An analysis of the security patterns landscape T Heyman, K Yskout, R Scandariato, W Joosen Third International Workshop on Software Engineering for Secure Systems …, 2007 | 110 | 2007 |
Using security patterns to combine security metrics T Heyman, R Scandariato, C Huygens, W Joosen 2008 Third International Conference on Availability, Reliability and …, 2008 | 83 | 2008 |
CsFire: Transparent client-side mitigation of malicious cross-domain requests P De Ryck, L Desmet, T Heyman, F Piessens, W Joosen Engineering Secure Software and Systems: Second International Symposium …, 2010 | 79 | 2010 |
A system of security patterns K Yskout, T Heyman, R Scandariato, W Joosen CW Reports, 2006 | 48 | 2006 |
Browser protection against cross-site request forgery W Maes, T Heyman, L Desmet, W Joosen Proceedings of the first ACM workshop on Secure execution of untrusted code …, 2009 | 46 | 2009 |
The security twin peaks T Heyman, K Yskout, R Scandariato, H Schmidt, Y Yu Engineering Secure Software and Systems: Third International Symposium …, 2011 | 39 | 2011 |
Reusable formal models for secure software architectures T Heyman, R Scandariato, W Joosen 2012 Joint Working IEEE/IFIP Conference on Software Architecture and …, 2012 | 32 | 2012 |
Threat modeling: from infancy to maturity K Yskout, T Heyman, D Van Landuyt, L Sion, K Wuyts, W Joosen Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 30 | 2020 |
Sospa: A system of security design patterns for systematically engineering secure systems PH Nguyen, K Yskout, T Heyman, J Klein, R Scandariato, Y Le Traon 2015 ACM/IEEE 18th International Conference on Model Driven Engineering …, 2015 | 26 | 2015 |
Systematic scalability assessment for feature oriented multi-tenant services D Preuveneers, T Heyman, Y Berbers, W Joosen Journal of Systems and Software 116, 162-176, 2016 | 23 | 2016 |
Towards a quantitative assessment of security in software architectures A Yautsiukhin, R Scandariato, T Heyman, F Massacci, W Joosen 13th Nordic Workshop on Secure IT Systems, Copenhagen, Denmark 26, 2008 | 23 | 2008 |
Architecting software with security patterns R Scandariato, K Yskout, T Heyman, W Joosen CW Reports, volume CW515, Department of Computer Science, KU Leuven, 2008 | 21 | 2008 |
An inventory of security patterns K Yskout, T Heyman, R Scandariato, W Joosen Katholieke Universiteit Leuven, Department of Computer Science, 2006 | 21 | 2006 |
Security in context: Analysis and refinement of software architectures T Heyman, R Scandariato, W Joosen 2010 IEEE 34th Annual Computer Software and Applications Conference, 161-170, 2010 | 11 | 2010 |
Security patterns: 10 years later K Yskout, T Heyman, R Scandariato, W Joosen Katholieke Universiteit Leuven, department of Computer Science, 2008 | 11 | 2008 |
Scalar: Systematic scalability analysis with the universal scalability law T Heyman, D Preuveneers, W Joosen 2014 International Conference on Future Internet of Things and Cloud, 497-504, 2014 | 10 | 2014 |
Scalability analysis of the OpenAM access control system with the universal scalability law T Heyman, D Preuveneers, W Joosen 2014 international conference on future internet of things and cloud, 505-512, 2014 | 9 | 2014 |
Improving Intrusion Detection through Alert Verification. T Heyman, B De Win, C Huygens, W Joosen WOSIS, 207-216, 2006 | 9 | 2006 |
Feature-based variability management for scalable enterprise applications: Experiences with an e-payment case D Preuveneers, T Heyman, Y Berbers, W Joosen 2016 49th Hawaii International Conference on System Sciences (HICSS), 5793-5802, 2016 | 4 | 2016 |
Scalar: a distributed scalability analysis framework T Heyman, D Preuveneers, W Joosen Quantitative Evaluation of Systems: 11th International Conference, QEST 2014 …, 2014 | 3 | 2014 |