A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements M Deng, K Wuyts, R Scandariato, B Preneel, W Joosen Requirements Engineering 16 (1), 3-32, 2011 | 663 | 2011 |
A descriptive study of Microsoft’s threat modeling technique R Scandariato, K Wuyts, W Joosen Requirements Engineering 20, 163-180, 2015 | 201 | 2015 |
LINDDUN privacy threat modeling: a tutorial K Wuyts, W Joosen CW Reports, 2015 | 102 | 2015 |
Empirical evaluation of a privacy-focused threat modeling methodology K Wuyts, R Scandariato, W Joosen Journal of Systems and Software 96, 122-138, 2014 | 85 | 2014 |
Linddun go: A lightweight approach to privacy threat modeling K Wuyts, L Sion, W Joosen 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020 | 72 | 2020 |
Effective and efficient privacy threat modeling through domain refinements K Wuyts, D Van Landuyt, A Hovsepyan, W Joosen Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1175-1178, 2018 | 49 | 2018 |
Privacy Threats in Software Architectures K Wuyts KU Leuven, Belgium, 2015 | 47 | 2015 |
An architectural view for data protection by design L Sion, P Dewitte, D Van Landuyt, K Wuyts, I Emanuilov, P Valcke, ... 2019 IEEE International Conference on Software Architecture (ICSA), 11-20, 2019 | 45 | 2019 |
Interaction-based privacy threat elicitation L Sion, K Wuyts, K Yskout, D Van Landuyt, W Joosen 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 79-86, 2018 | 40 | 2018 |
Threat modeling: from infancy to maturity K Yskout, T Heyman, D Van Landuyt, L Sion, K Wuyts, W Joosen Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 29 | 2020 |
Privacy risk assessment for data subject-aware threat modeling L Sion, D Van Landuyt, K Wuyts, W Joosen 2019 IEEE Security and Privacy Workshops (SPW), 64-71, 2019 | 27 | 2019 |
LIND (D) UN privacy threat tree catalog K Wuyts, R Scandariato, W Joosen CW Reports, 2014 | 27 | 2014 |
A data utility-driven benchmark for de-identification methods O Tomashchuk, D Van Landuyt, D Pletea, K Wuyts, W Joosen Trust, Privacy and Security in Digital Business: 16th International …, 2019 | 22 | 2019 |
Linking privacy solutions to developer goals K Wuyts, R Scandariato, B De Decker, W Joosen 2009 International Conference on Availability, Reliability and Security, 847-852, 2009 | 21 | 2009 |
Integrating patient consent in e-health access control K Wuyts, R Scandariato, G Verhenneman, W Joosen International Journal of Secure Software Engineering (IJSSE) 2 (2), 1-24, 2011 | 19 | 2011 |
A comparison of system description models for data protection by design P Dewitte, K Wuyts, L Sion, D Van Landuyt, I Emanuilov, P Valcke, ... Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 1512-1515, 2019 | 18 | 2019 |
What electronic health records don’t know just yet. A privacy analysis for patient communities and health records interaction K Wuyts, G Verhenneman, R Scandariato, W Joosen, J Dumortier Health and Technology 2, 159-183, 2012 | 18 | 2012 |
Threat modeling manifesto Z Braiterman, A Shostack, J Marcil, S de Vries, I Michlin, K Wuyts, ... Threat Modeling Manifesto Working Group, 2020 | 17 | 2020 |
Towards a roadmap for privacy technologies and the general data protection regulation: a transatlantic initiative S Schiffner, B Berendt, T Siil, M Degeling, R Riemann, F Schaub, K Wuyts, ... Privacy Technologies and Policy: 6th Annual Privacy Forum, APF 2018 …, 2018 | 17 | 2018 |
The OCareCloudS project: toward organizing care through trusted cloud services F De Backere, F Ongenae, F Vannieuwenborg, J Van Ooteghem, ... Informatics for Health and Social Care 41 (2), 159-176, 2016 | 13 | 2016 |