His primary areas of study are Computer security, World Wide Web, Software engineering, Software and Operating system. His work carried out in the field of Computer security brings together such families of science as Security information and event management, Cloud computing and Mobile device. Wouter Joosen focuses mostly in the field of World Wide Web, narrowing it down to matters related to Plug-in and, in some cases, Identifier, Cascading Style Sheets, Open standard and Server-side scripting.
The concepts of his Software engineering study are interwoven with issues in Transformation, Set, Software development and Database. His Software research is multidisciplinary, incorporating elements of Data mining, Identification, Code, Embedded system and Source code. His Distributed computing research integrates issues from Middleware, Scalability and Overhead.
The scientist’s investigation covers issues in Distributed computing, Computer security, Software engineering, Software and Wireless sensor network. His Distributed computing study which covers Cloud computing that intersects with Software as a service. His Computer security research is multidisciplinary, incorporating perspectives in Web application, World Wide Web, Cloud computing security and Internet privacy.
His studies in Software engineering integrate themes in fields like Software development, Software construction, Systems engineering, Software architecture and Software security assurance. Software is frequently linked to Software deployment in his study. His Wireless sensor network research includes themes of Key distribution in wireless sensor networks, Mobile wireless sensor network and Embedded system.
His main research concerns Computer security, Distributed computing, Threat model, Risk analysis and Cloud computing. His Computer security study frequently draws connections between adjacent fields such as The Internet. His study in the fields of Middleware under the domain of Distributed computing overlaps with other disciplines such as Resource management.
His research investigates the link between Threat model and topics such as Identification that cross with problems in Context model. The Risk analysis study combines topics in areas such as Quality, General Data Protection Regulation, Privacy by Design and Key. His research in Cloud computing intersects with topics in NoSQL and Service.
Wouter Joosen spends much of his time researching Threat model, Computer security, Cloud computing, Risk analysis and Service. His Threat model research is multidisciplinary, relying on both Risk analysis, Data modeling, Identification, Data flow diagram and Software system. His research in Data flow diagram focuses on subjects like Traceability, which are connected to Software.
Wouter Joosen studies Authentication, a branch of Computer security. His Cloud computing research incorporates elements of Distributed computing, Orchestration, Database and NoSQL. His work is dedicated to discovering how Service, Stability are connected with Adversary and other disciplines.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting
N. Nikiforakis;A. Kapravelos;W. Joosen;C. Kruegel.
ieee symposium on security and privacy (2013)
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
Mina Deng;Kim Wuyts;Riccardo Scandariato;Bart Preneel.
Requirements Engineering (2011)
You are what you include: large-scale evaluation of remote javascript inclusions
Nick Nikiforakis;Luca Invernizzi;Alexandros Kapravelos;Steven Van Acker.
computer and communications security (2012)
Predicting Vulnerable Software Components via Text Mining
Riccardo Scandariato;James Walden;Aram Hovsepyan;Wouter Joosen.
IEEE Transactions on Software Engineering (2014)
Portable Support for Transparent Thread Migration in Java
Eddy Truyen;Bert Robben;Bart Vanhaute;Tim Coninx.
Lecture Notes in Computer Science (2000)
PriVaricator: Deceiving Fingerprinters with Little White Lies
Nick Nikiforakis;Wouter Joosen;Benjamin Livshits.
the web conference (2015)
On the secure software development process: CLASP, SDL and Touchpoints compared
Bart De Win;Riccardo Scandariato;Koen Buyens;Johan Grégoire.
Information & Software Technology (2009)
LooCI: a loosely-coupled component infrastructure for networked embedded systems
Danny Hughes;Klaas Thoelen;Wouter Horré;Nelson Matthys.
advances in mobile multimedia (2009)
Dynamic and selective combination of extensions in component-based applications
Eddy Truyen;Bart Vanhaute;Bo Nørregaard Jørgensen;Wouter Joosen.
international conference on software engineering (2001)
Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse
Pieter Agten;Wouter Joosen;Frank Piessens;Nick Nikiforakis.
network and distributed system security symposium (2015)
KU Leuven
KU Leuven
Radboud University Nijmegen
KU Leuven
Ghent University
Vrije Universiteit Amsterdam
University of Bristol
University of Trento
Ghent University
University of California, Santa Barbara
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: