Follow
Thomas Heyman
Thomas Heyman
Researcher at DistriNet, KU Leuven
Verified email at cs.kuleuven.be
Title
Cited by
Cited by
Year
An analysis of the security patterns landscape
T Heyman, K Yskout, R Scandariato, W Joosen
Third International Workshop on Software Engineering for Secure Systems …, 2007
1102007
Using security patterns to combine security metrics
T Heyman, R Scandariato, C Huygens, W Joosen
2008 Third International Conference on Availability, Reliability and …, 2008
832008
CsFire: Transparent client-side mitigation of malicious cross-domain requests
P De Ryck, L Desmet, T Heyman, F Piessens, W Joosen
Engineering Secure Software and Systems: Second International Symposium …, 2010
792010
A system of security patterns
K Yskout, T Heyman, R Scandariato, W Joosen
CW Reports, 2006
482006
Browser protection against cross-site request forgery
W Maes, T Heyman, L Desmet, W Joosen
Proceedings of the first ACM workshop on Secure execution of untrusted code …, 2009
462009
The security twin peaks
T Heyman, K Yskout, R Scandariato, H Schmidt, Y Yu
Engineering Secure Software and Systems: Third International Symposium …, 2011
392011
Reusable formal models for secure software architectures
T Heyman, R Scandariato, W Joosen
2012 Joint Working IEEE/IFIP Conference on Software Architecture and …, 2012
322012
Threat modeling: from infancy to maturity
K Yskout, T Heyman, D Van Landuyt, L Sion, K Wuyts, W Joosen
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
302020
Sospa: A system of security design patterns for systematically engineering secure systems
PH Nguyen, K Yskout, T Heyman, J Klein, R Scandariato, Y Le Traon
2015 ACM/IEEE 18th International Conference on Model Driven Engineering …, 2015
262015
Systematic scalability assessment for feature oriented multi-tenant services
D Preuveneers, T Heyman, Y Berbers, W Joosen
Journal of Systems and Software 116, 162-176, 2016
232016
Towards a quantitative assessment of security in software architectures
A Yautsiukhin, R Scandariato, T Heyman, F Massacci, W Joosen
13th Nordic Workshop on Secure IT Systems, Copenhagen, Denmark 26, 2008
232008
Architecting software with security patterns
R Scandariato, K Yskout, T Heyman, W Joosen
CW Reports, volume CW515, Department of Computer Science, KU Leuven, 2008
212008
An inventory of security patterns
K Yskout, T Heyman, R Scandariato, W Joosen
Katholieke Universiteit Leuven, Department of Computer Science, 2006
212006
Security in context: Analysis and refinement of software architectures
T Heyman, R Scandariato, W Joosen
2010 IEEE 34th Annual Computer Software and Applications Conference, 161-170, 2010
112010
Security patterns: 10 years later
K Yskout, T Heyman, R Scandariato, W Joosen
Katholieke Universiteit Leuven, department of Computer Science, 2008
112008
Scalar: Systematic scalability analysis with the universal scalability law
T Heyman, D Preuveneers, W Joosen
2014 International Conference on Future Internet of Things and Cloud, 497-504, 2014
102014
Scalability analysis of the OpenAM access control system with the universal scalability law
T Heyman, D Preuveneers, W Joosen
2014 international conference on future internet of things and cloud, 505-512, 2014
92014
Improving Intrusion Detection through Alert Verification.
T Heyman, B De Win, C Huygens, W Joosen
WOSIS, 207-216, 2006
92006
Feature-based variability management for scalable enterprise applications: Experiences with an e-payment case
D Preuveneers, T Heyman, Y Berbers, W Joosen
2016 49th Hawaii International Conference on System Sciences (HICSS), 5793-5802, 2016
42016
Scalar: a distributed scalability analysis framework
T Heyman, D Preuveneers, W Joosen
Quantitative Evaluation of Systems: 11th International Conference, QEST 2014 …, 2014
32014
The system can't perform the operation now. Try again later.
Articles 1–20