Research Output

2020

Availability Incidents in the Telecommunication Domain: A Literature Review

Bukhsh, F. A., Vriezekolk, E., Wienen, H. & Wieringa, R., 2020, 59 p. (DSI technical report series )

Research output: Book/ReportReportAcademic

Open Access
File
34 Downloads (Pure)

FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic

van Ede, T. S., Bortolameotti, R., Continella, A., Ren, J., Dubois, D. J., Lindorfer, M., Choffnes, D., van Steen, M. & Peter, A., 24 Feb 2020, Network and Distributed System Security Symposium (NDSS). 27 ed. San Diego: Internet Society

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
6 Downloads (Pure)

HeadPrint: Detecting Anomalous Communications through Header-based APplication Fingerprinting

Bortolameotti, R., van Ede, T. S., Continella, A., Hupperich, T. M., Everts, M. H., Rafati, R., Jonker, W., Hartel, P. H. & Peter, A., 30 Mar 2020, SAC'20. p. 1696-1705 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
7 Downloads (Pure)

Multi-client functional encryption for controlled data sharing

van de Kamp, T. R., 21 Feb 2020, Enschede: University of Twente. 150 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

Open Access
File
39 Downloads (Pure)

Stimulating architectural thinking during requirements elicitation: an approach and tool support

Anish, P. R., 11 Dec 2020, Enschede: University of Twente. 162 p.

Research output: ThesisPhD Thesis - Research external, graduation UT

Open Access
File
59 Downloads (Pure)

Verifying Sanitizer Correctness through Black-Box Learning: A Symbolic Finite Transducer Approach

Lathouwers, S., Everts, M. & Huisman, M., 2020, Proceedings of the 6th International Conference on Information Systems Security and Privacy: Volume 1: ForSE. Furnell, S., Mori, P., Weippl, E. & Camp, O. (eds.). SCITEPRESS Digital Library, p. 784-795 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
22 Downloads (Pure)
2019

A Business Ecosystem Architecture Modeling Framework

Wieringa, R. J., Engelsman, W., Gordijn, J. & Ionita, D., 22 Aug 2019, 2019 IEEE 21st Conference on Business Informatics (CBI). IEEE

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)

A multi-authority approach to various predicate encryption types

van de Kamp, T. R., Peter, A. & Jonker, W., 25 Oct 2019, In : Designs, codes and cryptography.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
15 Downloads (Pure)

An architecture for Situation-aware Smart Logistics

Iacob, M. E., Charismadiptya, G., van Sinderen, M. J. & Piest, J. P. S., 2019.

Research output: Contribution to conferencePaper

An integrated conceptual model for information system security risk management supported by enterprise architecture management

Mayer, N., Grandry, E., Feltus, C., Goettelmann, E. & Wieringa, R. J., 1 Jun 2019, In : Software and systems modeling. 18, 3, p. 2285-2312 28 p.

Research output: Contribution to journalArticleAcademicpeer-review

5 Citations (Scopus)

An integration platform for synchromodal transport

Singh, P. M., 18 Sep 2019, Enschede: University of Twente. 231 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

Open Access
File
393 Downloads (Pure)

A security risk mitigation framework for cyber physical systems

Zahid, M., Inayat, I., Daneva, M. & Mehmood, Z., 29 Aug 2019, In : Journal of software: Evolution and Process. e2219.

Research output: Contribution to journalArticleAcademicpeer-review

A systematic literature review on requirement prioritization techniques and their empirical evaluation

Bukhsh, F. A., Bukhsh, Z. A. & Daneva, M., 1 Jan 2019, (Accepted/In press) In : Computer Standards and Interfaces. 103389.

Research output: Contribution to journalReview articleAcademicpeer-review

A systematic mapping study on crowdsourced requirements engineering using user feedback

Wang, C., Daneva, M., van Sinderen, M. & Liang, P., 1 Oct 2019, In : Journal of software: Evolution and Process. 31, 10, e2199.

Research output: Contribution to journalReview articleAcademicpeer-review

Open Access
File
2 Citations (Scopus)
13 Downloads (Pure)

Augmenting app reviews with app changelogs: An approach for app reviews classification

Wang, C., Wang, T., Liang, P., Daneva, M. & van Sinderen, M., 1 Jan 2019, Proceedings - SEKE 2019: 31st International Conference on Software Engineering and Knowledge Engineering. Knowledge Systems Institute Graduate School, p. 398-403 6 p. (Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE; vol. 2019, no. 31).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access

BACRank: Ranking building automation and control system components by business continuity impact

Esquivel-Vargas, H., Caselli, M., Tews, E., Bucur, D. & Peter, A., 8 Aug 2019, Computer Safety, Reliability, and Security: 38th International Conference, SAFECOMP 2019, Proceedings. Romanovsky, A., Troubitsyna, E. & Bitsch, F. (eds.). Springer Verlag, p. 183-199 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11698 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Designing software architecture to support continuous delivery and DevOps: A systematic literature review

Bolscher, R. & Daneva, M., 1 Jan 2019, ICSOFT 2019 - Proceedings of the 14th International Conference on Software Technologies. van Sinderen, M., Maciaszek, L. & Maciaszek, L. (eds.). SCITEPRESS, p. 27-39 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
1 Citation (Scopus)
242 Downloads (Pure)

Detection and evaluation of data exfiltration

Bortolameotti, R., 11 Oct 2019, Enschede: University of Twente. 157 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

Open Access
File
157 Downloads (Pure)

Eighth International Workshop on Creativity in Requirements Engineering (CreaRE 2019)

Herrmann, A., Berry, D. M., Daneva, M. & Groen, E. C., 2019, 2019 Joint of International Conference on Requirements Engineering: Foundation for Software Quality Workshops, Doctoral Symposium, Live Studies Track, and Poster Track, REFSQ-JP 2019. CEUR, (CEUR workshop proceedings; vol. 2376).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
11 Downloads (Pure)

Face recognition at a distance: low-resolution and alignment problems

Peng, Y., 8 Feb 2019, Enschede: University of Twente. 131 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

Open Access
File
114 Downloads (Pure)

How to manage and model unstructured business processes: A proposed list of representational requirements

Allah Bukhsh, Z., van Sinderen, M., Sikkel, K. & Quartel, D., 18 Jan 2019, E-Business and Telecommunications: 14th International Joint Conference, ICETE 2017, Revised Selected Paper. Obaidat, M. S. & Cabello, E. (eds.). Springer, p. 81-103 23 p. (Communications in Computer and Information Science; vol. 990).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)
1 Downloads (Pure)

Live studies at REFSQ 2019

Daneva, M., Berry, D., Condori-Fernandez, N., Dalpiaz, F., Herrmann, A., Horkoff, J. & Madhavji, N., 2019, REFSQ-2019 Workshops, Doctoral Symposium, Live Studies Track, and Poster Track: Essen, Germany, March 18th, 2019. Spoletini, P., Mäder, P., Berry, D. M., Dalpiaz, F. & Daneva, M. (eds.). CEUR, 1 p. (CEUR Workshop Proceedings; vol. 2376).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
8 Downloads (Pure)

Low-resolution face recognition and the importance of proper alignment

Peng, Y., Spreeuwers, L. & Veldhuis, R. N. J., 17 Jun 2019, In : IET biometrics. 8, 4, p. 267-276 10 p., 18726042.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
1 Citation (Scopus)
8 Downloads (Pure)

Multi-criteria and model-based analysis for project selection: An integration of capability-based planning, project portfolio management and enterprise architecture

Aldea, A., Iacob, M. E., Daneva, M. & Masyhur, L. H., 21 Nov 2019, 2019 IEEE 23rd International Enterprise Distributed Object Computing Workshop (EDOCW). IEEE, p. 128-135 8 p. 8907326

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Source Software Information Triangulation: A design science study

Wijnhoven, F., Kluitenberg, F. & Daneva, M., 28 Aug 2019, p. 1-12. 12 p.

Research output: Contribution to conferencePaper

Personalized support for well-being at work: an overview of the SWELL project

Kraaij, W., Verberne, S., Koldijk, S., de Korte, E., van Dantzig, S., Sappelli, M., Shoaib, M., Bosems, S., Achterkamp, R., Bonomi, A., Schavemaker, J., Hulsebosch, B., Wabeke, T., Vollenbroek-Hutten, M., Neerincx, M. & Sinderen, M. V., 20 Jun 2019, In : User modeling and user-adapted interaction. 34 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
19 Downloads (Pure)

Practical Mutation Testing for Smart Contracts

Honig, J. J., Everts, M. H. & Huisman, M., 2019, Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26-27, 2019, Proceedings. Pérez-Solà, C., Navarro-Arribas, G., Biryukov, A. & García-Alfaro, J. (eds.). Cham: Springer, p. 289-303 15 p. (Lecture Notes in Computer Science; vol. 11737).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Downloads (Pure)
Open Access
File
5 Citations (Scopus)
79 Downloads (Pure)

Quality requirements challenges in the context of large-scale distributed agile: An empirical study

Alsaqaf, W., Daneva, M. & Wieringa, R., 1 Jun 2019, In : Information and software technology. 110, p. 39-55 17 p.

Research output: Contribution to journalArticleAcademicpeer-review

2 Citations (Scopus)

Realizing Traceability from the Business Model to Enterprise Architecture

Engelsman, W., Wieringa, R. J., van Sinderen, M. J., Gordijn, J. & Haaker, T., 27 Oct 2019, Advances in Conceptual Modeling: ER 2019 Workshops FAIR, MREBA, EmpER, MoBiD, OntoCom, and ER Doctoral Symposium Papers, Salvador, Brazil, November 4–7, 2019, Proceedings. Guizzardi, G., Gailly, F. & Pitangueira Maciel, R. S. (eds.). Springer, p. 37-46 (Lecture Notes in Computer Science; vol. 11787).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Rethinking Blockchain Security: Position Paper

Chia, V., Hartel, P. H., Hum, Q., Ma, S., Piliouras, G., Reijsbergen, D., Van Staalduinen, M. & Szalachowski, P., 3 Jun 2019, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, p. 1273-1280 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)
Open Access
File
520 Downloads (Pure)

SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing by Remote Entities

Jakubeit, P., Dercksen, A. & Peter, A., Dec 2019.

Research output: Contribution to conferencePaper

Status Quo in Requirements Engineering: A Theory and a Global Family of Surveys

Wagner, S., Mendez Fernandez, D., Felderer, M., Vetro, A., Kalinowski, M., Wieringa, R. J., Pfahl, D., Conte, T., Christiansson, M-T., Greer, D., Lassenius, C., Mannisto, T., Nayebi, M., Oivo, M., Penzenstadler, B., Prikladnicki, R., Ruhe, G., Schekelmann, A., Sen, S., Spinola, R. & 3 others, Tuzcu, A., De La Vara, J. L. & Winkler, D., 26 Feb 2019, In : ACM Transactions on Software Engineering and Methodology. 28, 2, 9 p., 9.

Research output: Contribution to journalArticleAcademicpeer-review

5 Citations (Scopus)

Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of "Thinking Like a Thief"

Barth, S., Hartel, P. H., Junger, M. & Montoya, L., 14 May 2019, In : IEEE security & privacy. 17, 3, p. 8-16 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

1 Downloads (Pure)

Towards More Individualized Interfaces: Automating the assessment of computer literacy

Kegel, R. H. P., van Sinderen, M. & Wieringa, R. J., Apr 2019, Behavior Change Support Systems, BCSS 2019: Proceedings of the Seventh International Workshop on Behavior Change Support Systems. Iyengar, S., Tikka, P., van Gemert-Pijnen, L. & Oinas-Kukkonen, H. (eds.). CEUR, (CEUR Workshop proceedings; vol. 2340).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
1 Citation (Scopus)
5 Downloads (Pure)

Towards risk-driven security requirements management in agile software development

Ionita, D., van der Velden, C., Ikkink, H. J. K., Neven, E., Daneva, M. & Kuipers, M., 1 Jan 2019, Information Systems Engineering in Responsible Information Systems: CAiSE Forum 2019, Rome, Italy, June 3–7, 2019, Proceedings. Cappiello, C. & Ruiz, M. (eds.). Cham: Springer, p. 133-144 12 p. (Lecture Notes in Business Information Processing; vol. 350).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Two-Client and Multi-client Functional Encryption for Set Intersection

van de Kamp, T. R., Stritzl, D., Jonker, W. & Peter, A., 30 May 2019, Information security and privacy: 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Charm: Springer International Publishing AG, p. 97-115 19 p. (Lecture Notes in Computer Science; vol. 11547).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Downloads (Pure)

Understanding the most in-demand soft skills in requirements engineering practice: Insights from two focus groups

Daneva, M., Herrmann, A., Condori-Fernandez, N. & Wang, C., 15 Apr 2019, Proceedings of EASE 2019 - Evaluation and Assessment in Software Engineering. Association for Computing Machinery (ACM), p. 284-290 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Downloads (Pure)

Victim-Aware Adaptive Covert Channels

Bortolameotti, R., van Ede, T. S., Continella, A., Everts, M. H., Jonker, W., Hartel, P. H. & Peter, A., 2019, Security and Privacy in Communication Networks: 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohalsen, A. (eds.). p. 450-471 (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 304).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)
2018

A Building Information Model-centered Big Data Platform to Support Digital Transformation in the Construction Industry

Bosdriesz, Y., van Sinderen, M., Iacob, M. & Verkroost, P., 26 Oct 2018, Enterprise Interoperability: Smart Services and Business Impact of Enterprise Interoperability. Zelm, M., Jaekel, F-W., Doumeingts, G. & Wollschlaeger, M. (eds.). Wiley, p. 209-215 7 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Open Access
File
40 Downloads (Pure)

An information security architecture for smart cities

Berkel, A. R. R., Singh, P. M. & van Sinderen, M. J., 30 Jun 2018, Business Modeling and Software Design: 8th International Symposium, BMSD 2018, Vienna, Austria, July 2-4, 2018, Proceedings. Shishkov, B. (ed.). Springer, p. 167 - 184 17 p. (Lecture Notes in Business Information Processing; vol. 319).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Causal Models for Well-Being: Knowledge Modeling, Model-Driven Development of Context-Aware Applications, and Behavior Prediction

Bosems, S., 1 Feb 2018, Enschede: University of Twente. 317 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

Open Access
File
808 Downloads (Pure)

Computer Science

Hartel, P. H. & Junger, M., 30 Dec 2018, Routledge Handbook of Crime Science: Every new technology brings new opportunity for crime, and information and communication technology (ICT) is no exception. This short article offers students of crime insights in the two main connections between ICT and criminology. On the one hand we show how ICT can be used as a tool, target, or location of crime. On the other hand we show how ICT can be used as a tool to study crime.. Wortley, R., Sidebottom, A., Tilley, N. & Laycock, G. (eds.). 1 ed. London: Routledge, p. 179-189 11 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Open Access
File
32 Downloads (Pure)

Data pre-processing: Case of sensor data consistency based on Bi-temporal concepts

Bukhsh, F. A., De Alencar Silva, P. & Wienen, H., 5 Feb 2018, 2017 13th International Conference on Emerging Technologies (ICET). IEEE, p. 1-6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Empirical validation of a software requirements specification checklist

De Laat, M. & Daneva, M., 1 Jan 2018, In : CEUR workshop proceedings. 2075

Research output: Contribution to journalConference articleAcademicpeer-review

Open Access
File
1 Citation (Scopus)
34 Downloads (Pure)

Experiences in using practitioner's checklists to evaluate the industrial relevance of requirements engineering experiments

Daneva, M., Sikkel, K., Condori-Fernandez, N. & Herrmann, A., 28 May 2018, Proceedings 2018 ACM/IEEE 6th International Workshop on Conducting Empirical Studies in Industry, CESI 2018. IEEE, p. 5-12 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Forensic face recognition as a means to determine strength of evidence: A survey

Zeinstra, C. G., Meuwly, D., Ruifrok, A. C., Veldhuis, R. N. & Spreeuwers, L. J., 1 Jan 2018, In : Forensic Science Review. 30, 1, p. 21-32 12 p.

Research output: Contribution to journalReview articleAcademicpeer-review

7 Citations (Scopus)
43 Downloads (Pure)

Forensic image analysis - CCTV distortion and artefacts

Seckiner, D., Mallett, X., Roux, C., Meuwly, D. & Maynard, P., 1 Apr 2018, In : Forensic science international. 285, p. 77-85 9 p., 285.

Research output: Contribution to journalReview articleAcademicpeer-review

4 Citations (Scopus)

From fishing to phishing

Lastdrager, E. E. H., 9 Feb 2018, Enschede: University of Twente. 204 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

Open Access
File
387 Downloads (Pure)