Research Output

Perspectives of software re-usability

Sikkel, N. & van Vliet, J. C., 1 Sep 1991, Software Reuse, Utrecht 1989, Proceedings of the Software Re-use Workshop. Dusink, L. M. & Hall, P. A. V. (eds.). Berlin: Springer, p. 131-136 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Perspectives of Software Reusablity

Sikkel, N. & van Vliet, J. C., 1990, Utrecht: SERC Utrecht. 6 p. (Collected papers january-may 1990)

Research output: Book/ReportReportProfessional

Persuasive technologies: a systematic literature review and application to PISA

Kegel, R. H. P. & Wieringa, R. J., 13 May 2014, Enschede: Centre for Telematics and Information Technology (CTIT). 36 p. (CTIT Technical Report Series; no. TR-CTIT-14-07)

Research output: Book/ReportReportProfessional

Open Access
File
659 Downloads (Pure)

Physical and Digital Security Mechanisms: Properties, Combinations and Trade-offs

van Cleeff, A., 3 Jun 2015, Enschede: Universiteit Twente. 358 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

File
1609 Downloads (Pure)

Play-testing and requirements engineering: implications for research and teaching

Daneva, M., 6 May 2015, 2nd IEEE/ACM International Workshop on Requirements Engineering and Testing, RET@ICSE 2015. Bjarnason, E., Borg, M. & Morandino, M. (eds.). New York: Association for Computing Machinery (ACM), p. 9-12 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2 Citations (Scopus)
24 Downloads (Pure)

Practical attacks against WEP and WPA

Tews, E. & Beck, M., 2009, Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009. Basin, D. A., Capkun, S. & Lee, W. (eds.). Association for Computing Machinery (ACM), p. 79-86 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

106 Citations (Scopus)

Practical Mutation Testing for Smart Contracts

Honig, J. J., Everts, M. H. & Huisman, M., 2019, Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26-27, 2019, Proceedings. Pérez-Solà, C., Navarro-Arribas, G., Biryukov, A. & García-Alfaro, J. (eds.). Cham: Springer, p. 289-303 15 p. (Lecture Notes in Computer Science; vol. 11737).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)
1 Downloads (Pure)

Predicting Performance of a Face Recognition System Based on Image Quality

Dutta, A., 24 Apr 2015, Enschede: University of Twente. 136 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

File
274 Downloads (Pure)

Predicting service composition costs with complex cost behavior

Albuquerque de Medeiros, R. W., Ferreira Pires, L. & Rosa, N. S., 27 Jun 2015, 12th IEEE International Conference on Service Computing, SCC 2015. USA: IEEE Computer Society, p. 419-426 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

7 Citations (Scopus)

Prediction of domain behaviour through dynamic well-being domain model analysis

Bosems, S. & van Sinderen, M. J., 2015, In : Scientific world journal. 2015, p. 11 11 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
35 Downloads (Pure)

Predictive head-corner chart parsing

Sikkel, N. & op den Akker, H. J. A., 15 Feb 1993, Tilburg, Netherlands

Research output: Other contributionOther research output

Preface: 13th Open European Summer School and IFIP TC6.6 Workshop, EUNICE 2007 Enschede, The Netherlands, July 18-20, 2007 proceedings

Pras, A. & van Sinderen, M., 1 Jan 2007, Dependable and Adaptable Networks and Services - 13th Open European Summer School and IFIP TC6.6 Workshop, EUNICE 2007, Proceedings. Pras, A. & van Sinderen, M. (eds.). Springer, p. V-VI (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4606).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
8 Downloads (Pure)

Preface to the fourth international workshop on models and model-driven methods for service engineering - 3M4SE 2013

Van Sinderen, M., Pires, L. F. & Iacob, M. E., 2013, 2013 17th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW). p. 207-208 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Priming and warnings are not effective to prevent social engineering attacks

Junger, M., Montoya, L. & Overink, F. J., 2017, In : Computers in human behavior. 66, p. 75-87 13 p.

Research output: Contribution to journalArticleAcademicpeer-review

39 Citations (Scopus)
1 Downloads (Pure)

Privacy-enhanced participatory sensing with collusion resistance and data aggregation

Günther, F., Manulis, M. & Peter, A., 2014, 13th International Conference on Cryptology and Network Security (CANS 2014). London: Springer, p. 321-336 16 p. (Lecture Notes in Computer Science; vol. 8813).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

9 Citations (Scopus)

Privacy implications of presence sharing in mobile messaging applications

Buchenscheit, A., Könings, B., Neubert, A., Schaub, F., Schneider, M. & Kargl, F., Nov 2014, Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia (IEEE MUM 2014). New York: Association for Computing Machinery (ACM), p. 20-29 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

13 Citations (Scopus)

Privacy-preserving architecture for forensic image recognition

Peter, A., Hartman, T., Muller, S. & Katzenbeisser, S., 5 Dec 2013, IEEE International Workshop on Information Forensics and Security, WIFS 2012. USA: IEEE Computer Society, p. 79-84 6 p. (Information Forensics and Security (WIFS), 2012 IEEE International Workshop; no. 13249609).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
7 Citations (Scopus)
134 Downloads (Pure)

Privacy-Preserving Verification of Clinical Research

Makri, E., Everts, M. H., de Hoogh, S., Peter, A., op den Akker, H., Hartel, P. H. & Jonker, W., 2014, Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). Bonn: Gesellschaft für Informatik, p. 481-500 20 p. (Lecture Notes in Informatics (LNI)).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Citation (Scopus)
18 Downloads (Pure)

Privacy preserving whole genome sequence processing through proxy-aided ORAM

Karvelas, N. P., Peter, A., Katzenbeisser, S., Tews, E., Tews, E. & Hamacher, K., 2014, 13th Annual ACM Workshop on Privacy in the Electronic Society (WPES 2014). New York: Association for Computing Machinery (ACM), p. 1-10 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

13 Citations (Scopus)

Private Sharing of IOCs and Sightings

van de Kamp, T. R., Peter, A., Everts, M. H. & Jonker, W., 2016, 3rd ACM Workshop on Information Sharing and Collaborative Security, WISCS 2016. New York: Association for Computing Machinery (ACM), p. 35-38 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)
2 Downloads (Pure)

Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, 12th April, 2014

Kordy, B. (ed.), Kordy, B., Mauw, S. (ed.), Mauw, S. & Pieters, W. (ed.), 12 Apr 2014, Ithaca, NY, USA: EPTCS.ORG. 93 p. (EPTCS; vol. 148)

Research output: Book/ReportBook editingAcademic

File
105 Downloads (Pure)

Proceedings of the 13th International Conference on Software Technologies: July 26-28, 2018, in Porto, Portugal

Maciaszek, L. A. & van Sinderen, M. J., 28 Jul 2018, SCITEPRESS. 897 p.

Research output: Book/ReportBook editingAcademic

Proceedings of the 15th International Joint Conference on e-Business and Telecommunications (Volume 2)

Callegari, C., van Sinderen, M., Novais, P., Sarigiannidis, P. G., Battiato, S., Serrano Sanches de Leon, A., Lorenz, P. & Obaidat, M. S., 2018, Setúbal: SCITEPRESS.

Research output: Book/ReportBook editingAcademic

Process Support for Cooperative Work on the World Wide Web

Sikkel, N., Neumann, O. & Sachweh, S., Jan 1998, 6th EuroMicro Workshop on Parallel and Distributed Processing. Los Alamitos, California, USA: IEEE Computer Society, p. 325-334 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
51 Downloads (Pure)

ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation

Biedermann, S., Karvelas, N. P., Katzenbeisser, S., Strufe, T. & Peter, A., 2014, Proceedings of the 40th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2014). Berlin: Springer, p. 114-125 12 p. (Lecture Notes in Computer Science; vol. 8327).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Pseudonym schemes in vehicular networks: a survey

Petit, J., Schaub, F., Feiri, M. & Kargl, F., Mar 2015, In : IEEE communications surveys & tutorials. 17, 1, p. 228-255 32 p.

Research output: Contribution to journalArticleAcademicpeer-review

195 Citations (Scopus)

Publicly Verifiable Private Aggregation of Time-Series Data

Bakondi, B. G., Peter, A., Everts, M. H., Hartel, P. H. & Jonker, W., 1 Aug 2015, 10th International Conference on Availability, Reliability and Security, ARES 2015. Piscataway, NJ, USA: IEEE, p. 50-59 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET)

Förster, D., Kargl, F. & Löhr, H., Dec 2014, 2014 IEEE Vehicular Networking Conference (VNC). Piscataway, NJ, USA: IEEE, p. 25-32 8 p. (IEEE Vehicular Networking Conference (VNC); vol. 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

25 Citations (Scopus)

PUCA: A pseudonym scheme with strong privacy guarantees for vehicular ad-hoc networks

Förster, D., Kargl, F. & Löhr, H., Feb 2016, In : Ad hoc networks. 37, Part 1, p. 122-132 11 p.

Research output: Contribution to journalArticleAcademicpeer-review

21 Citations (Scopus)
Open Access
File
6 Citations (Scopus)
89 Downloads (Pure)

Quality-of-data broker for quality-of-data-aware telemedicine systems

Larburu Rubio, N., Bults, R. G. A., van Sinderen, M. J., Widya, I. A. & Hermens, H. J., 2016, In : IRBM (Ingenierie et recherche biomedicale). 37, 4, p. 210-218 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
4 Citations (Scopus)
70 Downloads (Pure)

Quality-of-Data Management for Telemedicine Systems

Larburu Rubio, N., Bults, R. G. A., van Sinderen, M. J. & Hermens, H. J., Sep 2015, 5th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2015). Amsterdam: Elsevier, p. 451-458 8 p. (Procedia Computer Science (2015); vol. 63).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)

Quality requirements challenges in the context of large-scale distributed agile: An empirical study

Alsaqaf, W., Daneva, M. & Wieringa, R., 1 Jun 2019, In : Information and software technology. 110, p. 39-55 17 p.

Research output: Contribution to journalArticleAcademicpeer-review

2 Citations (Scopus)

Quality requirements challenges in the context of large-scale distributed agile: An empirical study

Alsaqaf, W., Daneva, M. & Wieringa, R. J., 19 Mar 2018, Requirements Engineering: Foundation for Software Quality - 24th International Working Conference, REFSQ 2018, Utrecht, The Netherlands, March 19-22, 2018. Proceedings. Kamsties, E., Horkoff, J. & Dalpiaz, F. (eds.). Springer, p. 139-154 16 p. (Lecture Notes in Computer Science; vol. 10753).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Quality requirements in large-scale distributed agile projects - A systematic literature review

Alsaqaf, W., Daneva, M. & Wieringa, R., 2017, Requirements Engineering: Foundation for Software Quality: 23rd International Working Conference, REFSQ 2017, Essen, Germany, February 27 – March 2, 2017, Proceedings. Grünbacher, P. & Perini, A. (eds.). Springer, p. 219-234 (Lecture Notes in Computer Science; vol. 10153).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

20 Citations (Scopus)

Quantitative, Value-driven Risk Analysis of e-Services

Ionita, D., Gordijn, J., Yesuf, AS. & Wieringa, R. J., 22 May 2018, In : Journal of Information Systems.

Research output: Contribution to journalArticleAcademicpeer-review

1 Citation (Scopus)

Quantitative Penetration Testing with Item Response Theory

Arnold, F., Pieters, W. & Stoelinga, M. I. A., 2014, In : Journal of information assurance and security. 9, 3, p. 118-127 10 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
35 Downloads (Pure)

Reading between the fields: practical, effective intrusion detection for industrial control systems

Yüksel, Ö., den Hartog, J. & Etalle, S., 4 Apr 2016, SAC '16 Proceedings of the 31st Annual ACM Symposium on Applied Computing. New York: Association for Computing Machinery (ACM), p. 2063-2070 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
14 Citations (Scopus)
178 Downloads (Pure)

Realizing Traceability from the Business Model to Enterprise Architecture

Engelsman, W., Wieringa, R. J., van Sinderen, M. J., Gordijn, J. & Haaker, T., 27 Oct 2019, Advances in Conceptual Modeling: ER 2019 Workshops FAIR, MREBA, EmpER, MoBiD, OntoCom, and ER Doctoral Symposium Papers, Salvador, Brazil, November 4–7, 2019, Proceedings. Guizzardi, G., Gailly, F. & Pitangueira Maciel, R. S. (eds.). Springer, p. 37-46 (Lecture Notes in Computer Science; vol. 11787).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Real world privacy expectations in VANETs real world privacy expectations in VANETs

Feiri, M., Petit, J. & Kargl, F., Feb 2014, Proceedings of the 2nd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2014). Luxembourg City, Luxembourg: Vehicular Lab, University of Luxembourg, p. 30-32 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
25 Downloads (Pure)

Reconciling Malicious and Accidental Risk in Cyber Security

Pieters, W., Lukszo, Z., Hadziosmanovic, D. & van den Berg, J., May 2014, In : Journal of internet services and information security. 4, 2, p. 4-26 23 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
167 Downloads (Pure)

Reducing user discomfort in direct load control of domestic water heaters

Belov, A., Vasenev, A., Havinga, P. J. M., Meratnia, N. & van der Zwaag, B. J., 6 Nov 2015, Proceedings of the IEEE Innovative Smart Grid Technologies - Asia (ISGT ASIA 2015). USA: IEEE Computer Society, p. 1-6 6 p. (IEEE Transactions on Smart Grid).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
8 Citations (Scopus)
35 Downloads (Pure)

Redundancy-based Statistical Analysis for Insider Attack Detection in VANET Aggregation Schemes

Dietzel, S., Gürtler, J., van der Heijden, R., van der Heijden, R. & Kargl, F., Dec 2014, Proceedings of the IEEE Vehicular Networking Conference 2014 (VNC 2014). USA: IEEE, p. 135-142 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

8 Citations (Scopus)

Reference architecture for integration platforms

Singh, P. M., van Sinderen, M. J. & Wieringa, R. J., 13 Oct 2017, 2017 IEEE 21st International Enterprise Distributed Object Computing Conference (EDOC). Piscataway, NJ, USA: IEEE, p. 113-122 10 p. (IEEE International Enterprise Distributed Object Computing Conference (EDOC); vol. 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Regional fusion for high-resolution palmprint recognition using spectral minutiae representation

Wang, R., Ramos, D., Veldhuis, R., Fierrez, J., Spreeuwers, L. & Xu, H., Jun 2014, In : IET biometrics. 3, 2, p. 94-100 7 p.

Research output: Contribution to journalArticleAcademicpeer-review

13 Citations (Scopus)
18 Downloads (Pure)

Regression Nodes: Extending attack trees with data from social sciences

Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Jul 2015, Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015). Piscataway, New Jersey: IEEE Computer Society, p. 17-23 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Relating business intelligence and enterprise architecture - A method for combining operational data with architectural metadata

Veneberg, R. K. M., Iacob, M. E., van Sinderen, M. J. & Bodenstaff, L., Jun 2016, In : International journal of cooperative information systems. 25, 02, p. - 36 p., 1650007.

Research output: Contribution to journalArticleAcademicpeer-review

7 Citations (Scopus)

Reliably determining data leakage in the presence of strong attackers

Bortolameotti, R., Peter, A., Everts, M. H., Jonker, W. & Hartel, P. H., Dec 2016, Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016. New York: Association for Computing Machinery (ACM), p. 484-495 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Replacing a Hospital Information System: an example of a real-world case study

Sikkel, N., Spil, A. A. M. & van de Weg, R. L. W., Mar 1999, 12th Conference on Software Engineering Education and Training (CSEE&T'99). Los Alamitos, California, USA: IEEE Computer Society, p. 6-15 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
5 Citations (Scopus)
880 Downloads (Pure)

Requirements engineering: foundation for software quality

Daneva, M. (ed.) & Pastor, O. (ed.), 6 Mar 2016, London: Springer. 300 p. (Lecture Notes in Computer Science; vol. 9619, no. 6919)

Research output: Book/ReportBook editingAcademic

File
812 Downloads (Pure)