Thomas Heyman

According to our database1, Thomas Heyman authored at least 18 papers between 2006 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Threat modeling: from infancy to maturity.
Proceedings of the ICSE-NIER 2020: 42nd International Conference on Software Engineering, New Ideas and Emerging Results, Seoul, South Korea, 27 June, 2020

2018
K8-Scalar: a workbench to compare autoscalers for container-orchestrated services (Artifact).
Dagstuhl Artifacts Ser., 2018

2016
Systematic scalability assessment for feature oriented multi-tenant services.
J. Syst. Softw., 2016

Feature-Based Variability Management for Scalable Enterprise Applications: Experiences with an E-Payment Case.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
SoSPa: A system of Security design Patterns for systematically engineering secure systems.
Proceedings of the 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2015

2014
Scalar: A Distributed Scalability Analysis Framework.
Proceedings of the Quantitative Evaluation of Systems - 11th International Conference, 2014

Scalability Analysis of the OpenAM Access Control System with the Universal Scalability Law.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014

Scalar: Systematic Scalability Analysis with the Universal Scalability Law.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014

2013
A Formal Analysis Technique for Secure Software Architectures (Een formele analysetechniek voor veilige softwarearchitecturen).
PhD thesis, 2013

2012
Reusable Formal Models for Secure Software Architectures.
Proceedings of the 2012 Joint Working IEEE/IFIP Conference on Software Architecture and European Conference on Software Architecture, 2012

2011
The Security Twin Peaks.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

2010
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

Security in Context: Analysis and Refinement of Software Architectures.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

2009
Browser protection against cross-site request forgery.
Proceedings of the First ACM Workshop on Secure Execution of Untrusted Code, 2009

Risk-Driven Architectural Decomposition.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Using Security Patterns to Combine Security Metrics.
Proceedings of the The Third International Conference on Availability, 2008

2007
An Analysis of the Security Patterns Landscape.
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007

2006
Improving Intrusion Detection through Alert Verification.
Proceedings of the Security in Information Systems, 2006


  Loading...