Davy Preuveneers
Davy Preuveneers
Research Manager, DistriNet, KU Leuven
Verified email at - Homepage
Cited by
Cited by
Towards an extensible context ontology for ambient intelligence
D Preuveneers, J Van den Bergh, D Wagelaar, A Georges, P Rigole, ...
Ambient Intelligence: Second European Symposium, EUSAI 2004, Eindhoven, The …, 2004
Automated website fingerprinting through deep learning
V Rimmer, D Preuveneers, M Juarez, T Van Goethem, W Joosen
arXiv preprint arXiv:1708.06376, 2017
Chained anomaly detection models for federated learning: An intrusion detection case study
D Preuveneers, V Rimmer, I Tsingenopoulos, J Spooren, W Joosen, ...
Applied Sciences 8 (12), 2663, 2018
EASY: Efficient semAntic Service discoverY in pervasive computing environments with QoS and context support
SB Mokhtar, D Preuveneers, N Georgantas, V Issarny, Y Berbers
Journal of Systems and Software 81 (5), 785-808, 2008
The intelligent industry of the future: A survey on emerging trends, research challenges and opportunities in Industry 4.0
D Preuveneers, E Ilie-Zudor
Journal of Ambient Intelligence and Smart Environments 9 (3), 287-298, 2017
Mobile phones assisting with health self-care: a diabetes case study
D Preuveneers, Y Berbers
Proceedings of the 10th international conference on Human computer …, 2008
Internet of Things for enabling smart environments: A technology-centric perspective
C Gomez, S Chessa, A Fleury, G Roussos, D Preuveneers
Journal of Ambient Intelligence and Smart Environments 11 (1), 23-43, 2019
Accelerometer-based device fingerprinting for multi-factor mobile authentication
T Van Goethem, W Scheepers, D Preuveneers, W Joosen
Engineering Secure Software and Systems: 8th International Symposium, ESSoS …, 2016
A survey of software engineering best practices for the development of smart applications in ambient intelligence
D Preuveneers, P Novais
Journal of Ambient Intelligence and Smart Environments 4 (3), 149-162, 2012
Mobile device fingerprinting considered harmful for risk-based authentication
J Spooren, D Preuveneers, W Joosen
Proceedings of the eighth European workshop on system security, 1-6, 2015
Internet of things: A context-awareness perspective
D Preuveneers, Y Berbers
The Internet of things, 287-308, 2008
SmartAuth: dynamic context fingerprinting for continuous user authentication
D Preuveneers, W Joosen
Proceedings of the 30th annual ACM symposium on applied computing, 2185-2191, 2015
A comprehensive feature comparison study of open-source container orchestration frameworks
E Truyen, D Van Landuyt, D Preuveneers, B Lagaisse, W Joosen
Applied Sciences 9 (5), 931, 2019
Adaptive context management using a component-based approach
D Preuveneers, Y Berbers
Distributed Applications and Interoperable Systems: 5th IFIP WG 6.1 …, 2005
Trustworthy data-driven networked production for customer-centric plants
D Preuveneers, W Joosen, E Ilie-Zudor
Industrial Management & Data Systems 117 (10), 2305-2324, 2017
Sharing machine learning models as indicators of compromise for cyber threat intelligence
D Preuveneers, W Joosen
Journal of Cybersecurity and Privacy 1 (1), 140-163, 2021
Encoding semantic awareness in resource-constrained devices
D Preuveneers, Y Berbers
IEEE Intelligent Systems 23 (2), 26-33, 2008
Quality extensions and uncertainty handling for context ontologies
D Preuveneers, Y Berbers
Proceedings of (C&O 2006), 62-64, 2006
Detection of algorithmically generated domain names used by botnets: a dual arms race
J Spooren, D Preuveneers, L Desmet, P Janssen, W Joosen
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 1916-1923, 2019
Enabling self-learning in dynamic and open IoT environments
A Kishore Ramakrishnan, D Preuveneers, Y Berbers
Procedia Computer Science 32, 207-214, 2014
The system can't perform the operation now. Try again later.
Articles 1–20