Wuyts, Kim
58  Ergebnisse:
Personensuche X
?
 
?
2

Information needs in breast reconstruction after mastectomy..:

Wuyts, Kim ; Durston, Vicki ; Morstyn, Lisa..
Breast Cancer Research and Treatment.  205 (2024)  1 - p. 147-157 , 2024
 
?
4

From Privacy Policies to Privacy Threats: A Case Study in P..:

, In: Proceedings of the 22nd Workshop on Privacy in the Electronic Society,
 
?
5

Mitigation lost in translation : leveraging threat infor..:

, In: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing,
Al-Momani, Ala'a ; Bösch, Christoph ; Wuyts, Kim... - p. 1236-1247 , 2022
 
?
6

Land of the lost: privacy patterns' forgotten properties ..:

, In: Proceedings of the 36th Annual ACM Symposium on Applied Computing,
Al-Momani, Ala'a ; Wuyts, Kim ; Sion, Laurens... - p. 1217-1225 , 2021
 
?
7

LINDDUN GO: A Lightweight Approach to Privacy Threat Modeli..:

, In: 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW),
Wuyts, Kim ; Sion, Laurens ; Joosen, Wouter - p. 302-309 , 2020
 
?
8

Threat modeling : from infancy to maturity:

, In: Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering: New Ideas and Emerging Results,
 
?
9

A Data Utility-Driven Benchmark for De-identification Metho..:

, In: Trust, Privacy and Security in Digital Business; Lecture Notes in Computer Science,
 
?
10

A comparison of system description models for data protecti..:

, In: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing,
Dewitte, Pierre ; Wuyts, Kim ; Sion, Laurens... - p. 1512-1515 , 2019
 
?
11

Effective and efficient privacy threat modeling through dom..:

, In: Proceedings of the 33rd Annual ACM Symposium on Applied Computing,
Wuyts, Kim ; Van Landuyt, Dimitri ; Hovsepyan, Aram. - p. 1175-1178 , 2018
 
?
12

Towards a Roadmap for Privacy Technologies and the General ..:

, In: Privacy Technologies and Policy; Lecture Notes in Computer Science,
 
1-15