עקוב אחר
Koen Yskout
Koen Yskout
DistriNet Research group, Department of Computer Science, KU Leuven, Belgium
כתובת אימייל מאומתת בדומיין cs.kuleuven.be
כותרת
צוטט על ידי
צוטט על ידי
שנה
An analysis of the security patterns landscape
T Heyman, K Yskout, R Scandariato, W Joosen
Third International Workshop on Software Engineering for Secure Systems …, 2007
1112007
Solution-aware data flow diagrams for security threat modeling
L Sion, K Yskout, D Van Landuyt, W Joosen
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1425-1432, 2018
982018
Do security patterns really help designers?
K Yskout, R Scandariato, W Joosen
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015
812015
Design notations for secure software: a systematic literature review
A Van den Berghe, R Scandariato, K Yskout, W Joosen
Software & Systems Modeling 16 (3), 809-831, 2017
692017
Sparta: Security & privacy architecture through risk-driven threat assessment
L Sion, D Van Landuyt, K Yskout, W Joosen
2018 IEEE International Conference on Software Architecture Companion (ICSA …, 2018
492018
A system of security patterns
K Yskout, T Heyman, R Scandariato, W Joosen
48*
Automating the early detection of security design flaws
K Tuma, L Sion, R Scandariato, K Yskout
Proceedings of the 23rd ACM/IEEE International Conference on Model Driven …, 2020
472020
Interaction-based privacy threat elicitation
L Sion, K Wuyts, K Yskout, D Van Landuyt, W Joosen
2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 79-86, 2018
452018
Does organizing security patterns focus architectural choices?
K Yskout, R Scandariato, W Joosen
2012 34th International Conference on Software Engineering (ICSE), 617-627, 2012
402012
The security twin peaks
T Heyman, K Yskout, R Scandariato, H Schmidt, Y Yu
Engineering Secure Software and Systems: Third International Symposium …, 2011
382011
Change patterns: Co-evolving requirements and architecture
K Yskout, R Scandariato, W Joosen
Software and Systems Modeling 13 (2), 625-648, 2014
352014
Security threat modeling: are data flow diagrams enough?
L Sion, K Yskout, D Van Landuyt, A van Den Berghe, W Joosen
Proceedings of the IEEE/ACM 42nd international conference on software …, 2020
332020
Threat modeling: from infancy to maturity
K Yskout, T Heyman, D Van Landuyt, L Sion, K Wuyts, W Joosen
Proceedings of the ACM/IEEE 42nd international conference on software …, 2020
332020
Risk-based design security analysis
L Sion, K Yskout, D Van Landuyt, W Joosen
Proceedings of the 1st International Workshop on Security Awareness from …, 2018
302018
Sospa: A system of security design patterns for systematically engineering secure systems
PH Nguyen, K Yskout, T Heyman, J Klein, R Scandariato, Y Le Traon
2015 ACM/IEEE 18th International Conference on Model Driven Engineering …, 2015
302015
Evolution of security engineering artifacts: a state of the art survey
M Felderer, B Katt, P Kalb, J Jürjens, M Ochoa, F Paci, TT Tun, K Yskout, ...
Transportation Systems and Engineering: Concepts, Methodologies, Tools, and …, 2015
252015
Transforming security requirements into architecture
K Yskout, R Scandariato, B De Win, W Joosen
2008 Third International Conference on Availability, Reliability and …, 2008
252008
Architecting software with security patterns
R Scandariato, K Yskout, T Heyman, W Joosen
CW Reports, 2008
212008
An inventory of security patterns
K Yskout, T Heyman, R Scandariato, W Joosen
Katholieke Universiteit Leuven, Department of Computer Science, 2006
212006
Towards automated security design flaw detection
L Sion, K Tuma, R Scandariato, K Yskout, W Joosen
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
202019
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–20