Leveraging Kubernetes for adaptive and cost-efficient resource management S Verreydt, EH Beni, E Truyen, B Lagaisse, W Joosen Proceedings of the 5th International Workshop on Container Technologies and …, 2019 | 17 | 2019 |
Automated threat analysis and management in a continuous integration pipeline L Sion, D Van Landuyt, K Yskout, S Verreydt, W Joosen 2021 IEEE Secure Development Conference (SecDev), 30-37, 2021 | 13 | 2021 |
Security and privacy requirements for electronic consent: a systematic literature review S Verreydt, K Yskout, W Joosen ACM Transactions on Computing for Healthcare 2 (2), 1-24, 2021 | 13 | 2021 |
Relationship-based threat modeling S Verreydt, L Sion, K Yskout, W Joosen Proceedings of the 3rd International Workshop on Engineering and …, 2022 | 7 | 2022 |
Feasibility of container orchestration for adaptive performance isolation in multi-tenant SaaS applications E Truyen, A Jacobs, S Verreydt, EH Beni, B Lagaisse, W Joosen Proceedings of the 35th Annual ACM Symposium on Applied Computing, 162-169, 2020 | 7 | 2020 |
Expressive and systematic risk assessments with instance-centric threat models S Verreydt, D Van Landuyt, W Joosen Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 1450-1457, 2023 | 3 | 2023 |
Threat modeling state of practice in Dutch organizations S Verreydt, K Yskout, L Sion, W Joosen Twentieth Symposium on Usable Privacy and Security (SOUPS 2024), 473-486, 2024 | 2 | 2024 |
Run-time threat models for systematic and continuous risk assessment S Verreydt, DV Landuyt, W Joosen Software and Systems Modeling, 1-24, 2024 | 1 | 2024 |
Testing and Practical Implementation of a User-Friendly Personalized and Long-Term Electronic Informed Consent Prototype in Clinical Research: Mixed Methods Study E De Sutter, D Geerts, K Yskout, S Verreydt, P Borry, L Barbier, I Huys Journal of Medical Internet Research 25, e46306, 2023 | 1 | 2023 |
Threat modeling in Dutch organizations L SION, S VERREYDT, K YSKOUT | 1 | 2023 |
Ctam: A Tool for Continuous Threat Analysis and Management L Sion, D Van Landuyt, K Yskout, S Verreydt, W Joosen CyberSecurity in a DevOps Environment: From Requirements to Monitoring, 195-223, 2023 | 1 | 2023 |
Using provocative design to foster electronic informed consent innovation E De Sutter, S Verreydt, K Yskout, D Geerts, P Borry, A Outtier, M Ferrante, ... BMC Medical Informatics and Decision Making 22 (1), 296, 2022 | 1 | 2022 |
Towards Understanding Trust in Self-adaptive Systems D Van Landuyt, D Halász, S Verreydt, D Weyns Proceedings of the 19th International Symposium on Software Engineering for …, 2024 | | 2024 |
Poster: Automated Threat Analysis and Management in a Continuous Integration Pipeline L Sion, D Van Landuyt, K Yskout, S Verreydt, W Joosen IEEE Secure Development Conference, Date: 2022/10/18-2022/10/20, Location …, 2022 | | 2022 |
Systematic Elicitation of Common Security Design Flaws S Verreydt, K Yskout, L Sion, W Joosen 7th IEEE European Symposium on Security and Privacy, Date: 2022/06/06-2022 …, 2022 | | 2022 |
An Architecture for Dynamic Trust Management in IoT Security S Verreydt, KU DistriNet, D Van Landuyt, M Bampatsikos, R Dautov, ... | | |
Leveraging Kubernetes mechanisms for adaptive and cost-efficient resource management S Verreydt | | |
EnCyCriS 2022 A Okutan, M Mirakhorli, PA Jørgensen, A Waltoft-Olsen, SH Houmb, ... | | |
Poster: Systematic Elicitation of Common Security Design Flaws S Verreydt, K Yskout, L Sion, W Joosen | | |