Research Output

Article

A 3D-printed anatomical pancreas and kidney phantom for optimizing SPECT/CT reconstruction settings in beta cell imaging using 111In-exendin

Woliner-van der Weg, W., Deden, L. N., Meeuwis, A. P. W., Koenrades, M., Peeters, L. H. C., Kuipers, H., Laanstra, G. J., Gotthardt, M., Slump, C. H. & Visser, E. P., Dec 2016, In : EJNMMI physics. 3, 29.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
6 Citations (Scopus)
136 Downloads (Pure)

Abstract data types as reusable software components: the case for twin ADTs

Sikkel, N. & van Vliet, J. C., 1992, In : Software engineering journal. 7, 3, p. 177-183

Research output: Contribution to journalArticleAcademic

File
43 Downloads (Pure)

Achieving a Consensual Definition of Phishing Based on a Systematic Review of the Literature

Lastdrager, E. E. H., 4 Jun 2014, In : Crime science. 3, p. 9:1-9:16 9.

Research output: Contribution to journalArticleAcademicpeer-review

File
35 Citations (Scopus)
221 Downloads (Pure)

A commitment-based reference ontology for services

Nardi, J. C., de Almeida Falbo, R., Andrade Almeida, J., Guizzardi, G., Ferreira Pires, L., van Sinderen, M. J., Guarino, N. & Fonseca, C. M., Dec 2015, In : Information systems. 54, p. 263-288 26 p.

Research output: Contribution to journalArticleAcademicpeer-review

52 Citations (Scopus)
1 Downloads (Pure)

A guideline for the validation of likelihood ratio methods used for forensic evidence evaluation

Meuwly, D., Ramos, D. & Haraksim, R., 2017, In : Forensic science international. 276, p. 142-153 12 p.

Research output: Contribution to journalArticleAcademicpeer-review

43 Citations (Scopus)
61 Downloads (Pure)

A methodology based on openEHR archetypes and software agents for developing e-health applications reusing legacy systems

Moraes, J. L. C. D., Souza, W. L. D., Pires, L. F. & Prado, A. F. D., 2016, In : Computer methods and programs in biomedicine. 134, p. 267 - 287 21 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
12 Citations (Scopus)
42 Downloads (Pure)

A methodology for the development of RESTful semantic web services for gene expression analysis

Guardia, G. D. A., Ferreira Pires, L., Vêncio, R. Z. N., Malmegrim, K. C. R. & Guareis de farias, C., 24 Jul 2015, In : PLoS ONE. 10, 7, p. e0134011:1-e0134011:28 28 p., e0134011.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
4 Citations (Scopus)
20 Downloads (Pure)

A multi-authority approach to various predicate encryption types

van de Kamp, T. R., Peter, A. & Jonker, W., 25 Oct 2019, In : Designs, codes and cryptography.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
16 Downloads (Pure)

An annotaded bibliography on parallel parsing: updated version

op den Akker, H. J. A., Alblas, H., Nijholt, A., Oude luttighuis, P. H. W. M. & Sikkel, N., 1992, In : Memoranda informatica. 92, 84, p. - 45 p.

Research output: Contribution to journalArticleProfessional

An approach to estimation of degree of customization for ERP projects using prioritized requirements

Parthasarathy, S. & Daneva, M., 1 Jul 2016, In : Journal of systems and software. 117, p. 471-487 17 p.

Research output: Contribution to journalArticleAcademicpeer-review

9 Citations (Scopus)

An information fusion approach for filtering GNSS data sets collected during construction operations

Vasenev, A., Pradhananga, N., Bijleveld, F., Ionita, D., Hartmann, T., Teizer, J. & Doree, A. G., 2014, In : Advanced engineering informatics. 28, 4, p. 297-310 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

20 Citations (Scopus)

An integrated conceptual model for information system security risk management supported by enterprise architecture management

Mayer, N., Grandry, E., Feltus, C., Goettelmann, E. & Wieringa, R. J., 1 Jun 2019, In : Software and systems modeling. 18, 3, p. 2285-2312 28 p.

Research output: Contribution to journalArticleAcademicpeer-review

6 Citations (Scopus)

An ontology for telemedicine systems resiliency to technological context variations in pervasive healthcare

Larburu Rubio, N., Bults, R. G. A., van Sinderen, M. J., Widya, I. A. & Hermens, H. J., 2015, In : IEEE journal of translational engineering in health and medicine. 3, p. 10 10 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
11 Citations (Scopus)
74 Downloads (Pure)

A qualitative study of DevOps usage in practice

Erich, F. M. A., Amrit, C. & Daneva, M., Jun 2017, In : Journal of software: Evolution and Process. 29, 6, 20 p., e1885.

Research output: Contribution to journalArticleAcademicpeer-review

29 Citations (Scopus)

A security risk mitigation framework for cyber physical systems

Zahid, M., Inayat, I., Daneva, M. & Mehmood, Z., 29 Aug 2019, In : Journal of software: Evolution and Process. e2219.

Research output: Contribution to journalArticleAcademicpeer-review

A Survey of Provably Secure Searchable Encryption

Bösch, C. T., Hartel, P. H., Jonker, W. & Peter, A., Aug 2014, In : ACM computing surveys. 47, 2, p. 18:1-18:51 47 p., 18.

Research output: Contribution to journalArticleAcademicpeer-review

File
142 Citations (Scopus)
1452 Downloads (Pure)

A systematic literature review on agile requirements engineering practices and challenges

Inayat, I., Salim, S. S., Marczak, S., Daneva, M. & Shamshirband, S., Oct 2015, In : Computers in human behavior. 51, Part B, p. 915-929 15 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
179 Citations (Scopus)
1557 Downloads (Pure)

A system for denial-of-service attack detection based on multivariate correlation analysis

Tan, Z., Jamdagni, A., He, X., Nanda, P. & Liu, R. P., Feb 2014, In : IEEE transactions on parallel and distributed systems. 25, 2, p. 447-456 10 p.

Research output: Contribution to journalArticleAcademicpeer-review

124 Citations (Scopus)

A transformation-based approach to business process management in the cloud

Duipmans, E. F., Ferreira Pires, L. & Bonino da Silva Santos, L. O., 2014, In : Journal of grid computing. 12, 2, p. 191-219 29 p.

Research output: Contribution to journalArticleAcademicpeer-review

18 Citations (Scopus)

Attribute evaluation during generalized parsing

Oude luttighuis, P. H. W. M. & Sikkel, N., 1992, In : Memoranda informatica. 92, 85, p. - 95 p.

Research output: Contribution to journalArticleProfessional

Automated analysis of security requirements through risk-based argumentation

Yu, Y., Nunes Leal Franqueira, V., Tun, T. T., Wieringa, R. J. & Nuseibeh, B., 2015, In : Journal of systems and software. 106, p. 102-116 15 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
20 Citations (Scopus)
45 Downloads (Pure)

Automatic player detection and identification for sports entertainment applications

Mahmood, Z., Ali, T., Khattak, S., Hasan, L. & Khan, S. U., Sep 2014, In : Pattern analysis and applications. 18, 4, p. 971-982 12 p.

Research output: Contribution to journalArticleAcademicpeer-review

22 Citations (Scopus)

Biometric evidence evaluation: an empirical assessment of the effect of different training data

Ali, T., Spreeuwers, L. J., Veldhuis, R. N. J. & Meuwly, D., 29 Aug 2014, In : IET biometrics. online pre, 4, p. 1-12 12 p.

Research output: Contribution to journalArticleAcademicpeer-review

4 Citations (Scopus)

Breaking the 99% barrier: optimisation of 3D face recognition

Spreeuwers, L. J., 2015, In : IET biometrics. 4, 3, p. 169-177 10 p.

Research output: Contribution to journalArticleAcademicpeer-review

8 Citations (Scopus)
4 Downloads (Pure)

Building an intrusion detection system using a filter-based feature selection algorithm

Ambusaidi, M. A., He, X., Nanda, P. & Tan, Z., Oct 2016, In : IEEE transactions on computers. 65, 10, p. 2986-2998 13 p.

Research output: Contribution to journalArticleAcademicpeer-review

182 Citations (Scopus)

Cooperative home light: assessment of a security function for the automotive field

Knapik, P., Petit, J., Kargl, F. & Schoch, E., 2014, In : Journal on advances in security. 7, 1&2, p. 1-14 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
33 Downloads (Pure)

Cost management of service compositions

Albuquerque de Medeiros, R. W., Rosa, N. S. & Ferreira Pires, L., Oct 2016, In : International journal of services computing. 4, 4, p. 35-50 16 p.

Research output: Contribution to journalArticleAcademicpeer-review

2 Downloads (Pure)

Crime science: editorial statement

Junger, M., Laycock, G., Hartel, P. H. & Ratcliffe, J., 11 Jun 2012, In : Crime science. 1, 1, 3 p., 1.

Research output: Contribution to journalArticleAcademic

Open Access
File
12 Downloads (Pure)

Customer requirements based ERP customization using AHP technique

Parthasarathy, S. & Daneva, M., 2014, In : Business process management journal. 20, 5, p. 730-751 22 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
13 Citations (Scopus)
101 Downloads (Pure)
File
125 Downloads (Pure)

Deriving robust distributed business processes with automated transformations of fallible component processes

Wang, L., Ferreira Pires, L., van Sinderen, M. J., Wombacher, A. & Chi, C., 30 Dec 2015, In : International journal on advances in networks and services. 8, 3 and 4, p. 192-202 11 p.

Research output: Contribution to journalArticleAcademicpeer-review

9 Citations (Scopus)

Detection of denial-of-service attacks based on computer vision techniques

Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P. & Hu, J., 2015, In : IEEE transactions on computers. 64, 9, p. 2519-2533 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
61 Citations (Scopus)
150 Downloads (Pure)

e3service: a critical reflection and future research

Razo-Zapata, I. S., Gordijn, J., de Leenheer, P. & Wieringa, R. J., 2015, In : Business & information systems engineering. 57, 1, p. 51-59 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
6 Citations (Scopus)
25 Downloads (Pure)

Editorial for special section of grid computing journal on “Cloud Computing and Services Science‿

van Sinderen, M. J. & Ivanov, I. I., Mar 2015, In : Cluster computing. 18, 1, p. 453-455 3 p.

Research output: Contribution to journalArticleAcademic

File
78 Downloads (Pure)

Effectiveness of qualitative and quantitative security obligations

Pieters, W., Padget, J., Dechesne, F., Dignum, V. & Aldewereld, H., Jun 2015, In : Journal of information security and applications. 22, p. 3-16 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

8 Citations (Scopus)
1 Downloads (Pure)

Effects of pose and image resolution on automatic face recognition

Mahmood, Z., Ali, T. & Khan, S. U., Jun 2016, In : IET biometrics. 5, 2, p. 111-119 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
23 Citations (Scopus)
89 Downloads (Pure)

E-Government controls in service-oriented auditing perspective: Beyond Single Window

Bukhsh, F. A. & Weigand, H., 2012, In : International journal of electronic government research. 8, 4, p. 34-53 20 p.

Research output: Contribution to journalArticleAcademicpeer-review

5 Citations (Scopus)

Empirical research methodologies and studies in Requirements Engineering: How far did we come?

Daneva, M., Damian, D., Marchetto, A. & Pastor, O., 30 Jun 2014, In : Journal of systems and software. 95, 12, p. 1-9 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
34 Citations (Scopus)
187 Downloads (Pure)

Empirical research methods for technology validation: Scaling up to practice

Wieringa, R. J., Sep 2014, In : Journal of systems and software. 95, p. 19-31 13 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
37 Citations (Scopus)
96 Downloads (Pure)

Enhancing big data security with collaborative intrusion detection

Tan, Z., Nagar, U. T., He, X., Nanda, P., Liu, R. P., Wang, S. & Hu, J., 2014, In : IEEE cloud computing. 1, 3, p. 27-33 7 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
45 Citations (Scopus)
75 Downloads (Pure)

Enterprise interoperability: information, services and processes for the interoperable economy and society

Folmer, E., van Sinderen, M. & Oude Luttighuis, P., Nov 2014, In : Information systems and e-business management. 12, 4, p. 491-494 4 p.

Research output: Contribution to journalArticleAcademicpeer-review

1 Citation (Scopus)
4 Downloads (Pure)

Experimenting with Incentives: Security in Pilots for Future Grids

Dechesne, F., Hadziosmanovic, D. & Pieters, W., Nov 2014, In : IEEE security & privacy. 12, 6, p. 59-66 8 p.

Research output: Contribution to journalArticleAcademicpeer-review

4 Citations (Scopus)

Face reconstruction from image sequences for forensic face comparison

van Dam, C., Veldhuis, R. & Spreeuwers, L., 2016, In : IET biometrics. 5, 2, p. 140-146 7 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
5 Citations (Scopus)
95 Downloads (Pure)

ForenFace: A unique annotated forensic facial image dataset and toolset

Zeinstra, C. G., Veldhuis, R. N. J., Spreeuwers, L. J., Ruifrok, A. C. C. & Meuwly, D., 1 Nov 2017, In : IET biometrics. 6, 6, p. 487-494 8 p.

Research output: Contribution to journalArticleAcademicpeer-review

2 Citations (Scopus)

From Cybercrime to Cyborg Crime: Botnets as Hybrid Criminal Actor-Networks

van der Wagen, W. & Pieters, W., 6 Mar 2015, In : British journal of criminology. 55, 2, p. 1-18 18 p.

Research output: Contribution to journalArticleAcademicpeer-review

22 Citations (Scopus)

From enterprise architecture to business models and back

Iacob, M. E., Meertens, L. O., Jonkers, H., Quartel, D., Nieuwenhuis, L. J. M. & van Sinderen, M. J., Jul 2014, In : Software and systems modeling. 13, 3, p. 1059-1083 25 p.

Research output: Contribution to journalArticleAcademicpeer-review

48 Citations (Scopus)
521 Downloads (Pure)

GEM: A distributed goal evaluation algorithm for trust management

Trivellato, D., Zannone, N. & Etalle, S., May 2014, In : Theory and practice of logic programming. 14, 3, p. 293-337 45 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
13 Citations (Scopus)
63 Downloads (Pure)

Het Oersoep Algorithme

Sikkel, N., 1 Sep 1992, In : TA!. p. 31-38

Research output: Contribution to journalArticlePopular

Het succes van social engineering

Bullee, J-W., Montoya, L., Junger, M. & Hartel, P., 2018, In : Tijdschrift voor veiligheid. 17, 1-2, p. 40-53 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
188 Downloads (Pure)

Het vervangen van een ziekenhuisinformatiesysteem: een voorbeeld van projektonderwijs bij Bedrijfsinformatietechnologie

Sikkel, N., Spil, A. A. M. & van de Weg, R. L. W., 1999, In : TINFON. 8, 3, p. 106-109

Research output: Contribution to journalArticleAcademic