Folgen
Koen Yskout
Koen Yskout
DistriNet Research group, Department of Computer Science, KU Leuven, Belgium
Bestätigte E-Mail-Adresse bei cs.kuleuven.be
Titel
Zitiert von
Zitiert von
Jahr
An analysis of the security patterns landscape
T Heyman, K Yskout, R Scandariato, W Joosen
Third International Workshop on Software Engineering for Secure Systems …, 2007
1092007
Solution-aware data flow diagrams for security threat modeling
L Sion, K Yskout, D Van Landuyt, W Joosen
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1425-1432, 2018
812018
Do security patterns really help designers?
K Yskout, R Scandariato, W Joosen
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015
752015
Design notations for secure software: a systematic literature review
A Van den Berghe, R Scandariato, K Yskout, W Joosen
Software & Systems Modeling 16, 809-831, 2017
622017
A system of security patterns
K Yskout, T Heyman, R Scandariato, W Joosen
49*
Sparta: Security & privacy architecture through risk-driven threat assessment
L Sion, D Van Landuyt, K Yskout, W Joosen
2018 IEEE International Conference on Software Architecture Companion (ICSA …, 2018
432018
Does organizing security patterns focus architectural choices?
K Yskout, R Scandariato, W Joosen
2012 34th International Conference on Software Engineering (ICSE), 617-627, 2012
432012
Automating the early detection of security design flaws
K Tuma, L Sion, R Scandariato, K Yskout
Proceedings of the 23rd ACM/IEEE International Conference on Model Driven …, 2020
392020
The security twin peaks
T Heyman, K Yskout, R Scandariato, H Schmidt, Y Yu
Engineering Secure Software and Systems: Third International Symposium …, 2011
382011
Interaction-based privacy threat elicitation
L Sion, K Wuyts, K Yskout, D Van Landuyt, W Joosen
2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 79-86, 2018
362018
Change patterns: Co-evolving requirements and architecture
K Yskout, R Scandariato, W Joosen
Software and Systems Modeling 13 (2), 625-648, 2014
342014
Risk-based design security analysis
L Sion, K Yskout, D Van Landuyt, W Joosen
Proceedings of the 1st International Workshop on Security Awareness from …, 2018
292018
Threat modeling: from infancy to maturity
K Yskout, T Heyman, D Van Landuyt, L Sion, K Wuyts, W Joosen
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
272020
Security threat modeling: are data flow diagrams enough?
L Sion, K Yskout, D Van Landuyt, A van Den Berghe, W Joosen
Proceedings of the IEEE/ACM 42nd international conference on software …, 2020
262020
Sospa: A system of security design patterns for systematically engineering secure systems
PH Nguyen, K Yskout, T Heyman, J Klein, R Scandariato, Y Le Traon
2015 ACM/IEEE 18th International Conference on Model Driven Engineering …, 2015
252015
Evolution of security engineering artifacts: a state of the art survey
M Felderer, B Katt, P Kalb, J Jürjens, M Ochoa, F Paci, TT Tun, K Yskout, ...
International Journal of Secure Software Engineering (IJSSE) 5 (4), 48-98, 2014
252014
Transforming security requirements into architecture
K Yskout, R Scandariato, B De Win, W Joosen
2008 Third International Conference on Availability, Reliability and …, 2008
252008
Architecting software with security patterns
R Scandariato, K Yskout, T Heyman, W Joosen
CW Reports, 2008
212008
An inventory of security patterns
K Yskout, T Heyman, R Scandariato, W Joosen
Katholieke Universiteit Leuven, Department of Computer Science, 2006
212006
A model for provably secure software design
A Van Den Berghe, K Yskout, R Scandariato, W Joosen
2017 IEEE/ACM 5th International FME Workshop on Formal Methods in Software …, 2017
162017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20