Search Results for author: Wouter Joosen

Found 5 papers, 2 papers with code

How to Train your Antivirus: RL-based Hardening through the Problem-Space

1 code implementation29 Feb 2024 Ilias Tsingenopoulos, Jacopo Cortellazzi, Branislav Bošanský, Simone Aonzo, Davy Preuveneers, Wouter Joosen, Fabio Pierazzi, Lorenzo Cavallaro

It also makes possible to provide theoretical guarantees on the robustness of the model against a particular set of adversarial capabilities.

Malware Detection

The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion

2 code implementations18 Feb 2021 Yana Dimova, Gunes Acar, Lukasz Olejnik, Wouter Joosen, Tom Van Goethem

Furthermore, we report on several privacy and security issues inherent to the technical setup of CNAME-based tracking that we detected through a combination of automated and manual analyses.

Cryptography and Security

A Comprehensive Feature Comparison Study of Open-Source Container Orchestration Frameworks

no code implementations7 Feb 2020 Eddy Truyen, Dimitri Van Landuyt, Davy Preuveneers, Bert Lagaisse, Wouter Joosen

(2) Methods: we present a descriptive feature comparison study of the three most prominent orchestration frameworks: Docker Swarm, Kubernetes, and Mesos, which can be combined with Marathon, Aurora or DC/OS.

Distributed, Parallel, and Cluster Computing

Automated Website Fingerprinting through Deep Learning

no code implementations21 Aug 2017 Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom Van Goethem, Wouter Joosen

In our open world evaluation, the most performant deep learning model is 2% more accurate than the state-of-the-art attack.

Feature Engineering

Cannot find the paper you are looking for? You can Submit a new open access paper.