ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
104
publications
Top publications
5
views
Most viewed
0
reviews
Latest reviews
0
follows
Top followed users
0
followers
Follow
0
edited collections
All edited
0
followed collections
All followed
Publications
104
Sharing machine learning models as indicators of compromise for cyber threat intelligence
Authors:
D. Preuveneers
,
W. Joosen
,
Davy Preuveneers
…
A descriptive study of Microsoft’s threat modeling technique
Authors:
Riccardo Scandariato
,
Kim Wuyts
,
Wouter Joosen
…
Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware
Authors:
Ping Chen
,
Christophe Huygens
,
Lieven Desmet
…
All publications
Record
: found
Orcid
: not found
Profile
: not found
Wouter Joosen
Actions
Follow
New message
Share
Twitter
Sina Weibo
Facebook
Email
Statistics