His Condensed matter physics research overlaps with other disciplines such as Exciton and Atomic physics. While working in this field, Wouter Joosen studies both Atomic physics and Condensed matter physics. His Energy conversion efficiency research extends to the thematically linked field of Optoelectronics. Energy conversion efficiency is frequently linked to Optoelectronics in his study. His Femtosecond study often links to related topics such as Femtosecond pulse. Much of his study explores Femtosecond pulse relationship to Femtosecond. In his papers, he integrates diverse fields, such as Laser and Dye laser. His study on Dye laser is mostly dedicated to connecting different topics, such as Optics. Wouter Joosen combines Optics and Photonic-crystal fiber in his studies.
Optics is closely attributed to Femtosecond pulse shaping in his research. He merges Femtosecond pulse shaping with Laser in his study. His Laser study frequently draws connections between adjacent fields such as Pulse duration. His Optics research extends to Pulse duration, which is thematically connected. In his works, Wouter Joosen performs multidisciplinary study on Operating system and Process (computing). Wouter Joosen performs integrative study on Process (computing) and Operating system. Wouter Joosen integrates Atomic physics with Molecular physics in his study. Wouter Joosen integrates many fields, such as Molecular physics and Ion, in his works. Wouter Joosen undertakes interdisciplinary study in the fields of Ion and Excited state through his research.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting
N. Nikiforakis;A. Kapravelos;W. Joosen;C. Kruegel.
ieee symposium on security and privacy (2013)
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
Mina Deng;Kim Wuyts;Riccardo Scandariato;Bart Preneel.
Requirements Engineering (2011)
Nick Nikiforakis;Luca Invernizzi;Alexandros Kapravelos;Steven Van Acker.
computer and communications security (2012)
Predicting Vulnerable Software Components via Text Mining
Riccardo Scandariato;James Walden;Aram Hovsepyan;Wouter Joosen.
IEEE Transactions on Software Engineering (2014)
Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation.
Victor Le Pochat;Tom Van Goethem;Samaneh Tajalizadehkhoob;Maciej Korczyński.
network and distributed system security symposium (2019)
Portable Support for Transparent Thread Migration in Java
Eddy Truyen;Bert Robben;Bart Vanhaute;Tim Coninx.
Lecture Notes in Computer Science (2000)
PriVaricator: Deceiving Fingerprinters with Little White Lies
Nick Nikiforakis;Wouter Joosen;Benjamin Livshits.
the web conference (2015)
On the secure software development process: CLASP, SDL and Touchpoints compared
Bart De Win;Riccardo Scandariato;Koen Buyens;Johan Grégoire.
Information & Software Technology (2009)
Automated Website Fingerprinting through Deep Learning.
Vera Rimmer;Davy Preuveneers;Marc Juarez;Tom Van Goethem.
network and distributed system security symposium (2018)
LooCI: a loosely-coupled component infrastructure for networked embedded systems
Danny Hughes;Klaas Thoelen;Wouter Horré;Nelson Matthys.
advances in mobile multimedia (2009)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: