default search action
Laurens Sion
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c32]Dimitri Van Landuyt, Laurens Sion, Walewein Philips, Wouter Joosen:
From automation to CI/CD: a comparative evaluation of threat modeling tools. SecDev 2024: 35-45 - [c31]Stef Verreydt, Koen Yskout, Laurens Sion, Wouter Joosen:
Threat modeling state of practice in Dutch organizations. SOUPS @ USENIX Security Symposium 2024: 473-486 - 2023
- [c30]Laurens Sion, Dimitri Van Landuyt, Pierre Dewitte, Peggy Valcke, Wouter Joosen:
Demonstration of the DPMF for Data Protection Analysis. MoDELS (Companion) 2023: 75-79 - [c29]Omid Mirzamohammadi, Kristof Jannes, Laurens Sion, Dimitri Van Landuyt, Aysajan Abidin, Dave Singelée:
Security and Privacy Threat Analysis for Solid. SecDev 2023: 196-206 - 2022
- [c28]Stef Verreydt, Laurens Sion, Koen Yskout, Wouter Joosen:
Relationship-based threat modeling. EnCyCriS@ICSE 2022: 41-48 - [c27]Ala'a Al-Momani, Christoph Bösch, Kim Wuyts, Laurens Sion, Wouter Joosen, Frank Kargl:
Mitigation lost in translation: leveraging threat information to improve privacy solution selection. SAC 2022: 1236-1247 - [d1]Stef Verreydt, Laurens Sion, Koen Yskout, Wouter Joosen:
Relationship-Based Threat Modeling: Evaluation Data. Zenodo, 2022 - 2021
- [c26]Laurens Sion, Dimitri Van Landuyt, Wouter Joosen:
An Overview of Runtime Data Protection Enforcement Approaches. EuroS&P Workshops 2021: 351-358 - [c25]Ala'a Al-Momani, Kim Wuyts, Laurens Sion, Frank Kargl, Wouter Joosen, Benjamin Erb, Christoph Bösch:
Land of the lost: privacy patterns' forgotten properties: enhancing selection-support for privacy patterns. SAC 2021: 1217-1225 - [c24]Dimitri Van Landuyt, Liliana Pasquale, Laurens Sion, Wouter Joosen:
Threat modeling at run time: the case for reflective and adaptive threat management (NIER track). SEAMS@ICSE 2021: 203-209 - [c23]Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Stef Verreydt, Wouter Joosen:
Automated Threat Analysis and Management in a Continuous Integration Pipeline. SecDev 2021: 30-37 - 2020
- [j1]Laurens Sion, Pierre Dewitte, Dimitri Van Landuyt, Kim Wuyts, Peggy Valcke, Wouter Joosen:
DPMF: A Modeling Framework for Data Protection by Design. Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model. 15: 10:1-10:53 (2020) - [c22]Dimitri Van Landuyt, Laurens Sion, Pierre Dewitte, Wouter Joosen:
The Bigger Picture: Approaches to Inter-organizational Data Protection Impact Assessment. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 283-293 - [c21]Kim Wuyts, Laurens Sion, Wouter Joosen:
LINDDUN GO: A Lightweight Approach to Privacy Threat Modeling. EuroS&P Workshops 2020: 302-309 - [c20]Laurens Sion, Dimitri Van Landuyt, Wouter Joosen:
The Never-Ending Story: On the Need for Continuous Privacy Impact Assessment. EuroS&P Workshops 2020: 314-317 - [c19]Shamal Faily, Riccardo Scandariato, Adam Shostack, Laurens Sion, Duncan Ki-Aries:
Contextualisation of Data Flow Diagrams for Security Analysis. GraMSec@CSF 2020: 186-197 - [c18]Koen Yskout, Thomas Heyman, Dimitri Van Landuyt, Laurens Sion, Kim Wuyts, Wouter Joosen:
Threat modeling: from infancy to maturity. ICSE (NIER) 2020: 9-12 - [c17]Laurens Sion, Koen Yskout, Dimitri Van Landuyt, Alexander van Den Berghe, Wouter Joosen:
Security Threat Modeling: Are Data Flow Diagrams Enough? ICSE (Workshops) 2020: 254-257 - [c16]Katja Tuma, Laurens Sion, Riccardo Scandariato, Koen Yskout:
Automating the early detection of security design flaws. MoDELS 2020: 332-342 - [i1]Shamal Faily, Riccardo Scandariato, Adam Shostack, Laurens Sion, Duncan Ki-Aries:
Contextualisation of Data Flow Diagrams for security analysis. CoRR abs/2006.04098 (2020)
2010 – 2019
- 2019
- [c15]Dimitri Van Landuyt, Laurens Sion, Emiel Vandeloo, Wouter Joosen:
On the Applicability of Security and Privacy Threat Modeling for Blockchain Applications. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 195-203 - [c14]Laurens Sion, Pierre Dewitte, Dimitri Van Landuyt, Kim Wuyts, Ivo Emanuilov, Peggy Valcke, Wouter Joosen:
An Architectural View for Data Protection by Design. ICSA 2019: 11-20 - [c13]Laurens Sion, Katja Tuma, Riccardo Scandariato, Koen Yskout, Wouter Joosen:
Towards Automated Security Design Flaw Detection. ASE Workshops 2019: 49-56 - [c12]Pierre Dewitte, Kim Wuyts, Laurens Sion, Dimitri Van Landuyt, Ivo Emanuilov, Peggy Valcke, Wouter Joosen:
A comparison of system description models for data protection by design. SAC 2019: 1512-1515 - [c11]Laurens Sion, Dimitri Van Landuyt, Kim Wuyts, Wouter Joosen:
Privacy Risk Assessment for Data Subject-Aware Threat Modeling. IEEE Symposium on Security and Privacy Workshops 2019: 64-71 - [c10]Kim Wuyts, Laurens Sion, Dimitri Van Landuyt, Wouter Joosen:
Knowledge is Power: Systematic Reuse of Privacy Knowledge for Threat Elicitation. IEEE Symposium on Security and Privacy Workshops 2019: 80-83 - 2018
- [c9]Laurens Sion, Kim Wuyts, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen:
Interaction-Based Privacy Threat Elicitation. EuroS&P Workshops 2018: 79-86 - [c8]Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Wouter Joosen:
SPARTA: Security & Privacy Architecture Through Risk-Driven Threat Assessment. ICSA Companion 2018: 89-92 - [c7]Laurens Sion, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen:
Risk-based design security analysis. SEAD@ICSE 2018: 11-18 - [c6]Laurens Sion, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen:
Knowledge-enriched security and privacy threat modeling. ICSE (Companion Volume) 2018: 290-291 - [c5]Laurens Sion, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen:
Solution-aware data flow diagrams for security threat modeling. SAC 2018: 1425-1432 - 2017
- [c4]Laurens Sion, Koen Yskout, Riccardo Scandariato, Wouter Joosen:
A Modular Meta-model for Security Solutions. Programming 2017: 16:1-16:5 - 2016
- [c3]Laurens Sion, Dimitri Van Landuyt, Wouter Joosen, Gjalt de Jong:
Systematic quality trade-off support in the software product-line configuration process. SPLC 2016: 164-173 - [c2]Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Wouter Joosen:
Towards systematically addressing security variability in software product lines. SPLC 2016: 342-343 - 2015
- [c1]Laurens Sion, Koen Yskout, Alexander van Den Berghe, Riccardo Scandariato, Wouter Joosen:
MASC: Modelling Architectural Security Concerns. MiSE@ICSE 2015: 36-41
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint