Chained anomaly detection models for federated learning: An intrusion detection case study D Preuveneers, V Rimmer, I Tsingenopoulos, J Spooren, W Joosen, ... Applied Sciences 8 (12), 2663, 2018 | 309 | 2018 |
Mobile device fingerprinting considered harmful for risk-based authentication J Spooren, D Preuveneers, W Joosen Proceedings of the eighth European workshop on system security, 1-6, 2015 | 70 | 2015 |
System and method for on-line copyright management J Spooren, A Belpaire US Patent App. 09/838,728, 2002 | 53 | 2002 |
Detection of algorithmically generated domain names used by botnets: a dual arms race J Spooren, D Preuveneers, L Desmet, P Janssen, W Joosen Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 1916-1923, 2019 | 52 | 2019 |
Exploring the ecosystem of malicious domain registrations in the. eu tld T Vissers, J Spooren, P Agten, D Jumpertz, P Janssen, M Van Wesemael, ... Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017 | 36 | 2017 |
Apparatus and method for determining trends in picture taking activity T Hostyn, O Demarto, K Helsens, J Spooren, P Marivoet, TVT Pohjola, ... US Patent 9,866,709, 2018 | 24 | 2018 |
Method, system and electronic device T Hostyn, J Spooren, H Embrechts, C Aylward US Patent 10,084,601, 2018 | 22 | 2018 |
Premadoma: An operational solution for DNS registries to prevent malicious domain registrations J Spooren, T Vissers, P Janssen, W Joosen, L Desmet Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 21 | 2019 |
Leveraging battery usage from mobile devices for active authentication J Spooren, D Preuveneers, W Joosen Mobile Information Systems 2017 (1), 1367064, 2017 | 21 | 2017 |
PPG2Live: Using dual PPG for active authentication and liveness detection J Spooren, D Preuveneers, W Joosen 2019 International Conference on Biometrics (ICB), 1-6, 2019 | 17 | 2019 |
Premadoma An Operational Solution to Prevent Malicious Domain Name Registrations in the .eu TLD L Desmet, J Spooren, T Vissers, P Janssen, W Joosen Digital Threats: Research and Practice 2 (1), 1-24, 2021 | 9 | 2021 |
On the use of DGAs in malware: an everlasting competition of detection and evasion J Spooren, D Preuveneers, L Desmet, P Janssen, W Joosen ACM SIGAPP Applied Computing Review 19 (2), 31-43, 2019 | 9 | 2019 |
Apparatus, system and method for control of resource consumption and/or production C Minnoy, B Robben, G Premereur, J Spooren, A Spiessens US Patent App. 14/061,303, 2014 | 7 | 2014 |
Methods, devices and systems for context-sensitive organization of media files T Hostyn, C Minnoy, K Helsens, M Gerard, MB Migdisoglu, M Tilman, ... US Patent App. 14/627,388, 2015 | 4 | 2015 |
Energy storage J Spooren, C Rutherford EP Patent EP2,831,972, 2013 | 3* | 2013 |
DNS abuse and active authentication: applications of machine learning in cyber security J Spooren June, 2020 | 2 | 2020 |
Apparatus, method and program J Spooren, A Lubashevskiy US Patent 8,832,845, 2014 | 2 | 2014 |