关注
Stef Verreydt
Stef Verreydt
DistriNet, KU Leuven
在 kuleuven.be 的电子邮件经过验证
标题
引用次数
引用次数
年份
Leveraging Kubernetes for adaptive and cost-efficient resource management
S Verreydt, EH Beni, E Truyen, B Lagaisse, W Joosen
Proceedings of the 5th International Workshop on Container Technologies and …, 2019
172019
Automated threat analysis and management in a continuous integration pipeline
L Sion, D Van Landuyt, K Yskout, S Verreydt, W Joosen
2021 IEEE Secure Development Conference (SecDev), 30-37, 2021
132021
Security and privacy requirements for electronic consent: a systematic literature review
S Verreydt, K Yskout, W Joosen
ACM Transactions on Computing for Healthcare 2 (2), 1-24, 2021
132021
Relationship-based threat modeling
S Verreydt, L Sion, K Yskout, W Joosen
Proceedings of the 3rd International Workshop on Engineering and …, 2022
72022
Feasibility of container orchestration for adaptive performance isolation in multi-tenant SaaS applications
E Truyen, A Jacobs, S Verreydt, EH Beni, B Lagaisse, W Joosen
Proceedings of the 35th Annual ACM Symposium on Applied Computing, 162-169, 2020
72020
Expressive and systematic risk assessments with instance-centric threat models
S Verreydt, D Van Landuyt, W Joosen
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 1450-1457, 2023
32023
Threat modeling state of practice in Dutch organizations
S Verreydt, K Yskout, L Sion, W Joosen
Twentieth Symposium on Usable Privacy and Security (SOUPS 2024), 473-486, 2024
22024
Run-time threat models for systematic and continuous risk assessment
S Verreydt, DV Landuyt, W Joosen
Software and Systems Modeling, 1-24, 2024
12024
Testing and Practical Implementation of a User-Friendly Personalized and Long-Term Electronic Informed Consent Prototype in Clinical Research: Mixed Methods Study
E De Sutter, D Geerts, K Yskout, S Verreydt, P Borry, L Barbier, I Huys
Journal of Medical Internet Research 25, e46306, 2023
12023
Threat modeling in Dutch organizations
L SION, S VERREYDT, K YSKOUT
12023
Ctam: A Tool for Continuous Threat Analysis and Management
L Sion, D Van Landuyt, K Yskout, S Verreydt, W Joosen
CyberSecurity in a DevOps Environment: From Requirements to Monitoring, 195-223, 2023
12023
Using provocative design to foster electronic informed consent innovation
E De Sutter, S Verreydt, K Yskout, D Geerts, P Borry, A Outtier, M Ferrante, ...
BMC Medical Informatics and Decision Making 22 (1), 296, 2022
12022
Towards Understanding Trust in Self-adaptive Systems
D Van Landuyt, D Halász, S Verreydt, D Weyns
Proceedings of the 19th International Symposium on Software Engineering for …, 2024
2024
Poster: Automated Threat Analysis and Management in a Continuous Integration Pipeline
L Sion, D Van Landuyt, K Yskout, S Verreydt, W Joosen
IEEE Secure Development Conference, Date: 2022/10/18-2022/10/20, Location …, 2022
2022
Systematic Elicitation of Common Security Design Flaws
S Verreydt, K Yskout, L Sion, W Joosen
7th IEEE European Symposium on Security and Privacy, Date: 2022/06/06-2022 …, 2022
2022
An Architecture for Dynamic Trust Management in IoT Security
S Verreydt, KU DistriNet, D Van Landuyt, M Bampatsikos, R Dautov, ...
Leveraging Kubernetes mechanisms for adaptive and cost-efficient resource management
S Verreydt
EnCyCriS 2022
A Okutan, M Mirakhorli, PA Jørgensen, A Waltoft-Olsen, SH Houmb, ...
Poster: Systematic Elicitation of Common Security Design Flaws
S Verreydt, K Yskout, L Sion, W Joosen
系统目前无法执行此操作,请稍后再试。
文章 1–19