Follow
Jan Vossaert
Jan Vossaert
PostDoc, KU Leuven, TCG
Verified email at cs.kuleuven.be
Title
Cited by
Cited by
Year
Comparing performance parameters of mobile app development strategies
M Willocx, J Vossaert, V Naessens
Proceedings of the International Conference on Mobile Software Engineering …, 2016
822016
A quantitative assessment of performance in mobile app development tools
M Willocx, J Vossaert, V Naessens
2015 IEEE international conference on mobile services, 454-461, 2015
642015
Extracting vulnerabilities in industrial control systems using a knowledge-based system
L Lemaire, J Vossaert, J Jansen, V Naessens
3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 1-10, 2015
202015
CPS security assessment using automatically generated attack trees
W Depamelaere, L Lemaire, J Vossaert, V Naessens
Proceedings of the 5th international symposium for ICS & SCADA cyber …, 2018
192018
User-centric identity management using trusted modules
J Vossaert, J Lapon, B De Decker, V Naessens
Mathematical and Computer Modelling 57 (7-8), 1592-1605, 2013
182013
User-centric identity management using trusted modules
J Vossaert, J Lapon, B De Decker, V Naessens
Public Key Infrastructures, Services and Applications: 7th European Workshop …, 2011
162011
A logic-based framework for the security analysis of industrial control systems
L Lemaire, J Vossaert, J Jansen, V Naessens
Automatic Control and Computer Sciences 51, 114-123, 2017
132017
A smart card based solution for user-centric identity management
J Vossaert, P Verhaeghe, B De Decker, V Naessens
Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4 …, 2011
132011
Developing maintainable application-centric iot ecosystems
M Willocx, I Bohé, J Vossaert, V Naessens
2018 IEEE International Congress on Internet of Things (ICIOT), 25-32, 2018
102018
Security evaluation of cyber-physical systems using automatically generated attack trees
L Lemaire, J Vossaert, B De Decker, V Naessens
Critical Information Infrastructures Security: 12th International Conference …, 2018
82018
Security analysis of cordova applications in Google play
M Willocx, J Vossaert, V Naessens
Proceedings of the 12th International Conference on Availability …, 2017
82017
Using android devices as mobile extensible HMIs
M Willocx, J Vossaert, V Raes, V Naessens
2018 Fifth International Conference on Internet of Things: Systems …, 2018
72018
An assessment of security analysis tools for cyber-physical systems
L Lemaire, J Vossaert, B De Decker, V Naessens
Risk Assessment and Risk-Driven Quality Assurance: 4th International …, 2017
72017
Development of an embedded platform for secure CPS services
V Raes, J Vossaert, V Naessens
Computer Security: ESORICS 2017 International Workshops, CyberICPS 2017 and …, 2018
52018
Extending FAST-CPS for the analysis of data flows in cyber-physical systems
L Lemaire, J Vossaert, B De Decker, V Naessens
Computer Network Security: 7th International Conference on Mathematical …, 2017
52017
Developing secure java card applications
J Vossaert, J Lapon, V Naessens
Java Card development, 5, 2010
52010
Trusted computing to increase security and privacy in eID authentication
J Vossaert, J Lapon, B De Decker, V Naessens
ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International …, 2014
42014
Towards a general purpose identity card
J Vossaert, P Verhaeghe, B De Decker, V Naessens
CW Reports, 2010
42010
Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices
J Vossaert, J Lapon, B De Decker, V Naessens
Security and Communication Networks 9 (2), 106-117, 2016
32016
Out-of-Band Password Based Authentication towards Web Services
J Vossaert, J Lapon, V Naessens
ECUMICT 2014: Proceedings of the European Conference on the Use of Modern …, 2014
32014
The system can't perform the operation now. Try again later.
Articles 1–20