Research Output

APTs way: Evading Your EBNIDS

Abbasi, A. & Wetzel, J., 16 Oct 2014, Black Hat Europe. Amsterdam: Black Hat, p. 1-87 87 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
65 Downloads (Pure)

A qualitative study of DevOps usage in practice

Erich, F. M. A., Amrit, C. & Daneva, M., Jun 2017, In : Journal of software: Evolution and Process. 29, 6, 20 p., e1885.

Research output: Contribution to journalArticleAcademicpeer-review

32 Citations (Scopus)

A quality-of-data aware mobile decision support system for patients with chronic illnesses

Larburu Rubio, N., van Schooten, B. W., Shalom, E., Fung, L. S. N., van Sinderen, M. J., Hermens, H. J. & Jones, V. M., 2015, Knowledge representation for health care. Riano, D., Lenz, R., Miksch, S., Peleg, M., Reichert, M. U. & ten Teije, A. (eds.). Switzerland: Springer, p. 126-139 14 p. (Lecture Notes in Artificial Intelligence; vol. 9485, no. 1).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

3 Citations (Scopus)

Architectural design - Conception and specification of interactive systems

Vissers, C. A., Ferreira Pires, L., Quartel, D. & van Sinderen, M. J., 2016, Switzerland: Springer. 388 p.

Research output: Book/ReportBookAcademic

File
2 Citations (Scopus)
57 Downloads (Pure)

A reflection on agile requirements engineering: solutions brought and challenges posed

Inayat, I., Moraes, L., Daneva, M. & Salim, S. S., 20 May 2015, 1st International Workshop on Requirements Engineering in Agile Development (READ). Paasivaara, M. (ed.). New York: Association for Computing Machinery (ACM), p. 61-67 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
4 Citations (Scopus)
58 Downloads (Pure)

ArgueSecure: Out-of-the-box Risk Assessment

Ionita, D., Kegel, R., Baltuta, A. & Wieringa, R., Sep 2016, Proceedings of the 2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE). Piscataway, NJ: IEEE Computer Society, p. 74-79 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Argumentation-Based Security Requirements Elicitation: The Next Round

Ionita, D., Bullee, J-W. & Wieringa, R. J., 25 Aug 2014, Proceedings of the 2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE). Piscataway, New Jersey: IEEE Computer Society, p. 7-12 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

7 Citations (Scopus)

A Security Assessment Methodology for Critical Infrastructures

Caselli, M. & Kargl, F., 2014, Critical Information Infrastructures Security: Ninth International Conference, CRITIS 2014. Hämmerli, B. M. & Lopez, J. (eds.). London: Springer, p. 332-343 12 p. (Critical Information Infrastructures Security; vol. 8985).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

A security risk mitigation framework for cyber physical systems

Zahid, M., Inayat, I., Daneva, M. & Mehmood, Z., 29 Aug 2019, In : Journal of software: Evolution and Process. e2219.

Research output: Contribution to journalArticleAcademicpeer-review

Assessing loss event frequencies of smart grid cyber threats: Encoding flexibility into FAIR using Bayesian network approach

Le, A., Chen, Y., Chai, K. K., Vasenev, A. & Montoya, L., May 2016, 1st EAI International Conference on Smart Grid Inspired Future. London: Springer, p. 43-51 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

9 Citations (Scopus)

Assessing Telecommunication Service Availability Risks for Crisis Organisations

Vriezekolk, E., 14 Jul 2016, Enschede: Universiteit Twente. 275 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

File
1566 Downloads (Pure)

A Study of Identification Performance of Facial Regions from CCTV Images

Ali, T., Tome, P., Fierrez, J., Vera-Rodriguez, R., Spreeuwers, L. J. & Veldhuis, R. N. J., Jul 2015, Computational Forensics. Garain, U. & Shafait, F. (eds.). Switzerland: Springer, p. 83-91 9 p. (Lecture Notes in Computer Science; vol. 8915).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Open Access
File
2 Citations (Scopus)
60 Downloads (Pure)

A study on tangible participative enterprise modelling

Ionita, D., Kaidalova, J., Vasenev, A. & Wieringa, R., 17 Nov 2016, Advances in Conceptual Modeling: ER 2016 Workshops, AHA, MoBiD, MORE-BI, MReBA, QMMQ, SCME, and WM2SP, Gifu, Japan, November 14–17, 2016, Proceedings. Link, S. & Trujillo, J. C. (eds.). Cham: Springer, p. 139-148 10 p. (Lecture Notes in Computer Science; vol. 9975).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
1 Citation (Scopus)
51 Downloads (Pure)

A survey of cost accounting in service-oriented computing

de Medeiros, R. W. A., Rosa, N. S., Campos, G. M. M. & Ferreira Pires, L., Jun 2014, IEEE World Congress on Services, SERVICES 2014. USA: IEEE Computer Society, p. 77-84 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

A Survey of formalization approaches to service composition

Campos, G. M. M., Rosa, N. S. & Ferreira Pires, L., Jun 2014, IEEE International Conference on Services Computing, SCC 2014. USA: IEEE Computer Society, p. 179-186 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

9 Citations (Scopus)

A Survey of Provably Secure Searchable Encryption

Bösch, C. T., Hartel, P. H., Jonker, W. & Peter, A., Aug 2014, In : ACM computing surveys. 47, 2, p. 18:1-18:51 47 p., 18.

Research output: Contribution to journalArticleAcademicpeer-review

File
144 Citations (Scopus)
1595 Downloads (Pure)

A systematic literature review on agile requirements engineering practices and challenges

Inayat, I., Salim, S. S., Marczak, S., Daneva, M. & Shamshirband, S., Oct 2015, In : Computers in human behavior. 51, Part B, p. 915-929 15 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
184 Citations (Scopus)
1604 Downloads (Pure)

A systematic literature review on requirement prioritization techniques and their empirical evaluation

Bukhsh, F. A., Bukhsh, Z. A. & Daneva, M., 1 Jan 2019, (Accepted/In press) In : Computer Standards and Interfaces. 103389.

Research output: Contribution to journalReview articleAcademicpeer-review

A systematic mapping study on crowdsourced requirements engineering using user feedback

Wang, C., Daneva, M., van Sinderen, M. & Liang, P., 1 Oct 2019, In : Journal of software: Evolution and Process. 31, 10, e2199.

Research output: Contribution to journalReview articleAcademicpeer-review

Open Access
File
2 Citations (Scopus)
14 Downloads (Pure)

A system for denial-of-service attack detection based on multivariate correlation analysis

Tan, Z., Jamdagni, A., He, X., Nanda, P. & Liu, R. P., Feb 2014, In : IEEE transactions on parallel and distributed systems. 25, 2, p. 447-456 10 p.

Research output: Contribution to journalArticleAcademicpeer-review

126 Citations (Scopus)

A transformation-based approach to business process management in the cloud

Duipmans, E. F., Ferreira Pires, L. & Bonino da Silva Santos, L. O., 2014, In : Journal of grid computing. 12, 2, p. 191-219 29 p.

Research output: Contribution to journalArticleAcademicpeer-review

18 Citations (Scopus)

A transportable hybrid antenna-transmitter system for the generation of elliptically polarized waves for NVIS propagation research

Witvliet, B. A., Laanstra, G. J., van Maanen, E., Alsina-Pagès, R. M., Bentum, M. J., Slump, C. H. & Schiphorst, R., 12 Apr 2016, 2016 10th European Conference on Antennas and Propagation (EuCAP). Piscataway, NJ: IEEE, p. 1-5 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Attacks on the DECT Authentication Mechanisms

Lucks, S., Schuler, A., Tews, E., Weinmann, R-P. & Wenzel, M., 2009, Topics in Cryptology - CT-RSA 2009: The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings. Fischlin, M. (ed.). Berlin: Springer, p. 48-65 18 p. (Lecture Notes in Computer Science; vol. 5473).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

14 Citations (Scopus)

Attribute evaluation during generalized parsing

Oude luttighuis, P. H. W. M. & Sikkel, N., 1992, In : Memoranda informatica. 92, 85, p. - 95 p.

Research output: Contribution to journalArticleProfessional

Auditing with incomplete logs

Mian, U. S., den Hartog, J., Etalle, S. & Zannone, N., 18 Apr 2015, Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust 2015. Eindhoven: Technische Universiteit Eindhoven, p. 1-23 23 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
40 Downloads (Pure)

Augmenting app reviews with app changelogs: An approach for app reviews classification

Wang, C., Wang, T., Liang, P., Daneva, M. & van Sinderen, M., 1 Jan 2019, Proceedings - SEKE 2019: 31st International Conference on Software Engineering and Knowledge Engineering. Knowledge Systems Institute Graduate School, p. 398-403 6 p. (Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE; vol. 2019, no. 31).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access

Automated analysis of security requirements through risk-based argumentation

Yu, Y., Nunes Leal Franqueira, V., Tun, T. T., Wieringa, R. J. & Nuseibeh, B., 2015, In : Journal of systems and software. 106, p. 102-116 15 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
20 Citations (Scopus)
46 Downloads (Pure)

Automated Fingerprint Identification Systems: From Fingerprints to Fingermarks

Maltoni, D., Cappelli, R. & Meuwly, D., 3 Feb 2017, Handbook of Biometrics for Forensic Science. Tistarelli, M. & Champod, C. (eds.). Springer, p. 37-61 25 p. (Advances in Computer Vision and Pattern Recognition).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

3 Citations (Scopus)

Automated Identification and Prioritization of Business Risks in e-service Networks

Ionita, D., Wieringa, R. J. & Gordijn, J., 19 May 2016, Proceedings of the 7th International Conference on Exploring Service Science, IESS 2016. Borangiu, T., Dragoicea, M. & Novoa, H. (eds.). London: Springer, p. 547-560 14 p. (Lecture Notes in Business Information Processing; vol. 247).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
6 Citations (Scopus)
89 Downloads (Pure)

Automatic Deployment of Specification-based Intrusion Detection in the BACnet Protocol

Esquivel Vargas, H. T., Caselli, M. & Peter, A., 2017, CPS'17, Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. ACM Publishing, p. 25-36

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)

Automatic Eye Detection Error as a Predictor of Face Recognition Performance

Dutta, A., Veldhuis, R. & Spreeuwers, L., May 2014, 35rd WIC Symposium on Information Theory in the Benelux and The 4th WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux: Eindhoven, The Netherlands, May 12-13, 2014. Eindhoven: Werkgemeenschap voor Informatie- en Communicatietheorie (WIC), p. 89-96 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
11 Citations (Scopus)
14 Downloads (Pure)

Automatic player detection and identification for sports entertainment applications

Mahmood, Z., Ali, T., Khattak, S., Hasan, L. & Khan, S. U., Sep 2014, In : Pattern analysis and applications. 18, 4, p. 971-982 12 p.

Research output: Contribution to journalArticleAcademicpeer-review

22 Citations (Scopus)

Automotive Security Functions; The Use of New Technologies to Tackle Vehicle-Related Crime

Knapik, P., 29 Jan 2016, Enschede: Universiteit Twente. 268 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

File
482 Downloads (Pure)

Availability Incidents in the Telecommunication Domain: A Literature Review

Bukhsh, F. A., Vriezekolk, E., Wienen, H. & Wieringa, R., 2020, 59 p. (DSI technical report series )

Research output: Book/ReportReportAcademic

Open Access
File
46 Downloads (Pure)

BACRank: Ranking building automation and control system components by business continuity impact

Esquivel-Vargas, H., Caselli, M., Tews, E., Bucur, D. & Peter, A., 8 Aug 2019, Computer Safety, Reliability, and Security: 38th International Conference, SAFECOMP 2019, Proceedings. Romanovsky, A., Troubitsyna, E. & Bitsch, F. (eds.). Springer Verlag, p. 183-199 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11698 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Balancing functionality, risk, and cost in smart service networks

Batubara, F. R., 14 Jul 2015, ICSOFT 2015 Doctoral Consortium. Portugal: SCITEPRESS Digital Library, p. 7-14 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Citation (Scopus)
42 Downloads (Pure)

Basic Support voor Cooperative Work

Sikkel, N., 25 Mar 1998, Maastricht

Research output: Other contributionOther research output

Behavior Change Support Systems for Privacy and Security

Kegel, R. H. P. & Wieringa, R. J., 3 Jun 2015, Proceedings of the Third International Workshop on Behavior Change Support Systems. Kulyk, O. A., Kelders, S., van Gemert-Pijnen, L. & Oinas-Kukkonen, H. (eds.). Aachen: CEUR, p. 51-55 5 p. (CEUR Workshop Proceedings; vol. Vol-1369).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
1 Downloads (Pure)

Beyond the eye of the beholder: on a forensic descriptor of the eye region

Zeinstra, C. G., Veldhuis, R. N. J. & Spreeuwers, L. J., Sep 2015, 23rd European Signal Processing Conference, EUSIPCO 2015. IEEE Signal Processing Society, p. 779-783 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Big data interoperability challenges for logistics

Singh, P. M. & van Sinderen, M. J., Mar 2016, Enterprise Interoperability in the Digitized and Networked Factory of the Future. Zelm, M., Doumeingts, G. & Mendonca, J. P. (eds.). UK: International Society for Technology in Education, p. 325-335 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
289 Downloads (Pure)

Biometric evidence evaluation: an empirical assessment of the effect of different training data

Ali, T., Spreeuwers, L. J., Veldhuis, R. N. J. & Meuwly, D., 29 Aug 2014, In : IET biometrics. online pre, 4, p. 1-12 12 p.

Research output: Contribution to journalArticleAcademicpeer-review

4 Citations (Scopus)

Biometric Score Calibration for Forensic Face Recognition

Ali, T., 19 Jun 2014, Enschede: Universiteit Twente. 133 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

File
148 Downloads (Pure)

Biometrics — Developments and Potential

Meuwly, D. & Veldhuis, R. N. J., 16 Jun 2014, Wiley Encyclopedia of Forensic Science. Chichester, UK: Wiley, p. 1-8 8 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Biometrics in Forensic Science: Challenges, Lessons and New Technologies

Tistarelli, M., Grosso, E. & Meuwly, D., 30 Nov 2014, Biometric Authentication. Switzerland: Springer, p. 153-164 12 p. (Lecture Notes in Computer Science; vol. 8897, no. 8897).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

File
6 Citations (Scopus)
223 Downloads (Pure)

BioTwist: overcoming severe distortions in ridge-based biometrics for successful identification

Kotzerke, J., 19 May 2016, Enschede: Twente University Press (TUP). 197 p.

Research output: ThesisPhD Thesis - Research external, graduation UT

Open Access
File
40 Downloads (Pure)

Book review: Crime and Everyday Life by Marcus Felson and Mary Eckert, 5th edition

Hartel, P. H. & Junger, M., 9 Aug 2016, In : Crime science. 5, 10, p. 10:1-10:3 3 p.

Research output: Contribution to journalBook/Film/Article reviewAcademic

Open Access
File
41 Downloads (Pure)

Breaking DVB-CSA

Tews, E., Wälde, J. & Weiner, M., 2011, Research in Cryptology: 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers. Armknecht, F. & Lucks, S. (eds.). Springer, p. 45-61 17 p. (Lecture Notes in Computer Science; vol. 7242).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
4 Citations (Scopus)
1000 Downloads (Pure)

Breaking the 99% barrier: optimisation of 3D face recognition

Spreeuwers, L. J., 2015, In : IET biometrics. 4, 3, p. 169-177 10 p.

Research output: Contribution to journalArticleAcademicpeer-review

8 Citations (Scopus)
4 Downloads (Pure)

Building an intrusion detection system using a filter-based feature selection algorithm

Ambusaidi, M. A., He, X., Nanda, P. & Tan, Z., Oct 2016, In : IEEE transactions on computers. 65, 10, p. 2986-2998 13 p.

Research output: Contribution to journalArticleAcademicpeer-review

190 Citations (Scopus)

Business model risk analysis: predicting the probability of business network profitability

Johnson, P., Iacob, M. E., Valja, M., van Sinderen, M. J., Magnusson, C. & Ladhe, T., Mar 2013, Enterprise interoperability: 5th International IFIP Working Conference, IWEI 2013, Enschede, The Netherlands, March 27-28, 2013. Proceedings. van Sinderen, M. J., Oude Luttighuis, P. H. W. M., Folmer, E. J. A. & Bosems, S. (eds.). Heidelberg: Springer, p. 118-130 13 p. (Lecture notes in business information processing; vol. 144).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
1 Citation (Scopus)
172 Downloads (Pure)