Research Output

2016

An empirical study on memory bias situations and correction strategies in ERP effort estimation

Erasmus, I. P. & Daneva, M., 5 Jan 2016, 16th International Conference on Product-Focused Software Process Improvement, PROFES 2015. Amrahamsson, P., Corral, L., Olivo, M. & Russo, B. (eds.). London: Springer, p. 227-242 16 p. (Lecture Notes in Computer Science; vol. 9459).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2 Citations (Scopus)
24 Downloads (Pure)

An improvement of tree-Rule firewall for a large network: supporting large rule size and low delay

Chomsiri, T., He, X., Nanda, P. & Tan, Z., Aug 2016, 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. USA: IEEE Computer Society, p. 178-184 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Architectural design - Conception and specification of interactive systems

Vissers, C. A., Ferreira Pires, L., Quartel, D. & van Sinderen, M. J., 2016, Switzerland: Springer. 388 p.

Research output: Book/ReportBookAcademic

File
1 Citation (Scopus)
55 Downloads (Pure)

ArgueSecure: Out-of-the-box Risk Assessment

Ionita, D., Kegel, R., Baltuta, A. & Wieringa, R., Sep 2016, Proceedings of the 2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE). Piscataway, NJ: IEEE Computer Society, p. 74-79 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Assessing loss event frequencies of smart grid cyber threats: Encoding flexibility into FAIR using Bayesian network approach

Le, A., Chen, Y., Chai, K. K., Vasenev, A. & Montoya, L., May 2016, 1st EAI International Conference on Smart Grid Inspired Future. London: Springer, p. 43-51 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

9 Citations (Scopus)

Assessing Telecommunication Service Availability Risks for Crisis Organisations

Vriezekolk, E., 14 Jul 2016, Enschede: Universiteit Twente. 275 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

File
1448 Downloads (Pure)

A study on tangible participative enterprise modelling

Ionita, D., Kaidalova, J., Vasenev, A. & Wieringa, R., 17 Nov 2016, Advances in Conceptual Modeling: ER 2016 Workshops, AHA, MoBiD, MORE-BI, MReBA, QMMQ, SCME, and WM2SP, Gifu, Japan, November 14–17, 2016, Proceedings. Link, S. & Trujillo, J. C. (eds.). Cham: Springer, p. 139-148 10 p. (Lecture Notes in Computer Science; vol. 9975).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
1 Citation (Scopus)
50 Downloads (Pure)

A transportable hybrid antenna-transmitter system for the generation of elliptically polarized waves for NVIS propagation research

Witvliet, B. A., Laanstra, G. J., van Maanen, E., Alsina-Pagès, R. M., Bentum, M. J., Slump, C. H. & Schiphorst, R., 12 Apr 2016, 2016 10th European Conference on Antennas and Propagation (EuCAP). Piscataway, NJ: IEEE, p. 1-5 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Automated Identification and Prioritization of Business Risks in e-service Networks

Ionita, D., Wieringa, R. J. & Gordijn, J., 19 May 2016, Proceedings of the 7th International Conference on Exploring Service Science, IESS 2016. Borangiu, T., Dragoicea, M. & Novoa, H. (eds.). London: Springer, p. 547-560 14 p. (Lecture Notes in Business Information Processing; vol. 247).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
6 Citations (Scopus)
84 Downloads (Pure)

Automotive Security Functions; The Use of New Technologies to Tackle Vehicle-Related Crime

Knapik, P., 29 Jan 2016, Enschede: Universiteit Twente. 268 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

File
449 Downloads (Pure)

Big data interoperability challenges for logistics

Singh, P. M. & van Sinderen, M. J., Mar 2016, Enterprise Interoperability in the Digitized and Networked Factory of the Future. Zelm, M., Doumeingts, G. & Mendonca, J. P. (eds.). UK: International Society for Technology in Education, p. 325-335 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
287 Downloads (Pure)

BioTwist: overcoming severe distortions in ridge-based biometrics for successful identification

Kotzerke, J., 19 May 2016, Enschede: Twente University Press (TUP). 197 p.

Research output: ThesisPhD Thesis - Research external, graduation UT

Open Access
File
31 Downloads (Pure)

Book review: Crime and Everyday Life by Marcus Felson and Mary Eckert, 5th edition

Hartel, P. H. & Junger, M., 9 Aug 2016, In : Crime science. 5, 10, p. 10:1-10:3 3 p.

Research output: Contribution to journalBook/Film/Article reviewAcademic

Open Access
File
40 Downloads (Pure)

Building an intrusion detection system using a filter-based feature selection algorithm

Ambusaidi, M. A., He, X., Nanda, P. & Tan, Z., Oct 2016, In : IEEE transactions on computers. 65, 10, p. 2986-2998 13 p.

Research output: Contribution to journalArticleAcademicpeer-review

185 Citations (Scopus)

Business models & business cases for point-of-care testing

Staring, A. J., Meertens, L. O. & Sikkel, N., 2016, BMSD 2016 - Proceedings of the 6th International Symposium on Business Modeling and Software Design. SCITEPRESS, p. 54-63 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Cost management of service compositions

Albuquerque de Medeiros, R. W., Rosa, N. S. & Ferreira Pires, L., Oct 2016, In : International journal of services computing. 4, 4, p. 35-50 16 p.

Research output: Contribution to journalArticleAcademicpeer-review

2 Downloads (Pure)

Cybersecurity as a Politikum: Implications of Security Discourses for Infrastructures

Fichtner, L., Pieters, W. & Texeira, A., Sep 2016, NSPW '16: Proceedings of the 2016 New Security Paradigms Workshop. New York, NY: Association for Computing Machinery (ACM), p. 36-48

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
6 Citations (Scopus)
37 Downloads (Pure)

Decentralized enforcement of k-anonymity for location privacy using secret sharing

Förster, D., Löhr, H. & Kargl, F., 18 Jan 2016, 2015 IEEE Vehicular Networking Conference, VNC 2015. Altintas, O., Kargl, F., Ekici, E., Sommer, C. & Segata, M. (eds.). Piscataway, NJ: IEEE Computer Society, p. 279-286 8 p. 7385589. (IEEE Vehicular Networking Conference, VNC; vol. 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Designing a Low-Resolution Face Recognition System for Long-Range Surveillance

Peng, Y., Spreeuwers, L. J. & Veldhuis, R. N. J., 21 Sep 2016, p. 16429137. 5 p.

Research output: Contribution to conferencePaper

2 Downloads (Pure)
2 Citations (Scopus)

Effects of pose and image resolution on automatic face recognition

Mahmood, Z., Ali, T. & Khan, S. U., Jun 2016, In : IET biometrics. 5, 2, p. 111-119 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
23 Citations (Scopus)
89 Downloads (Pure)

Enhancing user comfort models for Demand Response solutions for domestic water heating systems

Belov, A., Vasenev, A., Havinga, P. J. M. & Meratnia, N., 2016, Proceedings of the 5th International Conference on Smart Cities and Green ICT Systems. Portugal: SCITEPRESS, p. 201-212 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Face reconstruction from image sequences for forensic face comparison

van Dam, C., Veldhuis, R. & Spreeuwers, L., 2016, In : IET biometrics. 5, 2, p. 140-146 7 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
5 Citations (Scopus)
97 Downloads (Pure)

Fixed FAR correction factor of score level fusion

Susyanto, N., Veldhuis, R. N. J., Spreeuwers, L. J. & Klaassen, C. A. J., 6 Sep 2016, p. 16555751. 8 p.

Research output: Contribution to conferencePaper

2 Citations (Scopus)

Ghost in the PLC: Designing an Undetectable Programmable Logic Controller Rootkit via Pin Control Attack

Abbasi, A. & Hashemi, M., 3 Nov 2016, Black Hat Europe. United Kingdom: Black Hat, p. 1-35 35 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
39 Citations (Scopus)
346 Downloads (Pure)

Ghost in the PLC: stealth on-the-fly manipulation of programmable logic controllers’ I/O

Abbasi, A., 8 Feb 2016, Enschede: Centre for Telematics and Information Technology (CTIT). 13 p. (CTIT Technical Report Series; no. TR-CTIT-16-02)

Research output: Book/ReportReportProfessional

File
170 Downloads (Pure)

Identification performance of evidential value estimation for ridge-based biometrics

Kotzerke, J., Hao, H., Davis, S. A., Hayes, R., Spreeuwers, L. J., Veldhuis, R. N. J. & Horadam, K. J., 26 Oct 2016, In : EURASIP journal on information security. 2016, 24, p. 1-10 10 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
2 Citations (Scopus)
87 Downloads (Pure)

Implementations of service oriented architecture and agile software development: What works and what are the challenges?

Schramm, M. & Daneva, M., 31 May 2016, p. 1-12. 12 p.

Research output: Contribution to conferencePaper

Open Access
2 Citations (Scopus)

Improving semantic interoperability of big data for epidemiological surveillance

Moreira, J., van Sinderen, M. J., Ferreira Pires, L. & Dockhorn Costa, P., Mar 2016, Enterprise Interoperability in the Digitized and Networked Factory of the Future, I-ESA 2016. Zelm, M., Doumeingts, G. & Mendonca, J. P. (eds.). UK: International Society for Technology in Education, p. 314-324 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

36 Downloads (Pure)

Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications

Chockalingam, S., Hadziosmanovic, D., Pieters, W., Texeira, A. & van Gelder, P., Oct 2016, Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers. Havarneanu, G., Setola, R., Nassopoulos, H. & Wolthusen, S. (eds.). Cham: Springer, p. - (Lecture Notes in Computer Science; vol. 10242)(Security and Cryptology).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
155 Downloads (Pure)

Intrusion Detection in Networked Control Systems: From System Knowledge to Network Security

Caselli, M., 4 Nov 2016, Enschede: Universiteit Twente. 169 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

File
420 Downloads (Pure)

Load shifting of domestic water heaters under double price tariffs: Bringing together money savings and comfort

Belov, A., Kartak, V., Vasenev, A., Meratnia, N. & Havinga, P. J. M., 12 Oct 2016. 6 p.

Research output: Contribution to conferencePaper

6 Citations (Scopus)

Measuring Computer Literacy Without Questionnaires

Kegel, R. H. P. & Wieringa, R. J., 5 Apr 2016, Fourth International Workshop on Behavior Change Support Systems (BCSS 2016). Kulyk, O. A., Simons, L., Oinas-Kukkonen, H. & van Gemert-Pijnen, J. E. W. C. (eds.). Aachen: CEUR, p. 61-65 5 p. (CEUR Workshop Proceedings; vol. 1573).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
2 Citations (Scopus)
24 Downloads (Pure)

Menthor Editor

Moreira, J. L., Sales, T. P., Guerson, J., Braga, B. F. B., Brasileiro, F. & Sobral, V., 1 Sep 2016, 5 p.

Research output: Working paper

Open Access
File
2 Citations (Scopus)
18 Downloads (Pure)

Modeling and verification of insider threats using logical analysis

Kammüller, F. & Probst, C. W., 2016, In : IEEE systems journal. 11, 2, p. 534-545 12 p.

Research output: Contribution to journalArticleAcademicpeer-review

10 Citations (Scopus)

Peak load reduction of multiple water heaters: Respecting consumer comfort and money savings

Belov, A., Vasenev, A., Kartak, V., Meratnia, N. & Havinga, P. J. M., Nov 2016. 7 p.

Research output: Contribution to conferencePaper

3 Citations (Scopus)
1 Downloads (Pure)

Private Sharing of IOCs and Sightings

van de Kamp, T. R., Peter, A., Everts, M. H. & Jonker, W., 2016, 3rd ACM Workshop on Information Sharing and Collaborative Security, WISCS 2016. New York: Association for Computing Machinery (ACM), p. 35-38 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)
2 Downloads (Pure)

PUCA: A pseudonym scheme with strong privacy guarantees for vehicular ad-hoc networks

Förster, D., Kargl, F. & Löhr, H., Feb 2016, In : Ad hoc networks. 37, Part 1, p. 122-132 11 p.

Research output: Contribution to journalArticleAcademicpeer-review

21 Citations (Scopus)

Quality-of-data broker for quality-of-data-aware telemedicine systems

Larburu Rubio, N., Bults, R. G. A., van Sinderen, M. J., Widya, I. A. & Hermens, H. J., 2016, In : IRBM (Ingenierie et recherche biomedicale). 37, 4, p. 210-218 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
4 Citations (Scopus)
68 Downloads (Pure)

Reading between the fields: practical, effective intrusion detection for industrial control systems

Yüksel, Ö., den Hartog, J. & Etalle, S., 4 Apr 2016, SAC '16 Proceedings of the 31st Annual ACM Symposium on Applied Computing. New York: Association for Computing Machinery (ACM), p. 2063-2070 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
14 Citations (Scopus)
161 Downloads (Pure)

Relating business intelligence and enterprise architecture - A method for combining operational data with architectural metadata

Veneberg, R. K. M., Iacob, M. E., van Sinderen, M. J. & Bodenstaff, L., Jun 2016, In : International journal of cooperative information systems. 25, 02, p. - 36 p., 1650007.

Research output: Contribution to journalArticleAcademicpeer-review

7 Citations (Scopus)

Reliably determining data leakage in the presence of strong attackers

Bortolameotti, R., Peter, A., Everts, M. H., Jonker, W. & Hartel, P. H., Dec 2016, Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016. New York: Association for Computing Machinery (ACM), p. 484-495 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Requirements engineering: foundation for software quality

Daneva, M. (ed.) & Pastor, O. (ed.), 6 Mar 2016, London: Springer. 300 p. (Lecture Notes in Computer Science; vol. 9619, no. 6919)

Research output: Book/ReportBook editingAcademic

File
766 Downloads (Pure)

Rule-based support for situation management

Dockhorn Costa, P., Andrade Almeida, J., Pereira, I. S. A., van Sinderen, M. J. & Ferreira Pires, L., 2016, Fusion Methodologies in Crisis Management. Rogova, G. & Scott, P. (eds.). Switzerland: Springer, p. 341-364 24 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

4 Citations (Scopus)

Scalable Broadcast Authentication for V2V Communication

Feiri, M., 13 Oct 2016, Enschede: Twente University Press (TUP). 214 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

Open Access
File
400 Downloads (Pure)

Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace

Pieters, W., Hadžiosmanović, D. & Dechesne, F., Jun 2016, In : Science and engineering ethics. 22, 3, p. 831-850 20 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
6 Citations (Scopus)
64 Downloads (Pure)

Semiparametric Copula Models for Biometric Score Level

Caselli, M., 11 Oct 2016, Amsterdam: Proefschriftmaken.nl & Uitgeverij BOXPress. 160 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

File
35 Downloads (Pure)

Service commitments and capabilities across ArchiMate architectural layers

Nardi, J. C., A. Almeida, J. P., Pereira, M. C., de Almeida Falbo, R., Iacob, M. E., van Sinderen, M. J. & Ferreira Pires, L., Sep 2016, 2016 IEEE 20th International Enterprise Distributed Object Computing Workshop (EDOCW). Piscataway, NJ: IEEE, p. 139-148 10 p. (IEEE International Enterprise Distributed Object Computing Workshop).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)
11 Downloads (Pure)

Specification Mining for Intrusion Detection in Networked Control Systems

Caselli, M., Zambon, E., Amann, J., Sommer, R. & Kargl, F., 2016, Proceedings of the 25th USENIX Security Symposium. USENIX Association, p. 791-806 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
14 Citations (Scopus)
26 Downloads (Pure)

Technical Report on Raster field test at a Water Board

Vriezekolk, E., Jun 2016, Enschede: Centre for Telematics and Information Technology (CTIT). 26 p. (CTIT Technical Report Series; no. TR-CTIT-16-06)

Research output: Book/ReportReportProfessional

File
33 Downloads (Pure)