D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 56 Citations 10,564 574 World Ranking 2086 National Ranking 22

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Programming language
  • The Internet

His primary areas of study are Computer security, World Wide Web, Software engineering, Software and Operating system. His work carried out in the field of Computer security brings together such families of science as Security information and event management, Cloud computing and Mobile device. Wouter Joosen focuses mostly in the field of World Wide Web, narrowing it down to matters related to Plug-in and, in some cases, Identifier, Cascading Style Sheets, Open standard and Server-side scripting.

The concepts of his Software engineering study are interwoven with issues in Transformation, Set, Software development and Database. His Software research is multidisciplinary, incorporating elements of Data mining, Identification, Code, Embedded system and Source code. His Distributed computing research integrates issues from Middleware, Scalability and Overhead.

His most cited work include:

  • Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting (284 citations)
  • A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements (255 citations)
  • You are what you include: large-scale evaluation of remote javascript inclusions (227 citations)

What are the main themes of his work throughout his whole career to date?

The scientist’s investigation covers issues in Distributed computing, Computer security, Software engineering, Software and Wireless sensor network. His Distributed computing study which covers Cloud computing that intersects with Software as a service. His Computer security research is multidisciplinary, incorporating perspectives in Web application, World Wide Web, Cloud computing security and Internet privacy.

His studies in Software engineering integrate themes in fields like Software development, Software construction, Systems engineering, Software architecture and Software security assurance. Software is frequently linked to Software deployment in his study. His Wireless sensor network research includes themes of Key distribution in wireless sensor networks, Mobile wireless sensor network and Embedded system.

He most often published in these fields:

  • Distributed computing (24.90%)
  • Computer security (18.61%)
  • Software engineering (17.20%)

What were the highlights of his more recent work (between 2017-2021)?

  • Computer security (18.61%)
  • Distributed computing (24.90%)
  • Threat model (3.08%)

In recent papers he was focusing on the following fields of study:

His main research concerns Computer security, Distributed computing, Threat model, Risk analysis and Cloud computing. His Computer security study frequently draws connections between adjacent fields such as The Internet. His study in the fields of Middleware under the domain of Distributed computing overlaps with other disciplines such as Resource management.

His research investigates the link between Threat model and topics such as Identification that cross with problems in Context model. The Risk analysis study combines topics in areas such as Quality, General Data Protection Regulation, Privacy by Design and Key. His research in Cloud computing intersects with topics in NoSQL and Service.

Between 2017 and 2021, his most popular works were:

  • Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. (81 citations)
  • Automated Website Fingerprinting through Deep Learning. (62 citations)
  • Chained Anomaly Detection Models for Federated Learning: An Intrusion Detection Case Study (34 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Programming language
  • The Internet

Wouter Joosen spends much of his time researching Threat model, Computer security, Cloud computing, Risk analysis and Service. His Threat model research is multidisciplinary, relying on both Risk analysis, Data modeling, Identification, Data flow diagram and Software system. His research in Data flow diagram focuses on subjects like Traceability, which are connected to Software.

Wouter Joosen studies Authentication, a branch of Computer security. His Cloud computing research incorporates elements of Distributed computing, Orchestration, Database and NoSQL. His work is dedicated to discovering how Service, Stability are connected with Adversary and other disciplines.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting

N. Nikiforakis;A. Kapravelos;W. Joosen;C. Kruegel.
ieee symposium on security and privacy (2013)

452 Citations

A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements

Mina Deng;Kim Wuyts;Riccardo Scandariato;Bart Preneel.
Requirements Engineering (2011)

331 Citations

You are what you include: large-scale evaluation of remote javascript inclusions

Nick Nikiforakis;Luca Invernizzi;Alexandros Kapravelos;Steven Van Acker.
computer and communications security (2012)

275 Citations

Predicting Vulnerable Software Components via Text Mining

Riccardo Scandariato;James Walden;Aram Hovsepyan;Wouter Joosen.
IEEE Transactions on Software Engineering (2014)

240 Citations

Portable Support for Transparent Thread Migration in Java

Eddy Truyen;Bert Robben;Bart Vanhaute;Tim Coninx.
Lecture Notes in Computer Science (2000)

183 Citations

PriVaricator: Deceiving Fingerprinters with Little White Lies

Nick Nikiforakis;Wouter Joosen;Benjamin Livshits.
the web conference (2015)

154 Citations

On the secure software development process: CLASP, SDL and Touchpoints compared

Bart De Win;Riccardo Scandariato;Koen Buyens;Johan Grégoire.
Information & Software Technology (2009)

150 Citations

LooCI: a loosely-coupled component infrastructure for networked embedded systems

Danny Hughes;Klaas Thoelen;Wouter Horré;Nelson Matthys.
advances in mobile multimedia (2009)

146 Citations

Dynamic and selective combination of extensions in component-based applications

Eddy Truyen;Bart Vanhaute;Bo Nørregaard Jørgensen;Wouter Joosen.
international conference on software engineering (2001)

143 Citations

Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse

Pieter Agten;Wouter Joosen;Frank Piessens;Nick Nikiforakis.
network and distributed system security symposium (2015)

130 Citations

Best Scientists Citing Wouter Joosen

Frank Piessens

Frank Piessens

KU Leuven

Publications: 57

Fabio Massacci

Fabio Massacci

Vrije Universiteit Amsterdam

Publications: 32

Danny Weyns

Danny Weyns

KU Leuven

Publications: 24

Bruno Crispo

Bruno Crispo

University of Trento

Publications: 21

Laurie Williams

Laurie Williams

North Carolina State University

Publications: 19

Jan Jürjens

Jan Jürjens

University of Koblenz and Landau

Publications: 18

Andrei Sabelfeld

Andrei Sabelfeld

Chalmers University of Technology

Publications: 18

William Robertson

William Robertson

Northeastern University

Publications: 17

Engin Kirda

Engin Kirda

Northeastern University

Publications: 17

Thorsten Holz

Thorsten Holz

Ruhr University Bochum

Publications: 15

Mira Mezini

Mira Mezini

TU Darmstadt

Publications: 15

Jun Han

Jun Han

Swinburne University of Technology

Publications: 15

Frank Leymann

Frank Leymann

University of Stuttgart

Publications: 15

Eduardo B. Fernandez

Eduardo B. Fernandez

Florida Atlantic University

Publications: 14

Awais Rashid

Awais Rashid

University of Bristol

Publications: 14

Geoff Coulson

Geoff Coulson

Lancaster University

Publications: 13

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us
Something went wrong. Please try again later.