Follow
Wouter Joosen
Wouter Joosen
imec-DistriNet, KU Leuven
No verified email - Homepage
Title
Cited by
Cited by
Year
Cookieless monster: Exploring the ecosystem of web-based device fingerprinting
N Nikiforakis, A Kapravelos, W Joosen, C Kruegel, F Piessens, G Vigna
2013 IEEE Symposium on Security and Privacy, 541-555, 2013
6392013
Tranco: A research-oriented top sites ranking hardened against manipulation
VL Pochat, T Van Goethem, S Tajalizadehkhoob, M Korczyński, W Joosen
arXiv preprint arXiv:1806.01156, 2018
6282018
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
M Deng, K Wuyts, R Scandariato, B Preneel, W Joosen
Requirements Engineering 16 (1), 3-32, 2011
6172011
Predicting vulnerable software components via text mining
R Scandariato, J Walden, A Hovsepyan, W Joosen
IEEE Transactions on Software Engineering 40 (10), 993-1006, 2014
3972014
You are what you include: large-scale evaluation of remote javascript inclusions
N Nikiforakis, L Invernizzi, A Kapravelos, S Van Acker, W Joosen, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
3862012
Automated website fingerprinting through deep learning
V Rimmer, D Preuveneers, M Juarez, T Van Goethem, W Joosen
arXiv preprint arXiv:1708.06376, 2017
3662017
Chained anomaly detection models for federated learning: An intrusion detection case study
D Preuveneers, V Rimmer, I Tsingenopoulos, J Spooren, W Joosen, ...
Applied Sciences 8 (12), 2663, 2018
2722018
Extending sensor networks into the cloud using amazon web services
K Lee, D Murray, D Hughes, W Joosen
2010 IEEE international conference on networked embedded systems for …, 2010
2312010
Privaricator: Deceiving fingerprinters with little white lies
N Nikiforakis, W Joosen, B Livshits
Proceedings of the 24th International Conference on World Wide Web, 820-830, 2015
2132015
A descriptive study of Microsoft’s threat modeling technique
R Scandariato, K Wuyts, W Joosen
Requirements Engineering 20, 163-180, 2015
1882015
Portable support for transparent thread migration in Java
E Truyen, B Robben, B Vanhaute, T Coninx, W Joosen, P Verbaeten
International Symposium on Agent Systems and Applications, 29-43, 2000
1872000
Seven months' worth of mistakes: A longitudinal study of typosquatting abuse
P Agten, W Joosen, F Piessens, N Nikiforakis
Proceedings of the 22nd Network and Distributed System Security Symposium …, 2015
1792015
On the secure software development process: CLASP, SDL and Touchpoints compared
B De Win, R Scandariato, K Buyens, J Grégoire, W Joosen
Information and software technology 51 (7), 1152-1171, 2009
1752009
RIPE: Runtime intrusion prevention evaluator
J Wilander, N Nikiforakis, Y Younan, M Kamkar, W Joosen
Proceedings of the 27th Annual Computer Security Applications Conference, 41-50, 2011
1652011
Dynamic and selective combination of extensions in component-based applications
E Truyen, B Vanhaute, W Joosen, P Verbaeten, BN Jorgensen
Proceedings of the 23rd International Conference on Software Engineering …, 2001
1492001
Software vulnerability prediction using text analysis techniques
A Hovsepyan, R Scandariato, W Joosen, J Walden
Proceedings of the 4th international workshop on Security measurements and …, 2012
1342012
SessionShield: Lightweight protection against session hijacking
N Nikiforakis, W Meert, Y Younan, M Johns, W Joosen
Engineering Secure Software and Systems: Third International Symposium …, 2011
1292011
PAriCheck: an efficient pointer arithmetic checker for C programs
Y Younan, P Philippaerts, L Cavallaro, R Sekar, F Piessens, W Joosen
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
1292010
LooCI: a loosely-coupled component infrastructure for networked embedded systems
D Hughes, K Thoelen, W Horré, N Matthys, JD Cid, S Michiels, C Huygens, ...
Proceedings of the 7th International Conference on Advances in Mobile …, 2009
1222009
Selective jamming of LoRaWAN using commodity hardware
E Aras, N Small, GS Ramachandran, S Delbruel, W Joosen, D Hughes
Proceedings of the 14th EAI International Conference on Mobile and …, 2017
1202017
The system can't perform the operation now. Try again later.
Articles 1–20