Sion, Laurens
34  Ergebnisse:
Personensuche X
?
1

URLink: Using Names As Sole Internet Addresses to Tackle Sc..:

, In: Proceedings of the First International Workshop on Security and Privacy of Sensing Systems,
 
?
2

Demonstration of the DPMF for Data Protection Analysis:

, In: 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C),
 
?
3

Security and Privacy Threat Analysis for Solid:

, In: 2023 IEEE Secure Development Conference (SecDev),
 
?
 
?
5

Mitigation lost in translation : leveraging threat infor..:

, In: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing,
Al-Momani, Ala'a ; Bösch, Christoph ; Wuyts, Kim... - p. 1236-1247 , 2022
 
?
6

Relationship-based threat modeling:

, In: Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems,
Verreydt, Stef ; Sion, Laurens ; Yskout, Koen. - p. 41-48 , 2022
 
?
7

Relationship-Based Threat Modeling:

, In: 2022 IEEE/ACM 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS),
Verreydt, Stef ; Sion, Laurens ; Yskout, Koen. - p. 41-48 , 2022
 
?
8

Automated Threat Analysis and Management in a Continuous In..:

, In: 2021 IEEE Secure Development Conference (SecDev),
 
?
9

Land of the lost: privacy patterns' forgotten properties ..:

, In: Proceedings of the 36th Annual ACM Symposium on Applied Computing,
Al-Momani, Ala'a ; Wuyts, Kim ; Sion, Laurens... - p. 1217-1225 , 2021
 
?
10

The Bigger Picture: Approaches to Inter-organizational Data..:

, In: Computer Security; Lecture Notes in Computer Science,
 
?
11

The Never-Ending Story: On the Need for Continuous Privacy ..:

, In: 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW),
 
?
12

Security Threat Modeling : Are Data Flow Diagrams Enough:

, In: Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops,
Sion, Laurens ; Yskout, Koen ; Van Landuyt, Dimitri.. - p. 254-257 , 2020
 
?
13

Contextualisation of Data Flow Diagrams for Security Analys..:

, In: Graphical Models for Security; Lecture Notes in Computer Science,
 
?
14

Threat modeling : from infancy to maturity:

, In: Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering: New Ideas and Emerging Results,
 
?
15

LINDDUN GO: A Lightweight Approach to Privacy Threat Modeli..:

, In: 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW),
Wuyts, Kim ; Sion, Laurens ; Joosen, Wouter - p. 302-309 , 2020
 
1-15