Research Output

2016

Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention

Bullee, J-W., Montoya, L., Junger, M. & Hartel, P. H., Jan 2016, Proceedings of the inaugural Singapore Cyber Security R&D Conference (SG-CRC 2016). Mathur, A. & Roychoudhury, A. (eds.). Amsterdam: IOS Press, p. 107-114 6 p. (Cryptology and Information Security Series; vol. 14).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
7 Citations (Scopus)
241 Downloads (Pure)

The Attack Navigator (Invited)

Probst, C. W., Willemson, J. & Pieters, W., 6 Feb 2016, Graphical Models for Security: Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers. Mauw, S., Kordy, B. & Jajodia, S. (eds.). Cham: Springer, p. 1-17 17 p. (Lecture Notes in Computer Science; vol. 9390).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

7 Citations (Scopus)

The Facial Appearance of CEOs: Faces Signal Selection but Not Performance

Stoker, J. I., Windman, S. (ed.), Garretsen, H. & Spreeuwers, L. J., 27 Jul 2016, In : PLoS ONE. 11, 7, p. e0159950:1-11 11 p., e0159950.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
16 Citations (Scopus)
81 Downloads (Pure)

The navigation metaphor in security economics

Pieters, W., Barendse, J., Ford, M., Heath, C. P. R., Probst, C. W. & Verbij, R., 25 May 2016, In : IEEE security & privacy. 14, 3, p. 14-21 8 p.

Research output: Contribution to journalArticleAcademicpeer-review

4 Citations (Scopus)

The Relation Between Residential Property and its Surroundings and Day- and Night-Time Residential Burglary

Montoya, L., Junger, M. & Ongena, Y., Apr 2016, In : Environment and behavior. 48, 4, p. 515-549 35 p.

Research output: Contribution to journalArticleAcademicpeer-review

22 Citations (Scopus)

Threat navigator: grouping and ranking malicious external threats to current and future urban smart grids

Vasenev, A., Montoya, L., Ceccarelli, A., Le, A. & Ionita, D., May 2016, 1st EAI International Conference on Smart Grid Inspired Future. London: Springer, p. 184-192 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
6 Citations (Scopus)
65 Downloads (Pure)

Towards a Collaborative Framework to Improve Urban Grid Resilience

Jung, O., Besser, S., Ceccarelli, A., Zoppi, T., Vasenev, A., Montoya, L., Clarke, T. & Chappell, K., Apr 2016, Proceedings of the IEEE International Energy Conference, ENERGYCON 2016. New York: IEEE, p. 1-6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
12 Citations (Scopus)
91 Downloads (Pure)

Two-step calibration method for multi-algorithm score-based face recognition systems by minimizing discrimination loss

Susyanto, N., Veldhuis, R. N. J., Spreeuwers, L. J. & Klaassen, C. A. J., 13 Jun 2016, p. 16252593. 7 p.

Research output: Contribution to conferencePaper

3 Citations (Scopus)

Understanding Bifurcation of Slow Versus Fast Cyber-Attackers

van Wieren, M., Doerr, C., Jacobs, V. & Pieters, W., 2016, Data Privacy Management and Security Assurance: 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Livraga, G., Torra, V., Aldini, A., Martinelli, F. & Suri, N. (eds.). Cham: Springer, p. 19-33 15 p. (Lecture notes in computer science; vol. 9963).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Value-Driven Risk Analysis of Coordination Models

Ionita, D., Gordijn, J., Yesuf, A. S. & Wieringa, R. J., 10 Nov 2016, The Practice of Enterprise Modeling : 9th IFIP WG 8.1. Working Conference, PoEM 2016, Proceedings. London: Springer, p. 102-116 15 p. (Lecture Notes in Business Information Processing; vol. 267).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)

Visualization environment for reviewing and experimenting with compaction equipment trajectories in context

Vasenev, A., Hartmann, T., Miller, S. R. & Doree, A. G., Apr 2016, In : Advanced engineering informatics. 30, 2, p. 95-108 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

4 Citations (Scopus)
1 Downloads (Pure)

Workshop C2 Report - Big Data Interoperability for Enterprises

van Sinderen, M. J. & Iacob, M. E., Sep 2016, Enterprise Interoperability in the Digitized and Networked Factory of the Future. Zelm, M., Doumeingts, G. & Mendonca, J. P. (eds.). UK: International Society for Technology in Education, p. 268-269 2 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

File
21 Downloads (Pure)
2015

A commitment-based reference ontology for services

Nardi, J. C., de Almeida Falbo, R., Andrade Almeida, J., Guizzardi, G., Ferreira Pires, L., van Sinderen, M. J., Guarino, N. & Fonseca, C. M., Dec 2015, In : Information systems. 54, p. 263-288 26 p.

Research output: Contribution to journalArticleAcademicpeer-review

52 Citations (Scopus)
1 Downloads (Pure)

Aligning enterprise architecture with strategic planning

Azevedo, C. L. B., van Sinderen, M. J., Ferreira Pires, L. & Andrade Almeida, J., 2015, CAiSE International Workshops 2015. Germany: Springer, p. 426-437 12 p. (Lecture Notes in Business Information Processing; vol. 215).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)

A methodology for the development of RESTful semantic web services for gene expression analysis

Guardia, G. D. A., Ferreira Pires, L., Vêncio, R. Z. N., Malmegrim, K. C. R. & Guareis de farias, C., 24 Jul 2015, In : PLoS ONE. 10, 7, p. e0134011:1-e0134011:28 28 p., e0134011.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
4 Citations (Scopus)
20 Downloads (Pure)

An approach to business process recovery from source code

Pacini, L. A., do Prado, A. F., Lopes de Souza, W. & Ferreira Pires, L., 2015, 12th International Conference on Information Technology: New Generations, ITNG 2015. Latifi, S. (ed.). USA: IEEE Computer Society, p. 361-366 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

An experience report on ERP effort estimation driven by quality requirements

Erasmus, P. & Daneva, M., 11 Mar 2015, 6th Workshop on Requirements Prioritization and Communication (RePriCo) at REFSQ 2015. Schockert, S. (ed.). CEUR, p. 126-139 14 p. (CEUR Workshop Proceedings; vol. 1342).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
64 Downloads (Pure)

An ontology for telemedicine systems resiliency to technological context variations in pervasive healthcare

Larburu Rubio, N., Bults, R. G. A., van Sinderen, M. J., Widya, I. A. & Hermens, H. J., 2015, In : IEEE journal of translational engineering in health and medicine. 3, p. 10 10 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
11 Citations (Scopus)
74 Downloads (Pure)

Apate: Anti-Phishing Analysing and Triaging Environment (Poster)

Lastdrager, E. E. H., Hartel, P. H. & Junger, M., 18 May 2015, 36th IEEE Symposium on Security and Privacy. Piscataway, New Jersey: IEEE Computer Society, p. - 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
94 Downloads (Pure)

A quality-of-data aware mobile decision support system for patients with chronic illnesses

Larburu Rubio, N., van Schooten, B. W., Shalom, E., Fung, L. S. N., van Sinderen, M. J., Hermens, H. J. & Jones, V. M., 2015, Knowledge representation for health care. Riano, D., Lenz, R., Miksch, S., Peleg, M., Reichert, M. U. & ten Teije, A. (eds.). Switzerland: Springer, p. 126-139 14 p. (Lecture Notes in Artificial Intelligence; vol. 9485, no. 1).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

3 Citations (Scopus)

A reflection on agile requirements engineering: solutions brought and challenges posed

Inayat, I., Moraes, L., Daneva, M. & Salim, S. S., 20 May 2015, 1st International Workshop on Requirements Engineering in Agile Development (READ). Paasivaara, M. (ed.). New York: Association for Computing Machinery (ACM), p. 61-67 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
4 Citations (Scopus)
58 Downloads (Pure)

A Study of Identification Performance of Facial Regions from CCTV Images

Ali, T., Tome, P., Fierrez, J., Vera-Rodriguez, R., Spreeuwers, L. J. & Veldhuis, R. N. J., Jul 2015, Computational Forensics. Garain, U. & Shafait, F. (eds.). Switzerland: Springer, p. 83-91 9 p. (Lecture Notes in Computer Science; vol. 8915).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Open Access
File
2 Citations (Scopus)
59 Downloads (Pure)

A systematic literature review on agile requirements engineering practices and challenges

Inayat, I., Salim, S. S., Marczak, S., Daneva, M. & Shamshirband, S., Oct 2015, In : Computers in human behavior. 51, Part B, p. 915-929 15 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
179 Citations (Scopus)
1566 Downloads (Pure)

Auditing with incomplete logs

Mian, U. S., den Hartog, J., Etalle, S. & Zannone, N., 18 Apr 2015, Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust 2015. Eindhoven: Technische Universiteit Eindhoven, p. 1-23 23 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
40 Downloads (Pure)

Automated analysis of security requirements through risk-based argumentation

Yu, Y., Nunes Leal Franqueira, V., Tun, T. T., Wieringa, R. J. & Nuseibeh, B., 2015, In : Journal of systems and software. 106, p. 102-116 15 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
20 Citations (Scopus)
45 Downloads (Pure)

Balancing functionality, risk, and cost in smart service networks

Batubara, F. R., 14 Jul 2015, ICSOFT 2015 Doctoral Consortium. Portugal: SCITEPRESS Digital Library, p. 7-14 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Citation (Scopus)
41 Downloads (Pure)

Behavior Change Support Systems for Privacy and Security

Kegel, R. H. P. & Wieringa, R. J., 3 Jun 2015, Proceedings of the Third International Workshop on Behavior Change Support Systems. Kulyk, O. A., Kelders, S., van Gemert-Pijnen, L. & Oinas-Kukkonen, H. (eds.). Aachen: CEUR, p. 51-55 5 p. (CEUR Workshop Proceedings; vol. Vol-1369).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
1 Downloads (Pure)

Beyond the eye of the beholder: on a forensic descriptor of the eye region

Zeinstra, C. G., Veldhuis, R. N. J. & Spreeuwers, L. J., Sep 2015, 23rd European Signal Processing Conference, EUSIPCO 2015. IEEE Signal Processing Society, p. 779-783 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Breaking the 99% barrier: optimisation of 3D face recognition

Spreeuwers, L. J., 2015, In : IET biometrics. 4, 3, p. 169-177 10 p.

Research output: Contribution to journalArticleAcademicpeer-review

8 Citations (Scopus)
4 Downloads (Pure)

Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

Pieters, W. & Davarynejad, M., 28 Mar 2015, Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers. Garcia-Alfaro, J., Herrera-Joancomartí, J., Lupu, E. & Posegga, J. (eds.). Berlin: Springer, p. 201-215 15 p. (Lecture Notes in Computer Science; vol. 8872).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

9 Citations (Scopus)

Cryptographically Enforced Search Pattern Hiding

Bösch, C. T., 21 Jan 2015, Enschede: Universiteit Twente. 154 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

File
537 Downloads (Pure)

Deriving robust distributed business processes with automated transformations of fallible component processes

Wang, L., Ferreira Pires, L., van Sinderen, M. J., Wombacher, A. & Chi, C., 30 Dec 2015, In : International journal on advances in networks and services. 8, 3 and 4, p. 192-202 11 p.

Research output: Contribution to journalArticleAcademicpeer-review

9 Citations (Scopus)

Detection of denial-of-service attacks based on computer vision techniques

Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P. & Hu, J., 2015, In : IEEE transactions on computers. 64, 9, p. 2519-2533 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
61 Citations (Scopus)
152 Downloads (Pure)

Developing situation-aware applications for disaster management with a distributed rule-based platform

Moreira, J., Moreira, J., Ferreira Pires, L., van Sinderen, M. J. & Dockhorn Costa, P., 2015, Proceedings of the RuleML 2015 Challenge, Special Track on Rule-based Recommender Systems for the Web of Data, Special Industry Track, and RuleML 2015 Doctoral Consortium. Aachen: CEUR, p. - 6 p. (CEUR Workshop Proceedings; vol. 1417).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
28 Downloads (Pure)

Discriminating fingermarks with evidential value for forensic comparison

Kotzerke, J., Kotzerke, J., Davis, S. A., Hayes, R., Spreeuwers, L. J., Veldhuis, R. N. J. & Horadam, K. J., Mar 2015, Proceedings of the 3rd International Workshop on Biometrics and Forensics, IWBF 2015. Piscataway, NJ, USA: IEEE, p. 1-6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)

e3service: a critical reflection and future research

Razo-Zapata, I. S., Gordijn, J., de Leenheer, P. & Wieringa, R. J., 2015, In : Business & information systems engineering. 57, 1, p. 51-59 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
6 Citations (Scopus)
25 Downloads (Pure)

Editorial for special section of grid computing journal on “Cloud Computing and Services Science‿

van Sinderen, M. J. & Ivanov, I. I., Mar 2015, In : Cluster computing. 18, 1, p. 453-455 3 p.

Research output: Contribution to journalArticleAcademic

File
78 Downloads (Pure)

Effectiveness of qualitative and quantitative security obligations

Pieters, W., Padget, J., Dechesne, F., Dignum, V. & Aldewereld, H., Jun 2015, In : Journal of information security and applications. 22, p. 3-16 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

8 Citations (Scopus)
1 Downloads (Pure)

eLearning in industrial mathematics with applications to nanoelectronics

Ali, G., Bilotta, E., Gabriele, L., Pantano, P., Sepulveda, J., Servidio, R. & Vasenev, A., 2015, Coupled multiscale simulation and optimization in nanoelectronics. Berlin: Springer, p. 503-559 57 p. (The European Consortium for Mathematics in Industry; vol. 21, no. 21).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

File
16 Citations (Scopus)
12 Downloads (Pure)

ERP services effort estimation strategies based on early requirements

Erasmus, I. P. & Daneva, M., 11 Mar 2015, 2nd International Workshop on Requirements Engineering for the Precontract Phase (RE4P2) at REFSQ 2015. Kalenborg, A. & Trapp, M. (eds.). Essen: CEUR, p. 83-99 17 p. (CEUR Workshop Proceedings; vol. 1342).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Citation (Scopus)
153 Downloads (Pure)

Examining the examiners: an online eyebrow verification experiment inspired by FISWG

Zeinstra, C. G., Veldhuis, R. N. J. & Spreeuwers, L. J., 3 Mar 2015, International Workshop on Biometrics and Forensics, IWBF 2015. Piscataway, NJ: IEEE Computer Society, p. 1-6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)
18 Downloads (Pure)

Experimental Validation of a Risk Assessment Method

Vriezekolk, E., Etalle, S. & Wieringa, R. J., Mar 2015, 21st International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2015. Cham, Switzerland: Springer, p. 1-16 16 p. (Lecture Notes in Computer Science; vol. 9013).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2 Citations (Scopus)
55 Downloads (Pure)

Exploring How User Routine Affects the Recognition Performance of a Lock Pattern

de Wide, L., Spreeuwers, L. J. & Veldhuis, R. N. J., 9 Sep 2015, Proceedings of the 2015 International Conference of the Biometrics Special Interest Group (BIOSIG). Bonn: Gesellschaft für Informatik, p. 1-8 8 p. (Lecture Notes in Informatics (LNI) - Proceedings; vol. P-245).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Citation (Scopus)
22 Downloads (Pure)

Facial recognition using new LBP representations

Akoushideh, A., Veldhuis, R. N. J., Spreeuwers, L. J. & Maybodi, B. M-N., 6 May 2015, Proceedings of the 36th WIC Symposium on Information Theory in the Benelux. Brussels: Université Libre de Bruxelles, p. 34-41 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
32 Downloads (Pure)

FFNT Annual Report 2015: Activity Report

Leisyte, L., Daneva, M., García Blanco, S., Magnanimo, V. & van Eijk, E., 2015, Enschede: Female Faculty Network Twente. 19 p.

Research output: Book/ReportReportProfessional

Open Access
File
9 Downloads (Pure)

Focus group: cost-effective and methodologically sound ways to get practitioners involved in your empirical RE research

Daneva, M., 2 Mar 2015, REFSQ-JP 2015: REFSQ Workshops, Research Method Track, and Poster Track. CEUR, p. 211-216 5 p. (CEUR Workshop Proceedings; vol. 1342).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
4 Citations (Scopus)
41 Downloads (Pure)

From Cybercrime to Cyborg Crime: Botnets as Hybrid Criminal Actor-Networks

van der Wagen, W. & Pieters, W., 6 Mar 2015, In : British journal of criminology. 55, 2, p. 1-18 18 p.

Research output: Contribution to journalArticleAcademicpeer-review

22 Citations (Scopus)
Open Access
File
34 Downloads (Pure)

Handling non-functional requirements in model-driven development: an ongoing industrial survey

Ameller, D., Franch, X., Gómez, C., Araújo, J., Berntsson Svensson, R., Biffle, S., Cabot, J., Cortelessa, V., Daneva, M., Méndez Fernández, D., Moreira, A., Muccini, H., Vallecillo, A., Wimmer, M., Amaral, V., Brunelière, H., Burgueño, L., Goulão, M., Schätz, B. & Teufl, S., 17 Aug 2015, 23rd International Conference on Requirements Engineering (RE). Piscataway, NJ: IEEE Computer Society, p. 208-213 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
12 Citations (Scopus)
11 Downloads (Pure)

Hybrid multidimensional design for heterogeneous data supported by ontological analysis: an application case in the Brazilian electric system operation

Moreira, J., Cordeiro, K., Campos, M. L. M. & Borges, M., 27 Mar 2015, 4th Workshop on Energy Data Management (EnDM) in the 18th International Conference on Extending Database Technology (EDBT). Belgium: CEUR, p. 72-77 6 p. (CEUR workshop proceedings; vol. 1330).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)