Follow
Dimitri Van Landuyt
Dimitri Van Landuyt
Associate Professor in Information Systems Engineering, KU Leuven
Verified email at kuleuven.be - Homepage
Title
Cited by
Cited by
Year
Efficient customization of multi-tenant software-as-a-service applications with service lines
S Walraven, D Van Landuyt, E Truyen, K Handekyn, W Joosen
Journal of Systems and Software 91, 48-62, 2014
932014
Solution-aware data flow diagrams for security threat modeling
L Sion, K Yskout, D Van Landuyt, W Joosen
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1425-1432, 2018
922018
A comprehensive feature comparison study of open-source container orchestration frameworks
E Truyen, D Van Landuyt, D Preuveneers, B Lagaisse, W Joosen
Applied Sciences 9 (5), 931, 2019
662019
Towards a container-based architecture for multi-tenant SaaS applications
E Truyen, D Van Landuyt, V Reniers, A Rafique, B Lagaisse, W Joosen
Proceedings of the 15th international workshop on adaptive and reflective …, 2016
632016
CryptDICE: Distributed data protection system for secure cloud data storage and computation
A Rafique, D Van Landuyt, EH Beni, B Lagaisse, W Joosen
Information Systems 96, 101671, 2021
522021
Effective and efficient privacy threat modeling through domain refinements
K Wuyts, D Van Landuyt, A Hovsepyan, W Joosen
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1175-1178, 2018
502018
An architectural view for data protection by design
L Sion, P Dewitte, D Van Landuyt, K Wuyts, I Emanuilov, P Valcke, ...
2019 IEEE International Conference on Software Architecture (ICSA), 11-20, 2019
472019
SPARTA: Security & privacy architecture through risk-driven threat assessment
L Sion, D Van Landuyt, K Yskout, W Joosen
2018 IEEE International Conference on Software Architecture Companion (ICSA …, 2018
452018
On the state of NoSQL Benchmarks
V Reniers, D Van Landuyt, A Rafique, W Joosen
Proceedings of the 8th ACM/SPEC on International Conference on Performance …, 2017
412017
Interaction-based privacy threat elicitation
L Sion, K Wuyts, K Yskout, D Van Landuyt, W Joosen
2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 79-86, 2018
402018
Towards an adaptive middleware for efficient multi-cloud data storage
A Rafique, D Van Landuyt, V Reniers, W Joosen
Proceedings of the 4th workshop on crosscloud infrastructures & platforms, 1-6, 2017
322017
Security threat modeling: are data flow diagrams enough?
L Sion, K Yskout, D Van Landuyt, A van Den Berghe, W Joosen
Proceedings of the IEEE/ACM 42nd international conference on software …, 2020
312020
Threat modeling: from infancy to maturity
K Yskout, T Heyman, D Van Landuyt, L Sion, K Wuyts, W Joosen
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
302020
K8-scalar: a workbench to compare autoscalers for container-orchestrated database clusters
W Delnat, E Truyen, A Rafique, D Van Landuyt, W Joosen
Proceedings of the 13th International Conference on software engineering for …, 2018
302018
Risk-based design security analysis
L Sion, K Yskout, D Van Landuyt, W Joosen
Proceedings of the 1st International Workshop on Security Awareness from …, 2018
292018
Object-NoSQL Database Mappers: a benchmark study on the performance overhead
V Reniers, A Rafique, D Van Landuyt, W Joosen
Journal of Internet Services and Applications 8, 1-16, 2017
292017
SCOPE: self-adaptive and policy-based data management middleware for federated clouds
A Rafique, D Van Landuyt, E Truyen, V Reniers, W Joosen
Journal of Internet Services and Applications 10, 1-19, 2019
282019
A descriptive study of assumptions in STRIDE security threat modeling
D Van Landuyt, W Joosen
Software and Systems Modeling, 1-18, 2022
272022
A descriptive study of assumptions made in LINDDUN privacy threat elicitation
D Van Landuyt, W Joosen
Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1280-1287, 2020
272020
Privacy risk assessment for data subject-aware threat modeling
L Sion, D Van Landuyt, K Wuyts, W Joosen
2019 IEEE Security and Privacy Workshops (SPW), 64-71, 2019
272019
The system can't perform the operation now. Try again later.
Articles 1–20