[go: up one dir, main page]

Follow
Dimitri Van Landuyt
Dimitri Van Landuyt
Associate Professor in Information Systems Engineering, KU Leuven
Verified email at kuleuven.be - Homepage
Title
Cited by
Cited by
Year
Solution-aware data flow diagrams for security threat modeling
L Sion, K Yskout, D Van Landuyt, W Joosen
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1425-1432, 2018
1132018
Efficient customization of multi-tenant software-as-a-service applications with service lines
S Walraven, D Van Landuyt, E Truyen, K Handekyn, W Joosen
Journal of Systems and Software 91, 48-62, 2014
992014
A comprehensive feature comparison study of open-source container orchestration frameworks
E Truyen, D Van Landuyt, D Preuveneers, B Lagaisse, W Joosen
Applied Sciences 9 (5), 931, 2019
902019
CryptDICE: Distributed data protection system for secure cloud data storage and computation
A Rafique, D Van Landuyt, EH Beni, B Lagaisse, W Joosen
Information Systems 96, 101671, 2021
662021
Effective and efficient privacy threat modeling through domain refinements
K Wuyts, D Van Landuyt, A Hovsepyan, W Joosen
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1175-1178, 2018
662018
Towards a container-based architecture for multi-tenant SaaS applications
E Truyen, D Van Landuyt, V Reniers, A Rafique, B Lagaisse, W Joosen
Proceedings of the 15th international workshop on adaptive and reflective …, 2016
662016
An architectural view for data protection by design
L Sion, P Dewitte, D Van Landuyt, K Wuyts, I Emanuilov, P Valcke, ...
2019 IEEE International Conference on Software Architecture (ICSA), 11-20, 2019
632019
A descriptive study of assumptions in STRIDE security threat modeling
D Van Landuyt, W Joosen
Software and Systems Modeling 21 (6), 2311-2328, 2022
602022
SPARTA: Security & privacy architecture through risk-driven threat assessment
L Sion, D Van Landuyt, K Yskout, W Joosen
2018 IEEE International Conference on Software Architecture Companion (ICSA …, 2018
592018
Interaction-based privacy threat elicitation
L Sion, K Wuyts, K Yskout, D Van Landuyt, W Joosen
2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 79-86, 2018
572018
Threat modeling: from infancy to maturity
K Yskout, T Heyman, D Van Landuyt, L Sion, K Wuyts, W Joosen
Proceedings of the ACM/IEEE 42nd international conference on software …, 2020
472020
On the state of NoSQL Benchmarks
V Reniers, D Van Landuyt, A Rafique, W Joosen
Proceedings of the 8th ACM/SPEC on International Conference on Performance …, 2017
472017
Security threat modeling: are data flow diagrams enough?
L Sion, K Yskout, D Van Landuyt, A van Den Berghe, W Joosen
Proceedings of the IEEE/ACM 42nd international conference on software …, 2020
462020
Towards a research agenda for understanding and managing uncertainty in self-adaptive systems
D Weyns, R Calinescu, R Mirandola, K Tei, M Acosta, N Bencomo, ...
ACM SIGSOFT Software Engineering Notes 48 (4), 20-36, 2023
392023
A descriptive study of assumptions made in LINDDUN privacy threat elicitation
D Van Landuyt, W Joosen
Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1280-1287, 2020
392020
Towards an adaptive middleware for efficient multi-cloud data storage
A Rafique, D Van Landuyt, V Reniers, W Joosen
Proceedings of the 4th workshop on crosscloud infrastructures & platforms, 1-6, 2017
372017
K8-scalar: a workbench to compare autoscalers for container-orchestrated database clusters
W Delnat, E Truyen, A Rafique, D Van Landuyt, W Joosen
Proceedings of the 13th International Conference on software engineering for …, 2018
362018
Privacy risk assessment for data subject-aware threat modeling
L Sion, D Van Landuyt, K Wuyts, W Joosen
2019 IEEE Security and Privacy Workshops (SPW), 64-71, 2019
352019
Risk-based design security analysis
L Sion, K Yskout, D Van Landuyt, W Joosen
Proceedings of the 1st International Workshop on Security Awareness from …, 2018
342018
SCOPE: self-adaptive and policy-based data management middleware for federated clouds
A Rafique, D Van Landuyt, E Truyen, V Reniers, W Joosen
Journal of Internet Services and Applications 10 (1), 2, 2019
302019
The system can't perform the operation now. Try again later.
Articles 1–20