- PriVaricator: Deceiving Fingerprinters with Little White Lies (2015) (139)
- RIPE: runtime intrusion prevention evaluator (2011) (135)
- Dynamic and selective combination of extensions in component-based applications (2001) (130)
- Chained Anomaly Detection Models for Federated Learning: An Intrusion Detection Case Study (2018) (127)
- A descriptive study of Microsoft’s threat modeling technique (2015) (124)
- Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse (2015) (121)
- Extending sensor networks into the Cloud using Amazon Web Services (2010) (120)
- On the secure software development process: CLASP, SDL and Touchpoints compared (2009) (114)
- LooCI: a loosely-coupled component infrastructure for networked embedded systems (2009) (105)
- SessionShield: Lightweight Protection against Session Hijacking (2011) (98)
- An Analysis of the Security Patterns Landscape (2007) (97)
- On the importance of the separation-of-concerns principle in secure software engineering (2003) (90)
- PAriCheck: an efficient pointer arithmetic checker for C programs (2010) (90)
- UniTI: a unified transformation infrastructure (2007) (89)
- Software vulnerability prediction using text analysis techniques (2012) (85)
- Parking Sensors: Analyzing and Detecting Parked Domains (2015) (82)
- A Middleware Layer for Flexible and Cost-Efficient Multi-tenant Applications (2011) (80)
- A Survey of System Configuration Tools (2010) (79)
- The Clock is Still Ticking: Timing Attacks in the Modern Web (2015) (77)
- Efficient customization of multi-tenant Software-as-a-Service applications with service lines (2014) (75)
- WebJail: least-privilege integration of third-party components in web mashups (2011) (74)
- Code injection in C and C++: a survey of vulnerabilities and countermeasures (2004) (73)
- Using Security Patterns to Combine Security Metrics (2008) (73)
- Selective Jamming of LoRaWAN using Commodity Hardware (2017) (72)
- Security-by-contract on the .NET platform (2008) (69)
- Developing secure applications through aspect-oriented programming (2004) (68)
- The MACODO middleware for context-driven dynamic agent organizations (2010) (66)
- Isolating Process-Level Concerns Using Padus (2006) (65)
- CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests (2010) (64)
- Automatic and Precise Client-Side Protection against CSRF Attacks (2011) (64)
- Bitsquatting: exploiting bit-flips for fun, or profit? (2013) (62)
- Do Security Patterns Really Help Designers? (2015) (59)
- Accelerometer-Based Device Fingerprinting for Multi-factor Mobile Authentication (2016) (59)
- On the Secure Software Development Process: CLASP and SDL Compared (2007) (57)
- Towards a software architecture for DRM (2005) (56)
- Runtime countermeasures for code injection attacks against C and C++ programs (2012) (56)
- Middleware for efficient and confidentiality-aware federation of access control policies (2014) (55)
- True and Transparent Distributed Composition of Aspect-Components (2006) (55)
- Stranger danger: exploring the ecosystem of ad-based URL shortening services (2014) (54)
- Crying wolf? On the price discrimination of online airline tickets (2014) (54)
- Empirical evaluation of a privacy-focused threat modeling methodology (2014) (54)
- Large-Scale Security Analysis of the Web: Challenges and Findings (2014) (53)
- A middleware platform to support river monitoring using wireless sensor networks (2011) (52)
- Classifying and documenting aspect interactions (2006) (50)
- Extended Protection against Stack Smashing Attacks without Performance Loss (2006) (50)
- Maneuvering Around Clouds: Bypassing Cloud-based Security Providers (2015) (50)
- Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware (2016) (49)
- A system of security patterns (2006) (49)
- Soundsquatting: Uncovering the Use of Homophones in Domain Squatting (2014) (48)
- It's Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services (2016) (48)
- LINDDUN privacy threat modeling: a tutorial (2015) (45)
- Customization of Object Request Brokers by Application Specific Policies (2000) (45)
- Design notations for secure software: a systematic literature review (2017) (44)
- Comparing PaaS offerings in light of SaaS development (2014) (44)
- Mobile device fingerprinting considered harmful for risk-based authentication (2015) (44)
- FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications (2012) (43)
- Aspect-Oriented Software Development in Practice: Tales from AOSD-Europe (2010) (43)
- DAViM: a dynamically adaptable virtual machine for sensor networks (2006) (43)
- PoDIM: A Language for High-Level Configuration Management (2007) (43)
- Static analysis versus penetration testing: A controlled experiment (2013) (42)
- Security of Web Mashups: A Survey (2010) (42)
- HProxy: Client-Side Detection of SSL Stripping Attacks (2010) (42)
- LooCI: The Loosely-coupled Component Infrastructure (2012) (41)
- Dynamic reconfiguration using template based web service composition (2008) (41)
- Support for distributed adaptations in aspect-oriented middleware (2008) (41)
- μPnP: plug and play peripherals for the internet of things (2015) (39)
- Solution-aware data flow diagrams for security threat modeling (2018) (38)
- Bridging the gap between web application firewalls and web applications (2006) (38)
- SmartAuth: dynamic context fingerprinting for continuous user authentication (2015) (38)
- Traceability as input for model transformations (2007) (38)
- Towards a container-based architecture for multi-tenant SaaS applications (2016) (38)
- Evolutionary algorithms for classification of malware families through different network behaviors (2014) (37)
- Aspects should not die (1998) (37)
- Towards performance isolation in multi-tenant SaaS applications (2012) (36)
- Towards a Transformation Chain Modeling Language (2006) (35)
- Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic (2006) (34)
- A Systematic Comparison of Age and Gender Prediction on IMU Sensor-Based Gait Traces (2019) (34)
- A flexible security architecture to support third-party applications on mobile devices (2007) (34)
- Does organizing security patterns focus architectural choices? (2012) (32)
- An AOP Case with Static and Dynamic Aspects (1998) (32)
- Cost-Effective Feature Placement of Customizable Multi-Tenant Applications in the Cloud (2014) (32)
- Serene: Self-Reliant Client-Side Protection against Session Fixation (2012) (32)
- BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks (2010) (32)
- From aspect-oriented models to aspect-oriented code?: the maintenance perspective (2010) (32)
- Managing semantic interference with aspect integration contracts (2004) (31)
- SPARTA: Security & Privacy Architecture Through Risk-Driven Threat Assessment (2018) (30)
- Exposing the Lack of Privacy in File Hosting Services (2011) (30)
- Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting (2017) (29)
- Threat Modelling for Web Services Based Web Applications (2004) (29)
- The Future of Mobile E-health Application Development: Exploring HTML5 for Context-aware Diabetes Monitoring (2013) (29)
- Towards portability and interoperability support in middleware for hybrid clouds (2014) (28)
- Detection of algorithmically generated domain names used by botnets: a dual arms race (2019) (28)
- Context-oriented programming for customizable SaaS applications (2012) (28)
- Building Wireless Sensor Network Applications with LooCI (2010) (28)
- AOSD & Security: a practical assessment (2003) (28)
- Browser protection against cross-site request forgery (2009) (28)
- Non-functional Policies (1999) (27)
- Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies (2018) (27)
- TabShots: client-side detection of tabnabbing attacks (2013) (27)
- Federated and Shared Use of Sensor Networks through Security Middleware (2009) (26)
- Request and Conquer: Exposing Cross-Origin Resource Size (2016) (26)
- Filter-resistant code injection on ARM (2009) (25)
- DAVIM: Adaptable Middleware for Sensor Networks (2008) (25)
- Managing Concern Interactions in Middleware (2007) (25)
- Troubleshooting an Intrusion Detection Dataset: the CICIDS2017 Case Study (2021) (25)
- Developing and managing customizable Software as a Service using feature model conversion (2012) (25)
- Exploring the Ecosystem of Malicious Domain Registrations in the .eu TLD (2017) (24)
- A Comprehensive Feature Comparison Study of Open-Source Container Orchestration Frameworks (2019) (24)
- A Reflective Framework for Fine-Grained Adaptation of Aspect-Oriented Compositions (2008) (24)
- The Wolf of Name Street: Hijacking Domains Through Their Nameservers (2017) (24)
- Empirical and statistical analysis of risk analysis-driven techniques for threat management (2007) (24)
- HeapSentry: Kernel-Assisted Protection against Heap Overflows (2013) (24)
- A Reflective Invocation Scheme to Realise Advanced Object Management (1993) (24)
- Trustworthy data-driven networked production for customer-centric plants (2017) (24)
- A methodology for designing countermeasures against current and future code injection attacks (2005) (24)
- Customization of Component-based Object Request Brokers through dynamic reconfiguration (2000) (24)
- QoS prediction for web service compositions using kernel-based quantile estimation with online adaptation of the constant offset (2014) (23)
- A generic and reflective debugging architecture to support runtime visibility and traceability of aspects (2009) (23)
- Transforming Security Requirements into Architecture (2008) (23)
- Towards an Adaptive Middleware for Efficient Multi-Cloud Data Storage (2017) (23)
- A study of aspect-oriented design approaches (2006) (23)
- Interaction-Based Privacy Threat Elicitation (2018) (23)
- Automated Feature Extraction for Website Fingerprinting through Deep Learning. (2017) (23)
- On the State of NoSQL Benchmarks (2017) (23)
- SAMURAI: A batch and streaming context architecture for large-scale intelligent applications and environments (2016) (23)
- A survey of middleware for wireless sensor networks (2007) (22)
- MASY: MAnagement of Secret keYs for federated mobile wireless sensor networks (2010) (22)
- Leveraging Battery Usage from Mobile Devices for Active Authentication (2017) (22)
- The S3MS.NET Run Time Monitor: Tool Demonstration (2009) (22)
- Entity-Based Access Control: supporting more expressive access control policies (2015) (22)
- Robust Digital Twin Compositions for Industry 4.0 Smart Manufacturing Systems (2018) (21)
- Modelling Variability in Self-Adaptive systems: Towards a Research Agenda (2008) (21)
- μPnP-WAN: Experiences with LoRa and its deployment in DR Congo (2017) (21)
- Resource Usage and Performance Trade-offs for Machine Learning Models in Smart Environments (2020) (20)
- A MVC Framework for Policy-Based Adaptation of Workflow Processes: A Case Study on Confidentiality (2010) (20)
- Architecting software with security patterns (2008) (20)
- SμV - the security microvisor: a virtualisation-based security middleware for the internet of things (2017) (20)
- Instruction-level countermeasures against stack-based buffer overflow attacks (2009) (20)
- μPnP-Mesh: The plug-and-play mesh network for the Internet of Things (2015) (20)
- Integrating Patient Consent in e-Health Access Control (2011) (20)
- SecLooCI: A comprehensive security middleware architecture for shared wireless sensor networks (2015) (20)
- Reusable Formal Models for Secure Software Architectures (2012) (20)
- Security of memory allocators for C and C (2005) (19)
- Effective and efficient privacy threat modeling through domain refinements (2018) (19)
- Towards a measuring framework for security properties of software (2006) (19)
- K8-Scalar: A Workbench to Compare Autoscalers for Container-Orchestrated Database Clusters (2018) (19)
- Digital rights management - a survey of existing technologies (2005) (19)
- Building a Customizable Business-Process-as-a-Service Application with Current State-of-Practice (2013) (18)
- Password Meters and Generators on the Web: From Large-Scale Empirical Study to Getting It Right (2015) (18)
- The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion (2021) (18)
- Uniform application-level access control enforcement of organizationwide policies (2005) (18)
- Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets (2014) (18)
- How secure is AOP and what can we do about it? (2006) (18)
- PaaSHopper: Policy-driven middleware for multi-PaaS environments (2015) (18)
- On the Workings and Current Practices of Web-Based Device Fingerprinting (2014) (17)
- Protecting Global and Static Variables from Buffer Overflow Attacks (2009) (17)
- On the Performance Impact of Data Access Middleware for NoSQL Data Stores A Study of the Trade-Off between Performance and Migration Cost (2018) (17)
- Towards efficient publish-subscribe middleware in the IoT with IPv6 multicast (2016) (17)
- Privacy-enabled remote health monitoring applications for resource constrained wearable devices (2016) (16)
- Object-NoSQL Database Mappers: a benchmark study on the performance overhead (2017) (16)
- Risk-Based Design Security Analysis (2018) (16)
- A formal model for self-adaptive and self-healing organizations (2009) (16)
- Endogenous versus exogenous self-management (2008) (16)
- Adaptive Performance Isolation Middleware for Multi-tenant SaaS (2015) (16)
- Resolving least privilege violations in software architectures (2009) (16)
- Abusing locality in shared web hosting (2011) (16)
- An Architectural View for Data Protection by Design (2019) (16)
- Towards a quantitative assessment of security in software architectures (2008) (16)
- Semantic analysis and verification of context-driven adaptive applications in intelligent environments (2016) (16)
- Change patterns (2014) (16)
- Proceedings of the 9th ACM/IFIP/USENIX International Conference on Middleware (2008) (15)
- Measuring and Modeling the Energy Cost of Reconfiguration in Sensor Networks (2015) (15)
- A Generalization and Solution to the Common Ancestor Dilemma Problem in Delegation-Based Object Systems (2004) (15)
- LINDDUN GO: A Lightweight Approach to Privacy Threat Modeling (2020) (15)
- Distributed Security Framework for Reliable Threat Intelligence Sharing (2020) (15)
- Middleware for resource sharing in multi-purpose Wireless Sensor Networks (2010) (15)
- Linking Privacy Solutions to Developer Goals (2009) (15)
- LIND(D)UN privacy threat tree catalog (2014) (15)
- The Web Browser as Distributed Application Server: Towards Decentralized Web Applications in the Edge (2019) (15)
- Managing Real-World System Configurations with Constraints (2008) (15)
- A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints (2020) (15)
- Domain-driven discovery of stable abstractions for pointcut interfaces (2009) (15)
- Aspects for Run-time Component Integration (2000) (15)
- Towards simplified specification of policies in different domains (2007) (15)
- Arriclides: An Architecture Integrating Clinical Decision Support Models (2007) (15)
- Variability middleware for multi-tenant SaaS applications: a research roadmap for service lines (2015) (15)
- SCOPE: self-adaptive and policy-based data management middleware for federated clouds (2019) (15)
- Funny Accents: Exploring Genuine Interest in Internationalized Domain Names (2019) (15)
- An object-oriented approach to datatype-generic programming (2006) (15)
- Using AADL to Model a Protocol Stack (2008) (15)
- Systematic scalability assessment for feature oriented multi-tenant services (2016) (15)
- PERSIST: Policy-Based Data Management Middleware for Multi-Tenant SaaS Leveraging Federated Cloud Storage (2018) (15)
- Is Newer Always Better?: The Case of Vulnerability Prediction Models (2016) (15)
- The e-document case study: functional analysis and access control requirements (2014) (14)
- Feature placement algorithms for high-variability applications in cloud environments (2012) (14)
- The case for aspect-oriented reflective middleware (2007) (14)
- Applying a Multi-paradigm Approach to Implementing Wireless Sensor Network Based River Monitoring (2010) (14)
- NeCoMan: Middleware for Safe Distributed-Service Adaptation in Programmable Networks (2005) (14)
- Component-Based open middleware supporting aspect-oriented software composition (2005) (14)
- CryptDICE: Distributed data protection system for secure cloud data storage and computation (2021) (14)
- DARMA: adaptable service and resource management for wireless sensor networks (2009) (14)
- The workforce management case study: functional analysis and access control requirements (2014) (14)
- A Component and Policy-Based Approach for Efficient Sensor Network Reconfiguration (2012) (14)
- Run-Time and Atomic Weaving of Distributed Aspects (2006) (13)
- Data Protection Compliance Regulations and Implications for Smart Factories of the Future (2016) (13)
- Requirements traceability to support evolution of access control (2005) (13)
- Using AADL in model driven development (2007) (13)
- Sharing Machine Learning Models as Indicators of Compromise for Cyber Threat Intelligence (2021) (13)
- Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections (2020) (13)
- Towards an aspect-oriented architecture for self-adaptive frameworks (2008) (13)
- Rigging Research Results by Manipulating Top Websites Rankings (2018) (13)
- Policy-Driven Data Management Middleware for Multi-cloud Storage in Multi-tenant SaaS (2015) (13)
- A comparison of system description models for data protection by design (2019) (13)
- Modeling Context-Dependent Aspect Interference Using Default Logics (2008) (12)
- Access Control in Multi-party Wireless Sensor Networks (2013) (12)
- Niflheim: An end-to-end middleware for applications on a multi-tier IoT infrastructure (2017) (12)
- Increasing user participation: An exploratory study of querying on the Facebook and Twitter platforms (2014) (12)
- An Audit of Facebook's Political Ad Policy Enforcement (2022) (12)
- On Interaction Refinement in Middleware (2000) (12)
- Performance overhead of container orchestration frameworks for management of multi-tenant database deployments (2019) (12)
- What electronic health records don’t know just yet. A privacy analysis for patient communities and health records interaction (2012) (12)
- Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies (2008) (12)
- Engineering Secure Future Internet Services and Systems (2014) (12)
- Evaluation of Container Orchestration Systems for Deploying and Managing NoSQL Database Clusters (2018) (12)
- Privacy Risk Assessment for Data Subject-Aware Threat Modeling (2019) (12)
- Object parallelism in XENOOPS (1993) (12)
- Infrastructure for mobile agents (1996) (12)
- Adaptable Access Control Policies for Medical Information Systems (2003) (12)
- Managing Agent Interactions with Context-Driven Dynamic Organizations (2008) (11)
- Supporting reconfiguration and re-use through self-describing component interfaces (2010) (11)
- Policy Analysis Using a Hybrid Semantic Reasoning Engine (2007) (11)
- Measuring the interplay of security principles in software architectures (2009) (11)
- Towards policy-based management of sensor networks (2008) (11)
- Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement (2011) (11)
- Interactions in AO Middleware (11)
- AsTAR: Sustainable Battery Free Energy Harvesting for Heterogeneous Platforms and Dynamic Environments (2019) (11)
- Towards Multi-party Policy-based Access Control in Federations of Cloud and Edge Microservices (2019) (11)
- Federated Authorization for Software-as-a-Service Applications (2013) (11)
- On the integration of sensor networks and general purpose IT infrastructure (2007) (11)
- Fine-Grained Tailoring of Component Behaviour for Embedded Systems (2009) (11)
- Streamlining Development for Networked Embedded Systems Using Multiple Paradigms (2010) (11)
- Implementing a modular access control service to support application-specific policies in CaesarJ (2005) (11)
- One Side-Channel to Bring Them All and in the Darkness Bind Them: Associating Isolated Browsing Sessions (2017) (11)
- Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals (2014) (11)
- Adding dynamic reconfiguration support to JBoss AOP (2007) (11)
- Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows (2017) (11)
- Least privilege analysis in software architectures (2013) (11)
- Policy reconciliation for access control in dynamic cross-enterprise collaborations (2018) (11)
- Object to NoSQL Database Mappers (ONDM): A systematic survey and comparison of frameworks (2019) (11)
- A Modular Access Control Service for Supporting Application-Specific Policies (2006) (11)
- Report of the AOSD2004 workshop on AOSD technology for application-level security (AOSDSEC) (2005) (11)
- Security Threat Modeling: Are Data Flow Diagrams Enough? (2020) (11)
- Network-aware impact determination algorithms for service workflow deployment in hybrid clouds (2012) (11)
- Improving Resilience of Behaviometric Based Continuous Authentication with Multiple Accelerometers (2017) (11)
- Consistency management in the presence of simultaneous client-specific views (2002) (10)
- A descriptive study of assumptions in STRIDE security threat modeling (2021) (10)
- Identity in federated electronic healthcare (2008) (10)
- Network dialog minimization and network dialog diffing: two novel primitives for network security applications (2014) (10)
- On the use of process migration in distributed systems (1990) (10)
- Demonstration of MicroPnP: The Zero-Configuration Wireless Sensing and Actuation Platform (2016) (10)
- Architectural design of a digital publishing system (2006) (10)
- Design Churn as Predictor of Vulnerabilities? (2014) (10)
- Specifying and Composing Concerns Expressed in Domain-Specific Modeling Languages (2009) (10)
- Generic Reusable Concern Compositions (2008) (10)
- SecSess: keeping your session tucked away in your browser (2015) (10)
- Continuous Evolution of Multi-tenant SaaS Applications: A Customizable Dynamic Adaptation Approach (2015) (10)
- Energy aware software evolution for Wireless Sensor Networks (2013) (10)
- Process Activities Supporting Security Principles (2007) (10)
- Components for Non-Functional Requirements (1998) (10)
- Support for Metadata-driven Selection of Run-time Services in .NET is Promising but Immature (2004) (10)
- Policy-Driven Tailoring of Sensor Networks (2010) (10)
- Building Dynamic and Dependable Component-Based Internet-of-Things Applications with Dawn (2016) (10)
- Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities (2017) (10)
- Context-driven dynamic organizations applied to coordinated monitoring of traffic jams (2007) (10)
- Documenting Early Architectural Assumptions in Scenario-Based Requirements (2012) (10)
- A descriptive study of assumptions made in LINDDUN privacy threat elicitation (2020) (10)
- Model-Driven Software Development of Safety-Critical Avionics Systems: an Experience Report (2014) (9)
- Migrating medical communications software to a multi-tenant cloud environment (2013) (9)
- Characterizing the performance of tenant data management in multi-tenant cloud authorization systems (2014) (9)
- Toward efficient and confidentiality-aware federation of access control policies (2012) (9)
- FAMoS: A Flexible Active Monitoring Service for Wireless Sensor Networks (2012) (9)
- Decomposition into elementary pointcuts: a design principle for improved aspect reusability (2006) (9)
- μPnP-WAN: Wide area plug and play sensing and actuation with LoRa (2016) (9)
- A Security Architecture for Electronic Commerce Applications (2000) (9)
- A Data Utility-Driven Benchmark for De-identification Methods (2019) (9)
- Modularizing Early Architectural Assumptions in Scenario-Based Requirements (2014) (9)
- Security patterns: 10 years later (2008) (9)
- A comparative study of workflow customization strategies: Quality implications for multi-tenant SaaS (2018) (9)
- Hitch Hiker 2.0: a binding model with flexible data aggregation for the Internet-of-Things (2016) (9)
- Exploring the Ecosystem of Referrer-Anonymizing Services (2012) (9)
- A deadlock detection tool for Occam (1989) (9)
- Improving Intrusion Detection through Alert Verification (2006) (9)
- Identifying and Resolving Least Privilege Violations in Software Architectures (2009) (9)
- Analysis of architectural variants for auditable blockchain-based private data sharing (2019) (9)
- Identity management for cyber-physical production workflows and individualized manufacturing in industry 4.0 (2017) (9)
- Cloud and edge based data analytics for privacy-preserving multi-modal engagement monitoring in the classroom (2020) (8)
- An open middleware for proactive QoS-aware service composition in a multi-tenant SaaS environment (2012) (8)
- Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies (2008) (8)
- Mapping problem-space to solution-space features: a feature interaction approach (2009) (8)
- Flexible integration of data qualities in wireless sensor networks (2009) (8)
- Towards preserving correctness in self-managed software systems (2004) (8)
- A framework for integrated configuration management tools (2013) (8)
- HyperForce: Hypervisor-enForced Execution of Security-Critical Code (2012) (8)
- OWebSync: Seamless Synchronization of Distributed Web Clients (2021) (8)
- Fishy Faces: Crafting Adversarial Images to Poison Face Authentication (2018) (8)
- A comparison of two approaches for achieving flexible and adaptive security middleware (2008) (8)
- A Smörgåsbord of Typos: Exploring International Keyboard Layout Typosquatting (2019) (8)
- MASC: Modelling Architectural Security Concerns (2015) (8)
- Exposing Cookie Policy Flaws Through an Extensive Evaluation of Browsers and Their Extensions (2019) (8)
- A Model for Provably Secure Software Design (2017) (8)
- Automated Detection of Least Privilege Violations in Software Architectures (2010) (8)
- Policy-driven middleware for heterogeneous, hybrid cloud platforms (2013) (8)
- Composing Non-orthogonal Meta-programs (1999) (8)
- An event-based component model for sensor networks: a case study for river monitoring (2010) (8)
- The XENOOPS project (1991) (7)
- Key Research Challenges for Successfully Applying MDD Within Real-Time Embedded Software Development (2006) (7)
- Sender-Initated and Receiver-Initated Coordination in a Global Object Space (1994) (7)
- Security and privacy controls for streaming data in extended intelligent environments (2016) (7)
- Weaving the Fabric of the Control Loop through Aspects (2009) (7)
- Decentralized cooperative management: a bottom-up approach (2005) (7)
- SparkXS: Efficient Access Control for Intelligent and Large-Scale Streaming Data Applications (2015) (7)
- You Don't Need a Ledger: Lightweight Decentralized Consensus Between Mobile Web Clients (2019) (7)
- Security Patterns 2.0: Toward Security Patterns Based on Security Building Blocks (2018) (7)
- Middleware for Customizable Multi-staged Dynamic Upgrades of Multi-tenant SaaS Applications (2015) (7)
- Run-time Support for Aspects in Distributed System Infrastructure (2002) (7)
- A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components (2004) (7)
- Hardening XDS-Based Architectures (2008) (7)
- Feature Models at Run Time: Feature Middleware for Multi-tenant SaaS applications (2014) (7)
- Software security: experiments on the .NET common language run-time and the shared source common language infrastructure (2003) (7)
- Language Constructs for Coordination in an Agent Space (1994) (7)
- A Secure Multi-Application Platform for Vehicle Telematics (2010) (7)
- Configuration management as a multi-cloud enabler (2014) (7)
- Towards fine-grained and application-centric access control for wireless sensor networks (2010) (7)
- Premadoma: an operational solution for DNS registries to prevent malicious domain registrations (2019) (7)
- Hello rootKitty: A Lightweight Invariance-Enforcing Framework (2011) (7)
- Managing your content with CIMPLE - a content-centric storage interface (2009) (7)
- A permission system for secure AOP (2010) (7)
- Towards application driven security dashboards in future middleware (2012) (7)
- PPG2Live: Using dual PPG for active authentication and liveness detection (2019) (7)
- Discovery of Stable Abstractions for Aspect-Oriented Composition in the Car Crash Management Domain (2010) (7)
- A Dynamic Customization Model for Distributed Component-Based Applications (2001) (7)
- Multi-level Patterns (1997) (7)
- Towards managing variability in the safety design of an automotive hall effect sensor (2014) (7)
- High-level system configuration (2008) (7)
- Advanced Sensor Network Software Deployment using Application-level Quality Goals (2011) (7)
- The elementary pointcut pattern (2007) (7)
- A middleware pattern to support complex sensor network applications (2006) (7)
- Towards Automated Security Design Flaw Detection (2019) (6)
- Towards More Scalable and Secure LPWAN Networks Using Cryptographic Frequency Hopping (2019) (6)
- Scalable and manageable customization of workflows in multi-tenant SaaS offerings (2016) (6)
- Automated regression testing of BPMN 2.0 processes: a capture and replay framework for continuous delivery (2016) (6)
- Adaptive and reflective middleware for the cloudification of simulation & optimization workflows (2017) (6)
- Thread-level resource consumption control of tenant custom code in a shared JVM for multi-tenant SaaS (2021) (6)
- A reference model for cross-organizational coordination architectures (2008) (6)
- Mobile Friendly or Attacker Friendly?: A Large-scale Security Evaluation of Mobile-first Websites (2019) (6)
- Customization of On-line Services with Simultaneous Client-Specific Views (2001) (6)
- Protected Web Components: Hiding Sensitive Information in the Shadows (2015) (6)
- An Efficient Modeling and Execution Framework for Complex Systems Development (2011) (6)
- A dynamic customization model for distributed component-based systems (2001) (6)
- Extending middleware frameworks for Wireless Sensor Networks (2009) (6)
- QARI: Quality Aware Software Deployment for Wireless Sensor Networks (2010) (6)
- Dynamic composition of cross-organizational features in distributed software systems (2010) (6)
- View connectors for the integration of domain specific access control (2005) (6)
- Systematic quality trade-off support in the software product-line configuration process (2016) (6)
- Modelling Genetic Search Agents with a Concurrent Object-Oriented Language (1998) (6)
- Towards a unifying view on security contracts (2005) (6)
- Hitch hiker: a remote binding model with priority based data aggregation for wireless sensor networks (2015) (6)
- A Graph Based Approach to Supporting Reconfiguration in Wireless Sensor Networks (2009) (6)
- A reconfigurable component model with semantic type system for dynamic WSN applications (2012) (6)
- Policy‐driven customization of cross‐organizational features in distributed service systems (2013) (6)
- Schema design support for semi-structured data: Finding the sweet spot between NF and De-NF (2017) (6)
- Towards systematically addressing security variability in software product lines (2016) (6)
- A Software Architecture to Facilitate the Creation of DRM Systems (2007) (6)
- Fine-grained Access-control for the Puppet Configuration Language (2011) (6)
- Amusa: middleware for efficient access control management of multi-tenant SaaS applications (2015) (6)
- Security in Context: Analysis and Refinement of Software Architectures (2010) (6)
- Integrated management of network and security devices in IT infrastructures (2011) (5)
- User-Rank: Generic Query Optimization for Participatory Social Applications (2014) (5)
- Naming and Network Transparent Process Migration in Loosely Coupled Distributed Systems (1989) (5)
- Threat modeling: from infancy to maturity (2020) (5)
- Federated Access Control and Workflow Enforcement in Systems Configuration (2009) (5)
- Towards a pattern language for aspect-based design (2009) (5)
- The DiPS+ software architecture for self-healing protocol stacks (2004) (5)
- TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE (2019) (5)
- Comparative Evaluation of Converged Service-Oriented Architectures (2007) (5)
- Scalar: Systematic Scalability Analysis with the Universal Scalability Law (2014) (5)
- A Model Curriculum for Aspect-Oriented Software Development (2006) (5)
- Evaluating the Long-term Effects of Parameters on the Characteristics of the Tranco Top Sites Ranking (2019) (5)
- Managing distributed trust relationships for multi-modal authentication (2018) (5)
- Survey of configuration management tools (2007) (5)
- The object-oriented development of a parallel application in protein dynamics: why we need software tools for HPCN applications (1996) (5)
- The S 3 MS . NET Run Time Monitor (2009) (5)
- Analysis of Sensor Network Operating System Performance Throughout the Software Life Cycle (2013) (5)
- A comprehensive model for digital publishing (2006) (5)
- Dynamic load balancing in transputer applications with geometric parallelism (1990) (5)
- AutoAttacker: A reinforcement learning approach for black-box adversarial attacks (2019) (5)
- Privacy-Preserving Behavioral Authentication on Smartphones (2017) (5)
- Sensor Middleware to Support Diverse Data Qualities (2011) (5)
- On the use of threads in mobile object systems (2000) (5)
- CRAM: Robust Medium Access Control for LPWAN using Cryptographic Frequency Hopping (2020) (5)
- Improving Memory Management Security for C and C++ (2010) (5)
- AOSD as an enabler for good enough security (2003) (5)
- Longitudinal Study of the Use of Client-side Security Mechanisms on the European Web (2016) (5)
- Scalability Analysis of the OpenAM Access Control System with the Universal Scalability Law (2014) (5)
- Striking the Balance: Effective yet Privacy Friendly Contact Tracing (2020) (5)
- Engineering Secure Future Internet Services (2011) (5)
- Types in Their Prime: Sub-typing of Data in Resource Constrained Environments (2013) (5)
- A Middleware Model in Alloy for Supply Chain-Wide Agent Interactions (2010) (5)
- A Flexible Architecture for Enforcing and Composing Policies in a Service-Oriented Environment (2007) (5)
- On the suitability of black-box performance monitoring for SLA-driven cloud provisioning scenarios (2015) (5)
- Automating the discovery of stable domain abstractions for reusable aspects (2009) (5)
- A Security Analysis of Emerging Web Standards - HTML5 and Friends, from Specification to Implementation (2012) (5)
- Helping hands: Measuring the impact of a large threat intelligence sharing community (2022) (5)
- On the Role of Early Architectural Assumptions in Quality Attribute Scenarios: A Qualitative and Quantitative Study (2015) (4)
- A reusable load balancer for parallel search problems (1993) (4)
- Towards reusable aspects: the callback mismatch problem (2010) (4)
- A Session Layer Concept for Overlay Networks (2005) (4)
- Object-Oriented Simulation Software for Drug Design (1994) (4)
- On the modularity impact of architectural assumptions (2012) (4)
- A Low-Power Hardware Platform for Smart Environment as a Call for More Flexibility and Re-Usability (2019) (4)
- Automated Configuration of NoSQL Performance and Scalability Tactics for Data-Intensive Applications (2020) (4)
- Idea: Supporting Policy-Based Access Control on Database Systems (2016) (4)
- Parallel simulation software for drug design (1994) (4)
- Static Verification of Indirect Data Sharing in Loosely-coupled Component Systems (2006) (4)
- Classifying component interaction in product-line architectures (1999) (4)
- @migo: A Comprehensive Middleware Solution for Participatory Sensing Applications (2015) (4)
- Security and Privacy Requirements for Electronic Consent (2021) (4)
- AsTAR: Sustainable Energy Harvesting for the Internet of Things through Adaptive Task Scheduling (2022) (4)
- Reducing cold starts during elastic scaling of containers in kubernetes (2021) (4)
- Ontology-Based Discovery of Data-Driven Services (2006) (4)
- A Metaobject Protocol for Correlate (1998) (4)
- Improving software reliability in data-centered software systems by enforcing composition time constraints (2004) (4)
- Authenticated and auditable data sharing via smart contract (2020) (4)
- A Security Architecture for Web 2.0 Applications (2009) (4)
- Morphy: Software Defined Charge Storage for the IoT (2021) (4)
- Traceability Between Run-Time and Development Time Abstractions - A Case Study on AOSD and Debugging (2012) (4)
- Middleware for Dynamic Upgrade Activation and Compensations in Multi-tenant SaaS (2017) (4)
- On the effectiveness of virtualization-based security (2012) (4)
- Automated workflow regression testing for multi-tenant SaaS: integrated support in self-service configuration dashboard (2016) (4)
- System requirements on digital newspapers (2007) (4)
- Building a Meta-level architecture for distributed applications (1998) (4)
- Security Middleware for Mobile Applications (2009) (4)
- Evolving Multi-tenant SaaS Applications through Self-Adaptive Upgrade Enactment and Tenant Mediation (2016) (4)
- Using roles and aspects for designing and implementing dynamic adaptations (2005) (4)
- Flexible load balancing software for parallel applications in a time-sharing environment (1995) (4)
- Transparent object migration in adaptive parallel applications (1992) (4)
- Mobile active objects in correlate (1995) (4)
- Ensuring application integrity in shared sensing environments (2014) (4)
- Optimizing resource and data security in shared sensor networks (2016) (4)
- Transforming Security Audit Requirements into a Software Architecture (2008) (4)
- Open Implementation of a Mobile Communication System (1998) (4)
- Network Policies in Kubernetes: Performance Evaluation and Security Analysis (2021) (4)
- Composing application models and security models: On the value of aspect-oriented technologies (2007) (4)
- Design Issues in Load Balancing Techniques (1988) (4)
- MicroVault: Reliable Storage Unit for IoT Devices (2020) (4)
- Trusted Operations on Sensor Data † (2018) (4)
- Towards building secure web mashups (2010) (4)
- SASHA: A Distributed Protocol for Secure Application Deployment in Shared Ad-Hoc Wireless Sensor Networks (2011) (4)
- Aspect-based variability model for cross-organizational features in service networks (2010) (4)
- On the Security of Biometrics and Fuzzy Commitment Cryptosystems: A Study on Gait Authentication (2021) (4)
- Scalable Authorization Middleware for Service Oriented Architectures (2011) (4)
- Empirical research on security and privacy by design - What (not) to expect as a researcher or a reviewer (2017) (3)
- E-finance case study: analysis and requirements (2006) (3)
- Purchased Fame: Exploring the Ecosystem of Private Blog Networks (2019) (3)
- On the Need for Federated Authorization in Cross-organizational e-Health Platforms (2015) (3)
- Experiences with an Object-Oriented Parallel Language: The CORRELATE Project (1997) (3)
- On-demand attribute-based service discovery for mobile WSANs (2011) (3)
- MASY: Management of secret keys in federated wireless sensor networks (2010) (3)
- Service line engineering in practice: Developing an integrated document processing SaaS application (2014) (3)
- Trusted Operations On Mobile Phones (2017) (3)
- Tools for deadlock detection on a hypercube (1989) (3)
- A modular type system for first-class composition inheritance (2009) (3)
- Parallel computing : from theory to sound practice : proceedings of EWPC '92, the European Workshops on Parallel Computing, 23-24 March 1992, Barcelona, Spain (1992) (3)
- Preserving Aspects via Automation: A Maintainability Study (2011) (3)
- Towards an Automated Pattern Selection Procedure in Software Models (2013) (3)
- Feature-Based Variability Management for Scalable Enterprise Applications: Experiences with an E-Payment Case (2016) (3)
- Scalable and Secure Concurrent Evaluation of History-based Access Control Policies (2015) (3)
- Security and resilience of cyber-physical infrastructures:Proceedings of the First International Workshop held on 06 April 2016 in conjunction with the International Symposium on Engineering Secure Software and Systems, London, UK (2016) (3)
- Active objects, message passing and concurrency control in XENOOPS (1993) (3)
- Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor (2022) (3)
- QoC$$^{2}$$2Breaker: intelligent software circuit breakers for fault-tolerant distributed context-aware applications (2017) (3)
- Improving the security of session management in web applications (2013) (3)
- Assessment of Palm OS Susceptibility to Malicious Code Threats (2005) (3)
- Hierarchical Organizations and a Supporting Software Architecture for Floating Car Data (2008) (3)
- Affordable Overhead in CORRELATE: Comparing two MD Simulators (1996) (3)
- Formalizing CORRELATE: from practice to pi (1997) (3)
- Evaluating Communication Overhead in Helios (1990) (3)
- Leveraging Kubernetes for adaptive and cost-efficient resource management (2019) (3)
- End-to-end middleware for distributed sensor applications (2007) (3)
- Dependency analysis of the GatorMail webmail application (2005) (3)
- Enhanced fraud detection as a service supporting merchant-specific runtime customization (2017) (3)
- Tracking and tracing containers through distributed sensor middleware (2008) (3)
- Demo: Enabling Plug-and-Play for the Internet of Things (2015) (3)
- Edge-Based and Privacy-Preserving Multi-Modal Monitoring of Student Engagement in Online Learning Environments (2019) (3)
- Assessing the Effectiveness of Domain Blacklisting Against Malicious DNS Registrations (2019) (3)
- Change Impact Analysis for Context-Aware Applications in Intelligent Environments (2015) (3)
- Leveraging NoSQL for Scalable and Dynamic Data Encryption in Multi-tenant SaaS (2017) (3)
- Extraction of an Architectural Model for Least Privilege Analysis (2012) (3)
- Poster: Knowledge-Enriched Security and Privacy Threat Modeling (2018) (3)
- Managing Feature Compatibility in Kubernetes: Vendor Comparison and Analysis (2020) (3)
- An Event-based Component Model for Wireless Sensor Networks: a Case Study for River Monitoring (2010) (3)
- An Environment for Object-Oriented Parallel Applications: The XENOOPS Approach (1991) (3)
- Aspectual dependencies: towards pure black-box aspect-oriented composition in component models (2007) (3)
- Authorizing and directing configuration updates in contemporary it infrastructures (2010) (3)
- Adaptive Dissemination for Mobile Electronic Health Record Applications with Proactive Situational Awareness (2016) (3)
- Towards PaaS Offering of BPMN 2.0 Engines: A Proposal for Service-Level Tenant Isolation (2017) (3)
- A Generic Solution for Agile Run-Time Inspection Middleware (2011) (3)
- Dynamic QoS support for IoT backhaul networks through SDN (2018) (3)
- WF-Interop: Adaptive and Reflective REST Interfaces for Interoperability between Workflow Engines (2015) (3)
- On the Applicability of Security and Privacy Threat Modeling for Blockchain Applications (2019) (3)
- Real-time Distributed In-Situ Benchmarking of Energy Harvesting IoT Devices (2018) (3)
- DRM interoperability and reusability through a generic software architecture (2006) (3)
- Deterministic 40 year battery lifetime through a hybrid perpetual sensing platform (HyPer) (2020) (3)
- Federated Privileged Identity Management for Break-the-Glass: A Case Study with OpenAM (2014) (3)
- Infracomposer: Policy-driven adaptive and reflective middleware for the cloudification of simulation & optimization workflows (2019) (3)
- Safe language support for feature composition through feature-based dispatch (2005) (3)
- Transforming XACML policies into database search queries (2017) (3)
- Premadoma: An Operational Solution to Prevent Malicious Domain Name Registrations in the .eu TLD (2021) (3)
- Aspectual vs. component-based decomposition: a quantitative study (2007) (3)
- Discovery of stable domain abstractions for reusable pointcut interfaces: common case study for AO modeling (2009) (3)
- Similarities and differences between CLASP, SDL, and Touchpoints: the activity-matrix (2007) (3)
- Niflheim: End-to-End Middleware for Applications Across all Tiers of the IoT (2017) (3)
- CORRELATE: High-level support for traveling agents (1996) (3)
- Dynamic Scheduling of Object Invocations in Distributed Object Oriented Real-Time Systems (1998) (3)
- Knowledge is Power: Systematic Reuse of Privacy Knowledge for Threat Elicitation (2019) (2)
- Multi-view refinement of AO-connectors in distributed software systems (2012) (2)
- Integrating flexible middleware solutions with applications through non-functional policies (1999) (2)
- An object-oriented framework for aspect-oriented languages (2012) (2)
- Land of the lost: privacy patterns' forgotten properties: enhancing selection-support for privacy patterns (2021) (2)
- Security patterns 2.0: towards security patterns based on security building blocks (2018) (2)
- Interactions in aspect-oriented middleware (2007) (2)
- Seamless Synchronization for Collaborative Web Services (2021) (2)
- Towards a systematic literature review on secure software design (2013) (2)
- A System of Patterns for Reusable Aspect Libraries (2011) (2)
- Supporting IoT Application Middleware on Edge and Cloud Infrastructures (2018) (2)
- An Object-Oriented Communication Subsystem for Adaptive Parallel Applications (1991) (2)
- Security services in mainstream enterprise-oriented middleware Platforms (2005) (2)
- Obtaining Flexible System Software Architectures Using Reflection Points (1998) (2)
- PIVOT: Private and Effective Contact Tracing (2022) (2)
- Policy evaluation contracts (2009) (2)
- StIgMa: Status information management for evolvable wireless sensor networks (2012) (2)
- Debugging Scandal: The Next Generation (2011) (2)
- K8-Scalar: a workbench to compare autoscalers for container-orchestrated services (Artifact) (2018) (2)
- Adversarial Robustness is Not Enough: Practical Limitations for Securing Facial Authentication (2022) (2)
- A proposal for decentralized, scalable and automatic IP network configuration: SCNP (2005) (2)
- Empirical Assessment of Security Requirements and Architecture: Lessons Learned (2014) (2)
- The architectural divergence problem in security and privacy of eHealth IoT product lines (2021) (2)
- Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications (2011) (2)
- Design and Implementation of an Experimental Load Balancing Environment (1991) (2)
- Data Privatizer for Biometric Applications and Online Identity Management (2019) (2)
- A Workload-Driven Document Database Schema Recommender (DBSR) (2020) (2)
- Applying a metadata level for concurrency in wireless sensor networks (2012) (2)
- Language and middleware support for dynamism in wireless sensor and actuator network applications (2011) (2)
- Show me the money The importance of network effects for mobile application business models (2012) (2)
- Khronos: Middleware for Simplified Time Management in CPS (2019) (2)
- Polyglot CerberOS: Resource Security, Interoperability and Multi-Tenancy for IoT Services on a Multilingual Platform (2018) (2)
- Expressive Data Storage Policies for Multi-cloud Storage Configurations (2015) (2)
- Using change patterns to incorporate evolving trust relationships into a software architecture (2010) (2)
- An experimental design for evaluating the maintainability of aspect-oriented models enhanced with domain-specific constructs (2010) (2)
- Problem-Solution Feature Interactions as Configuration Knowledge in Distributed Runtime Adaptations (2009) (2)
- A component platform for flexible protocol stacks (2005) (2)
- Thread-Level CPU and Memory Usage Control of Custom Code in Multi-tenant SaaS (2019) (2)
- Resource Management Middleware to Support Self Managing Wireless Sensor Networks (2010) (2)
- Middleware for Adaptive Group Communication in Wireless Sensor Networks (2010) (2)
- Using AOP to build complex data centric component frameworks (2000) (2)
- Connecting Embedded Devices Using a Component Platform for Adaptable Protocol Stacks (2005) (2)
- Multi-stage Aspect-Oriented Composition of Component-Based Applications (2007) (2)
- Composition of least privilege analysis results in software architectures (position paper) (2011) (2)
- Component-based Orchestration of Dynamic IaaS Applications (2016) (2)
- SEQUOIA: Scalable Policy-Based Access Control for Search Operations in Data-Driven Applications (2017) (2)
- Coping with variability in product-line architectures using component technology (2003) (2)
- The design of a low-power, high-resolution controller board for μPnP (2015) (2)
- Transparent observation of Xenoops objects (1992) (2)
- The Bigger Picture: Approaches to Inter-organizational Data Protection Impact Assessment (2020) (2)
- Automated Threat Analysis and Management in a Continuous Integration Pipeline (2021) (2)
- A Lingua Franca for Security by Design (2018) (2)
- Expressing and Configuring Quality of Data in Multi-purpose Wireless Sensor Networks (2010) (2)
- An Overview of Runtime Data Protection Enforcement Approaches (2021) (1)
- A refined architecture for DRM (2006) (1)
- Least privilege analysis in software architectures (2011) (1)
- GReCCo: Composing generic reusable concerns (2008) (1)
- Introducing concurrency in policy-based access control (2013) (1)
- Users as reconfigurable elements in distributed sensing applications (2012) (1)
- A framework for black-box SLO tuning of multi-tenant applications in Kubernetes (2019) (1)
- SecSharp: Towards Efficient Trusted Execution in Managed Languages (Work in Progress) (2022) (1)
- A security analysis of emerging web standards - Extended version (2012) (1)
- Participation in Context: An Exploratory Study of Querying in Participatory Applications (2014) (1)
- DPMF: A Modeling Framework for Data Protection by Design (2020) (1)
- Proceedings of the Fifth AOSD Workshop on Aspects , Components , and Patterns for Infrastructure Software March (2006) (1)
- Information Security and Privacy - Challenges and Outlook (2021) (1)
- The Never-Ending Story: On the Need for Continuous Privacy Impact Assessment (2020) (1)
- Improving Reuse of Attribute-Based Access Control Policies Using Policy Templates (2015) (1)
- On the privacy of file sharing services (2010) (1)
- Scalar: A Distributed Scalability Analysis Framework (2014) (1)
- A Software Architecture for Load Balancing (1989) (1)
- OAuch: Exploring Security Compliance in the OAuth 2.0 Ecosystem (2022) (1)
- Bridging the gap between web application firewalls and web applications: extended abstract (2006) (1)
- AuthGuide: Analyzing Security, Privacy and Usability Trade-Offs in Multi-factor Authentication (2021) (1)
- Idea: Visual Analytics for Web Security (2018) (1)
- Hitch Hiker 2.0: a binding model with priority-based data aggregation for the Internet-of-Things (2016) (1)
- SoBeNet: financial case study - Part 1: requirements and analysis (2005) (1)
- Ermis: a middleware for bridging data collection and data processing in IoT streaming applications (2021) (1)
- A Siamese Adversarial Anonymizer for Data Minimization in Biometric Applications (2020) (1)
- Networking and Reflection: A Strong Combination (1999) (1)
- Building Multi-Agent Systems with CORRELATE (1997) (1)
- Safe Reparametrization of Component-Based WSNs (2013) (1)
- Generic reusable concern compositions (GReCCo): Description and case study (2008) (1)
- Building smart environments with LooCI (2012) (1)
- Towards scalable and dynamic data encryption for multi-tenant SaaS (2017) (1)
- Privacy-Preserving Polyglot Sharing and Analysis of Confidential Cyber Threat Intelligence (2022) (1)
- Observation of a global object space on a distributed memory machine (1994) (1)
- Reading Between the Lines: An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems (2021) (1)
- Feasibility of container orchestration for adaptive performance isolation in multi-tenant SaaS applications (2020) (1)
- Dynamic load balancing in large scale parallel applications: the XENOOPS approach (1992) (1)
- Dawn: Dependable Networking Framework for Multimedia-enabled Internet-of-Things (2015) (1)
- Design notations for secure software: a systematic literature review (2015) (1)
- EH-CRAM: A Sustainable Energy Harvesting Algorithm for LPWANs (2021) (1)
- Transparent IO access control for application-level tenant isolation (2018) (1)
- SCFMSP: static detection of side channels in MSP430 programs (2020) (1)
- Risk-Driven Architectural Decomposition (2009) (1)
- Mitigation lost in translation: leveraging threat information to improve privacy solution selection (2022) (1)
- DataBlinder: A distributed data protection middleware supporting search and computation on encrypted data (2019) (1)
- Results of threat analysis for a publishing system (2007) (1)
- Knowledge-enriched security and privacy threat modeling (2018) (1)
- Enabling resource sharing in heterogeneous wireless sensor networks (2014) (1)
- Zero-Wire (2021) (1)
- Policy driven infrastructure management (2006) (1)
- Chimera: A Low-power Reconfigurable Platform for Internet of Things (2021) (1)
- Loosely coupled transformation chains (2010) (1)
- Towards Parallel Compile Time Debugging of Parallel Applications (1990) (1)
- Modularity and Variability of Distributed Software Architectures through Multi-view Refinement of AO-Connectors (2013) (1)
- Threat modeling at run time: the case for reflective and adaptive threat management (NIER track) (2021) (1)
- DiFiSec: An Adaptable Multi-level Security Framework for Event-Driven Communication in Wireless Sensor Networks (2012) (1)
- Secure replication for client-centric data stores (2022) (1)
- Adaptable resource management for WSNs (2009) (1)
- On the benefits of using aspect technology in component-oriented architectures (2006) (1)
- Base Architectures for NLP (1998) (1)
- The Object-Oriented Development of a Parallel Application in Polymer Dynamics (1994) (1)
- The relationship between the cost of cybercrime and web security posture: a case study on Belgian companies (2017) (1)
- Towards Visual Analytics for Web Security Data (2018) (1)
- Gait template protection using HMM-UBM (2018) (1)
- ACS: Specifying "Smart" Applications Using Sense-Process-Consume Flows (2013) (1)
- Hierarchical Organizations for Decentralized Traffic Monitoring (2008) (1)
- Evolving Wireless Sensor Network Behavior Through Adaptability Points in Middleware (2011) (1)
- A Reimagined Catalogue of Software Security Patterns (2022) (1)
- Proceedings of the 2008 Workshop on Next Generation Aspect Oriented Middleware, NAOMI@AOSD 2008, Brussels, Belgium, April 1, 2008 (2008) (1)
- Aspect-Oriented Middleware and a Case Study on Security Services (2006) (1)
- Enabling Massive Scale Sensing with the @LooCI Mobile Sensing Framework (2012) (1)
- A Modular Meta-model for Security Solutions (2017) (1)
- On the use of load balancing mechanisms for fault tolerance support (1990) (1)
- Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018 (2022) (1)
- Intelligent Malware Defenses (2022) (1)
- Formal technologies for information and software security: An annotated bibliography (2005) (1)
- A Sequence of Patterns for Reusable Aspect Libraries with Easy Configuration (2011) (1)
- Relationship-Based Threat Modeling (2022) (1)
- Load Sharing: Current Research in Distributed Systems (1988) (1)
- Operationalization of Privacy and Security Requirements for eHealth IoT Applications in the Context of GDPR and CSL (2020) (1)
- AI for Biometric Authentication Systems (2022) (1)
- On the use of DGAs in malware: an everlasting competition of detection and evasion (2019) (1)
- Developing secure applications with metrics in mind (2007) (1)
- Federated Authorization for SaaS applications (2012) (1)
- Domain-driven discovery of stable abstractions for reusable pointcut interfaces (2009) (1)
- A dynamic decision fusion middleware for trustworthy context-aware IoT applications (2017) (1)
- A sensor middleware and agent-based communication platform for supply-chain management (2009) (1)
- Towards a reference framework for legal compliance: a detailed overview (2010) (1)
- Simplifying CPS Application Development through Fine-grained, Automatic Timeout Predictions (2020) (1)
- Infrastructural support for data dependencies in data-centered software systems (2004) (1)
- Khronos (2019) (1)
- Policy-based management of middleware for distributed sensor applications (2008) (1)
- Optimized Resource Access Control in Shared Sensor Networks (2010) (1)
- A metadata-driven approach that combines family polymorphism , delegation and flexible composition semantics (2003) (0)
- Improving Least Privilege in Software Architecture by Guided Automated Compartmentalization (2008) (0)
- Tomography: lowering management overhead for distributed component-based applications (2015) (0)
- BoboLink: Low Latency and Low Power Communication for Intelligent Environments (2022) (0)
- BeauForT: Robust Byzantine Fault Tolerance for Client-Centric Mobile Web Applications (2023) (0)
- On the feasability of feature based composition for programming in the large (2005) (0)
- Using Multi-Level Security Annotations to Improve Software Assurance (2008) (0)
- Machine Learning Meets Data Modification - The Potential of Pre-processing for Privacy Enchancement (2022) (0)
- Gait Authentication based on Spiking Neural Networks (2021) (0)
- MiTS: Middleware for travelling sensor nodes (2006) (0)
- Adversarial Machine Learning (2022) (0)
- DataBlinder (2019) (0)
- Run-time Support for Components (1999) (0)
- Towards a Platform for Empirical Software Design Studies (2017) (0)
- Captcha me if you can: Imitation Games with Reinforcement Learning (2022) (0)
- 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2012, Chapel Hill, NC, USA, July 16-18, 2012 (2012) (0)
- On the Aspect Composition Issue (2001) (0)
- A Survey on Applying Machine Learning Techniques for Behavioral Awareness (2017) (0)
- Session details: Debugging (2012) (0)
- Distributed and real-time programming using a concurrent object-orient ed language: a status report (1995) (0)
- Secure composition policies (2011) (0)
- Maintainability studies investigating aspect preservation via automation: lessons learned (2011) (0)
- Applying machinemodel-aided countermeasure design to improve memory allocator security (2005) (0)
- Generic reusable concern compositions (GReCCo) (2008) (0)
- A shared multi-stakeholder platform for IoT: poster (2017) (0)
- SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model (2022) (0)
- Dynamic Load Balancing in Adaptive Parallel Applications (1993) (0)
- System support for dynamic computer networks (2003) (0)
- What electronic health records don’t know just yet. A privacy analysis for patient communities and health records interaction (2012) (0)
- A generic payment system architecture (2001) (0)
- The Efficient Management Of Task Clusters In A Dynamic Load Balancer (1994) (0)
- Automated detection and resolution of least privilege violations in software architectures (2010) (0)
- Formal Techniques for Information and Software Security : An Annotated Bibliography (2005) (0)
- Supporting quality of service in a multi-tiered wireless sensor network architecture (2010) (0)
- of the 2 nd BCS-FACS Northern Formal Methods Workshop , Ilkley , 14-15 July 1997 Formalizing Correlate-from Practice to Pi (1997) (0)
- Real-time scheduling in correlate (1997) (0)
- Applying machinemodel-aided countermeasure design to improve security (2006) (0)
- A graph based approach to supporting software reconfiguration in distributed sensor network applications (2010) (0)
- A reconfigurable component model with semantic type system for dynamic WSN applications (2012) (0)
- Proceedings of the 11th Middleware Doctoral Symposium (2014) (0)
- A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks (2022) (0)
- Position Paper: On Advancing Adversarial Malware Generation Using Dynamic Features (2022) (0)
- Building secure software applications (2004) (0)
- Refraction: low-cost management of reflective meta-data in pervasive component-based applications (2015) (0)
- Secure software: a specific option in computer science (2008) (0)
- ThunQ: A Distributed and Deep Authorization Middleware for Early and Lazy Policy Enforcement in Microservice Applications (2021) (0)
- On the criteria of aspectual component models (2006) (0)
- Memory Error Exploits in C: Vulnerabilities and Countermeasures (2009) (0)
- Detailed author index (2022) (0)
- Composing Non-orthogonal Meta-programs Composing Non-orthogonal Meta-programs (2010) (0)
- Navigating Law and Software Engineering Towards Privacy by Design (2018) (0)
- Design of a Robust MAC Protocol for LoRa (2022) (0)
- On flexible support for mobile objects (1996) (0)
- A Voucher-Based Security Middleware for Secure Business Process Outsourcing (2017) (0)
- Running Helios on the Meiko (1990) (0)
- Fingerprinting through Deep Learning (2018) (0)
- Expect the unexpected: Towards a middleware for policy adaptation in IoT platforms (2018) (0)
- Tracking the Evolution of Cookie-based Tracking on Facebook (2022) (0)
- A descriptive study of Microsoft’s threat modeling technique (2013) (0)
- An environment for load balancing experiments (1992) (0)
- Continuous and Client-centric Trust Monitoring in Multi-cloud Storage (2019) (0)
- SCNP: A protocol for automatic, decentralized and scalable IP network configuration (2005) (0)
- A Credential-Based System for the Anonymous Delegation of Rights (2007) (0)
- PARTICIPATION IN CONTEXT: AN EXPLORATORY STUDY OF QUERYING IN PARTICATORY APPLICATIONS CAREN CROWLEY, WILFRIED DANIELS, RAFAEL BACHILLER, WOUTER JOOSEN AND DANIEL HUGHES (2014) (0)
- A general purpose distributed operating system for a hypercube (1988) (0)
- Object migration with time-limited residual dependency (1992) (0)
- ������ � �� � � � ��� � Contents Discussion summary........................................................1 Toward a Reusable and Generic Security Aspect Library....................5 (2005) (0)
- Cost-Effective Feature Placement of Customizable Multi-Tenant Applications in the Cloud (2013) (0)
- A Package for Dynamic Load Balancing: Design Issues (1990) (0)
- SoK (2022) (0)
- On the realization of an object support system on micro-kernels (1994) (0)
- User oriented debugging in object oriented parallel applications (1993) (0)
- Cloud and edge based data analytics for privacy-preserving multi-modal engagement monitoring in the classroom (2020) (0)
- AOSD & Security: an empirical assessment (2003) (0)
- PaaSHopper: Policy-driven middleware for multi-PaaS environments (2015) (0)
- Real-Time Scheduling in CORRELATE 1 Real-Time Scheduling in CORRELATE (2007) (0)
- Object parallelism for parallel programming (1993) (0)
- Management of Events in a multi-agent system (1997) (0)
- SCEW: Programmable BFT-Consensus with Smart Contracts for Client-Centric P2P Web Applications (2021) (0)
- Flexible Migration in Blue-Green Deployments within a Fixed Cost (2020) (0)
- SCF MSP (2020) (0)
- A domain specific aspect language for run-time inspection (2012) (0)
- Support for event handling in a mobile agents environment (1997) (0)
- Information in Shadows (2019) (0)
- dEVOLVe:: Middleware support for software maintenance in distributed EVOLVing environments (2008) (0)
- Middleware for heterogeneous and federated data management (2014) (0)
- PERSIST: Policy-Based Data Management Middleware for Multi-Tenant SaaS Leveraging Federated Cloud Storage (2018) (0)
- Running head : DESIGN CHURN AS PREDICTOR OF VULNERABILITIES ? Title : Design Churn as Predictor of Vulnerabilities ? (2014) (0)
- Implementing Run-time Support for Components 1 using Object-Oriented Programmin (2007) (0)
- Open-World Network Intrusion Detection (2022) (0)
- European Web Security Roadmap (2015) (0)
- Smarmy -- A language to verify the security of software architectures (2012) (0)
- A model-based transformation approach for embedded systems development (2007) (0)
- Standardizing Component Interaction Patterns in Product-Lines Architectures (1999) (0)
- Detailed author index (2009) (0)
- Static: Low Frequency Energy Harvesting and Power Transfer for the Internet of Things (2022) (0)
- Chimera (2021) (0)
- Automated allocation and configuration of dual stack IP networks (2013) (0)
- SPECIAL ISSUE PAPER Applying a metadata level for concurrency in wireless sensor networks (2012) (0)
- Sensor Network Middleware DAVIM : Adaptable Middleware for Sensor Networks (2008) (0)
- Object-NoSQL Database Mappers: a benchmark study on the performance overhead (2017) (0)
- Software architectures: State-of-the-art and challenges (2007) (0)
- Comparing Aspect-Oriented and Component-Based design : A Quantitative Study (2007) (0)
- Self-Configuration middleware for sensor localization in a realistic business context (2007) (0)
- Towards a Software Architecture for Sensor Middleware (2006) (0)
- Applying Machine Learning to use security oracles: a case study in virus and malware detection (2022) (0)
- SCOPE: self-adaptive and policy-based data management middleware for federated clouds (2019) (0)
- &xvwrpl]dwlrqqrii&rpsrqhqwedvhgg2emhfww5htxhvww%urnhuvv7kurxjk '\qdplff5hfrqiljxudwlrq 7khh0dhuvnn0f.lqqh\\0roohuu,qvwlwxwhhiruu3urgxfwlrqq7hfkqrorj\ 8qlyhuvlw\\rii6rxwkhuqq'hqpdun2ghqvhh&dpsxv '.2ghqvhh0'hqpdun Eqm#plsvgxgn (2002) (0)
- Constructing a debugger for scientific applications from reusable components (1994) (0)
- Composition-Safe re-parametrization in Distributed Component-based WSN Applications (2013) (0)
- A testbed for Load Balancing Experiments (1989) (0)
- Vendor-Agnostic Reconfiguration of Kubernetes Clusters in Cloud Federations (2023) (0)
- Proceedings of the Doctoral Symposium of the 16th International Middleware Conference (2015) (0)
- A Note on Understanding and Verifying Component-Based Systems (2001) (0)
- MonitDB: a Customizable API for Monitoring Heterogeneous Databases (2021) (0)
- Proceedings of the International Workshop on Middleware for Sensor Networks : November 28, 2006, Melbourne, Australia : co-located with Middleware 2006 (2006) (0)
- Object-orientation as an appropriate paradigm for high-performance environments for scientific computing (1992) (0)
- ASM-based run-time verification of application protocols (2005) (0)
- Run-time Adjustment Feedback Services BPEL Process Running Instances Execution platform : shared bpel engine Controller : Customization Logic View : Master Process BPEL Process Running Instances Tenant (2012) (0)
- Advanced monitoring and smart auto-scaling of NoSQL systems (2015) (0)
- Smart-Hop: Low-Latency Multi-hop Networking for LoRa (2022) (0)
- Event System Providing a Service for Filtering and Correlating Events (1999) (0)
- SCEW (0)
- A Quantitative Assessment of the Detection Performance of Web Vulnerability Scanners (2022) (0)
- An object model with feature-based dispatch for context-sensitive behavior in distributed systems (2008) (0)
- Poster Abstract: Adapting Pretrained Features for Efficient Unsupervised Acoustic Anomaly Detection (2022) (0)
- Semantic analysis and verification of context-driven adaptive applications in intelligent environments (2016) (0)
- Premadoma (2019) (0)
- Load balanced parallel program verification on a shared memory machine (1993) (0)
- Selection of run-time services in .NET: there is room for improvement (2003) (0)
- 4 Injecting Wrappers at Run Time (2007) (0)
- Using model checkers to elicit security metrics (2008) (0)
- Specifying reusable concerns using DSMLs and connector interfaces (2008) (0)
- Adaptive Malware Control: Decision-Based Attacks in the Problem Space of Dynamic Analysis (2022) (0)
- Formalizing correlate through the Pi-calculus (1997) (0)
- Unsupervised Acoustic Anomaly Detection Systems Based on Gaussian Mixture Density Neural Network (2022) (0)
- Middleware for efficient and confidentiality-aware federation of access control policies (2014) (0)
- LINDDUN : running example-social network 2 . 0-Based on (2015) (0)
- Consistency management in the presence of dynamically scoped adaptations (2009) (0)
- Set Communication in Distributed Systems (1988) (0)
- ReFrAEN: a Reconfigurable Vibration Analysis Framework for Constrained Sensor Nodes (2021) (0)
- A comprehensive analysis of an intelligent platform for supply chain management (2008) (0)
- Discriminative training of spiking neural networks organised in columns for stream-based biometric authentication (2022) (0)
- Modular type checking of anchored exception declarations (2014) (0)
- Hitch Hiker 2.0: a binding model with flexible data aggregation for the Internet-of-Things (2016) (0)
- Inspection of distributed and composed systems (2011) (0)
- An approach to dynamic load balancing in inviscid flow calculations (1990) (0)
- Eradicating Bearer Tokens for Session Management (2014) (0)
- Can You Tell Me the Time? Security Implications of the Server-Timing Header (2023) (0)
- Morphy (2021) (0)
- Demo Proposal - dEVOLVe: Middleware Support for Application Deployment and Maintenance in Distributed EVOLVing Environments (2008) (0)
- DeFIRED (2022) (0)
- A YCSB Workload for Benchmarking Hotspot Object Behaviour in NoSQL Databases (2021) (0)
- SEQUOIA: A Middleware Supporting Policy-Based Access Control for Search and Aggregation in Data-Driven Applications (2018) (0)
- Comparing PaaS offerings in light of SaaS development (2013) (0)
- Towards flexible I/O support in parallel and distributed systems (1996) (0)
- Modular anchored exception declarations (2009) (0)
- Putting Sense inside Sensor Systems: A Coordinated Approach to Messaging (2015) (0)
- Journal First Presentation of a Comparative Study of Workflow Customization Strategies: Quality Implications for Multi-Tenant SaaS (2019) (0)
- Teaching Software Security: Courseware and Projects on .NET and Rotor (2003) (0)
- Kairos: a self-configuring approach for short and accurate event timeouts in IoT (2020) (0)
- A distributed middleware for container transport: lessons learned (2008) (0)
- Building blocks for secure multiparty federated wireless sensor networks (2011) (0)
- QoC2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$^{2}$$\end{document}Breaker: intelligent software circuit breakers (2017) (0)
- Towards application driven security dashboards in future middleware (2011) (0)
- Syddansk Universitet Dynamic Scheduling of Object Invocations in Distributed Object Oriented Real-Time Systems (2018) (0)
- Shared memory protection in a multi-tenant JVM (2021) (0)
- The power of MOPs for developing distributed applications (1996) (0)
- DeFIRED: decentralized authorization with receiver-revocable and refutable delegations (2022) (0)
- A Systematic Survey of Architectural Approaches and Trade-Offs in Data De-identification (2022) (0)
- Change patterns (2012) (0)
- Towards Improving the Deprecation Process of Web Features through Progressive Web Security (2022) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Wouter Joosen?
Wouter Joosen is affiliated with the following schools: