Koen Yskout

Orcid: 0000-0002-9192-9100

According to our database1, Koen Yskout authored at least 36 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
AndrAS: Automated Attack Surface Extraction for Android Applications.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

2022
Relationship-Based Threat Modeling: Evaluation Data.
Dataset, March, 2022

Using provocative design to foster electronic informed consent innovation.
BMC Medical Informatics Decis. Mak., 2022

Relationship-based threat modeling.
Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems, 2022

A reimagined catalogue of software security patterns.
Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems, 2022

2021
Security and Privacy Requirements for Electronic Consent: A Systematic Literature Review.
ACM Trans. Comput. Heal., 2021

Automated Threat Analysis and Management in a Continuous Integration Pipeline.
Proceedings of the IEEE Secure Development Conference, 2021

2020
Automating the early detection of security design flaws.
Proceedings of the MoDELS '20: ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems, 2020

Threat modeling: from infancy to maturity.
Proceedings of the ICSE-NIER 2020: 42nd International Conference on Software Engineering, New Ideas and Emerging Results, Seoul, South Korea, 27 June, 2020

Security Threat Modeling: Are Data Flow Diagrams Enough?
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Workshops, Seoul, Republic of Korea, 27 June, 2020

2019
Towards Automated Security Design Flaw Detection.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2019

2018
A Lingua Franca for Security by Design.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018

Solution-aware data flow diagrams for security threat modeling.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Risk-based design security analysis.
Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, 2018

Knowledge-enriched security and privacy threat modeling.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Security patterns 2.0: towards security patterns based on security building blocks.
Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, 2018

SPARTA: Security & Privacy Architecture Through Risk-Driven Threat Assessment.
Proceedings of the 2018 IEEE International Conference on Software Architecture Companion, 2018

Interaction-Based Privacy Threat Elicitation.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

2017
Design notations for secure software: a systematic literature review.
Softw. Syst. Model., 2017

A Modular Meta-model for Security Solutions.
Proceedings of the Companion to the first International Conference on the Art, 2017

Towards a Platform for Empirical Software Design Studies.
Proceedings of the 1st IEEE/ACM International Workshop on Establishing the Community-Wide Infrecaseructure for Architecture-Based Software Engineering, 2017

A Model for Provably Secure Software Design.
Proceedings of the 5th IEEE/ACM International FME Workshop on Formal Methods in Software Engineering, 2017

2016
Towards systematically addressing security variability in software product lines.
Proceedings of the 20th International Systems and Software Product Line Conference, 2016

2015
SoSPa: A system of Security design Patterns for systematically engineering secure systems.
Proceedings of the 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2015

Do Security Patterns Really Help Designers?
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

MASC: Modelling Architectural Security Concerns.
Proceedings of the 7th IEEE/ACM International Workshop on Modeling in Software Engineering, 2015

2014
Empirical Assessment of Security Requirements and Architecture: Lessons Learned.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

Change patterns - Co-evolving requirements and architecture.
Softw. Syst. Model., 2014

Evolution of Security Engineering Artifacts: A State of the Art Survey.
Int. J. Secur. Softw. Eng., 2014

2013
Connecting Security Requirements and Software Architecture with Patterns (Beveiligingsvereisten en softwarearchitectuur verbinden met patronen).
PhD thesis, 2013

2012
Does organizing security patterns focus architectural choices?
Proceedings of the 34th International Conference on Software Engineering, 2012

2011
Requirements-Driven Runtime Reconfiguration for Security.
Proceedings of the Eternal Systems - First International Workshop, 2011

The Security Twin Peaks.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

2008
Transforming Security Audit Requirements into a Software Architecture.
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008

Transforming Security Requirements into Architecture.
Proceedings of the The Third International Conference on Availability, 2008

2007
An Analysis of the Security Patterns Landscape.
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007


  Loading...