Koen Yskout
Koen Yskout
DistriNet Research group, Department of Computer Science, KU Leuven, Belgium
Verified email at cs.kuleuven.be
Title
Cited by
Cited by
Year
An analysis of the security patterns landscape
T Heyman, K Yskout, R Scandariato, W Joosen
Third International Workshop on Software Engineering for Secure Systems …, 2007
962007
Do security patterns really help designers?
K Yskout, R Scandariato, W Joosen
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015
422015
A system of security patterns
K Yskout, T Heyman, R Scandariato, W Joosen
37
Does organizing security patterns focus architectural choices?
K Yskout, R Scandariato, W Joosen
2012 34th International Conference on Software Engineering (ICSE), 617-627, 2012
302012
Change patterns: Co-evolving requirements and architecture
K Yskout, R Scandariato, W Joosen
Software and Systems Modeling 13 (2), 625-648, 2014
292014
The security twin peaks
T Heyman, K Yskout, R Scandariato, H Schmidt, Y Yu
International Symposium on Engineering Secure Software and Systems, 167-180, 2011
272011
Design notations for secure software: a systematic literature review
A Van Den Berghe, R Scandariato, K Yskout, W Joosen
Software & Systems Modeling 16 (3), 809-831, 2017
252017
International Journal of Advanced Research in Computer Science and Software Engineering
S Roy, S Nag, IK Maitra, SK Bandyopadhyay
International Journal 3 (6), 2013
252013
Transforming security requirements into architecture
K Yskout, R Scandariato, B De Win, W Joosen
2008 Third International Conference on Availability, Reliability and …, 2008
232008
Solution-aware data flow diagrams for security threat modeling
L Sion, K Yskout, D Van Landuyt, W Joosen
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1425-1432, 2018
202018
Architecting software with security patterns
R Scandariato, K Yskout, T Heyman, W Joosen
CW Reports, 2008
192008
Sospa: A system of security design patterns for systematically engineering secure systems
PH Nguyen, K Yskout, T Heyman, J Klein, R Scandariato, Y Le Traon
2015 ACM/IEEE 18th International Conference on Model Driven Engineering …, 2015
162015
An inventory of security patterns
K Yskout, T Heyman, R Scandariato, W Joosen
Technical Report CW-469, Katholieke Universiteit Leuven, Department of …, 2006
162006
Evolution of security engineering artifacts: a state of the art survey
M Felderer, B Katt, P Kalb, J Jürjens, M Ochoa, F Paci, TT Tun, K Yskout, ...
International Journal of Secure Software Engineering (IJSSE) 5 (4), 48-98, 2014
152014
Security patterns: 10 years later
K Yskout, T Heyman, R Scandariato, W Joosen
CW Reports, 2008
102008
Sparta: Security & privacy architecture through risk-driven threat assessment
L Sion, D Van Landuyt, K Yskout, W Joosen
2018 IEEE International Conference on Software Architecture Companion (ICSA …, 2018
92018
Interaction-based privacy threat elicitation
L Sion, K Wuyts, K Yskout, D Van Landuyt, W Joosen
2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 79-86, 2018
92018
MASC: modelling architectural security concerns
L Sion, K Yskout, A van Den Berghe, R Scandariato, W Joosen
2015 IEEE/ACM 7th International Workshop on Modeling in Software Engineering …, 2015
92015
A model for provably secure software design
A van Den Berghe, K Yskout, R Scandariato, W Joosen
2017 IEEE/ACM 5th International FME Workshop on Formal Methods in Software …, 2017
82017
Risk-based design security analysis
L Sion, K Yskout, D Van Landuyt, W Joosen
Proceedings of the 1st International Workshop on Security Awareness from …, 2018
72018
The system can't perform the operation now. Try again later.
Articles 1–20