Follow
Jan Spooren
Jan Spooren
imec - DistriNet - KU Leuven
Verified email at spooren.com
Title
Cited by
Cited by
Year
Chained anomaly detection models for federated learning: An intrusion detection case study
D Preuveneers, V Rimmer, I Tsingenopoulos, J Spooren, W Joosen, ...
Applied Sciences 8 (12), 2663, 2018
2552018
Mobile device fingerprinting considered harmful for risk-based authentication
J Spooren, D Preuveneers, W Joosen
Proceedings of the eighth European workshop on system security, 1-6, 2015
662015
System and method for on-line copyright management
J Spooren, A Belpaire
US Patent App. 09/838,728, 2002
532002
Detection of algorithmically generated domain names used by botnets: a dual arms race
J Spooren, D Preuveneers, L Desmet, P Janssen, W Joosen
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 1916-1923, 2019
462019
Exploring the ecosystem of malicious domain registrations in the. eu tld
T Vissers, J Spooren, P Agten, D Jumpertz, P Janssen, M Van Wesemael, ...
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
342017
Apparatus and method for determining trends in picture taking activity
T Hostyn, O Demarto, K Helsens, J Spooren, P Marivoet, TVT Pohjola, ...
US Patent 9,866,709, 2018
232018
Leveraging battery usage from mobile devices for active authentication
J Spooren, D Preuveneers, W Joosen
Mobile Information Systems 2017, 2017
212017
PPG2Live: Using dual PPG for active authentication and liveness detection
J Spooren, D Preuveneers, W Joosen
2019 International Conference on Biometrics (ICB), 1-6, 2019
172019
Premadoma: An operational solution for DNS registries to prevent malicious domain registrations
J Spooren, T Vissers, P Janssen, W Joosen, L Desmet
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
162019
On the use of DGAs in malware: an everlasting competition of detection and evasion
J Spooren, D Preuveneers, L Desmet, P Janssen, W Joosen
ACM SIGAPP Applied Computing Review 19 (2), 31-43, 2019
82019
Apparatus, system and method for control of resource consumption and/or production
C Minnoy, B Robben, G Premereur, J Spooren, A Spiessens
US Patent App. 14/061,303, 2014
72014
Premadoma An Operational Solution to Prevent Malicious Domain Name Registrations in the .eu TLD
L Desmet, J Spooren, T Vissers, P Janssen, W Joosen
Digital Threats: Research and Practice 2 (1), 1-24, 2021
62021
Methods, devices and systems for context-sensitive organization of media files
T Hostyn, C Minnoy, K Helsens, M Gerard, MB Migdisoglu, M Tilman, ...
US Patent App. 14/627,388, 2015
42015
Energy storage
J Spooren, C Rutherford
EP Patent EP2,831,972, 2013
3*2013
DNS abuse and active authentication: applications of machine learning in cyber security
J Spooren
22020
Apparatus, method and program
J Spooren, A Lubashevskiy
US Patent 8,832,845, 2014
22014
Method, system and electronic device
T Hostyn, J Spooren, H Embrechts, C Aylward
US Patent 10,084,601, 2018
12018
The system can't perform the operation now. Try again later.
Articles 1–17