Research Output

2015

Using Value Models for Business Risk Analysis in e-Service Networks

Ionita, D., Wieringa, R. J., Wolos, L., Gordijn, J. & Pieters, W., 12 Nov 2015, 8th IFIP WG 8.1. Working Conference on the Practice of Enterprise Modelling, PoEM 2015. Ralyté, J., España, S. & Pastor, O. (eds.). Berlin: Springer, p. 239-253 15 p. (Lecture Notes in Business Information Processing; vol. 235).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)

Validating the raster risk assessment method in practice

Vriezekolk, E., Etalle, S. & Wieringa, R. J., 27 May 2015, Proceedings of the ISCRAM 2015 Conference. Palen, L., Buscher, M., Comes, T. & Hughes, A. (eds.). International Association for Information Systems for Crisis Response and Management (ISCRAM), p. - 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Citation (Scopus)
40 Downloads (Pure)

Welcome from the Workshop Chairs

Berntsson Svensson, R., Daneva, M., Marczak, S., Ernst, N. & Madhavji, N., 11 Aug 2015, Fifth International Workshop on Empirical Requirements Engineering, EmpiRE 2015 at RE'15. USA: IEEE Computer Society, p. 3-5 3 p.

Research output: Chapter in Book/Report/Conference proceedingForeword/postscriptAcademic

File
17 Downloads (Pure)

What you ask is what you get: Understanding architecturally significant functional requirements

Anish, P. R., Daneva, M., Cleland-Huang, J., Wieringa, R. J. & Ghaisas, S., 20 Aug 2015, 23rd IEEE Internatioanl Conference on Requirements Engineering (RE). Zowghi, D., Gervasi, V. & Amyot, D. (eds.). IEEE Computer Society, p. 86-95 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
9 Citations (Scopus)
212 Downloads (Pure)

Workflow-based service selection under multi-constraints

Xia, C., Chi, C., Wong, R., Wombacher, A., Ferreira Pires, L., van Sinderen, M. J. & Ding, C., Jul 2015, Twelfth IEEE International Conference on Services Computing, SCC 2015. USA: IEEE, p. 332-339 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

“If you were attacked, you’d be sorry‿: Counterfactuals as security arguments

Herley, C. & Pieters, W., Sep 2015, New Security Paradigm Workshop (NSPW). New York: Association for Computing Machinery (ACM), p. 112-123 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

8 Citations (Scopus)
2014

A Bayesian model for predicting face recognition performance using image quality

Dutta, A., Veldhuis, R. N. J. & Spreeuwers, L. J., 29 Sep 2014, 2014 IEEE International Joint Conference on Biometrics (IJCB). USA: IEEE, p. 1-8 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
7 Citations (Scopus)
115 Downloads (Pure)

Achieving a Consensual Definition of Phishing Based on a Systematic Review of the Literature

Lastdrager, E. E. H., 4 Jun 2014, In : Crime science. 3, p. 9:1-9:16 9.

Research output: Contribution to journalArticleAcademicpeer-review

File
35 Citations (Scopus)
221 Downloads (Pure)

A collaborative processes synchronization method with regard to system crashes and network failures

Wang, L., Wombacher, A., Ferreira Pires, L., van Sinderen, M. J. & Chi, C., 2014, 29th Symposium on Applied Computing, SAC 2014. New York: Association for Computing Machinery (ACM), p. 1393-1398 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

A comparative study of baseline algorithms of face recognition

Mehmood, Z., Ali, T., Khattak, S. & Khan, S. U., Dec 2014, 12th International Conference on Frontiers of Information Technology, FIT 2014. USA: IEEE, p. 263-268 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
9 Citations (Scopus)
193 Downloads (Pure)

A flexible, subjective logic-based framework for misbehavior detection in V2V networks

Dietzel, S., van der Heijden, R., van der Heijden, R., Decke, H. & Kargl, F., Jun 2014, IEEE 15th International Symposium on A World of Wireless, Mobile and Multimedia Networks, WoWMoM 2014. USA: IEEE, p. 513-516 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

19 Citations (Scopus)

A Mapping Study on Cooperation between Information System Development and Operations

Erich, F., Amrit, C. A. & Daneva, M., 13 Dec 2014, 15th International Conference on Product-Focused Software Process Improvement, PROFES 2014. Jedlitschka, A., Kuvaja, P., Kuhrmann, M., Männistö, T., Münch, J. & Raatikainen, M. (eds.). London: Springer, p. 277-280 4 p. (Lecture Notes in Computer Science; vol. 8892).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
21 Citations (Scopus)
257 Downloads (Pure)

A metamodel for modeling cost behavior in service composition

de Medeiros, R. W. A., Rosa, N. S. & Ferreira Pires, L., 2014, 11th ACS/IEEE International Conference on Computer Systems and Applications, AICSSA 2014. IEEE eXpress Conference Publishing, p. 84-91 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

A More Efficient AES Threshold Implementation

Bilgin, B., Gierlichs, B., Nikova, S., Nikov, V. & Rijmen, V., May 2014, Progress in Cryptology – AFRICACRYPT 2014: 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings. Pointcheval, D. & Vergnaud, D. (eds.). Switzerland: Springer, p. 267-284 18 p. (Lecture Notes in Computer Science; vol. 8469).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

66 Citations (Scopus)

Analyzing the Effect of the Collaborative Interactions on Performance of Requirements Validation

Condori-Fernandez, N., España, S., España, S., Sikkel, N., Daneva, M. & Gonzlez, A., 10 Apr 2014, 20th International Working Conference on Requirements Engineering: Foundation for Software Quality. Salinesi, C. & van de Weerd, I. (eds.). Berlin: Springer, p. 216-231 16 p. (Lecture Notes in Computer Science; vol. 8396).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
3 Citations (Scopus)
37 Downloads (Pure)

An approach to the decomposition of business processes for execution in the cloud

Venezian Povoa, L., Lopes de Souza, W., Ferreira Pires, L. & do Prado, A. F., 2014, 11th ACS/IEEE International Conference on Computer Systems and Applications, AICSSA 2014. IEEE eXpress Conference Publishing, p. 470-477 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

10 Citations (Scopus)

An Architecture for Health Information Exchange in Pervasive Healthcare Environment

Cardoso de Moraes, J. L., Lopes de Souza, W., Ferreira Pires, L. & Francisco do Prado, A., 31 Aug 2014, Enterprise Information Systems. Hammoudi, S., Cordeiro, J., Maciaszek, L. A. & Filipe, J. (eds.). Switzerland: Springer, p. 384-401 17 p. (Lecture Notes in Business Information Processing; vol. 190, no. 190).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

1 Citation (Scopus)

An evaluation framework for pre-distribution strategies of certificates in VANETs

Feiri, M., Petit, J. & Kargl, F., Feb 2014, Proceedings of 2nd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2014). Luxembourg City, Luxembourg: Vehicular Lab, University of Luxemburg, p. 22-23 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
27 Downloads (Pure)

An information fusion approach for filtering GNSS data sets collected during construction operations

Vasenev, A., Pradhananga, N., Bijleveld, F., Ionita, D., Hartmann, T., Teizer, J. & Doree, A. G., 2014, In : Advanced engineering informatics. 28, 4, p. 297-310 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

20 Citations (Scopus)

APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography

Andreeva, E., Bilgin, B., Bogdanov, A., Luykx, A., Mennink, B., Mouha, N. & Yasuda, K., Mar 2014, Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers. Cid, C. & Rechberger, C. (eds.). London: Springer, p. 168-186 16 p. ( Lecture Notes in Computer Science; vol. 8540).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
28 Citations (Scopus)
73 Downloads (Pure)

APTs way: Evading Your EBNIDS

Abbasi, A. & Wetzel, J., 16 Oct 2014, Black Hat Europe. Amsterdam: Black Hat, p. 1-87 87 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
65 Downloads (Pure)

Argumentation-Based Security Requirements Elicitation: The Next Round

Ionita, D., Bullee, J-W. & Wieringa, R. J., 25 Aug 2014, Proceedings of the 2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE). Piscataway, New Jersey: IEEE Computer Society, p. 7-12 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)

A Security Assessment Methodology for Critical Infrastructures

Caselli, M. & Kargl, F., 2014, Critical Information Infrastructures Security: Ninth International Conference, CRITIS 2014. Hämmerli, B. M. & Lopez, J. (eds.). London: Springer, p. 332-343 12 p. (Critical Information Infrastructures Security; vol. 8985).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

A survey of cost accounting in service-oriented computing

de Medeiros, R. W. A., Rosa, N. S., Campos, G. M. M. & Ferreira Pires, L., Jun 2014, IEEE World Congress on Services, SERVICES 2014. USA: IEEE Computer Society, p. 77-84 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

A Survey of formalization approaches to service composition

Campos, G. M. M., Rosa, N. S. & Ferreira Pires, L., Jun 2014, IEEE International Conference on Services Computing, SCC 2014. USA: IEEE Computer Society, p. 179-186 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

9 Citations (Scopus)

A Survey of Provably Secure Searchable Encryption

Bösch, C. T., Hartel, P. H., Jonker, W. & Peter, A., Aug 2014, In : ACM computing surveys. 47, 2, p. 18:1-18:51 47 p., 18.

Research output: Contribution to journalArticleAcademicpeer-review

File
142 Citations (Scopus)
1463 Downloads (Pure)

A system for denial-of-service attack detection based on multivariate correlation analysis

Tan, Z., Jamdagni, A., He, X., Nanda, P. & Liu, R. P., Feb 2014, In : IEEE transactions on parallel and distributed systems. 25, 2, p. 447-456 10 p.

Research output: Contribution to journalArticleAcademicpeer-review

124 Citations (Scopus)

A transformation-based approach to business process management in the cloud

Duipmans, E. F., Ferreira Pires, L. & Bonino da Silva Santos, L. O., 2014, In : Journal of grid computing. 12, 2, p. 191-219 29 p.

Research output: Contribution to journalArticleAcademicpeer-review

18 Citations (Scopus)

Automatic Eye Detection Error as a Predictor of Face Recognition Performance

Dutta, A., Veldhuis, R. & Spreeuwers, L., May 2014, 35rd WIC Symposium on Information Theory in the Benelux and The 4th WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux: Eindhoven, The Netherlands, May 12-13, 2014. Eindhoven: Werkgemeenschap voor Informatie- en Communicatietheorie (WIC), p. 89-96 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
11 Citations (Scopus)
14 Downloads (Pure)

Automatic player detection and identification for sports entertainment applications

Mahmood, Z., Ali, T., Khattak, S., Hasan, L. & Khan, S. U., Sep 2014, In : Pattern analysis and applications. 18, 4, p. 971-982 12 p.

Research output: Contribution to journalArticleAcademicpeer-review

22 Citations (Scopus)

Biometric evidence evaluation: an empirical assessment of the effect of different training data

Ali, T., Spreeuwers, L. J., Veldhuis, R. N. J. & Meuwly, D., 29 Aug 2014, In : IET biometrics. online pre, 4, p. 1-12 12 p.

Research output: Contribution to journalArticleAcademicpeer-review

4 Citations (Scopus)

Biometric Score Calibration for Forensic Face Recognition

Ali, T., 19 Jun 2014, Enschede: Universiteit Twente. 133 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

File
137 Downloads (Pure)

Biometrics — Developments and Potential

Meuwly, D. & Veldhuis, R. N. J., 16 Jun 2014, Wiley Encyclopedia of Forensic Science. Chichester, UK: Wiley, p. 1-8 8 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Biometrics in Forensic Science: Challenges, Lessons and New Technologies

Tistarelli, M., Grosso, E. & Meuwly, D., 30 Nov 2014, Biometric Authentication. Switzerland: Springer, p. 153-164 12 p. (Lecture Notes in Computer Science; vol. 8897, no. 8897).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

File
6 Citations (Scopus)
216 Downloads (Pure)

Context-sensitive Information security Risk identification and evaluation techniques

Ionita, D., 25 Aug 2014, 22nd IEEE International Requirements Engineering Conference (RE14). Piscataway, New Jersey: IEEE, p. 485-488 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Cooperation between information system development and operations: a literature review

Erich, F., Amrit, C. A. & Daneva, M., 19 Sep 2014, Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2014. Torchiano, M. (ed.). New York: Association for Computing Machinery (ACM), p. 1-1 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
11 Citations (Scopus)
165 Downloads (Pure)

Cooperative home light: assessment of a security function for the automotive field

Knapik, P., Petit, J., Kargl, F. & Schoch, E., 2014, In : Journal on advances in security. 7, 1&2, p. 1-14 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
33 Downloads (Pure)

Cost-effectiveness of Security Measures: A model-based Framework

Pieters, W., Probst, C. W., Lukszo, Z. & Montoya, L., Jan 2014, Approaches and Processes for Managing the Economics of Information Systems. Tsiakis, T., Kargidis, T. & Katsaros, P. (eds.). Hershey, PA: IGI Global, p. 139-156 18 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

8 Citations (Scopus)
2 Downloads (Pure)

Cryptographically-Enhanced Privacy for Recommender Systems

Jeckmans, A., 5 Feb 2014, Enschede: University of Twente. 103 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

File
430 Downloads (Pure)

Customer requirements based ERP customization using AHP technique

Parthasarathy, S. & Daneva, M., 2014, In : Business process management journal. 20, 5, p. 730-751 22 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
13 Citations (Scopus)
101 Downloads (Pure)

Cyber Security as Social Experiment

Pieters, W., Hadziosmanovic, D. & Dechesne, F., 15 Sep 2014, NSPW '14 Proceedings of the 2014 workshop on New Security Paradigms, NSPW 2014. New York: Association for Computing Machinery (ACM), p. 15-24 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)
File
125 Downloads (Pure)

Design science methodology for information systems and software engineering

Wieringa, R. J., 2014, London: Springer. 332 p.

Research output: Book/ReportBookAcademic

File
270 Citations (Scopus)
457 Downloads (Pure)

Developing a Service Oriented IT Platform for Synchromodal Transportation

Singh, P. M., Oct 2014, On the Move to Meaningful Internet Systems, OTM 2014 Workshops. Meersman, R., Panetto, H., Mishra, A. & Valencia-Garcia, R. (eds.). Heidelberg: Springer, p. 30-36 7 p. (Lecture Notes in Computer Science; vol. Volume 8842, no. 8842).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Distributed Searchable Symmetric Encryption

Bösch, C. T., Peter, A., Leenders, B., Lim, H. W., Tang, Q., Wang, H., Hartel, P. H. & Jonker, W., Jul 2014, Twelfth Annual International Conference on Privacy, Security and Trust, PST 2014. USA: IEEE, p. 330-337 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
17 Citations (Scopus)
90 Downloads (Pure)

Empirical research methodologies and studies in Requirements Engineering: How far did we come?

Daneva, M., Damian, D., Marchetto, A. & Pastor, O., 30 Jun 2014, In : Journal of systems and software. 95, 12, p. 1-9 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
34 Citations (Scopus)
188 Downloads (Pure)

Empirical research methods for technology validation: Scaling up to practice

Wieringa, R. J., Sep 2014, In : Journal of systems and software. 95, p. 19-31 13 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
37 Citations (Scopus)
96 Downloads (Pure)

Engineering of quality requirements as perceived by near-shore development centers' architects in eastern Europe: the hole in the whole.

Daneva, M., Marczak, S. & Herrmann, A., 19 Sep 2014, Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2014. Torchiano, M. (ed.). New York: Association for Computing Machinery (ACM), p. 191-200 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
4 Citations (Scopus)
22 Downloads (Pure)

Enhancing big data security with collaborative intrusion detection

Tan, Z., Nagar, U. T., He, X., Nanda, P., Liu, R. P., Wang, S. & Hu, J., 2014, In : IEEE cloud computing. 1, 3, p. 27-33 7 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
45 Citations (Scopus)
75 Downloads (Pure)

Enterprise architecture intelligence

Veneberg, R. K. M., Iacob, M. E., van Sinderen, M. J. & Bodenstaff, L., 2014, Eighteenth IEEE International Enterprise Distributed Object Computing Conference, EDOC 2014. Reichert, M. U., Rinderle-Ma, S. & Grossmann, G. (eds.). USA: IEEE Computer Society, p. 22-31 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

11 Citations (Scopus)