Research Output

Head-Corner Chart Parsing

Sikkel, N. & op den Akker, H. J. A., 4 Nov 1992, Computing Science in the Netherlands (CSN'92). Utrecht, p. 279-290 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

HeadPrint: Detecting Anomalous Communications through Header-based APplication Fingerprinting

Bortolameotti, R., van Ede, T. S., Continella, A., Hupperich, T. M., Everts, M. H., Rafati, R., Jonker, W., Hartel, P. H. & Peter, A., 30 Mar 2020, SAC'20. p. 1696-1705 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
14 Downloads (Pure)

Het Oersoep Algorithme

Sikkel, N., 1 Sep 1992, In : TA!. p. 31-38

Research output: Contribution to journalArticlePopular

Het succes van social engineering

Bullee, J-W., Montoya, L., Junger, M. & Hartel, P., 2018, In : Tijdschrift voor veiligheid. 17, 1-2, p. 40-53 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
196 Downloads (Pure)

Het vervangen van een ziekenhuisinformatiesysteem: een voorbeeld van projektonderwijs bij Bedrijfsinformatietechnologie

Sikkel, N., Spil, A. A. M. & van de Weg, R. L. W., 1999, In : TINFON. 8, 3, p. 106-109

Research output: Contribution to journalArticleAcademic

Het vervangen van een ziekenhuisinformatiesysteem. Een voorbeeld van projektonderwijs bij Bedrijfsinformatietechnologie

Sikkel, N., Spil, A. A. M. & van de Weg, R. L. W., 1999, In : TINFON. 8, 3, p. 106-109 4 p.

Research output: Contribution to journalArticleProfessional

File
29 Downloads (Pure)

Higher-Order Threshold Implementation

Bilgin, B., Gierlichs, B., Nikova, S., Nikov, V. & Rijmen, V., Dec 2014, Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings. Sarkar, P. & Iwata, T. (eds.). London: Springer, p. 326-343 19 p. (Lecture Notes in Computer Science; vol. 8874).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

98 Citations (Scopus)

How Effective is Anti-Phishing Training for Children? (Distinguished Paper Award)

Lastdrager, E. E. H., Carvajal Gallardo, I. R., Hartel, P. H. & Junger, M., 14 Jul 2017, Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, p. 229-239 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
25 Downloads (Pure)

How practitioners approach gameplay requirements? An exploration into the context of massive multiplayer online role-playing games

Daneva, M., 22 Aug 2014, 2014 IEEE 22nd International Requirements Engineering Conference, RE 2014. Lutz, R. (ed.). USA: IEEE Computer Society, p. 3-12 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
6 Citations (Scopus)
25 Downloads (Pure)

How Random Is a Classifier Given Its Area under Curve?

Zeinstra, C., Veldhuis, R. & Spreeuwers, L., 28 Sep 2017, 2017 International Conference of the Biometrics Special Interest Group (BIOSIG): BIOSIG 2017. Brömme, A., Busch, C., Dantcheva, A., Rathgeb, C. & Uhl, A. (eds.). Gesellschaft für Informatik, 8053509

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

How to manage and model unstructured business processes: A proposed list of representational requirements

Allah Bukhsh, Z., van Sinderen, M., Sikkel, K. & Quartel, D., 18 Jan 2019, E-Business and Telecommunications: 14th International Joint Conference, ICETE 2017, Revised Selected Paper. Obaidat, M. S. & Cabello, E. (eds.). Springer, p. 81-103 23 p. (Communications in Computer and Information Science; vol. 990).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)
1 Downloads (Pure)

How to Reduce Software Development Cost with Personnel Assignment Optimization

Wang, C., Luo, Z., Lin, L. & Daneva, M., 2017, EASE'17: Proceedings of the 21st International Conference on Evaluation and Assessment in Software Engineering. New York, NY: ACM Press, p. 270-279 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)
File
17 Citations (Scopus)
163 Downloads (Pure)

Hunting the Unknown

Constante, E., den Hartog, J., Petkovic, M., Etalle, S. & Pechenizkiy, M., 2014, 28th Annual IFIP WG 11.3 Working ConferenceData and Applications Security and Privacy (DBSec). Berlin: Springer, p. 243-259 17 p. (Lecture Notes in Computer Science; vol. 8566).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
10 Citations (Scopus)
23 Downloads (Pure)

Hybrid multidimensional design for heterogeneous data supported by ontological analysis: an application case in the Brazilian electric system operation

Moreira, J., Cordeiro, K., Campos, M. L. M. & Borges, M., 27 Mar 2015, 4th Workshop on Energy Data Management (EnDM) in the 18th International Conference on Extending Database Technology (EDBT). Belgium: CEUR, p. 72-77 6 p. (CEUR workshop proceedings; vol. 1330).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Hybrid tree-rule firewall for high speed data transmission

Chomsiri, T., He, X., Nanda, P. & Tan, Z., 14 Apr 2017, In : IEEE transactions on cloud computing. p. 1-13 13 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
44 Downloads (Pure)

ICETE 2017: Proceedings of the 14th International Joint Conference on e-Business and Telecommunications

van Sinderen, M. J. (ed.), Obaidat, M. S. & Cabello, E., 26 Jul 2017, ICE-B ed. Madrid: SCITEPRESS.

Research output: Book/ReportBook editingAcademic

Identification Performance of Evidential Value Estimation for Fingermarks

Kotzerke, J., Kotzerke, J., Davis, S., Hayes, R., Spreeuwers, L. J., Veldhuis, R. N. J. & Horadam, K. J., 15 Sep 2015, Proceedings of the 2015 International Conference of the Biometrics Special Interest Group (BIOSIG). Bonn: Gesellschaft für Informatik, p. 1-6 6 p. (Lecture Notes in Informatics (LNI) - Proceedings; vol. P-245).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Identification performance of evidential value estimation for ridge-based biometrics

Kotzerke, J., Hao, H., Davis, S. A., Hayes, R., Spreeuwers, L. J., Veldhuis, R. N. J. & Horadam, K. J., 26 Oct 2016, In : EURASIP journal on information security. 2016, 24, p. 1-10 10 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
2 Citations (Scopus)
91 Downloads (Pure)

Impact of eye detection error on face recognition performance

Dutta, A., Günther, M., El Shafey, L., Veldhuis, R. N. J. & Spreeuwers, L. J., 19 Jan 2015, In : IET biometrics. 4, 3, p. 137-150 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

9 Citations (Scopus)

Implementations of service oriented architecture and agile software development: What works and what are the challenges?

Schramm, M. & Daneva, M., 31 May 2016, p. 1-12. 12 p.

Research output: Contribution to conferencePaper

Open Access
2 Citations (Scopus)

Improving cloud network security using tree-rule firewall

He, X., Chomsiri, T., Nanda, P. & Tan, Z., Jan 2014, In : Future generation computer systems. 30, p. 116-126 11 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
30 Citations (Scopus)
168 Downloads (Pure)

Improving context-aware applications for the well-being domain: Model-driven design guided by medical knowledge

Bosems, S. & van Sinderen, M. J., Jan 2014, Proceedings of the third International Conference on Sensor Networks, SENSORNETS 2014. Portugal: INSTICC, p. 397-403 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2 Citations (Scopus)
19 Downloads (Pure)

Improving Feedback and Classroom Interaction Using Mobile Phones

Bär, H., Tews, E. & Rößling, G., 2005, Mobile Learning 2005 Proceedings: Proceedings of the IADIS International Conference on Mobile Learning . Isaías, P., Borg, C., Kommers, P. & Bonanno, P. (eds.).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access

Improving semantic interoperability of big data for epidemiological surveillance

Moreira, J., van Sinderen, M. J., Ferreira Pires, L. & Dockhorn Costa, P., Mar 2016, Enterprise Interoperability in the Digitized and Networked Factory of the Future, I-ESA 2016. Zelm, M., Doumeingts, G. & Mendonca, J. P. (eds.). UK: International Society for Technology in Education, p. 314-324 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

36 Downloads (Pure)

Improving the semantic interoperability of IoT Early Warning Systems: the Port of Valencia use case

Moreira, J. L., van Sinderen, M. J., Ferreira Pires, L., Wieringa, R. J., Singh, P. M., Dockhorn Costa, P. & Llop, M., 1 Nov 2018.

Research output: Contribution to conferencePaper

INACHUS : Integrated wide area situation awarenesss and survivor localization in search and rescue operations

Athanasiou, G., Amditis, A., Riviere, N., Makri, E., Makri, E., Bartzas, A., Anyfantis, A., Werner, R., Alexsson, D., di Girolamo, E., Etienne, N., Schaap, M., Kerle, N., Bozabalian, N., Marafioti, G., Berzosa, J. & Gustafsson, A., 8 Dec 2015, Book of abstracts of the 5th International Conference on Earth Observation for Global Changes (EOGC) and the 7th Geo-information Technologies for Natural Disaster Management (GiT4NDM). United Nations Office for Outer Space Affairs, p. 1-1 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
11 Downloads (Pure)

Incorporating enterprise strategic plans into enterprise architecture

Lins Borges Azevedo, C., 29 Nov 2017, Enschede: University of Twente. 168 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

Open Access
File
225 Downloads (Pure)

Incorporating FAIR into Bayesian Network for Numerical Assessment of Loss Event Frequencies of Smart Grid Cyber Threats

Le, A., Chen, Y., Chai, K. K., Vasenev, A. & Montoya, L., 1 Sep 2018, In : Mobile networks & applications. 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
3 Citations (Scopus)
101 Downloads (Pure)

Indicators of Malicious SSL Connections

Bortolameotti, R., Peter, A., Everts, M. H. & Bolzoni, D., Nov 2015, 9th International Conference on Network and System Security, NSS 2015. New York: Springer, p. 162-175 14 p. (Lecture Notes in Computer Science; vol. 9408).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Influence of the datasets size on the stability of the LR in the lower region of the within source distribution

Haraksim, R. & Meuwly, D., Oct 2013, Proceedings of Biometric Technologies in Forensic Science, BTFS 2013. Nijmegen: Radboud University Nijmegen, p. 34-38 5 p. (Biometric Technologies in Forensic Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
53 Downloads (Pure)

Information fusion of GNSS sensor readings, field notes, and expert's a priori knowledge

Vasenev, A., Ionita, D., Bijleveld, F., Hartmann, T. & Doree, A. G., 1 Jul 2013, eg-ice 2013 20th international workshop: intelligent computing in engineering, July 1 - 3, 2013, Vienna, Austria. Suter, G., de Wilde, P. & Rafiq, Y. (eds.). Vienna, Austria: TU Wien, p. 1-10 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2 Citations (Scopus)
17 Downloads (Pure)

Infrared drones in the construction industry: Designing a protocol for building thermography procedures

Entrop, A. G. & Vasenev, A., 2017, In : Energy procedia. 132, p. 63-68 6 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
14 Citations (Scopus)
617 Downloads (Pure)

In-Network Aggregation for Vehicular Ad Hoc Networks

Dietzel, S., Petit, J., Kargl, F. & Scheuermann, B., Nov 2014, In : IEEE communications surveys & tutorials. 16, 4, p. 1909-1932 26 p.

Research output: Contribution to journalArticleAcademicpeer-review

36 Citations (Scopus)

Insights on the Security and Dependability of Industrial Control Systems

Kargl, F., van der Heijden, R., van der Heijden, R. W., König, H., Valdes, A. & Dacier, M. C., Nov 2014, In : IEEE security & privacy. 12, 6, p. 75-78 4 p.

Research output: Contribution to journalArticleAcademic

15 Citations (Scopus)

Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications

Chockalingam, S., Hadziosmanovic, D., Pieters, W., Texeira, A. & van Gelder, P., Oct 2016, Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers. Havarneanu, G., Setola, R., Nassopoulos, H. & Wolthusen, S. (eds.). Cham: Springer, p. - (Lecture Notes in Computer Science; vol. 10242)(Security and Cryptology).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
165 Downloads (Pure)

Interactive decryption of DECT phone calls

McHardy, P., Schuler, A. & Tews, E., 2011, Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011. Gollmann, D., Westhoff, D., Tsudik, G. & Asokan, N. (eds.). Association for Computing Machinery (ACM), p. 71-78 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)

Interactive Illustrative Line Styles and Line Style Transfer Functions for Flow Visualization

Everts, M. H., Bekker, H., Roerdink, J. B. T. M. & Isenberg, T., 19 Mar 2015.

Research output: Working paper

Open Access
File
34 Downloads (Pure)

Interoperability architecture for electric mobility

Brand, A. & Iacob, M. E., 2015, Enterprise Interoperability - Proceedings of the 6th International IFIP Working Conference, IWEI 2015. van Sinderen, M. J. & Chapurlat, V. (eds.). Berlin Heidelberg: Springer, p. 126-140 15 p. (Lecture Notes in Business Information Processing; vol. 213).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Interoperability challenges for context aware logistics services - the case of synchromodal logistics

Singh, P. M. & van Sinderen, M. J., 2015, Proceedings of the Workshops of the 6th International IFIP Working Conference on Enterprise Interoperability, IWEI-WS 2015. Zelm, M. (ed.). Aachen: CEUR, p. 9 9 p. (CEUR Workshop Proceedings; vol. 1414).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Citation (Scopus)
56 Downloads (Pure)

Introducing the Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics

Mayoral Vilches, V., Alzola Kirschgens, L., Bilbao Calvo, A., Hernández Cordero, A., Izquierdo Pisón, R., Mayoral Vilches, D., Muñiz Rosas, A., Olalde Mendia, G., Usategi San Juan, L., Zamalloa Ugarte, I., Gil-Uriarte, E., Tews, E. & Peter, A., 2018.

Research output: Contribution to conferencePaper

Intrusion Detection in Networked Control Systems: From System Knowledge to Network Security

Caselli, M., 4 Nov 2016, Enschede: Universiteit Twente. 169 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

File
437 Downloads (Pure)

Intrusion detection method based on nonlinear correlation measure

Ambusaidi, M. A., Tan, Z., He, X., Nanda, P., Lu, L. F. & Jamdagni, A., Dec 2014, In : International journal of internet protocol technology. 8, 2/3, p. 77-86 10 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
7 Citations (Scopus)
28 Downloads (Pure)

Investigating the usability and utility of tangible modelling of socio-technical architectures

Ionita, D., Wieringa, R. J., Bullee, J-W. & Vasenev, A., 29 May 2015, Enschede: Centre for Telematics and Information Technology (CTIT). 29 p. (CTIT Technical Report Series; no. TR-CTIT-15-03)

Research output: Book/ReportReportProfessional

File
52 Downloads (Pure)

Inzicht en toezicht. Controle in de kennissamenleving: Inleiding Jaarboek Kennissamenleving

Pieters, W., Boersma, K., Alberts, G., Timmer, J., Dijkstra, A. & Popkema, M., 2010, Inzicht en toezicht. Jaarboek KennisSamenleving. Amsterdam: Aksant, Vol. 6. p. 7-17

Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

Open Access
File
13 Downloads (Pure)

Left-Corner and Head-Corner Chart Parsing

Sikkel, N. & op den Akker, H. J. A., 1992, Universiteit Twente. 28 p. (Memoranda informatica; no. 92-55)

Research output: Book/ReportReportProfessional

Lightweight metrics for enterprise architecture analysis

Singh, P. M. & van Sinderen, M. J., 2015, Business Information Workshops - Revised Papers of BIS 2015 International Workshops. Abramowicz, W. (ed.). Switzerland: Springer, p. 113-125 13 p. (Lecture Notes in Business Information Processing; vol. 228).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Likelihood Ratio Based Mixed Resolution Facial Comparison

Peng, Y., Spreeuwers, L. J. & Veldhuis, R. N. J., 3 Mar 2015, Proceedings of the 3rd International Workshop on Biometrics and Forensics, IWBF 2015. USA: IEEE Computer Society, p. 1-5 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
6 Citations (Scopus)
46 Downloads (Pure)

Likelihood ratio based verification in high dimensional spaces

Hendrikse, A. J., Veldhuis, R. N. J. & Spreeuwers, L. J., Jan 2014, In : IEEE transactions on pattern analysis and machine intelligence. 36, 1, p. 127-139 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
3 Citations (Scopus)
25 Downloads (Pure)

Likelihood ratio data to report the validation of a forensic fingerprint evaluation method

Ramos, D., Haraksim, R. & Meuwly, D., 1 Feb 2017, In : Data in brief. 10, p. 75-92 18 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
4 Citations (Scopus)
90 Downloads (Pure)