Kim Wuyts
Orcid: 0000-0002-0950-9490
According to our database1,
Kim Wuyts
authored at least 23 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
CoRR, 2024
From insight to compliance: Appropriate technical and organisational security measures through the lens of cybersecurity maturity models.
Comput. Law Secur. Rev., 2024
2023
From Privacy Policies to Privacy Threats: A Case Study in Policy-Based Threat Modeling.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023
2022
Mitigation lost in translation: leveraging threat information to improve privacy solution selection.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
2021
Land of the lost: privacy patterns' forgotten properties: enhancing selection-support for privacy patterns.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
2020
Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model., 2020
Proceedings of the ICSE-NIER 2020: 42nd International Conference on Software Engineering, New Ideas and Emerging Results, Seoul, South Korea, 27 June, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
2019
Proceedings of the Trust, Privacy and Security in Digital Business, 2019
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Proceedings of the IEEE International Conference on Software Architecture, 2019
2018
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018
Towards a Roadmap for Privacy Technologies and the General Data Protection Regulation: A Transatlantic Initiative.
Proceedings of the Privacy Technologies and Policy - 6th Annual Privacy Forum, 2018
2015
2014
J. Syst. Softw., 2014
2011
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements.
Requir. Eng., 2011
Int. J. Secur. Softw. Eng., 2011
2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Proceedings of the The Third International Conference on Availability, 2008