Research Output

2015

Identification Performance of Evidential Value Estimation for Fingermarks

Kotzerke, J., Kotzerke, J., Davis, S., Hayes, R., Spreeuwers, L. J., Veldhuis, R. N. J. & Horadam, K. J., 15 Sep 2015, Proceedings of the 2015 International Conference of the Biometrics Special Interest Group (BIOSIG). Bonn: Gesellschaft für Informatik, p. 1-6 6 p. (Lecture Notes in Informatics (LNI) - Proceedings; vol. P-245).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Impact of eye detection error on face recognition performance

Dutta, A., Günther, M., El Shafey, L., Veldhuis, R. N. J. & Spreeuwers, L. J., 19 Jan 2015, In : IET biometrics. 4, 3, p. 137-150 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

9 Citations (Scopus)

INACHUS : Integrated wide area situation awarenesss and survivor localization in search and rescue operations

Athanasiou, G., Amditis, A., Riviere, N., Makri, E., Makri, E., Bartzas, A., Anyfantis, A., Werner, R., Alexsson, D., di Girolamo, E., Etienne, N., Schaap, M., Kerle, N., Bozabalian, N., Marafioti, G., Berzosa, J. & Gustafsson, A., 8 Dec 2015, Book of abstracts of the 5th International Conference on Earth Observation for Global Changes (EOGC) and the 7th Geo-information Technologies for Natural Disaster Management (GiT4NDM). United Nations Office for Outer Space Affairs, p. 1-1 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
11 Downloads (Pure)

Indicators of Malicious SSL Connections

Bortolameotti, R., Peter, A., Everts, M. H. & Bolzoni, D., Nov 2015, 9th International Conference on Network and System Security, NSS 2015. New York: Springer, p. 162-175 14 p. (Lecture Notes in Computer Science; vol. 9408).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Interactive Illustrative Line Styles and Line Style Transfer Functions for Flow Visualization

Everts, M. H., Bekker, H., Roerdink, J. B. T. M. & Isenberg, T., 19 Mar 2015.

Research output: Working paper

Open Access
File
33 Downloads (Pure)

Interoperability architecture for electric mobility

Brand, A. & Iacob, M. E., 2015, Enterprise Interoperability - Proceedings of the 6th International IFIP Working Conference, IWEI 2015. van Sinderen, M. J. & Chapurlat, V. (eds.). Berlin Heidelberg: Springer, p. 126-140 15 p. (Lecture Notes in Business Information Processing; vol. 213).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Interoperability challenges for context aware logistics services - the case of synchromodal logistics

Singh, P. M. & van Sinderen, M. J., 2015, Proceedings of the Workshops of the 6th International IFIP Working Conference on Enterprise Interoperability, IWEI-WS 2015. Zelm, M. (ed.). Aachen: CEUR, p. 9 9 p. (CEUR Workshop Proceedings; vol. 1414).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Citation (Scopus)
56 Downloads (Pure)

Investigating the usability and utility of tangible modelling of socio-technical architectures

Ionita, D., Wieringa, R. J., Bullee, J-W. & Vasenev, A., 29 May 2015, Enschede: Centre for Telematics and Information Technology (CTIT). 29 p. (CTIT Technical Report Series; no. TR-CTIT-15-03)

Research output: Book/ReportReportProfessional

File
52 Downloads (Pure)

Lightweight metrics for enterprise architecture analysis

Singh, P. M. & van Sinderen, M. J., 2015, Business Information Workshops - Revised Papers of BIS 2015 International Workshops. Abramowicz, W. (ed.). Switzerland: Springer, p. 113-125 13 p. (Lecture Notes in Business Information Processing; vol. 228).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Likelihood Ratio Based Mixed Resolution Facial Comparison

Peng, Y., Spreeuwers, L. J. & Veldhuis, R. N. J., 3 Mar 2015, Proceedings of the 3rd International Workshop on Biometrics and Forensics, IWBF 2015. USA: IEEE Computer Society, p. 1-5 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
6 Citations (Scopus)
46 Downloads (Pure)

Model-driven Development for User-centric Well-being Support: From Dynamic Well-being Domain Models to Context-aware Applications

Bosems, S. & van Sinderen, M. J., Feb 2015, 3rd International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2015). SCITEPRESS, p. 425-432 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)

Modeling message sequences for intrusion detection in industrial control systems

Caselli, M., Zambon, E., Petit, J. & Kargl, F., Mar 2015, Critical Infrastructure Protection IX: 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers. Rice, M. & Shenoi, S. (eds.). London: Springer, p. 49-71 23 p. (Critical Infrastructure Protection IX; vol. 466).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

11 Citations (Scopus)

Modeling resources and capabilities in enterprise architecture: A well-founded ontology-based proposal for ArchiMate

Azevedo, C. L. B., Iacob, M. E., Almeida, J. P. A., van Sinderen, M., Ferreira Pires, L. & Guizzardi, G., Dec 2015, In : Information systems. 54, p. 235-262 28 p.

Research output: Contribution to journalArticleAcademicpeer-review

61 Citations (Scopus)
363 Downloads (Pure)

Modelling urban crime through workforce size: a test of the activity support concept

Montoya, L., 2015, In : Environment and planning. Part B: Planning and design. 42, 3, p. 399-414 40 p.

Research output: Contribution to journalArticleAcademicpeer-review

3 Citations (Scopus)

OntoEmergePlan: variability of emergency plans supported by a domain ontology

Ferreira, M. I. G. B., Moreira, J., Campos, M. L. M., Braga, B. F. B., Sales, T. P., de Cordeiro, K. F. & Borges, M. R. S., 24 May 2015, 12th International Conference on Information Systems for Crisis Response and Management (ISCRAM). Agder, Norway: University of Agder, p. 1-9 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Physical and Digital Security Mechanisms: Properties, Combinations and Trade-offs

van Cleeff, A., 3 Jun 2015, Enschede: Universiteit Twente. 358 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

File
1566 Downloads (Pure)

Play-testing and requirements engineering: implications for research and teaching

Daneva, M., 6 May 2015, 2nd IEEE/ACM International Workshop on Requirements Engineering and Testing, RET@ICSE 2015. Bjarnason, E., Borg, M. & Morandino, M. (eds.). New York: Association for Computing Machinery (ACM), p. 9-12 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2 Citations (Scopus)
24 Downloads (Pure)

Predicting Performance of a Face Recognition System Based on Image Quality

Dutta, A., 24 Apr 2015, Enschede: University of Twente. 136 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

File
267 Downloads (Pure)

Predicting service composition costs with complex cost behavior

Albuquerque de Medeiros, R. W., Ferreira Pires, L. & Rosa, N. S., 27 Jun 2015, 12th IEEE International Conference on Service Computing, SCC 2015. USA: IEEE Computer Society, p. 419-426 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

7 Citations (Scopus)

Prediction of domain behaviour through dynamic well-being domain model analysis

Bosems, S. & van Sinderen, M. J., 2015, In : Scientific world journal. 2015, p. 11 11 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
33 Downloads (Pure)

Pseudonym schemes in vehicular networks: a survey

Petit, J., Schaub, F., Feiri, M. & Kargl, F., Mar 2015, In : IEEE communications surveys & tutorials. 17, 1, p. 228-255 32 p.

Research output: Contribution to journalArticleAcademicpeer-review

189 Citations (Scopus)

Publicly Verifiable Private Aggregation of Time-Series Data

Bakondi, B. G., Peter, A., Everts, M. H., Hartel, P. H. & Jonker, W., 1 Aug 2015, 10th International Conference on Availability, Reliability and Security, ARES 2015. Piscataway, NJ, USA: IEEE, p. 50-59 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Quality-of-Data Management for Telemedicine Systems

Larburu Rubio, N., Bults, R. G. A., van Sinderen, M. J. & Hermens, H. J., Sep 2015, 5th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2015). Amsterdam: Elsevier, p. 451-458 8 p. (Procedia Computer Science (2015); vol. 63).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)

Reducing user discomfort in direct load control of domestic water heaters

Belov, A., Vasenev, A., Havinga, P. J. M., Meratnia, N. & van der Zwaag, B. J., 6 Nov 2015, Proceedings of the IEEE Innovative Smart Grid Technologies - Asia (ISGT ASIA 2015). USA: IEEE Computer Society, p. 1-6 6 p. (IEEE Transactions on Smart Grid).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
8 Citations (Scopus)
35 Downloads (Pure)

Regression Nodes: Extending attack trees with data from social sciences

Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Jul 2015, Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015). Piscataway, New Jersey: IEEE Computer Society, p. 17-23 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Resilient In-Network Aggregation for Vehicular Networks

Dietzel, S., 24 Apr 2015, Enschede: University of Twente. 268 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

File
223 Downloads (Pure)

REWIRE – Revocation without resolution: A privacy-friendly revocation mechanism for vehicular ad-hoc networks

Förster, D., Löhr, H., Zibuschka, J. & Kargl, F., 2015, Trust and Trustworthy Computing: 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings. Conti, M., Schunter, M. & Askoxylakis, I. (eds.). Cham: Springer, p. 193-208 16 p. (Lecture Notes in Computer Science; vol. 9229).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)

Robust collaborative services interactions under system crashes and network failures

Wang, L., 23 Apr 2015, Enschede: University of Twente. 144 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

Open Access
File
81 Downloads (Pure)

Robust interactions under system crashes and network failures of collaborative processes with arbitrary control flows

Wang, L., Ferreira Pires, L., Wombacher, A., van Sinderen, M. J. & Chi, C., 2015, Seventh International Conference on Advanced Service Computing, Service Computation 2015. Nice: IARIA, p. 27-34 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)

Sampling variability in forensic likelihood-ratio computation: A simulation study

Ali, T., Spreeuwers, L. J., Veldhuis, R. N. J. & Meuwly, D., Dec 2015, In : Science & justice. 55, 6, p. 499-508 10 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
6 Citations (Scopus)
41 Downloads (Pure)

Secure Cluster-Based In-Network Information Aggregation for Vehicular Networks

Dietzel, S., Peter, A. & Kargl, F., May 2015, IEEE 81st Vehicular Technology Conference, VTC Spring 2015. Piscataway, NJ, USA: IEEE, p. 1-5 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)

Semiparametric score level fusion: Gaussian copula approach

Susyanyo, N., Klaassen, C. A. J., Veldhuis, R. N. J. & Spreeuwers, L. J., 6 May 2015, Proceedings of the 36th WIC Symposium on Information Theory in the Benelux. Brussels: Université Libre de Bruxelles, p. 26-33 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
87 Downloads (Pure)

Sequence-aware intrusion detection in industrial control systems

Caselli, M., Zambon, E. & Kargl, F., Apr 2015, Proceedings of the 1st ACM Workshop on Cyber-Physical System Security. Zhou, J. & Jones, D. (eds.). New York: Association for Computing Machinery (ACM), p. 13-24 12 p. (CPSS Workshop - AsiaCCS'15).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

82 Citations (Scopus)

Setting a world record in 3D face recognition

Spreeuwers, L. J., Nov 2015, In : Vonk. 33, 4, p. 11-21 11 p.

Research output: Contribution to journalArticleAcademic

File
49 Downloads (Pure)

Short: A framework for evaluating pseudonym strategies in vehicular ad-hoc networks

Förster, D., Kargl, F. & Löhr, H., 22 Jun 2015, WiSec '15: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks. Association for Computing Machinery (ACM), p. 1–6 a19

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

7 Citations (Scopus)

Six strategies for generalizing software engineering theories

Wieringa, R. J. & Daneva, M., Apr 2015, In : Science of computer programming. 101, p. 136-152 17 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
52 Citations (Scopus)
126 Downloads (Pure)

SOA and EDA: a comparative study - similarities, difference and conceptual guidelines on their usage

Allah Bukhsh, Z., van Sinderen, M. J. & Singh, P. M., 2015, Twelfth International Conference on e-Business, ICE-B 2015. Lisbon: SCITEPRESS, p. 213-220 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Socio-Technical Security Metrics (Dagstuhl Seminar 14491)

Gollmann, D., Herley, C., Koenig, V., Pieters, W. & Sasse, M. A., 20 Mar 2015, In : Dagstuhl reports. 4, 12, p. 1-28 28 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
27 Downloads (Pure)

Tangible Modelling to Elicit Domain Knowledge: An Experiment and Focus Group

Ionita, D., Wieringa, R. J., Bullee, J-W. & Vasenev, A., 22 Oct 2015, 34th International Conference on Conceptual Modeling, ER 2015. Johannesson, P., Li Lee, M., Liddle, S. W., Opdahl, A. L. & López, Ó. P. (eds.). Berlin: Springer, p. 558-565 8 p. (Lecture Notes in Computer Science; vol. 9381).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

9 Citations (Scopus)

Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security

Coles-Kemp, L., Bullée, J-W., Montoya, L., Junger, M., Heath, C. P., Pieters, W. & Wolos, L., 2015, Trespass Project. 96 p.

Research output: Book/ReportReportProfessional

Open Access
File
12 Downloads (Pure)

Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions

Kleber, S., van der Heijden, R. W., Kopp, H. & Kargl, F., Mar 2015, 2015 International Conference and Workshops on Networked Systems (NetSys). USA: IEEE Computer Society, p. 1-8 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

The Personal Information Security Assistant

Kegel, R. H. P., Aug 2015, 2015 IEEE 23rd International Requirements Engineering Conference (RE). United States: IEEE, p. 393-397 5 p. (IEEE International Requirements Engineering Conference (RE); vol. 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

The persuasion and security awareness experiment: reducing the success of social engineering attacks

Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Mar 2015, In : Journal of experimental criminology. 11, 1, p. 97-115 19 p.

Research output: Contribution to journalArticleAcademicpeer-review

29 Citations (Scopus)

The relation between the secrecy rate of biometric template protection and biometric recognition performance

Veldhuis, R. N. J., 19 May 2015, 2015 International Conference on Biometrics (ICB 2015): Phuket, Thailand, 19-22 May 2015. Piscataway, NJ: IEEE, p. 311-318 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Citation (Scopus)
22 Downloads (Pure)

Threshold implementations: as countermeasure against higher-order differential power analysis

Bilgin, B., 13 May 2015, Enschede: University of Twente. 166 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

Open Access
File
249 Downloads (Pure)

Threshold implementations of Small S-boxes

Bilgin, B., Nikova, S. I., Nikov, V., Rijmen, V., Tokareva, N. & Vitkup, V., Mar 2015, In : Cryptography and communications. 7, 1, p. 3-33 32 p.

Research output: Contribution to journalArticleAcademicpeer-review

27 Citations (Scopus)

Toward automatic segmentation and quantification of tumor and stroma in whole-slide images of H&E stained rectal carcinomas

Geessink, O., Baidoshvili, A., Baidoshvili, A., Freling, G., Klaase, J. M., Slump, C. H. & van der Heijden, F., 17 Mar 2015, Medical Imaging 2015: Digital Pathology. Bellingham, Washington: SPIE, p. 94200F 7 p. (Proceedings of SPIE; vol. 9420, no. 94200F).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Towards capturing strategic planning in EA

Azevedo, C. L. B., A. Almeida, J. P., van Sinderen, M. J. & Ferreira Pires, L., 2015, 19th IEEE International Enterprise Object Computing Conference, EDOC 2015. USA: IEEE, p. 159-168 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

9 Citations (Scopus)

Towards ontology-driven situation-aware disaster management

Moreira, J., Ferreira Pires, L., van Sinderen, M. J. & Dockhorn Costa, P., Dec 2015, In : Applied ontology. 10, 3-4, p. 339-353 15 p.

Research output: Contribution to journalArticleAcademicpeer-review

8 Citations (Scopus)
2 Downloads (Pure)

Transforming Graphical System Models To Graphical Attack Models

Ivanova, M. G., Probst, C. W., Hansen, R. R. & Kammüller, F., 13 Jul 2015, Graphical Models for Security: Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers. Mauw, S., Kordy, B. & Jajodia, S. (eds.). London: Springer, p. 82-96 2 p. (Lecture notes in computer science; vol. 9390).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
18 Citations (Scopus)
76 Downloads (Pure)