Research Output

Understandability of Goal-Oriented Requirements Engineering Concepts for Enterprise Architects

Engelsman, W. & Wieringa, R. J., 2014, 26th International Conference on Advanced Information Systems Engineering, CAiSE 2014. Heidelberg: Springer, p. 105-119 15 p. (Lecture Notes in Computer Science; vol. 8484).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
8 Citations (Scopus)
164 Downloads (Pure)

Understanding

Haasnoot, E., Barnhoorn, J., Spreeuwers, L., Veldhuis, R. & Verwey, W., Jun 2017.

Research output: Contribution to conferencePaper

Understanding Bifurcation of Slow Versus Fast Cyber-Attackers

van Wieren, M., Doerr, C., Jacobs, V. & Pieters, W., 2016, Data Privacy Management and Security Assurance: 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Livraga, G., Torra, V., Aldini, A., Martinelli, F. & Suri, N. (eds.). Cham: Springer, p. 19-33 15 p. (Lecture notes in computer science; vol. 9963).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Understanding challenging situations in agile quality requirements engineering and their solution strategies: Insights from a case study

Alsaqaf, W., Daneva, M. & Wieringa, R., 12 Oct 2018, Proceedings - 2018 IEEE 26th International Requirements Engineering Conference, RE 2018. Ruhe, G., Maalej, W. & Amyot, D. (eds.). IEEE, p. 274-285 12 p. 8491142

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Understanding computer security

Etalle, S. & Zannone, N., 22 Oct 2014, In : Frontiers in ICT. 1, 3, 2 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
1 Citation (Scopus)
16 Downloads (Pure)

Understanding Functional Reuse of ERP Requirements in the Telecommunication Sector: an Empirical Study

Daneva, M., 6 Oct 2014, 2014 Joint Conference of the International Workshop on Software Measurement and the International Conference on Software Process and Product Measurement, IWSM-Mensura 2014. USA: IEEE Computer Society, p. 216-221 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)

Understanding Modeling Requirements of Unstructured Business Processes

Allah Bukhsh, Z., van Sinderen, M. J., Sikkel, N. & Quartel, D., 2017, ICETE 2017: Proceedings of the 14th International Joint Conference on e-Business and Telecommunications. van Sinderen, M., Obaidat, M. S. & Cabello, E. (eds.). Vol. 4. p. 17-27 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
7 Citations (Scopus)
259 Downloads (Pure)

Understanding quality requirements engineering in contract-based projects from the perspective of software architects: an exploratory study

Daneva, M., Herrmann, A. & Buglione, L., 1 Oct 2014, Relating System Quality and Software Architecture. Mistrik, I., Bahsoon, R., Eeles, P., Roshandel, R. & Stal, M. (eds.). Amsterdam: Morgan Kaufmann, p. 325-357 33 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

1 Citation (Scopus)

Understanding the most in-demand soft skills in requirements engineering practice: Insights from two focus groups

Daneva, M., Herrmann, A., Condori-Fernandez, N. & Wang, C., 15 Apr 2019, Proceedings of EASE 2019 - Evaluation and Assessment in Software Engineering. Association for Computing Machinery (ACM), p. 284-290 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Downloads (Pure)

Understanding the soft skills that industry wants from requirements engineers: A focus group study

Daneva, M., Wang, C., Herrmann, A. & Condori-Fernandez, N., 20 Mar 2018, In : CEUR workshop proceedings. 2075, 10 p., LS_paper1.

Research output: Contribution to journalConference articleAcademicpeer-review

Open Access
File
1 Citation (Scopus)
87 Downloads (Pure)

Using crowdsourced data for empirical research in information systems: What it is and how to do it safe?

Daneva, M., 6 Jul 2018, 2018 12th International Conference on Research Challenges in Information Science, RCIS 2018. Piscataway, NJ: IEEE Computer Society, 4 p. (Proceedings International Conference on Research Challenges in Information Science (RCIS); vol. 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Using Oblivious RAM in Genomic Studies

Karvelas, N. P., Peter, A. & Katzenbeisser, S., 2017, Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings. Garcia-Alfaro, J., Navarro-Aribas, G., Hartenstein, H. & Herrera-Joancomarti, J. (eds.). Springer, p. 35-52 (Lecture notes in computer science; vol. 10436).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Using Value Models for Business Risk Analysis in e-Service Networks

Ionita, D., Wieringa, R. J., Wolos, L., Gordijn, J. & Pieters, W., 12 Nov 2015, 8th IFIP WG 8.1. Working Conference on the Practice of Enterprise Modelling, PoEM 2015. Ralyté, J., España, S. & Pastor, O. (eds.). Berlin: Springer, p. 239-253 15 p. (Lecture Notes in Business Information Processing; vol. 235).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)

Validating the raster risk assessment method in practice

Vriezekolk, E., Etalle, S. & Wieringa, R. J., 27 May 2015, Proceedings of the ISCRAM 2015 Conference. Palen, L., Buscher, M., Comes, T. & Hughes, A. (eds.). International Association for Information Systems for Crisis Response and Management (ISCRAM), p. - 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Citation (Scopus)
40 Downloads (Pure)

Validation of Likelihood Ratio Methods Used for Forensic Evidence Evaluation: Application in Forensic Fingerprints

Haraksim, R., 18 Jun 2014, Enschede: University of Twente. 186 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

File
180 Downloads (Pure)

Value-Driven Risk Analysis of Coordination Models

Ionita, D., Gordijn, J., Yesuf, A. S. & Wieringa, R. J., 10 Nov 2016, The Practice of Enterprise Modeling : 9th IFIP WG 8.1. Working Conference, PoEM 2016, Proceedings. London: Springer, p. 102-116 15 p. (Lecture Notes in Business Information Processing; vol. 267).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)

Verifying Sanitizer Correctness through Black-Box Learning: A Symbolic Finite Transducer Approach

Lathouwers, S., Everts, M. & Huisman, M., 2020, Proceedings of the 6th International Conference on Information Systems Security and Privacy: Volume 1: ForSE. Furnell, S., Mori, P., Weippl, E. & Camp, O. (eds.). SCITEPRESS Digital Library, p. 784-795 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
28 Downloads (Pure)

Victim-Aware Adaptive Covert Channels

Bortolameotti, R., van Ede, T. S., Continella, A., Everts, M. H., Jonker, W., Hartel, P. H. & Peter, A., 2019, Security and Privacy in Communication Networks: 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohalsen, A. (eds.). p. 450-471 (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 304).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Visualization environment for reviewing and experimenting with compaction equipment trajectories in context

Vasenev, A., Hartmann, T., Miller, S. R. & Doree, A. G., Apr 2016, In : Advanced engineering informatics. 30, 2, p. 95-108 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

4 Citations (Scopus)
1 Downloads (Pure)

Welcome from the Workshop Chairs

Daneva, M., Marczak, S., Knauss, E. & Madhavji, N., 19 Oct 2018, 2018 IEEE 7th International Workshop on Empirical Requirements Engineering (EmpiRE). 7 ed. IEEE, p. VI-VII

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Welcome from the Workshop Chairs

Berntsson Svensson, R., Daneva, M., Marczak, S., Ernst, N. & Madhavji, N., 11 Aug 2015, Fifth International Workshop on Empirical Requirements Engineering, EmpiRE 2015 at RE'15. USA: IEEE Computer Society, p. 3-5 3 p.

Research output: Chapter in Book/Report/Conference proceedingForeword/postscriptAcademic

File
17 Downloads (Pure)

Welcome from the Workshop Chairs

Daneva, M., Berntsson Svensson, R., Marczak, S., Franch, X. & Madhavji, N., 25 Aug 2014, Fourth International Workshop on Empirical Requirements Engineering, EmpiRE 2014. USA: IEEE Computer Society, p. 1-3 3 p.

Research output: Chapter in Book/Report/Conference proceedingForeword/postscriptAcademic

File
8 Downloads (Pure)

What the Job Market Wants from Requirements Engineers? An Empirical Analysis of Online Job Ads from the Netherlands

Daneva, M., Wang, C., Hoener, P. & Hoener, P., 7 Dec 2017, Proceedings - 11th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2017. Piscataway, NJ: IEEE Computer Society, p. 448-453 6 p. (International Symposium on Empirical Software Engineering and Measurement; vol. 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

10 Citations (Scopus)

What you ask is what you get: Understanding architecturally significant functional requirements

Anish, P. R., Daneva, M., Cleland-Huang, J., Wieringa, R. J. & Ghaisas, S., 20 Aug 2015, 23rd IEEE Internatioanl Conference on Requirements Engineering (RE). Zowghi, D., Gervasi, V. & Amyot, D. (eds.). IEEE Computer Society, p. 86-95 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
9 Citations (Scopus)
217 Downloads (Pure)

Where do we stand in requirements engineering improvement today? First results from a mapping study

Méndez Fernández, D., Ognawala, S., Wagner, S. & Daneva, M., 21 Sep 2014, Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2014. Torchiano, M. (ed.). New York: Association for Computing Machinery (ACM), p. 1-4 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
3 Citations (Scopus)
45 Downloads (Pure)

Windowed Factorization and Merging

van den Berg, B. & Wanders, I., 2017, Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux: May 11-12, 2017, Delft University of Technology, Delft, the Netherlands. Heusdens, R. & Weber, J. H. (eds.). Delft University of Technology, p. 15-22

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
30 Downloads (Pure)

Workflow-based service selection under multi-constraints

Xia, C., Chi, C., Wong, R., Wombacher, A., Ferreira Pires, L., van Sinderen, M. J. & Ding, C., Jul 2015, Twelfth IEEE International Conference on Services Computing, SCC 2015. USA: IEEE, p. 332-339 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Workshop C2 Report - Big Data Interoperability for Enterprises

van Sinderen, M. J. & Iacob, M. E., Sep 2016, Enterprise Interoperability in the Digitized and Networked Factory of the Future. Zelm, M., Doumeingts, G. & Mendonca, J. P. (eds.). UK: International Society for Technology in Education, p. 268-269 2 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

File
21 Downloads (Pure)

μShield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems

Abbasi, A., Wetzels, J., Bokslag, W., Zambon, E. & Etalle, S., 21 Aug 2017, Network and System Security: 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings. Yan, Z., Molva, R., Mazurczyk, W. & Kantola, R. (eds.). Springer, p. 694-709 15 p. ( Lecture Notes in Computer Science; vol. 10394).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)

“If you were attacked, you’d be sorry‿: Counterfactuals as security arguments

Herley, C. & Pieters, W., Sep 2015, New Security Paradigm Workshop (NSPW). New York: Association for Computing Machinery (ACM), p. 112-123 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

8 Citations (Scopus)