Research Output

Business models & business cases for point-of-care testing

Staring, A. J., Meertens, L. O. & Sikkel, N., 2016, BMSD 2016 - Proceedings of the 6th International Symposium on Business Modeling and Software Design. SCITEPRESS, p. 54-63 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

Pieters, W. & Davarynejad, M., 28 Mar 2015, Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers. Garcia-Alfaro, J., Herrera-Joancomartí, J., Lupu, E. & Posegga, J. (eds.). Berlin: Springer, p. 201-215 15 p. (Lecture Notes in Computer Science; vol. 8872).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

9 Citations (Scopus)

Causal Models for Well-Being: Knowledge Modeling, Model-Driven Development of Context-Aware Applications, and Behavior Prediction

Bosems, S., 1 Feb 2018, Enschede: University of Twente. 317 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

Open Access
File
850 Downloads (Pure)

Combining Behaviour-Driven Development with Scrum for Software Development in the Education Domain

Lopes de Souza, P., Francisco do Prado, A., Lopes de Souza, W., Pereira, S. & Ferreira Pires, L., 1 Jan 2017, Proceedings of the 19th International Conference on Enterprise Information Systems (ICEIS 2017). Hammoudi, S., Smialek, M., Camp, O. & Filipe, J. (eds.). Setúbal: SCITEPRESS, Vol. 2. p. 449-458 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Computer literacy systematic literature review method

Kegel, R. H. P., Barth, S., Klaassen, R. & Wieringa, R. J., 19 Jun 2017, Enschede: Centre for Telematics and Information Technology (CTIT). 4 p. (CTIT Technical Report Series; no. TR-CTIT-17-05)

Research output: Book/ReportReportAcademic

Open Access
File
450 Downloads (Pure)

Computer Science

Hartel, P. H. & Junger, M., 30 Dec 2018, Routledge Handbook of Crime Science: Every new technology brings new opportunity for crime, and information and communication technology (ICT) is no exception. This short article offers students of crime insights in the two main connections between ICT and criminology. On the one hand we show how ICT can be used as a tool, target, or location of crime. On the other hand we show how ICT can be used as a tool to study crime.. Wortley, R., Sidebottom, A., Tilley, N. & Laycock, G. (eds.). 1 ed. London: Routledge, p. 179-189 11 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

43 Downloads (Pure)

Connectionist parsing of context-free grammars

Sikkel, N., 1990, Universiteit Twente. 75 p. (Memoranda informatica; no. 90-30)

Research output: Book/ReportReportProfessional

Context-sensitive Information security Risk identification and evaluation techniques

Ionita, D., 25 Aug 2014, 22nd IEEE International Requirements Engineering Conference (RE14). Piscataway, New Jersey: IEEE, p. 485-488 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Cooperation between information system development and operations: a literature review

Erich, F., Amrit, C. A. & Daneva, M., 19 Sep 2014, Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2014. Torchiano, M. (ed.). New York: Association for Computing Machinery (ACM), p. 1-1 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
11 Citations (Scopus)
167 Downloads (Pure)

Cooperative home light: assessment of a security function for the automotive field

Knapik, P., Petit, J., Kargl, F. & Schoch, E., 2014, In : Journal on advances in security. 7, 1&2, p. 1-14 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
33 Downloads (Pure)

Cost-effectiveness of Security Measures: A model-based Framework

Pieters, W., Probst, C. W., Lukszo, Z. & Montoya, L., Jan 2014, Approaches and Processes for Managing the Economics of Information Systems. Tsiakis, T., Kargidis, T. & Katsaros, P. (eds.). Hershey, PA: IGI Global, p. 139-156 18 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

8 Citations (Scopus)
2 Downloads (Pure)

Cost management of service composition

Albuquerque de Medeiros, R. W., 8 Dec 2017, Enschede: University of Twente. 164 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

Open Access
File
140 Downloads (Pure)

Cost management of service compositions

Albuquerque de Medeiros, R. W., Rosa, N. S. & Ferreira Pires, L., Oct 2016, In : International journal of services computing. 4, 4, p. 35-50 16 p.

Research output: Contribution to journalArticleAcademicpeer-review

2 Downloads (Pure)

CreaRE 2017: Sixth International Workshop on Creativity in Requirements Engineering

Herrmann, A., Berry, D. M., Daneva, M. & Groen, E. C., 2017, REFSQ-JP 2017: REFSQ 2017 Joint Proceedings of the Co-Located Events. CEUR, (CEUR workshop proceedings; vol. 1796).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
9 Downloads (Pure)

Crime science: editorial statement

Junger, M., Laycock, G., Hartel, P. H. & Ratcliffe, J., 11 Jun 2012, In : Crime science. 1, 1, 3 p., 1.

Research output: Contribution to journalArticleAcademic

Open Access
File
12 Downloads (Pure)

Cross-fertilization of Earley and Tomita

Sikkel, N., 1990, Enschede: University of Twente. 41 p. (Memoranda Informatica; no. 1990-69)

Research output: Book/ReportReportProfessional

Cross-fertilization of Earley and Tomita

Sikkel, N., 1 Sep 1991, Computational Linguistics in The Netherlands: Papers of the first CLIN Meeting, Utrecht, 1990. van der Wouden, T. & Sijtsma, W. (eds.). Utrecht: OTS, p. 133-148 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Cryptanalysis of the DECT Standard Cipher

Nohl, K., Tews, E. & Weinmann, R-P., 2010, Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers. Hong, S. & Iwata, T. (eds.). Berlin: Springer, p. 1-18 18 p. (Lecture Notes in Computer Science; vol. 6147).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

16 Citations (Scopus)

Cryptographically Enforced Search Pattern Hiding

Bösch, C. T., 21 Jan 2015, Enschede: Universiteit Twente. 154 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

File
565 Downloads (Pure)

Cryptographically-Enhanced Privacy for Recommender Systems

Jeckmans, A., 5 Feb 2014, Enschede: University of Twente. 103 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

File
458 Downloads (Pure)

Current established risk assessment methodologies and tools

Ionita, D., Hartel, P. H., Pieters, W. & Wieringa, R. J., 1 Sep 2013, Enschede: Centre for Telematics and Information Technology (CTIT). 131 p. (CTIT Technical Report Series; no. TR-CTIT-14-04)

Research output: Book/ReportReportProfessional

File
1747 Downloads (Pure)

Customer requirements based ERP customization using AHP technique

Parthasarathy, S. & Daneva, M., 2014, In : Business process management journal. 20, 5, p. 730-751 22 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
13 Citations (Scopus)
103 Downloads (Pure)

Cybersecurity as a Politikum: Implications of Security Discourses for Infrastructures

Fichtner, L., Pieters, W. & Texeira, A., Sep 2016, NSPW '16: Proceedings of the 2016 New Security Paradigms Workshop. New York, NY: Association for Computing Machinery (ACM), p. 36-48

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
6 Citations (Scopus)
40 Downloads (Pure)

Cyber Security as Social Experiment

Pieters, W., Hadziosmanovic, D. & Dechesne, F., 15 Sep 2014, NSPW '14 Proceedings of the 2014 workshop on New Security Paradigms, NSPW 2014. New York: Association for Computing Machinery (ACM), p. 15-24 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)

Data pre-processing: Case of sensor data consistency based on Bi-temporal concepts

Bukhsh, F. A., De Alencar Silva, P. & Wienen, H., 5 Feb 2018, 2017 13th International Conference on Emerging Technologies (ICET). IEEE, p. 1-6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

De applicatie laag

van Sinderen, M., Nov 1986, OSI '86: proceedings van de Telematica-3 Conferentie. Amsterdam: Nederlands Genootschap voor Informatica (NGI), p. 65-76

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting

Bortolameotti, R., van Ede, T. S., Caselli, M., Everts, M. H., Hartel, P. H., Hofstede, R., Jonker, W. & Peter, A., 2017, ACSAC 2017, Proceedings of the 33rd Annual Computer Security Applications Conference. p. 373-386

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

9 Citations (Scopus)
4 Downloads (Pure)

Decentralized enforcement of k-anonymity for location privacy using secret sharing

Förster, D., Löhr, H. & Kargl, F., 18 Jan 2016, 2015 IEEE Vehicular Networking Conference, VNC 2015. Altintas, O., Kargl, F., Ekici, E., Sommer, C. & Segata, M. (eds.). Piscataway, NJ: IEEE Computer Society, p. 279-286 8 p. 7385589. (IEEE Vehicular Networking Conference, VNC; vol. 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Deep Verification Learning

Hillerström, F., Veldhuis, R. & Spreeuwers, L., 2017, Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux: May 11-12, 2017, Delft University of Technology, Delft, the Netherlands. Heusden, R. & Weber, J. H. (eds.). Delft: Delft University of Technology, p. 97-104

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
11 Downloads (Pure)

Depicting the smarter cities of the future: A systematic literature review & field study

Raaijen, T. & Daneva, M., 2017, 2017 Smart Cities Symposium Prague (SCSP): Prague, May 25-26, 2017. Ruzicka, J. (ed.). IEEE, 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)
File
133 Downloads (Pure)

Deriving robust distributed business processes with automated transformations of fallible component processes

Wang, L., Ferreira Pires, L., van Sinderen, M. J., Wombacher, A. & Chi, C., 30 Dec 2015, In : International journal on advances in networks and services. 8, 3 and 4, p. 192-202 11 p.

Research output: Contribution to journalArticleAcademicpeer-review

10 Citations (Scopus)

Describing Data Format Exploits Using Bitstream Segment Graphs

Hartle, M., Schumann, D., Botchak, A., Tews, E. & Mühlhäuser, M., 2008, The Third International Multi-Conference on Computing in the Global Information Technology, ICCGI 2008. Piscataway, NJ: IEEE, p. 119-124 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Designing a Low-Resolution Face Recognition System for Long-Range Surveillance

Peng, Y., Spreeuwers, L. J. & Veldhuis, R. N. J., 21 Sep 2016, p. 16429137. 5 p.

Research output: Contribution to conferencePaper

2 Downloads (Pure)

Designing software architecture to support continuous delivery and DevOps: A systematic literature review

Bolscher, R. & Daneva, M., 1 Jan 2019, ICSOFT 2019 - Proceedings of the 14th International Conference on Software Technologies. van Sinderen, M., Maciaszek, L. & Maciaszek, L. (eds.). SCITEPRESS, p. 27-39 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
2 Citations (Scopus)
307 Downloads (Pure)

Design science methodology for information systems and software engineering

Wieringa, R. J., 2014, London: Springer. 332 p.

Research output: Book/ReportBookAcademic

File
283 Citations (Scopus)
512 Downloads (Pure)

Detection and evaluation of data exfiltration

Bortolameotti, R., 11 Oct 2019, Enschede: University of Twente. 157 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

Open Access
File
211 Downloads (Pure)

Detection of denial-of-service attacks based on computer vision techniques

Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P. & Hu, J., 2015, In : IEEE transactions on computers. 64, 9, p. 2519-2533 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
63 Citations (Scopus)
154 Downloads (Pure)

Developing a Service Oriented IT Platform for Synchromodal Transportation

Singh, P. M., Oct 2014, On the Move to Meaningful Internet Systems, OTM 2014 Workshops. Meersman, R., Panetto, H., Mishra, A. & Valencia-Garcia, R. (eds.). Heidelberg: Springer, p. 30-36 7 p. (Lecture Notes in Computer Science; vol. Volume 8842, no. 8842).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Developing situation-aware applications for disaster management with a distributed rule-based platform

Moreira, J., Moreira, J., Ferreira Pires, L., van Sinderen, M. J. & Dockhorn Costa, P., 2015, Proceedings of the RuleML 2015 Challenge, Special Track on Rule-based Recommender Systems for the Web of Data, Special Industry Track, and RuleML 2015 Doctoral Consortium. Aachen: CEUR, p. - 6 p. (CEUR Workshop Proceedings; vol. 1417).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
28 Downloads (Pure)

Discriminating fingermarks with evidential value for forensic comparison

Kotzerke, J., Kotzerke, J., Davis, S. A., Hayes, R., Spreeuwers, L. J., Veldhuis, R. N. J. & Horadam, K. J., Mar 2015, Proceedings of the 3rd International Workshop on Biometrics and Forensics, IWBF 2015. Piscataway, NJ, USA: IEEE, p. 1-6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)
2 Citations (Scopus)

Distributed Searchable Symmetric Encryption

Bösch, C. T., Peter, A., Leenders, B., Lim, H. W., Tang, Q., Wang, H., Hartel, P. H. & Jonker, W., Jul 2014, Twelfth Annual International Conference on Privacy, Security and Trust, PST 2014. USA: IEEE, p. 330-337 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
17 Citations (Scopus)
93 Downloads (Pure)

e3service: a critical reflection and future research

Razo-Zapata, I. S., Gordijn, J., de Leenheer, P. & Wieringa, R. J., 2015, In : Business & information systems engineering. 57, 1, p. 51-59 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
6 Citations (Scopus)
25 Downloads (Pure)

ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers

Abbasi, A., Holz, T., Zambon, E. & Etalle, S., 2 Dec 2017, ACSAC 2017: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017. Association for Computing Machinery (ACM), p. 437-448

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
12 Citations (Scopus)
91 Downloads (Pure)

Editorial for special section of grid computing journal on “Cloud Computing and Services Science‿

van Sinderen, M. J. & Ivanov, I. I., Mar 2015, In : Cluster computing. 18, 1, p. 453-455 3 p.

Research output: Contribution to journalArticleAcademic

File
80 Downloads (Pure)

Effectiveness of qualitative and quantitative security obligations

Pieters, W., Padget, J., Dechesne, F., Dignum, V. & Aldewereld, H., Jun 2015, In : Journal of information security and applications. 22, p. 3-16 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

8 Citations (Scopus)
1 Downloads (Pure)

Effects of pose and image resolution on automatic face recognition

Mahmood, Z., Ali, T. & Khan, S. U., Jun 2016, In : IET biometrics. 5, 2, p. 111-119 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
23 Citations (Scopus)
89 Downloads (Pure)

E-Government controls in service-oriented auditing perspective: Beyond Single Window

Bukhsh, F. A. & Weigand, H., 2012, In : International journal of electronic government research. 8, 4, p. 34-53 20 p.

Research output: Contribution to journalArticleAcademicpeer-review

5 Citations (Scopus)

Eighth International Workshop on Creativity in Requirements Engineering (CreaRE 2019)

Herrmann, A., Berry, D. M., Daneva, M. & Groen, E. C., 2019, 2019 Joint of International Conference on Requirements Engineering: Foundation for Software Quality Workshops, Doctoral Symposium, Live Studies Track, and Poster Track, REFSQ-JP 2019. CEUR, (CEUR workshop proceedings; vol. 2376).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
12 Downloads (Pure)