Vincent Naessens
Orcid: 0000-0002-9255-4902
According to our database1,
Vincent Naessens
authored at least 76 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Reverse Engineering the Eufy Ecosystem: A Deep Dive into Security Vulnerabilities and Proprietary Protocols.
Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, 2024
Demo: Backdoor Through the Front Door: Demonstrating Security Flaws in the Eufy Ecosystem.
Proceedings of the IEEE/ACM Symposium on Edge Computing, 2024
Proceedings of the 14th International Conference on Cloud Computing and Services Science, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Compromising anonymity in identity-reserved k-anonymous datasets through aggregate knowledge.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Proceedings of the IEEE European Symposium on Security and Privacy, 2023
A hybrid anonymization pipeline to improve the privacy-utility balance in sensitive datasets for ML purposes.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Proceedings of the M4IoT@Middleware 2021: Proceedings of the 8th International Workshop on Middleware and Applications for the Internet of Things, Virtual Event, Canada, December 6, 2021
Proceedings of the 2021 International Symposium on Computer Science and Intelligent Control, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Int. J. Cloud Comput., 2020
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020
Proceedings of the ESSE 2020: 2020 European Symposium on Software Engineering, 2020
2019
Proceedings of the 5th IEEE World Forum on Internet of Things, 2019
Proceedings of the 6th International Workshop on Middleware and Applications for the Internet of Things, 2019
Trustworthiness Assessment of Web Applications: Approach and Experimental Study using Input Validation Coding Practices.
Proceedings of the 30th IEEE International Symposium on Software Reliability Engineering, 2019
An Extensible Approach for Integrating Health and Activity Wearables in Mobile IoT Apps.
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019
2018
Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, 2018
Proceedings of the 2018 IEEE International Congress on Internet of Things, 2018
2017
Autom. Control. Comput. Sci., 2017
Proceedings of the Computer Network Security, 2017
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017
Security Evaluation of Cyber-Physical Systems Using Automatically Generated Attack Trees.
Proceedings of the Critical Information Infrastructures Security, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices.
Secur. Commun. Networks, 2016
Proceedings of the Risk Assessment and Risk-Driven Quality Assurance, 2016
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016
2015
Proceedings of the 2015 World Congress on Industrial Control Systems Security, 2015
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015
Extracting Vulnerabilities in Industrial Control Systems using a Knowledge-Based System.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
Proceedings of the Business Information Systems Workshops, 2015
2014
Proceedings of the 2014 IEEE World Congress on Services, 2014
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Proceedings of the 2014 International Conference on Privacy and Security in Mobile Systems, 2014
Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, 2014
Proceedings of the Information Systems Security - 10th International Conference, 2014
An Architecture for the Analysis and Management of Security in Industrial Control Systems.
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014
Proceedings of the Communications and Multimedia Security, 2014
2013
A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services.
Proceedings of the Information Systems Security - 9th International Conference, 2013
Proceedings of the Engineering Secure Software and Systems - 5th International Symposium, 2013
Proceedings of the Communications and Multimedia Security, 2013
Proceedings of the Communications and Multimedia Security, 2013
2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2012
Proceedings of the Communications and Multimedia Security, 2012
Proceedings of the Communications and Multimedia Security, 2012
2011
Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Privacy and Identity Management for Life, 2011
Proceedings of the Privacy and Identity Management for Life, 2011
Proceedings of the Privacy and Identity Management for Life, 2011
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011
Proceedings of the Communications and Multimedia Security, 2011
A Generic Architecture for Integrating Health Monitoring and Advanced Care Provisioning.
Proceedings of the Communications and Multimedia Security, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Proceedings of the Privacy and Identity Management for Life, 2010
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010
Proceedings of the Electronic Healthcare - Third International Conference, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
2009
Proceedings of the Emerging Challenges for Security, 2009
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009
Proceedings of the Software Services for e-Business and e-Society, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Proceedings of the Data and Applications Security XXII, 2008
2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the Communications and Multimedia Security, 2006
2005
Accountable Anonymous E-Mail.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
2001
Proceedings of the Advances in Network and Distributed Systems Security, 2001