Research Output

Live studies at REFSQ 2019

Daneva, M., Berry, D., Condori-Fernandez, N., Dalpiaz, F., Herrmann, A., Horkoff, J. & Madhavji, N., 2019, REFSQ-2019 Workshops, Doctoral Symposium, Live Studies Track, and Poster Track: Essen, Germany, March 18th, 2019. Spoletini, P., Mäder, P., Berry, D. M., Dalpiaz, F. & Daneva, M. (eds.). CEUR, 1 p. (CEUR Workshop Proceedings; vol. 2376).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
8 Downloads (Pure)

Load shifting of domestic water heaters under double price tariffs: Bringing together money savings and comfort

Belov, A., Kartak, V., Vasenev, A., Meratnia, N. & Havinga, P. J. M., 12 Oct 2016. 6 p.

Research output: Contribution to conferencePaper

6 Citations (Scopus)

Low-resolution face alignment and recognition using mixed-resolution classifiers

Peng, Y., Spreeuwers, L. & Veldhuis, R., Nov 2017, In : IET biometrics. 6, 6, p. 418-428

Research output: Contribution to journalArticleAcademicpeer-review

4 Citations (Scopus)
4 Downloads (Pure)

Low-resolution face recognition and the importance of proper alignment

Peng, Y., Spreeuwers, L. & Veldhuis, R. N. J., 17 Jun 2019, In : IET biometrics. 8, 4, p. 267-276 10 p., 18726042.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
2 Citations (Scopus)
17 Downloads (Pure)

Making Green Stuff? Effects of Corporate Greenwashing on Consumers

de Jong, M. D. T., Harkink, K. M. & Barth, S., 1 Jan 2018, In : Journal of business and technical communication. 32, 1, p. 77-112 36 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
13 Citations (Scopus)
915 Downloads (Pure)

Making Likelihood Ratios Digestible for Cross-Application Performance Assessment

Nautsch, A., Meuwly, D., Ramos, D., Lindh, J. & Busch, C., 4 Sep 2017, In : IEEE signal processing letters. 24, 10, p. 1552-1556 5 p., 17176768.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
3 Citations (Scopus)
34 Downloads (Pure)

Manually annotated characteristic descriptors: Measurability and variability

Zeinstra, C., Veldhuis, R., Spreeuwers, L. & Ruifrok, A., 26 May 2017, 2017 5th International Workshop on Biometrics and Forensics (IWBF 2017) . IEEE, 7935095

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Measuring Computer Literacy Without Questionnaires

Kegel, R. H. P. & Wieringa, R. J., 5 Apr 2016, Fourth International Workshop on Behavior Change Support Systems (BCSS 2016). Kulyk, O. A., Simons, L., Oinas-Kukkonen, H. & van Gemert-Pijnen, J. E. W. C. (eds.). Aachen: CEUR, p. 61-65 5 p. (CEUR Workshop Proceedings; vol. 1573).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
3 Citations (Scopus)
49 Downloads (Pure)

Measuring Enterprise Architecture Complexity

Iacob, M. E., Monteban, J., Van Sinderen, M., Hegeman, E. & Bitaraf, K., 15 Nov 2018, 2018 IEEE 22nd International Enterprise Distributed Object Computing Conference Workshops, EDOCW 2018. IEEE, p. 115-124 10 p. 8536112

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)
3 Downloads (Pure)

Menthor Editor

Moreira, J. L., Sales, T. P., Guerson, J., Braga, B. F. B., Brasileiro, F. & Sobral, V., 1 Sep 2016, 5 p.

Research output: Working paper

Open Access
File
2 Citations (Scopus)
20 Downloads (Pure)

Message from the 3M4SE 2011 chairs

van Sinderen, M. J., Ferreira Pires, L. & Iacob, M. E., Sep 2011, 2011 IEEE 15th International Enterprise Distributed Object Computing Conference Workshops. p. 55-56 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

4 Downloads (Pure)

Message from the 3M4SE 2014 Workshop Chairs

van Sinderen, M. J., Ferreira Pires, L. & Iacob, M. E., 2014, 18th IEEE International Enterprise Distributed Object Computing Conference Workshops and Demonstrations, EDOCW 2014. USA: IEEE, p. 333-334 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

Methodological Support to Develop Interoperable Applications for Pervasive Healthcare

Cardoso de Moraes, J. L., 5 Nov 2014, Enschede: University of Twente. 203 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

File
156 Downloads (Pure)

Model-driven Development for User-centric Well-being Support: From Dynamic Well-being Domain Models to Context-aware Applications

Bosems, S. & van Sinderen, M. J., Feb 2015, 3rd International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2015). SCITEPRESS, p. 425-432 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)

Model-Driven Information Security Risk Assessment of Socio-Technical Systems

Ionita, D., 8 Mar 2018, Enschede: Universiteit Twente. 156 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

Open Access
File
505 Downloads (Pure)

Modeling and Analyzing Digital Business Ecosystems: An Approach and Evaluation

Aldea, A., Kusumaningrum, M. C., Iacob, M. & Daneva, M., 31 Aug 2018, 2018 IEEE 20th Conference on Business Informatics (CBI). Brichni, M., Huemer, C., Proper, H. A., Rozier, D., Guerreiro, S., Guedria, W., Razo-Zapata, I., Komarov, M. M., Strecker, S., Feltus, C. & Maltseva, S. V. (eds.). Piscataway, NJ: IEEE, p. 156-163 8 p. (IEEE Conference on Business Informatics (CBI); vol. 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Downloads (Pure)

Modeling and verification of insider threats using logical analysis

Kammüller, F. & Probst, C. W., 2016, In : IEEE systems journal. 11, 2, p. 534-545 12 p.

Research output: Contribution to journalArticleAcademicpeer-review

10 Citations (Scopus)

Modeling message sequences for intrusion detection in industrial control systems

Caselli, M., Zambon, E., Petit, J. & Kargl, F., Mar 2015, Critical Infrastructure Protection IX: 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers. Rice, M. & Shenoi, S. (eds.). London: Springer, p. 49-71 23 p. (Critical Infrastructure Protection IX; vol. 466).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

11 Citations (Scopus)

Modeling resources and capabilities in enterprise architecture: A well-founded ontology-based proposal for ArchiMate

Azevedo, C. L. B., Iacob, M. E., Almeida, J. P. A., van Sinderen, M., Ferreira Pires, L. & Guizzardi, G., Dec 2015, In : Information systems. 54, p. 235-262 28 p.

Research output: Contribution to journalArticleAcademicpeer-review

63 Citations (Scopus)
389 Downloads (Pure)

Modeling value creation with enterprise architecture

Singh, P. M., Jonkers, H., Iacob, M. E. & van Sinderen, M. J., 2014, Sixteenth International Conference on Enterprise Information Systems, ICEIS 2014, Volume 3. Portugal: SCITEPRESS, p. 343-351 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)
2 Downloads (Pure)

Modelling telecom fraud with e3value

Ionita, D., Koenen, S. & Wieringa, R. J., 31 Oct 2014, Enschede: Centre for Telematics and Information Technology (CTIT). 28 p. (CTIT Technical Report Series; no. TR-CTIT-14-11)

Research output: Book/ReportReportProfessional

File
111 Downloads (Pure)

Modelling urban crime through workforce size: a test of the activity support concept

Montoya, L., 2015, In : Environment and planning. Part B: Planning and design. 42, 3, p. 399-414 40 p.

Research output: Contribution to journalArticleAcademicpeer-review

3 Citations (Scopus)

Models in the design of context-aware well-being applications

Bosems, S. & van Sinderen, M. J., Oct 2014, On the Move to Meaningful Internet Systems, OnTheMove 2014. Heidelberg: Springer, p. 37-42 6 p. (Lecture Notes in Computer Science; vol. 8842, no. 8842).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
4 Citations (Scopus)
15 Downloads (Pure)

Multi-client functional encryption for controlled data sharing

van de Kamp, T. R., 21 Feb 2020, Enschede: University of Twente. 150 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

Open Access
File
63 Downloads (Pure)

Multi-client Predicate-only Encryption for Conjunctive Equality Tests

van de Kamp, T. R., Peter, A., Everts, M. H. & Jonker, W., 2017.

Research output: Contribution to conferencePaper

Open Access
File
98 Downloads (Pure)

Multi-criteria and model-based analysis for project selection: An integration of capability-based planning, project portfolio management and enterprise architecture

Aldea, A., Iacob, M. E., Daneva, M. & Masyhur, L. H., 21 Nov 2019, 2019 IEEE 23rd International Enterprise Distributed Object Computing Workshop (EDOCW). IEEE, p. 128-135 8 p. 8907326

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Downloads (Pure)

Naming the pain in requirements engineering: Contemporary problems, causes, and effects in practice

Méndez Fernández, D., Wagner, S., Kalinowski, N., Felderer, M., Mafra, P., Vetrò, A., Conte, T., Christianson, M-T., Greer, D., Lassenius, C., Männistö, T., Nayabi, M., Oivo, M., Penzenstadler, B., Pfahl, D., Prikladnicki, R., Ruhe, G., Schekelmann, A., Sen, S., Spinola, R. & 3 others, Tuzcu, A., de la Vara, J. L. & Wieringa, R., 2017, In : Empirical software engineering. 41 p.

Research output: Contribution to journalArticleAcademicpeer-review

54 Citations (Scopus)
22 Downloads (Pure)

Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures

Dacier, M. C., Kargl, F., van der Heijden, R., van der Heijden, R., König, H. & Valdes, A., 2014, In : Informatik Spektrum. 37, 6, p. 605-607 3 p.

Research output: Contribution to journalArticleProfessional

Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292)

Dacer, M., Kargl, F., König, H. & Valdes, A., Nov 2014, In : Dagstuhl reports. 4, 7, p. 62-79 18 p.

Research output: Contribution to journalArticleAcademic

File
339 Downloads (Pure)

On Emulation-Based Network Intrusion Detection Systems

Abbasi, A., Wetzel, J., Bokslag, W., Zambon, E. & Etalle, S., 18 Sep 2014, Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID). Switzerland: Springer, p. 384-404 21 p. (Lecture Notes in Computer Science; vol. 8688).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

10 Citations (Scopus)

Online social sports networks as crime facilitators

Stottelaar, B., Senden, J. & Montoya, L., Jun 2014, In : Crime science. 3, 8, p. 1-20 20 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
6 Citations (Scopus)
59 Downloads (Pure)

On the anatomy of social engineering attacks: A literature-based dissection of successful attacks

Bullée, J-W. H., Montoya, L., Pieters, W., Junger, M. & Hartel, P., Jan 2018, In : Journal of Investigative Psychology and Offender Profiling. 15, 1, p. 20-45 26 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
5 Citations (Scopus)
87 Downloads (Pure)

On the design of context-aware applications

Shishkov, B. & van Sinderen, M. J., 2008, Proceedings of the 2nd International Workshop on Enterprise Systems and Technology (I-WEST 2008). Cordeiro, J., van Sinderen, M. J. & Shishkov, B. (eds.). Portugal: INSTICC PRESS, p. 21-34 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

On the pragmatic design of literature studies in software engineering: An experience-based guideline

Kuhrmann, M., Méndez Fernández, D. & Daneva, M., 5 Jan 2017, In : Empirical software engineering. 22, 1, p. 1-40 40 p.

Research output: Contribution to journalArticleAcademicpeer-review

36 Citations (Scopus)

On the Significance of Process Comprehension for Conducting Targeted ICS Attacks

Green, B., Krotofil, M. & Abbasi, A., 30 Oct 2017, CPS '17: Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. Association for Computing Machinery (ACM), p. 57-67

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)

OntoEmergePlan: variability of emergency plans supported by a domain ontology

Ferreira, M. I. G. B., Moreira, J., Campos, M. L. M., Braga, B. F. B., Sales, T. P., de Cordeiro, K. F. & Borges, M. R. S., 24 May 2015, 12th International Conference on Information Systems for Crisis Response and Management (ISCRAM). Agder, Norway: University of Agder, p. 1-9 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Ontology-Driven Conceptual Modeling for Early Warning Systems: Redesigning the Situation Modeling Language

Moreira, J. L., Ferreira Pires, L., van Sinderen, M. J. & Dockhorn Costa, P., 27 Feb 2017, MODELSWARD 2017: proceedings of the 5th intrnational conference on Model-Driven Engineering and Software Development: Porto, Portugal, February 19-21, 2017. Pires, L. F., Hammoudi, S. & Selic, B. (eds.). Sétubal: SCITEPRESS, p. 467-477 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

8 Citations (Scopus)

Open issues in differentiating misbehavior and anomalies for VANETs

van der Heijden, R. W. & Kargl, F., Feb 2014, Proceedings of 2nd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2014). Luxembourg City, Luxembourg: Vehicular Lab, University of Luxembourg, p. 24-26 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
38 Downloads (Pure)

Open Source Software Information Triangulation: A design science study

Wijnhoven, F., Kluitenberg, F. & Daneva, M., 28 Aug 2019, p. 1-12. 12 p.

Research output: Contribution to conferencePaper

Outlining an ‘Evaluation continuum’: Structuring evaluation methodologies for infrastructure-related decision making tools

Vasenev, A., Montoya, L. & Ionita, D., 2017, Smart Grid Inspired Future Technologies: Second EAI International Conference, SmartGIFT 2017, London, UK, March 27–28, 2017, Proceedings. Lau, E. T., chai, M. K. K., Chen, Y., Jung, O., Leung, V. C. M., Yang, K., Bessler, S., Loo, J. & Nakayama, T. (eds.). Springer, p. 243-249 6 p. ( Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; vol. 203).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
151 Downloads (Pure)

Parallel on-line parsing in constant time

Sikkel, N., 1991, Universiteit Twente. 11 p. (Memoranda informatica; no. 64)

Research output: Book/ReportReportProfessional

Parallel On-line Parsing in Constant Time per Word

Sikkel, N., 1993, In : Theoretical computer science. 120, 2, p. 303-310 8 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
2 Citations (Scopus)
63 Downloads (Pure)

Parsing of context-free languages

Sikkel, N. & Nijholt, A., 1997, Handbook of Formal Languages. Part II. Chapter 17, A. Salomma & G. Rozenberg (eds.). Berlin, Germany: Springer, p. 61-100

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Parsing Schemata

Sikkel, N., 17 Dec 1993, Enschede: Universiteit Twente. 412 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

File
201 Downloads (Pure)

Parsing schemata. A framework for parallel and sequential parsing

Sikkel, N., 1993, In : Memoranda informatica. 28, p. - 98 p.

Research output: Contribution to journalArticleProfessional

Parsing Schemata and Correctness of Parsing algorithms

Sikkel, N., 1998, In : Theoretical computer science. 1998, 199, p. 87-103

Research output: Contribution to journalArticleAcademicpeer-review

Parsing Schemata and Correctness of Parsing Algorithms

Sikkel, N., 1995, In : CTIT workshop proceedings series. 5, 10, p. 83-97

Research output: Contribution to journalArticleAcademic

PBT: A parallel bottom-up Tomita parser

Lankhorst, M. & Sikkel, N., 1991, Universiteit Twente. 7 p. (Memoranda informatica; no. 91-68)

Research output: Book/ReportReportProfessional

Peak load reduction of multiple water heaters: Respecting consumer comfort and money savings

Belov, A., Vasenev, A., Kartak, V., Meratnia, N. & Havinga, P. J. M., Nov 2016. 7 p.

Research output: Contribution to conferencePaper

3 Citations (Scopus)
1 Downloads (Pure)

Personalized support for well-being at work: an overview of the SWELL project

Kraaij, W., Verberne, S., Koldijk, S., de Korte, E., van Dantzig, S., Sappelli, M., Shoaib, M., Bosems, S., Achterkamp, R., Bonomi, A., Schavemaker, J., Hulsebosch, B., Wabeke, T., Vollenbroek-Hutten, M., Neerincx, M. & Sinderen, M. V., 20 Jun 2019, In : User modeling and user-adapted interaction. 34 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
1 Citation (Scopus)
28 Downloads (Pure)