Cookieless monster: Exploring the ecosystem of web-based device fingerprinting N Nikiforakis, A Kapravelos, W Joosen, C Kruegel, F Piessens, G Vigna 2013 IEEE Symposium on Security and Privacy, 541-555, 2013 | 640 | 2013 |
Tranco: A research-oriented top sites ranking hardened against manipulation VL Pochat, T Van Goethem, S Tajalizadehkhoob, M Korczyński, W Joosen arXiv preprint arXiv:1806.01156, 2018 | 635 | 2018 |
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements M Deng, K Wuyts, R Scandariato, B Preneel, W Joosen Requirements Engineering 16 (1), 3-32, 2011 | 622 | 2011 |
Predicting vulnerable software components via text mining R Scandariato, J Walden, A Hovsepyan, W Joosen IEEE Transactions on Software Engineering 40 (10), 993-1006, 2014 | 398 | 2014 |
You are what you include: large-scale evaluation of remote javascript inclusions N Nikiforakis, L Invernizzi, A Kapravelos, S Van Acker, W Joosen, ... Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 386 | 2012 |
Automated website fingerprinting through deep learning V Rimmer, D Preuveneers, M Juarez, T Van Goethem, W Joosen arXiv preprint arXiv:1708.06376, 2017 | 372 | 2017 |
Chained anomaly detection models for federated learning: An intrusion detection case study D Preuveneers, V Rimmer, I Tsingenopoulos, J Spooren, W Joosen, ... Applied Sciences 8 (12), 2663, 2018 | 272 | 2018 |
Extending sensor networks into the cloud using amazon web services K Lee, D Murray, D Hughes, W Joosen 2010 IEEE international conference on networked embedded systems for …, 2010 | 231 | 2010 |
Privaricator: Deceiving fingerprinters with little white lies N Nikiforakis, W Joosen, B Livshits Proceedings of the 24th International Conference on World Wide Web, 820-830, 2015 | 213 | 2015 |
A descriptive study of Microsoft’s threat modeling technique R Scandariato, K Wuyts, W Joosen Requirements Engineering 20, 163-180, 2015 | 188 | 2015 |
Portable support for transparent thread migration in Java E Truyen, B Robben, B Vanhaute, T Coninx, W Joosen, P Verbaeten International Symposium on Agent Systems and Applications, 29-43, 2000 | 187 | 2000 |
Seven months' worth of mistakes: A longitudinal study of typosquatting abuse P Agten, W Joosen, F Piessens, N Nikiforakis Proceedings of the 22nd Network and Distributed System Security Symposium …, 2015 | 181 | 2015 |
On the secure software development process: CLASP, SDL and Touchpoints compared B De Win, R Scandariato, K Buyens, J Grégoire, W Joosen Information and software technology 51 (7), 1152-1171, 2009 | 175 | 2009 |
RIPE: Runtime intrusion prevention evaluator J Wilander, N Nikiforakis, Y Younan, M Kamkar, W Joosen Proceedings of the 27th Annual Computer Security Applications Conference, 41-50, 2011 | 165 | 2011 |
Dynamic and selective combination of extensions in component-based applications E Truyen, B Vanhaute, W Joosen, P Verbaeten, BN Jorgensen Proceedings of the 23rd International Conference on Software Engineering …, 2001 | 149 | 2001 |
Software vulnerability prediction using text analysis techniques A Hovsepyan, R Scandariato, W Joosen, J Walden Proceedings of the 4th international workshop on Security measurements and …, 2012 | 134 | 2012 |
SessionShield: Lightweight protection against session hijacking N Nikiforakis, W Meert, Y Younan, M Johns, W Joosen Engineering Secure Software and Systems: Third International Symposium …, 2011 | 129 | 2011 |
PAriCheck: an efficient pointer arithmetic checker for C programs Y Younan, P Philippaerts, L Cavallaro, R Sekar, F Piessens, W Joosen Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010 | 129 | 2010 |
LooCI: a loosely-coupled component infrastructure for networked embedded systems D Hughes, K Thoelen, W Horré, N Matthys, JD Cid, S Michiels, C Huygens, ... Proceedings of the 7th International Conference on Advances in Mobile …, 2009 | 122 | 2009 |
Selective jamming of LoRaWAN using commodity hardware E Aras, N Small, GS Ramachandran, S Delbruel, W Joosen, D Hughes Proceedings of the 14th EAI International Conference on Mobile and …, 2017 | 120 | 2017 |