Research Output

eLearning in industrial mathematics with applications to nanoelectronics

Ali, G., Bilotta, E., Gabriele, L., Pantano, P., Sepulveda, J., Servidio, R. & Vasenev, A., 2015, Coupled multiscale simulation and optimization in nanoelectronics. Berlin: Springer, p. 503-559 57 p. (The European Consortium for Mathematics in Industry; vol. 21, no. 21).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

File
17 Citations (Scopus)
12 Downloads (Pure)

Empirical research methodologies and studies in Requirements Engineering: How far did we come?

Daneva, M., Damian, D., Marchetto, A. & Pastor, O., 30 Jun 2014, In : Journal of systems and software. 95, 12, p. 1-9 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
34 Citations (Scopus)
198 Downloads (Pure)

Empirical research methods for technology validation: Scaling up to practice

Wieringa, R. J., Sep 2014, In : Journal of systems and software. 95, p. 19-31 13 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
37 Citations (Scopus)
104 Downloads (Pure)

Empirical validation of a software requirements specification checklist

De Laat, M. & Daneva, M., 1 Jan 2018, In : CEUR workshop proceedings. 2075

Research output: Contribution to journalConference articleAcademicpeer-review

Open Access
File
2 Citations (Scopus)
42 Downloads (Pure)

Engineering of quality requirements as perceived by near-shore development centers' architects in eastern Europe: the hole in the whole.

Daneva, M., Marczak, S. & Herrmann, A., 19 Sep 2014, Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2014. Torchiano, M. (ed.). New York: Association for Computing Machinery (ACM), p. 191-200 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
4 Citations (Scopus)
22 Downloads (Pure)

Enhancing big data security with collaborative intrusion detection

Tan, Z., Nagar, U. T., He, X., Nanda, P., Liu, R. P., Wang, S. & Hu, J., 2014, In : IEEE cloud computing. 1, 3, p. 27-33 7 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
46 Citations (Scopus)
76 Downloads (Pure)

Enhancing user comfort models for Demand Response solutions for domestic water heating systems

Belov, A., Vasenev, A., Havinga, P. J. M. & Meratnia, N., 2016, Proceedings of the 5th International Conference on Smart Cities and Green ICT Systems. Portugal: SCITEPRESS, p. 201-212 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Enterprise architecture intelligence

Veneberg, R. K. M., Iacob, M. E., van Sinderen, M. J. & Bodenstaff, L., 2014, Eighteenth IEEE International Enterprise Distributed Object Computing Conference, EDOC 2014. Reichert, M. U., Rinderle-Ma, S. & Grossmann, G. (eds.). USA: IEEE Computer Society, p. 22-31 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

11 Citations (Scopus)

Enterprise Interoperability: 5th International IFIP Working Conference, IWEI 2013, Enschede, The Netherlands, March 27-28, 2013. Proceedings

van Sinderen, M. (ed.), Oude Luttighuis, P. (ed.), Folmer, E. (ed.) & Bosems, S. (ed.), Mar 2013, Heidelberg: Springer. 224 p. (Lecture Notes in Business Information Processing; vol. 144)

Research output: Book/ReportBook editingPopular

Open Access
File
91 Downloads (Pure)

Enterprise interoperability: information, services and processes for the interoperable economy and society

Folmer, E., van Sinderen, M. & Oude Luttighuis, P., Nov 2014, In : Information systems and e-business management. 12, 4, p. 491-494 4 p.

Research output: Contribution to journalArticleAcademicpeer-review

2 Citations (Scopus)
4 Downloads (Pure)

ERP Effort Estimation Based on Expert Judgments

Erasmus, I. P. & Daneva, M., 23 Oct 2013, 2013 Joint Conference of the 23rd International Workshop on Software Measurement and the 8th International Conference on Software Process and Product Measurement. Demirors, O. & Abran, A. (eds.). USA: IEEE Computer Society, p. 104-109 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
6 Citations (Scopus)
404 Downloads (Pure)

ERP services effort estimation strategies based on early requirements

Erasmus, I. P. & Daneva, M., 11 Mar 2015, 2nd International Workshop on Requirements Engineering for the Precontract Phase (RE4P2) at REFSQ 2015. Kalenborg, A. & Trapp, M. (eds.). Essen: CEUR, p. 83-99 17 p. (CEUR Workshop Proceedings; vol. 1342).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Citation (Scopus)
155 Downloads (Pure)

Examining the examiners: an online eyebrow verification experiment inspired by FISWG

Zeinstra, C. G., Veldhuis, R. N. J. & Spreeuwers, L. J., 3 Mar 2015, International Workshop on Biometrics and Forensics, IWBF 2015. Piscataway, NJ: IEEE Computer Society, p. 1-6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)
18 Downloads (Pure)

Experiences in using practitioner's checklists to evaluate the industrial relevance of requirements engineering experiments

Daneva, M., Sikkel, K., Condori-Fernandez, N. & Herrmann, A., 28 May 2018, Proceedings 2018 ACM/IEEE 6th International Workshop on Conducting Empirical Studies in Industry, CESI 2018. IEEE, p. 5-12 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Experimental social engineering: investigation and prevention

Bullee, J-W., 6 Oct 2017, Enschede: Centre for Telematics and Information Technology (CTIT). 178 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

Open Access
File
253 Downloads (Pure)

Experimental Validation of a Risk Assessment Method

Vriezekolk, E., Etalle, S. & Wieringa, R. J., Mar 2015, 21st International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2015. Cham, Switzerland: Springer, p. 1-16 16 p. (Lecture Notes in Computer Science; vol. 9013).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2 Citations (Scopus)
57 Downloads (Pure)

Experimenting with Incentives: Security in Pilots for Future Grids

Dechesne, F., Hadziosmanovic, D. & Pieters, W., Nov 2014, In : IEEE security & privacy. 12, 6, p. 59-66 8 p.

Research output: Contribution to journalArticleAcademicpeer-review

4 Citations (Scopus)

Exploring How User Routine Affects the Recognition Performance of a Lock Pattern

de Wide, L., Spreeuwers, L. J. & Veldhuis, R. N. J., 9 Sep 2015, Proceedings of the 2015 International Conference of the Biometrics Special Interest Group (BIOSIG). Bonn: Gesellschaft für Informatik, p. 1-8 8 p. (Lecture Notes in Informatics (LNI) - Proceedings; vol. P-245).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Citation (Scopus)
22 Downloads (Pure)

Face identification in videos from mobile cameras

Mu, M., Spreeuwers, L. J. & Veldhuis, R. N. J., 24 Apr 2014, Proceedings of Netherlands Conference on Computer Vision, NCCV 2014. Delft: ASCI, p. 1-4 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
46 Downloads (Pure)

Face recognition at a distance: low-resolution and alignment problems

Peng, Y., 8 Feb 2019, Enschede: University of Twente. 131 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

Open Access
File
118 Downloads (Pure)

Face reconstruction from image sequences for forensic face comparison

van Dam, C., Veldhuis, R. & Spreeuwers, L., 2016, In : IET biometrics. 5, 2, p. 140-146 7 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
5 Citations (Scopus)
99 Downloads (Pure)

Facial recognition using new LBP representations

Akoushideh, A., Veldhuis, R. N. J., Spreeuwers, L. J. & Maybodi, B. M-N., 6 May 2015, Proceedings of the 36th WIC Symposium on Information Theory in the Benelux. Brussels: Université Libre de Bruxelles, p. 34-41 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
32 Downloads (Pure)

FFNT Annual Report 2015: Activity Report

Leisyte, L., Daneva, M., García Blanco, S., Magnanimo, V. & van Eijk, E., 2015, Enschede: Female Faculty Network Twente. 19 p.

Research output: Book/ReportReportProfessional

Open Access
File
9 Downloads (Pure)

Fixed FAR correction factor of score level fusion

Susyanto, N., Veldhuis, R. N. J., Spreeuwers, L. J. & Klaassen, C. A. J., 6 Sep 2016, p. 16555751. 8 p.

Research output: Contribution to conferencePaper

2 Citations (Scopus)

Fixed FAR Vote Fusion of regional Facial Classifiers

Spreeuwers, L. J., Veldhuis, R. N. J., Sultanali, S. & Diephuis, J., Sep 2014, BIOSIG 2014: Proceedings of the 13th International Conference of the Biometrics Special Interest Group. Busch, C. & Brömme, A. (eds.). Darmstadt: Gesellschaft für Informatik, p. 1-4 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
28 Downloads (Pure)

FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic

van Ede, T. S., Bortolameotti, R., Continella, A., Ren, J., Dubois, D. J., Lindorfer, M., Choffnes, D., van Steen, M. & Peter, A., 24 Feb 2020, Network and Distributed System Security Symposium (NDSS). 27 ed. San Diego: Internet Society

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
9 Downloads (Pure)

Focus group: cost-effective and methodologically sound ways to get practitioners involved in your empirical RE research

Daneva, M., 2 Mar 2015, REFSQ-JP 2015: REFSQ Workshops, Research Method Track, and Poster Track. CEUR, p. 211-216 5 p. (CEUR Workshop Proceedings; vol. 1342).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
4 Citations (Scopus)
43 Downloads (Pure)

ForenFace: A unique annotated forensic facial image dataset and toolset

Zeinstra, C. G., Veldhuis, R. N. J., Spreeuwers, L. J., Ruifrok, A. C. C. & Meuwly, D., 1 Nov 2017, In : IET biometrics. 6, 6, p. 487-494 8 p.

Research output: Contribution to journalArticleAcademicpeer-review

2 Citations (Scopus)

Forensic Face Recognition: From characteristic descriptors to strength of evidence

Zeinstra, C. G., 3 Nov 2017, Enschede: University of Twente. 208 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

Open Access
File
284 Downloads (Pure)

Forensic face recognition as a means to determine strength of evidence: A survey

Zeinstra, C. G., Meuwly, D., Ruifrok, A. C., Veldhuis, R. N. & Spreeuwers, L. J., 1 Jan 2018, In : Forensic Science Review. 30, 1, p. 21-32 12 p.

Research output: Contribution to journalReview articleAcademicpeer-review

7 Citations (Scopus)
43 Downloads (Pure)

Forensic image analysis - CCTV distortion and artefacts

Seckiner, D., Mallett, X., Roux, C., Meuwly, D. & Maynard, P., 1 Apr 2018, In : Forensic science international. 285, p. 77-85 9 p., 285.

Research output: Contribution to journalReview articleAcademicpeer-review

5 Citations (Scopus)

Forensic use of fingermarks and fingerprints

Meuwly, D., 2014, Encyclopedia of Biometrics. Li, S. Z. & Jain, A. K. (eds.). London: Springer, p. 1-15 15 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Formal Model of Certificate Omission Schemes in VANET

Feiri, M., Petit, J. & Kargl, F., Dec 2014, Proceedings of the IEEE Vehicular Networking Conference (VNC 2014). USA: IEEE, p. 41-44 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

From Cybercrime to Cyborg Crime: Botnets as Hybrid Criminal Actor-Networks

van der Wagen, W. & Pieters, W., 6 Mar 2015, In : British journal of criminology. 55, 2, p. 1-18 18 p.

Research output: Contribution to journalArticleAcademicpeer-review

24 Citations (Scopus)

From enterprise architecture to business models and back

Iacob, M. E., Meertens, L. O., Jonkers, H., Quartel, D., Nieuwenhuis, L. J. M. & van Sinderen, M. J., Jul 2014, In : Software and systems modeling. 13, 3, p. 1059-1083 25 p.

Research output: Contribution to journalArticleAcademicpeer-review

50 Citations (Scopus)
536 Downloads (Pure)

From fishing to phishing

Lastdrager, E. E. H., 9 Feb 2018, Enschede: University of Twente. 204 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

Open Access
File
393 Downloads (Pure)

From image sequence to frontal image: reconstruction of the unknown face: a forensic case

van Dam, C., 30 Mar 2017, Enschede: University of Twente. 109 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

Open Access
File
59 Downloads (Pure)
Open Access
File
34 Downloads (Pure)

GEM: A distributed goal evaluation algorithm for trust management

Trivellato, D., Zannone, N. & Etalle, S., May 2014, In : Theory and practice of logic programming. 14, 3, p. 293-337 45 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
13 Citations (Scopus)
68 Downloads (Pure)

General Impossibility of Group Homomorphic Encryption in the Quantum World

Armknecht, F., Gagliardoni, T., Katzenbeisser, S. & Peter, A., 2014, 17th International Conference on Practice and Theory in Public-Key Cryptography. PKC 2014. Berlin: Springer, p. 556-573 18 p. (Lecture Notes in Computer Science; vol. 8383).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

11 Citations (Scopus)

Generalized LR parsing of attribute grammars

Oude luttighuis, P. H. W. M. & Sikkel, N., 4 Feb 1993, International Workshop on Parsing Technologies. Tilburg, Netherlands/ Durbuy Belgium, p. 219-233

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Generating and analyzing synthetic finger vein images

Hillerström, F., Kumar, A. & Veldhuis, R. N. J., 10 Sep 2014, Proceedings of the 13th International Conference of the Biometrics Special Interest Group, BIOSIG 2014. Bonn: Gesellschaft für Informatik, p. 121-132 12 p. (Lecture Notes in Informatics (LNI); vol. P-230).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
156 Downloads (Pure)

Ghost in the PLC: Designing an Undetectable Programmable Logic Controller Rootkit via Pin Control Attack

Abbasi, A. & Hashemi, M., 3 Nov 2016, Black Hat Europe. United Kingdom: Black Hat, p. 1-35 35 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
41 Citations (Scopus)
354 Downloads (Pure)

Ghost in the PLC: stealth on-the-fly manipulation of programmable logic controllers’ I/O

Abbasi, A., 8 Feb 2016, Enschede: Centre for Telematics and Information Technology (CTIT). 13 p. (CTIT Technical Report Series; no. TR-CTIT-16-02)

Research output: Book/ReportReportProfessional

File
171 Downloads (Pure)

Graphical Modeling of Security Arguments: Current State and Future Directions

Ionita, D., Ford, M., Vasenev, A. & Wieringa, R. J., 2018, Graphical Models for Security: 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers. Liu, P., Mauw, S. & Stolen, K. (eds.). Springer, p. 1 - 16 16 p. (Lecture Notes in Computer Science; vol. 10744).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Grid resilience governance of the future: analyzing the role of associations in experimental smart grid projects in the Netherlands

Lammers, I. & Vasenev, A., 2017, p. 1-6. 6 p.

Research output: Contribution to conferencePaper

Groupware and the World Wide Web

Bentley, R., Busbach, U., Kerr, D. & Sikkel, N., 1997, Dordrecht: Kluwer Academic Publishers. 148 p.

Research output: Book/ReportBookAcademic

Groupware Technology and Software Reuse

Sikkel, N., 1 Nov 1998, Position papers European Reuse Workshop (ERW'98). Madrid, Spain, p. 45-48

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Handling non-functional requirements in model-driven development: an ongoing industrial survey

Ameller, D., Franch, X., Gómez, C., Araújo, J., Berntsson Svensson, R., Biffle, S., Cabot, J., Cortelessa, V., Daneva, M., Méndez Fernández, D., Moreira, A., Muccini, H., Vallecillo, A., Wimmer, M., Amaral, V., Brunelière, H., Burgueño, L., Goulão, M., Schätz, B. & Teufl, S., 17 Aug 2015, 23rd International Conference on Requirements Engineering (RE). Piscataway, NJ: IEEE Computer Society, p. 208-213 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
12 Citations (Scopus)
11 Downloads (Pure)

Handling requirements dependencies in agile projects: A focus group with agile software development practitioners

Martakis, A. & Daneva, M., 29 May 2013, IEEE 7th International Conference on Research Challenges in Information Science, RCIS 2013. Wieringa, R. J., Jean-Louis Cavarero, S., Rolland, C. & Cavarero, J. L. (eds.). USA: IEEE Computer Society, p. 1-11 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
14 Citations (Scopus)
466 Downloads (Pure)