Comparing performance parameters of mobile app development strategies M Willocx, J Vossaert, V Naessens Proceedings of the International Conference on Mobile Software Engineering …, 2016 | 82 | 2016 |
A quantitative assessment of performance in mobile app development tools M Willocx, J Vossaert, V Naessens 2015 IEEE international conference on mobile services, 454-461, 2015 | 64 | 2015 |
Extracting vulnerabilities in industrial control systems using a knowledge-based system L Lemaire, J Vossaert, J Jansen, V Naessens 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 1-10, 2015 | 20 | 2015 |
CPS security assessment using automatically generated attack trees W Depamelaere, L Lemaire, J Vossaert, V Naessens Proceedings of the 5th international symposium for ICS & SCADA cyber …, 2018 | 19 | 2018 |
User-centric identity management using trusted modules J Vossaert, J Lapon, B De Decker, V Naessens Mathematical and Computer Modelling 57 (7-8), 1592-1605, 2013 | 18 | 2013 |
User-centric identity management using trusted modules J Vossaert, J Lapon, B De Decker, V Naessens Public Key Infrastructures, Services and Applications: 7th European Workshop …, 2011 | 16 | 2011 |
A logic-based framework for the security analysis of industrial control systems L Lemaire, J Vossaert, J Jansen, V Naessens Automatic Control and Computer Sciences 51, 114-123, 2017 | 13 | 2017 |
A smart card based solution for user-centric identity management J Vossaert, P Verhaeghe, B De Decker, V Naessens Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4 …, 2011 | 13 | 2011 |
Developing maintainable application-centric iot ecosystems M Willocx, I Bohé, J Vossaert, V Naessens 2018 IEEE International Congress on Internet of Things (ICIOT), 25-32, 2018 | 10 | 2018 |
Security evaluation of cyber-physical systems using automatically generated attack trees L Lemaire, J Vossaert, B De Decker, V Naessens Critical Information Infrastructures Security: 12th International Conference …, 2018 | 8 | 2018 |
Security analysis of cordova applications in Google play M Willocx, J Vossaert, V Naessens Proceedings of the 12th International Conference on Availability …, 2017 | 8 | 2017 |
Using android devices as mobile extensible HMIs M Willocx, J Vossaert, V Raes, V Naessens 2018 Fifth International Conference on Internet of Things: Systems …, 2018 | 7 | 2018 |
An assessment of security analysis tools for cyber-physical systems L Lemaire, J Vossaert, B De Decker, V Naessens Risk Assessment and Risk-Driven Quality Assurance: 4th International …, 2017 | 7 | 2017 |
Development of an embedded platform for secure CPS services V Raes, J Vossaert, V Naessens Computer Security: ESORICS 2017 International Workshops, CyberICPS 2017 and …, 2018 | 5 | 2018 |
Extending FAST-CPS for the analysis of data flows in cyber-physical systems L Lemaire, J Vossaert, B De Decker, V Naessens Computer Network Security: 7th International Conference on Mathematical …, 2017 | 5 | 2017 |
Developing secure java card applications J Vossaert, J Lapon, V Naessens Java Card development, 5, 2010 | 5 | 2010 |
Trusted computing to increase security and privacy in eID authentication J Vossaert, J Lapon, B De Decker, V Naessens ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International …, 2014 | 4 | 2014 |
Towards a general purpose identity card J Vossaert, P Verhaeghe, B De Decker, V Naessens CW Reports, 2010 | 4 | 2010 |
Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices J Vossaert, J Lapon, B De Decker, V Naessens Security and Communication Networks 9 (2), 106-117, 2016 | 3 | 2016 |
Out-of-Band Password Based Authentication towards Web Services J Vossaert, J Lapon, V Naessens ECUMICT 2014: Proceedings of the European Conference on the Use of Modern …, 2014 | 3 | 2014 |