Research Output

2014

Enterprise interoperability: information, services and processes for the interoperable economy and society

Folmer, E., van Sinderen, M. & Oude Luttighuis, P., Nov 2014, In : Information systems and e-business management. 12, 4, p. 491-494 4 p.

Research output: Contribution to journalArticleAcademicpeer-review

1 Citation (Scopus)
4 Downloads (Pure)

Experimenting with Incentives: Security in Pilots for Future Grids

Dechesne, F., Hadziosmanovic, D. & Pieters, W., Nov 2014, In : IEEE security & privacy. 12, 6, p. 59-66 8 p.

Research output: Contribution to journalArticleAcademicpeer-review

4 Citations (Scopus)

Face identification in videos from mobile cameras

Mu, M., Spreeuwers, L. J. & Veldhuis, R. N. J., 24 Apr 2014, Proceedings of Netherlands Conference on Computer Vision, NCCV 2014. Delft: ASCI, p. 1-4 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
46 Downloads (Pure)

Fixed FAR Vote Fusion of regional Facial Classifiers

Spreeuwers, L. J., Veldhuis, R. N. J., Sultanali, S. & Diephuis, J., Sep 2014, BIOSIG 2014: Proceedings of the 13th International Conference of the Biometrics Special Interest Group. Busch, C. & Brömme, A. (eds.). Darmstadt: Gesellschaft für Informatik, p. 1-4 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
27 Downloads (Pure)

Forensic use of fingermarks and fingerprints

Meuwly, D., 2014, Encyclopedia of Biometrics. Li, S. Z. & Jain, A. K. (eds.). London: Springer, p. 1-15 15 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Formal Model of Certificate Omission Schemes in VANET

Feiri, M., Petit, J. & Kargl, F., Dec 2014, Proceedings of the IEEE Vehicular Networking Conference (VNC 2014). USA: IEEE, p. 41-44 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

From enterprise architecture to business models and back

Iacob, M. E., Meertens, L. O., Jonkers, H., Quartel, D., Nieuwenhuis, L. J. M. & van Sinderen, M. J., Jul 2014, In : Software and systems modeling. 13, 3, p. 1059-1083 25 p.

Research output: Contribution to journalArticleAcademicpeer-review

48 Citations (Scopus)
521 Downloads (Pure)

GEM: A distributed goal evaluation algorithm for trust management

Trivellato, D., Zannone, N. & Etalle, S., May 2014, In : Theory and practice of logic programming. 14, 3, p. 293-337 45 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
13 Citations (Scopus)
63 Downloads (Pure)

General Impossibility of Group Homomorphic Encryption in the Quantum World

Armknecht, F., Gagliardoni, T., Katzenbeisser, S. & Peter, A., 2014, 17th International Conference on Practice and Theory in Public-Key Cryptography. PKC 2014. Berlin: Springer, p. 556-573 18 p. (Lecture Notes in Computer Science; vol. 8383).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

11 Citations (Scopus)

Generating and analyzing synthetic finger vein images

Hillerström, F., Kumar, A. & Veldhuis, R. N. J., 10 Sep 2014, Proceedings of the 13th International Conference of the Biometrics Special Interest Group, BIOSIG 2014. Bonn: Gesellschaft für Informatik, p. 121-132 12 p. (Lecture Notes in Informatics (LNI); vol. P-230).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
150 Downloads (Pure)

Higher-Order Threshold Implementation

Bilgin, B., Gierlichs, B., Nikova, S., Nikov, V. & Rijmen, V., Dec 2014, Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings. Sarkar, P. & Iwata, T. (eds.). London: Springer, p. 326-343 19 p. (Lecture Notes in Computer Science; vol. 8874).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

96 Citations (Scopus)

How practitioners approach gameplay requirements? An exploration into the context of massive multiplayer online role-playing games

Daneva, M., 22 Aug 2014, 2014 IEEE 22nd International Requirements Engineering Conference, RE 2014. Lutz, R. (ed.). USA: IEEE Computer Society, p. 3-12 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
6 Citations (Scopus)
24 Downloads (Pure)
File
17 Citations (Scopus)
135 Downloads (Pure)

Hunting the Unknown

Constante, E., den Hartog, J., Petkovic, M., Etalle, S. & Pechenizkiy, M., 2014, 28th Annual IFIP WG 11.3 Working ConferenceData and Applications Security and Privacy (DBSec). Berlin: Springer, p. 243-259 17 p. (Lecture Notes in Computer Science; vol. 8566).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
10 Citations (Scopus)
23 Downloads (Pure)

Improving cloud network security using tree-rule firewall

He, X., Chomsiri, T., Nanda, P. & Tan, Z., Jan 2014, In : Future generation computer systems. 30, p. 116-126 11 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
29 Citations (Scopus)
163 Downloads (Pure)

Improving context-aware applications for the well-being domain: Model-driven design guided by medical knowledge

Bosems, S. & van Sinderen, M. J., Jan 2014, Proceedings of the third International Conference on Sensor Networks, SENSORNETS 2014. Portugal: INSTICC, p. 397-403 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2 Citations (Scopus)
19 Downloads (Pure)

In-Network Aggregation for Vehicular Ad Hoc Networks

Dietzel, S., Petit, J., Kargl, F. & Scheuermann, B., Nov 2014, In : IEEE communications surveys & tutorials. 16, 4, p. 1909-1932 26 p.

Research output: Contribution to journalArticleAcademicpeer-review

35 Citations (Scopus)

Insights on the Security and Dependability of Industrial Control Systems

Kargl, F., van der Heijden, R., van der Heijden, R. W., König, H., Valdes, A. & Dacier, M. C., Nov 2014, In : IEEE security & privacy. 12, 6, p. 75-78 4 p.

Research output: Contribution to journalArticleAcademic

13 Citations (Scopus)

Intrusion detection method based on nonlinear correlation measure

Ambusaidi, M. A., Tan, Z., He, X., Nanda, P., Lu, L. F. & Jamdagni, A., Dec 2014, In : International journal of internet protocol technology. 8, 2/3, p. 77-86 10 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
7 Citations (Scopus)
27 Downloads (Pure)

Likelihood ratio based verification in high dimensional spaces

Hendrikse, A. J., Veldhuis, R. N. J. & Spreeuwers, L. J., Jan 2014, In : IEEE transactions on pattern analysis and machine intelligence. 36, 1, p. 127-139 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
3 Citations (Scopus)
25 Downloads (Pure)

Message from the 3M4SE 2014 Workshop Chairs

van Sinderen, M. J., Ferreira Pires, L. & Iacob, M. E., 2014, 18th IEEE International Enterprise Distributed Object Computing Conference Workshops and Demonstrations, EDOCW 2014. USA: IEEE, p. 333-334 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

Methodological Support to Develop Interoperable Applications for Pervasive Healthcare

Cardoso de Moraes, J. L., 5 Nov 2014, Enschede: University of Twente. 203 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

File
144 Downloads (Pure)

Modeling value creation with enterprise architecture

Singh, P. M., Jonkers, H., Iacob, M. E. & van Sinderen, M. J., 2014, Sixteenth International Conference on Enterprise Information Systems, ICEIS 2014, Volume 3. Portugal: SCITEPRESS, p. 343-351 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)
2 Downloads (Pure)

Modelling telecom fraud with e3value

Ionita, D., Koenen, S. & Wieringa, R. J., 31 Oct 2014, Enschede: Centre for Telematics and Information Technology (CTIT). 28 p. (CTIT Technical Report Series; no. TR-CTIT-14-11)

Research output: Book/ReportReportProfessional

File
107 Downloads (Pure)

Models in the design of context-aware well-being applications

Bosems, S. & van Sinderen, M. J., Oct 2014, On the Move to Meaningful Internet Systems, OnTheMove 2014. Heidelberg: Springer, p. 37-42 6 p. (Lecture Notes in Computer Science; vol. 8842, no. 8842).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
4 Citations (Scopus)
15 Downloads (Pure)

Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures

Dacier, M. C., Kargl, F., van der Heijden, R., van der Heijden, R., König, H. & Valdes, A., 2014, In : Informatik Spektrum. 37, 6, p. 605-607 3 p.

Research output: Contribution to journalArticleProfessional

Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292)

Dacer, M., Kargl, F., König, H. & Valdes, A., Nov 2014, In : Dagstuhl reports. 4, 7, p. 62-79 18 p.

Research output: Contribution to journalArticleAcademic

File
328 Downloads (Pure)

On Emulation-Based Network Intrusion Detection Systems

Abbasi, A., Wetzel, J., Bokslag, W., Zambon, E. & Etalle, S., 18 Sep 2014, Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID). Switzerland: Springer, p. 384-404 21 p. (Lecture Notes in Computer Science; vol. 8688).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

9 Citations (Scopus)

Online social sports networks as crime facilitators

Stottelaar, B., Senden, J. & Montoya, L., Jun 2014, In : Crime science. 3, 8, p. 1-20 20 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
6 Citations (Scopus)
55 Downloads (Pure)

Open issues in differentiating misbehavior and anomalies for VANETs

van der Heijden, R. W. & Kargl, F., Feb 2014, Proceedings of 2nd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2014). Luxembourg City, Luxembourg: Vehicular Lab, University of Luxembourg, p. 24-26 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
37 Downloads (Pure)

Persuasive technologies: a systematic literature review and application to PISA

Kegel, R. H. P. & Wieringa, R. J., 13 May 2014, Enschede: Centre for Telematics and Information Technology (CTIT). 36 p. (CTIT Technical Report Series; no. TR-CTIT-14-07)

Research output: Book/ReportReportProfessional

Open Access
File
659 Downloads (Pure)

Privacy-enhanced participatory sensing with collusion resistance and data aggregation

Günther, F., Manulis, M. & Peter, A., 2014, 13th International Conference on Cryptology and Network Security (CANS 2014). London: Springer, p. 321-336 16 p. (Lecture Notes in Computer Science; vol. 8813).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

9 Citations (Scopus)

Privacy implications of presence sharing in mobile messaging applications

Buchenscheit, A., Könings, B., Neubert, A., Schaub, F., Schneider, M. & Kargl, F., Nov 2014, Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia (IEEE MUM 2014). New York: Association for Computing Machinery (ACM), p. 20-29 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

13 Citations (Scopus)

Privacy-Preserving Verification of Clinical Research

Makri, E., Everts, M. H., de Hoogh, S., Peter, A., op den Akker, H., Hartel, P. H. & Jonker, W., 2014, Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). Bonn: Gesellschaft für Informatik, p. 481-500 20 p. (Lecture Notes in Informatics (LNI)).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Citation (Scopus)
18 Downloads (Pure)

Privacy preserving whole genome sequence processing through proxy-aided ORAM

Karvelas, N. P., Peter, A., Katzenbeisser, S., Tews, E., Tews, E. & Hamacher, K., 2014, 13th Annual ACM Workshop on Privacy in the Electronic Society (WPES 2014). New York: Association for Computing Machinery (ACM), p. 1-10 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

13 Citations (Scopus)

Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, 12th April, 2014

Kordy, B. (ed.), Kordy, B., Mauw, S. (ed.), Mauw, S. & Pieters, W. (ed.), 12 Apr 2014, Ithaca, NY, USA: EPTCS.ORG. 93 p. (EPTCS; vol. 148)

Research output: Book/ReportBook editingAcademic

File
98 Downloads (Pure)

ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation

Biedermann, S., Karvelas, N. P., Katzenbeisser, S., Strufe, T. & Peter, A., 2014, Proceedings of the 40th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2014). Berlin: Springer, p. 114-125 12 p. (Lecture Notes in Computer Science; vol. 8327).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET)

Förster, D., Kargl, F. & Löhr, H., Dec 2014, 2014 IEEE Vehicular Networking Conference (VNC). Piscataway, NJ, USA: IEEE, p. 25-32 8 p. (IEEE Vehicular Networking Conference (VNC); vol. 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

24 Citations (Scopus)

Quantitative Penetration Testing with Item Response Theory

Arnold, F., Pieters, W. & Stoelinga, M. I. A., 2014, In : Journal of information assurance and security. 9, 3, p. 118-127 10 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
28 Downloads (Pure)

Real world privacy expectations in VANETs real world privacy expectations in VANETs

Feiri, M., Petit, J. & Kargl, F., Feb 2014, Proceedings of the 2nd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2014). Luxembourg City, Luxembourg: Vehicular Lab, University of Luxembourg, p. 30-32 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
25 Downloads (Pure)

Reconciling Malicious and Accidental Risk in Cyber Security

Pieters, W., Lukszo, Z., Hadziosmanovic, D. & van den Berg, J., May 2014, In : Journal of internet services and information security. 4, 2, p. 4-26 23 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
162 Downloads (Pure)

Redundancy-based Statistical Analysis for Insider Attack Detection in VANET Aggregation Schemes

Dietzel, S., Gürtler, J., van der Heijden, R., van der Heijden, R. & Kargl, F., Dec 2014, Proceedings of the IEEE Vehicular Networking Conference 2014 (VNC 2014). USA: IEEE, p. 135-142 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

7 Citations (Scopus)

Regional fusion for high-resolution palmprint recognition using spectral minutiae representation

Wang, R., Ramos, D., Veldhuis, R., Fierrez, J., Spreeuwers, L. & Xu, H., Jun 2014, In : IET biometrics. 3, 2, p. 94-100 7 p.

Research output: Contribution to journalArticleAcademicpeer-review

13 Citations (Scopus)
18 Downloads (Pure)

Revisiting attacker model for smart vehicles

Petit, J., Feiri, M. & Kargl, F., Sep 2014, IEEE 6th International Symposium on Wireless Vehicular Communications (WiVeC 2014). USA: IEEE, p. 1-5 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

10 Citations (Scopus)

SOFIR: Securely Outsourced Forensic Image Recognition

Bösch, C. T., Peter, A., Hartel, P. H. & Jonker, W., Feb 2014, 39th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2014. USA: IEEE, p. 2694-2698 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
5 Citations (Scopus)
104 Downloads (Pure)

Software Technologies - 8th International Joint Conference, ICSOFT 2013 : Revised Selected Papers

Cordeiro, J. (ed.) & van Sinderen, M. J. (ed.), 2014, Heidelberg: Springer. 321 p. (Communications in Computer and Information Science; vol. 457)

Research output: Book/ReportBook editingAcademic

Testing reliability of raster - report of experiment with Kerckhoffs students

Vriezekolk, E., Mar 2014, Enschede: Centre for Telematics and Information Technology (CTIT). 39 p. (CTIT Technical Report Series; no. TR-CTIT-14-05)

Research output: Book/ReportReportProfessional

File
32 Downloads (Pure)

The process matters: cyber security in industrial control systems

Hadziosmanovic, D., 9 Jan 2014, Enschede: Centre for Telematics and Information Technology (CTIT). 138 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

File
358 Downloads (Pure)

Through the eye of the PLC: semantic security monitoring for industrial processes

Hadziosmanovic, D., Sommer, R., Zambon, E. & Hartel, P. H., 8 Dec 2014, ACSAC'14 Proceedings of the 30th Annual Computer Security Applications Conference. New York: Association for Computing Machinery (ACM), p. 126-135 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
66 Citations (Scopus)
126 Downloads (Pure)

Towards middle-range usable design theories for software engineering

Wieringa, R. J., 2014, Proceedings of the 3rd SEMAT Workshop on General Theories of Software Engineering, GTSE 2014. New York: Association for Computing Machinery (ACM), p. 1-4 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
3 Citations (Scopus)
24 Downloads (Pure)