Research Output

Requirements Engineering Since the Year One Thousand

Wieringa, R. J., 4 Sep 2017, p. 480 - 481. 2 p.

Research output: Contribution to conferencePaper

1 Citation (Scopus)

Requirements for smart cities: Results from a systematic review of literature

Daneva, M. & Lazarov, B., 6 Jul 2018, 2018 12th International Conference on Research Challenges in Information Science, RCIS 2018. Piscataway, NJ: IEEE Computer Society, 6 p. (Proceedings International Conference on Research Challenges in Information Science (RCIS); vol. 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)

Resilient In-Network Aggregation for Vehicular Networks

Dietzel, S., 24 Apr 2015, Enschede: University of Twente. 268 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

File
237 Downloads (Pure)

Rethinking Blockchain Security: Position Paper

Chia, V., Hartel, P. H., Hum, Q., Ma, S., Piliouras, G., Reijsbergen, D., Van Staalduinen, M. & Szalachowski, P., 3 Jun 2019, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, p. 1273-1280 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Revisiting attacker model for smart vehicles

Petit, J., Feiri, M. & Kargl, F., Sep 2014, IEEE 6th International Symposium on Wireless Vehicular Communications (WiVeC 2014). USA: IEEE, p. 1-5 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

10 Citations (Scopus)

REWIRE – Revocation without resolution: A privacy-friendly revocation mechanism for vehicular ad-hoc networks

Förster, D., Löhr, H., Zibuschka, J. & Kargl, F., 2015, Trust and Trustworthy Computing: 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings. Conti, M., Schunter, M. & Askoxylakis, I. (eds.). Cham: Springer, p. 193-208 16 p. (Lecture Notes in Computer Science; vol. 9229).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)

Risk assessment as an argumentation game

Prakken, H., Ionita, D. & Wieringa, R. J., Sep 2013, 14th International Workshop on Computational Logic in Multi-Agent Systems, CLIMA XIV. Leite, J., Son, T. C., Torrini, P., Van Der Torre, L. & Woltran, S. (eds.). London: Springer, p. 357-373 17 p. (Lecture Notes in Computer Science; vol. 8143).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

12 Citations (Scopus)

Robust collaborative services interactions under system crashes and network failures

Wang, L., 23 Apr 2015, Enschede: University of Twente. 144 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

Open Access
File
85 Downloads (Pure)

Robust interactions under system crashes and network failures of collaborative processes with arbitrary control flows

Wang, L., Ferreira Pires, L., Wombacher, A., van Sinderen, M. J. & Chi, C., 2015, Seventh International Conference on Advanced Service Computing, Service Computation 2015. Nice: IARIA, p. 27-34 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)

RS4IoT: a Recommender System for IoT

Barbosa, C. M., Lima Gomes, R., Goncalves Pereira Filho, J. & Moreira, J. L., 30 Aug 2018, Enterprise Interoperability: Smart Services and Business Impact of Enterprise Interoperability. Wiley, p. 225 - 231 7 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Rule-based support for situation management

Dockhorn Costa, P., Andrade Almeida, J., Pereira, I. S. A., van Sinderen, M. J. & Ferreira Pires, L., 2016, Fusion Methodologies in Crisis Management. Rogova, G. & Scott, P. (eds.). Switzerland: Springer, p. 341-364 24 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

4 Citations (Scopus)

Sampling variability in forensic likelihood-ratio computation: A simulation study

Ali, T., Spreeuwers, L. J., Veldhuis, R. N. J. & Meuwly, D., Dec 2015, In : Science & justice. 55, 6, p. 499-508 10 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
6 Citations (Scopus)
41 Downloads (Pure)

SAREF4health: IoT Standard-Based Ontology-Driven Healthcare Systems

Moreira, J., Ferreira Pires, L., van Sinderen, M. & Daniele, L., 1 Sep 2018, Formal Ontology in Information Systems: Proceedings of the 10th International Conference (FOIS 2018). Borgo, S., Hitzler, P. & Kutz, O. (eds.). Amsterdam: IOS Press, Vol. 309. p. 239-252 14 p. (Frontiers in Artificial Intelligence and Applications; vol. 306).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
6 Citations (Scopus)
152 Downloads (Pure)

SAREF4health: IoT Standard-Based Ontology-Driven Healthcare Systems

van Sinderen, M. J., Moreira, J. L., Ferreira Pires, L. & Daniele, L., Sep 2018, p. 239 - 252. 13 p.

Research output: Contribution to conferencePaper

Scalable Broadcast Authentication for V2V Communication

Feiri, M., 13 Oct 2016, Enschede: Twente University Press (TUP). 214 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

Open Access
File
405 Downloads (Pure)

Schengen: Informatisering van politieke besluitvorming

op den Akker, H. J. A., Nijholt, A., Schaake, J., Sikkel, N. & van der Voort, M. M., 31 Mar 1992, In : Universitaire Vredeskrant Informatica. p. -

Research output: Contribution to journalArticlePopular

Secure Cluster-Based In-Network Information Aggregation for Vehicular Networks

Dietzel, S., Peter, A. & Kargl, F., May 2015, IEEE 81st Vehicular Technology Conference, VTC Spring 2015. Piscataway, NJ, USA: IEEE, p. 1-5 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)

Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace

Pieters, W., Hadžiosmanović, D. & Dechesne, F., Jun 2016, In : Science and engineering ethics. 22, 3, p. 831-850 20 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
6 Citations (Scopus)
65 Downloads (Pure)

Security requirements engineering in the agile era: How does it work in practice?

Daneva, M. & Wang, C., 19 Oct 2018, 2018 IEEE 1st International Workshop on Quality Requirements in Agile Projects (QuaRAP). Franch, X., Jedlitschka, A., Fernandez, D. M. & Oivo, M. (eds.). IEEE, p. 10-13 4 p. 8501269

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Semantic Interoperability for the IoT: Analysis of JSON for Linked Data

Moreira, J. L., Ferreira Pires, L. & van Sinderen, M. J., Oct 2018, Enterprise Interoperability: Smart Services and Business Impact of Enterprise Interoperability. Zelm, M., Jaekel, F-W., Doumeingts, G. & Wollschlaeger, M. (eds.). Wiley, p. 163-169 7 p. (Systems and Industrial Engineering Series).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Semantic Interoperability of Early Warning Systems: a Systematic Literature Review

Moreira, J. L., Ferreira Pires, L., Dockhorn Costa, P. & van Sinderen, M. J., 30 Aug 2018, Enterprise Interoperability: Smart Services and Business Impact of Enterprise Interoperability. Wiley, p. 407 - 413 7 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

SemanticSCo: a platform to support the semantic composition of services for gene expression analysis

Guardia, G. D. A., Ferreira Pires, L., Goncalves da Silva, E. & Guareis de farias, C., Feb 2017, In : Journal of biomedical informatics. 66, p. 116-128 22 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
4 Citations (Scopus)
34 Downloads (Pure)
Open Access
File
610 Downloads (Pure)

Semiparametric Copula Models for Biometric Score Level

Caselli, M., 11 Oct 2016, Amsterdam: Proefschriftmaken.nl & Uitgeverij BOXPress. 160 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

File
35 Downloads (Pure)

Semiparametric score level fusion: Gaussian copula approach

Susyanyo, N., Klaassen, C. A. J., Veldhuis, R. N. J. & Spreeuwers, L. J., 6 May 2015, Proceedings of the 36th WIC Symposium on Information Theory in the Benelux. Brussels: Université Libre de Bruxelles, p. 26-33 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
87 Downloads (Pure)

Sequence-aware intrusion detection in industrial control systems

Caselli, M., Zambon, E. & Kargl, F., Apr 2015, Proceedings of the 1st ACM Workshop on Cyber-Physical System Security. Zhou, J. & Jones, D. (eds.). New York: Association for Computing Machinery (ACM), p. 13-24 12 p. (CPSS Workshop - AsiaCCS'15).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

85 Citations (Scopus)

Service commitments and capabilities across ArchiMate architectural layers

Nardi, J. C., A. Almeida, J. P., Pereira, M. C., de Almeida Falbo, R., Iacob, M. E., van Sinderen, M. J. & Ferreira Pires, L., Sep 2016, 2016 IEEE 20th International Enterprise Distributed Object Computing Workshop (EDOCW). Piscataway, NJ: IEEE, p. 139-148 10 p. (IEEE International Enterprise Distributed Object Computing Workshop).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)
11 Downloads (Pure)

Setting a world record in 3D face recognition

Spreeuwers, L. J., Nov 2015, In : Vonk. 33, 4, p. 11-21 11 p.

Research output: Contribution to journalArticleAcademic

File
49 Downloads (Pure)

Short: A framework for evaluating pseudonym strategies in vehicular ad-hoc networks

Förster, D., Kargl, F. & Löhr, H., 22 Jun 2015, WiSec '15: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks. Association for Computing Machinery (ACM), p. 1–6 a19

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

7 Citations (Scopus)

Six strategies for generalizing software engineering theories

Wieringa, R. J. & Daneva, M., Apr 2015, In : Science of computer programming. 101, p. 136-152 17 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
53 Citations (Scopus)
127 Downloads (Pure)

Smart logistics: an enterprise architecture perspective

van Sinderen, M. J., Singh, P. M. & Wieringa, R. J., Jun 2017, p. 9-16.

Research output: Contribution to conferencePaper

Open Access
File
7 Citations (Scopus)
57 Downloads (Pure)

SmTIP: A Big Data Intergration Platform for Synchromodal Transport

Singh, P. M., van Sinderen, M. & Wieringa, R., Oct 2018, Enterprise Interoperability: Smart Services and Business Impact of Enterprise Interoperability. Zelm, M., Jaekel, F-W., Doumeingts, G. & Wollschlaeger, M. (eds.). Wiley, p. 187-192 6 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

SOA and EDA: a comparative study - similarities, difference and conceptual guidelines on their usage

Allah Bukhsh, Z., van Sinderen, M. J. & Singh, P. M., 2015, Twelfth International Conference on e-Business, ICE-B 2015. Lisbon: SCITEPRESS, p. 213-220 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Socio-Technical Security Metrics (Dagstuhl Seminar 14491)

Gollmann, D., Herley, C., Koenig, V., Pieters, W. & Sasse, M. A., 20 Mar 2015, In : Dagstuhl reports. 4, 12, p. 1-28 28 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
27 Downloads (Pure)

SOFIR: Securely Outsourced Forensic Image Recognition

Bösch, C. T., Peter, A., Hartel, P. H. & Jonker, W., Feb 2014, 39th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2014. USA: IEEE, p. 2694-2698 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
5 Citations (Scopus)
108 Downloads (Pure)

Software Technologies: 12th International Joint Conference, ICSOFT 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Papers

Cabello, E., Cardoso, J. S., Maciaszek, L. A. & van Sinderen, M. J., 24 Jul 2018, Cham: Springer. 309 p. (Communications in computer and information science; vol. 868)

Research output: Book/ReportBook editingAcademic

1 Downloads (Pure)

Software Technologies - 8th International Joint Conference, ICSOFT 2013 : Revised Selected Papers

Cordeiro, J. (ed.) & van Sinderen, M. J. (ed.), 2014, Heidelberg: Springer. 321 p. (Communications in Computer and Information Science; vol. 457)

Research output: Book/ReportBook editingAcademic

Spear phishing in organisations explained

Bullee, J-W., Montoya, L., Junger, M. & Hartel, P., Jul 2017, In : Information and Computer Security. 25, 5, p. 593-613 21 p.

Research output: Contribution to journalArticleAcademicpeer-review

12 Citations (Scopus)
1 Downloads (Pure)

Specification Mining for Intrusion Detection in Networked Control Systems

Caselli, M., Zambon, E., Amann, J., Sommer, R. & Kargl, F., 2016, Proceedings of the 25th USENIX Security Symposium. USENIX Association, p. 791-806 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
14 Citations (Scopus)
26 Downloads (Pure)

SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing by Remote Entities

Jakubeit, P., Dercksen, A. & Peter, A., Dec 2019.

Research output: Contribution to conferencePaper

Status Quo in Requirements Engineering: A Theory and a Global Family of Surveys

Wagner, S., Mendez Fernandez, D., Felderer, M., Vetro, A., Kalinowski, M., Wieringa, R. J., Pfahl, D., Conte, T., Christiansson, M-T., Greer, D., Lassenius, C., Mannisto, T., Nayebi, M., Oivo, M., Penzenstadler, B., Prikladnicki, R., Ruhe, G., Schekelmann, A., Sen, S., Spinola, R. & 3 others, Tuzcu, A., De La Vara, J. L. & Winkler, D., 26 Feb 2019, In : ACM Transactions on Software Engineering and Methodology. 28, 2, 9 p., 9.

Research output: Contribution to journalArticleAcademicpeer-review

6 Citations (Scopus)

Stimulating architectural thinking during requirements elicitation: an approach and tool support

Anish, P. R., 11 Dec 2020, Enschede: University of Twente. 162 p.

Research output: ThesisPhD Thesis - Research external, graduation UT

Open Access
File
84 Downloads (Pure)

Striving for balance: A look at gameplay requirements of massively multiplayer online role-playing games

Daneva, M., 20 Jul 2017, In : Journal of systems and software. 134, p. 54-75 22 p.

Research output: Contribution to journalArticleAcademicpeer-review

1 Citation (Scopus)

Summary: Industrial Big Data Platforms Enabling Enterprise Interoperability for Smart Services

van Sinderen, M. & Gusmeroli, S., Oct 2018, Enterprise Interoperability: Smart Services and Business Impact of Enterprise Interoperability. Zelm, M., Jaekel, F-W., Doumeingts, G. & Wollschlaeger, M. (eds.). Wiley, p. 159-161 3 p. (Systems and Industrial Engineering Series).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Tangible Modelling to Elicit Domain Knowledge: An Experiment and Focus Group

Ionita, D., Wieringa, R. J., Bullee, J-W. & Vasenev, A., 22 Oct 2015, 34th International Conference on Conceptual Modeling, ER 2015. Johannesson, P., Li Lee, M., Liddle, S. W., Opdahl, A. L. & López, Ó. P. (eds.). Berlin: Springer, p. 558-565 8 p. (Lecture Notes in Computer Science; vol. 9381).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

9 Citations (Scopus)

Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of "Thinking Like a Thief"

Barth, S., Hartel, P. H., Junger, M. & Montoya, L., 14 May 2019, In : IEEE security & privacy. 17, 3, p. 8-16 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

1 Downloads (Pure)

Technical Report on Raster field test at a Water Board

Vriezekolk, E., Jun 2016, Enschede: Centre for Telematics and Information Technology (CTIT). 26 p. (CTIT Technical Report Series; no. TR-CTIT-16-06)

Research output: Book/ReportReportProfessional

File
33 Downloads (Pure)

Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security

Coles-Kemp, L., Bullée, J-W., Montoya, L., Junger, M., Heath, C. P., Pieters, W. & Wolos, L., 2015, Trespass Project. 96 p.

Research output: Book/ReportReportProfessional

Open Access
File
13 Downloads (Pure)

Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention

Bullee, J-W., Montoya, L., Junger, M. & Hartel, P. H., Jan 2016, Proceedings of the inaugural Singapore Cyber Security R&D Conference (SG-CRC 2016). Mathur, A. & Roychoudhury, A. (eds.). Amsterdam: IOS Press, p. 107-114 6 p. (Cryptology and Information Security Series; vol. 14).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
9 Citations (Scopus)
250 Downloads (Pure)

Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions

Kleber, S., van der Heijden, R. W., Kopp, H. & Kargl, F., Mar 2015, 2015 International Conference and Workshops on Networked Systems (NetSys). USA: IEEE Computer Society, p. 1-8 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)