default search action
Thomas Heyman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c15]Koen Yskout, Thomas Heyman, Dimitri Van Landuyt, Laurens Sion, Kim Wuyts, Wouter Joosen:
Threat modeling: from infancy to maturity. ICSE (NIER) 2020: 9-12
2010 – 2019
- 2018
- [j2]Wito Delnat, Thomas Heyman, Wouter Joosen, Davy Preuveneers, Ansar Rafique, Eddy Truyen, Dimitri Van Landuyt:
K8-Scalar: a workbench to compare autoscalers for container-orchestrated services (Artifact). Dagstuhl Artifacts Ser. 4(1): 03:1-03:6 (2018) - 2016
- [j1]Davy Preuveneers, Thomas Heyman, Yolande Berbers, Wouter Joosen:
Systematic scalability assessment for feature oriented multi-tenant services. J. Syst. Softw. 116: 162-176 (2016) - [c14]Davy Preuveneers, Thomas Heyman, Yolande Berbers, Wouter Joosen:
Feature-Based Variability Management for Scalable Enterprise Applications: Experiences with an E-Payment Case. HICSS 2016: 5793-5802 - 2015
- [c13]Phu Hong Nguyen, Koen Yskout, Thomas Heyman, Jacques Klein, Riccardo Scandariato, Yves Le Traon:
SoSPa: A system of Security design Patterns for systematically engineering secure systems. MoDELS 2015: 246-255 - 2014
- [c12]Thomas Heyman, Davy Preuveneers, Wouter Joosen:
Scalar: Systematic Scalability Analysis with the Universal Scalability Law. FiCloud 2014: 497-504 - [c11]Thomas Heyman, Davy Preuveneers, Wouter Joosen:
Scalability Analysis of the OpenAM Access Control System with the Universal Scalability Law. FiCloud 2014: 505-512 - [c10]Thomas Heyman, Davy Preuveneers, Wouter Joosen:
Scalar: A Distributed Scalability Analysis Framework. QEST 2014: 241-244 - [e1]Wouter Joosen, Fabio Martinelli, Thomas Heyman:
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), Munich, Germany, February 26, 2014. CEUR Workshop Proceedings 1298, CEUR-WS.org 2014 [contents] - 2013
- [b1]Thomas Heyman:
A Formal Analysis Technique for Secure Software Architectures (Een formele analysetechniek voor veilige softwarearchitecturen). Katholieke Universiteit Leuven, Belgium, 2013 - 2012
- [c9]Thomas Heyman, Riccardo Scandariato, Wouter Joosen:
Reusable Formal Models for Secure Software Architectures. WICSA/ECSA 2012: 41-50 - 2011
- [c8]Thomas Heyman, Koen Yskout, Riccardo Scandariato, Holger Schmidt, Yijun Yu:
The Security Twin Peaks. ESSoS 2011: 167-180 - 2010
- [c7]Thomas Heyman, Riccardo Scandariato, Wouter Joosen:
Security in Context: Analysis and Refinement of Software Architectures. COMPSAC 2010: 161-170 - [c6]Philippe De Ryck, Lieven Desmet, Thomas Heyman, Frank Piessens, Wouter Joosen:
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests. ESSoS 2010: 18-34
2000 – 2009
- 2009
- [c5]Thomas Heyman, Riccardo Scandariato, Wouter Joosen:
Risk-Driven Architectural Decomposition. ARES 2009: 363-368 - [c4]Wim Maes, Thomas Heyman, Lieven Desmet, Wouter Joosen:
Browser protection against cross-site request forgery. SecuCode@CCS 2009: 3-10 - 2008
- [c3]Thomas Heyman, Riccardo Scandariato, Christophe Huygens, Wouter Joosen:
Using Security Patterns to Combine Security Metrics. ARES 2008: 1156-1163 - 2007
- [c2]Thomas Heyman, Koen Yskout, Riccardo Scandariato, Wouter Joosen:
An Analysis of the Security Patterns Landscape. SESS@ICSE 2007: 3 - 2006
- [c1]Thomas Heyman, Bart De Win, Christophe Huygens, Wouter Joosen:
Improving Intrusion Detection through Alert Verification. WOSIS 2006: 207-216
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint