default search action
Koen Yskout
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c30]Stef Verreydt, Koen Yskout, Laurens Sion, Wouter Joosen:
Threat modeling state of practice in Dutch organizations. SOUPS @ USENIX Security Symposium 2024: 473-486 - 2023
- [c29]Anh-Duy Tran, Koen Yskout, Wouter Joosen:
Threat Modeling: A Rough Diamond or Fool's Gold? ECSA (Tracks, Workshops and Doctoral Symposium) 2023: 120-129 - [c28]Anh-Duy Tran, Koen Yskout, Wouter Joosen:
AndrAS: Automated Attack Surface Extraction for Android Applications. QRS 2023: 406-417 - 2022
- [j5]Evelien De Sutter, Stef Verreydt, Koen Yskout, David Geerts, Pascal Borry, An Outtier, Marc Ferrante, Corinne Vandermeulen, Nele Vanmechelen, Bart Van der Schueren, Isabelle Huys:
Using provocative design to foster electronic informed consent innovation. BMC Medical Informatics Decis. Mak. 22(1): 296 (2022) - [c27]Alexander van Den Berghe, Koen Yskout, Wouter Joosen:
A reimagined catalogue of software security patterns. EnCyCriS@ICSE 2022: 25-32 - [c26]Stef Verreydt, Laurens Sion, Koen Yskout, Wouter Joosen:
Relationship-based threat modeling. EnCyCriS@ICSE 2022: 41-48 - [d1]Stef Verreydt, Laurens Sion, Koen Yskout, Wouter Joosen:
Relationship-Based Threat Modeling: Evaluation Data. Zenodo, 2022 - 2021
- [j4]Stef Verreydt, Koen Yskout, Wouter Joosen:
Security and Privacy Requirements for Electronic Consent: A Systematic Literature Review. ACM Trans. Comput. Heal. 2(2): 16:1-16:24 (2021) - [c25]Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Stef Verreydt, Wouter Joosen:
Automated Threat Analysis and Management in a Continuous Integration Pipeline. SecDev 2021: 30-37 - 2020
- [c24]Koen Yskout, Thomas Heyman, Dimitri Van Landuyt, Laurens Sion, Kim Wuyts, Wouter Joosen:
Threat modeling: from infancy to maturity. ICSE (NIER) 2020: 9-12 - [c23]Laurens Sion, Koen Yskout, Dimitri Van Landuyt, Alexander van Den Berghe, Wouter Joosen:
Security Threat Modeling: Are Data Flow Diagrams Enough? ICSE (Workshops) 2020: 254-257 - [c22]Katja Tuma, Laurens Sion, Riccardo Scandariato, Koen Yskout:
Automating the early detection of security design flaws. MoDELS 2020: 332-342
2010 – 2019
- 2019
- [c21]Laurens Sion, Katja Tuma, Riccardo Scandariato, Koen Yskout, Wouter Joosen:
Towards Automated Security Design Flaw Detection. ASE Workshops 2019: 49-56 - 2018
- [c20]Laurens Sion, Kim Wuyts, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen:
Interaction-Based Privacy Threat Elicitation. EuroS&P Workshops 2018: 79-86 - [c19]Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Wouter Joosen:
SPARTA: Security & Privacy Architecture Through Risk-Driven Threat Assessment. ICSA Companion 2018: 89-92 - [c18]Laurens Sion, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen:
Risk-based design security analysis. SEAD@ICSE 2018: 11-18 - [c17]Alexander van Den Berghe, Koen Yskout, Wouter Joosen:
Security patterns 2.0: towards security patterns based on security building blocks. SEAD@ICSE 2018: 45-48 - [c16]Laurens Sion, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen:
Knowledge-enriched security and privacy threat modeling. ICSE (Companion Volume) 2018: 290-291 - [c15]Laurens Sion, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen:
Solution-aware data flow diagrams for security threat modeling. SAC 2018: 1425-1432 - [c14]Alexander van Den Berghe, Koen Yskout, Riccardo Scandariato, Wouter Joosen:
A Lingua Franca for Security by Design. SecDev 2018: 69-76 - 2017
- [j3]Alexander van Den Berghe, Riccardo Scandariato, Koen Yskout, Wouter Joosen:
Design notations for secure software: a systematic literature review. Softw. Syst. Model. 16(3): 809-831 (2017) - [c13]Alexander van Den Berghe, Koen Yskout, Riccardo Scandariato, Wouter Joosen:
A Model for Provably Secure Software Design. FormaliSE@ICSE 2017: 3-9 - [c12]Koen Yskout, Dimitri Van Landuyt, Wouter Joosen:
Towards a Platform for Empirical Software Design Studies. ECASE@ICSE 2017: 3-7 - [c11]Laurens Sion, Koen Yskout, Riccardo Scandariato, Wouter Joosen:
A Modular Meta-model for Security Solutions. Programming 2017: 16:1-16:5 - 2016
- [c10]Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Wouter Joosen:
Towards systematically addressing security variability in software product lines. SPLC 2016: 342-343 - 2015
- [c9]Laurens Sion, Koen Yskout, Alexander van Den Berghe, Riccardo Scandariato, Wouter Joosen:
MASC: Modelling Architectural Security Concerns. MiSE@ICSE 2015: 36-41 - [c8]Koen Yskout, Riccardo Scandariato, Wouter Joosen:
Do Security Patterns Really Help Designers? ICSE (1) 2015: 292-302 - [c7]Phu Hong Nguyen, Koen Yskout, Thomas Heyman, Jacques Klein, Riccardo Scandariato, Yves Le Traon:
SoSPa: A system of Security design Patterns for systematically engineering secure systems. MoDELS 2015: 246-255 - 2014
- [j2]Michael Felderer, Basel Katt, Philipp Kalb, Jan Jürjens, Martín Ochoa, Federica Paci, Le Minh Sang Tran, Thein Than Tun, Koen Yskout, Riccardo Scandariato, Frank Piessens, Dries Vanoverberghe, Elizabeta Fourneret, Matthias Gander, Bjørnar Solhaug, Ruth Breu:
Evolution of Security Engineering Artifacts: A State of the Art Survey. Int. J. Secur. Softw. Eng. 5(4): 48-98 (2014) - [j1]Koen Yskout, Riccardo Scandariato, Wouter Joosen:
Change patterns - Co-evolving requirements and architecture. Softw. Syst. Model. 13(2): 625-648 (2014) - [p1]Riccardo Scandariato, Federica Paci, Le Minh Sang Tran, Katsiaryna Labunets, Koen Yskout, Fabio Massacci, Wouter Joosen:
Empirical Assessment of Security Requirements and Architecture: Lessons Learned. Engineering Secure Future Internet Services and Systems 2014: 35-64 - 2013
- [b1]Koen Yskout:
Connecting Security Requirements and Software Architecture with Patterns (Beveiligingsvereisten en softwarearchitectuur verbinden met patronen). Katholieke Universiteit Leuven, Belgium, 2013 - 2012
- [c6]Koen Yskout, Riccardo Scandariato, Wouter Joosen:
Does organizing security patterns focus architectural choices? ICSE 2012: 617-627 - 2011
- [c5]Thomas Heyman, Koen Yskout, Riccardo Scandariato, Holger Schmidt, Yijun Yu:
The Security Twin Peaks. ESSoS 2011: 167-180 - [c4]Koen Yskout, Olivier-Nathanael Ben David, Riccardo Scandariato, Benoit Baudry:
Requirements-Driven Runtime Reconfiguration for Security. EternalS@FET 2011: 25-33
2000 – 2009
- 2008
- [c3]Koen Yskout, Riccardo Scandariato, Bart De Win, Wouter Joosen:
Transforming Security Requirements into Architecture. ARES 2008: 1421-1428 - [c2]Koen Yskout, Bart De Win, Wouter Joosen:
Transforming Security Audit Requirements into a Software Architecture. MODSEC@MoDELS 2008 - 2007
- [c1]Thomas Heyman, Koen Yskout, Riccardo Scandariato, Wouter Joosen:
An Analysis of the Security Patterns Landscape. SESS@ICSE 2007: 3
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint