Research Output

2014

Towards the automation of forensic facial individualisation: Comparing forensic to non forensic eyebrow features

Zeinstra, C., Veldhuis, R. & Spreeuwers, L., 12 May 2014, 35rd WIC Symposium on Information Theory in the Benelux and The 4th WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux: Eindhoven, The Netherlands, May 12-13, 2014. Skoric, B. & Ignatenko, T. (eds.). Eindhoven: Werkgemeenschap voor Informatie- en Communicatietheorie (WIC), p. 73-80 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

Open Access
File
17 Downloads (Pure)

TREsPASS: Plug-and-Play Attacker Profiles for Security Risk Analysis (Poster)

Pieters, W., Hadziosmanovic, D., Lenin, A., Montoya, L. & Willemson, J., May 2014, 35th IEEE Symposium on Security and Privacy. Piscataway, New Jersey: IEEE Computer Society, 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
41 Downloads (Pure)

Trust management support for context-aware service platforms

Neisse, R., Wegdam, M. & van Sinderen, M., May 2014, User-Centric Networking - Future Perspectives. Aldini, A. & Bogliolo, A. (eds.). Switzerland: Springer, p. 75-106 32 p. (Lecture Notes in Social Networks).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

TuLP:A family of lightweight message authentication codes for body sensor networks

Gong, Z., Hartel, P. H., Nikova, S. I., Tang, S-H. & Zhu, B., 1 Jan 2014, In : Journal of computer science and technology. 29, 1, p. 53-68 16 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
10 Citations (Scopus)
40 Downloads (Pure)

Understandability of Goal Concepts by Requirements Engineering Experts

Engelsman, W. & Wieringa, R. J., 2014, Advances in conceptual modeling: ER 2014 Workshops, ENMO, MoBiD, MReBA, QMMQ, SeCoGIS, WISM, and ER Demos. London: Springer, p. 97-106 10 p. (Lecture Notes in Computer Science; vol. 8823).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2 Citations (Scopus)
40 Downloads (Pure)

Understandability of Goal-Oriented Requirements Engineering Concepts for Enterprise Architects

Engelsman, W. & Wieringa, R. J., 2014, 26th International Conference on Advanced Information Systems Engineering, CAiSE 2014. Heidelberg: Springer, p. 105-119 15 p. (Lecture Notes in Computer Science; vol. 8484).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
8 Citations (Scopus)
163 Downloads (Pure)

Understanding computer security

Etalle, S. & Zannone, N., 22 Oct 2014, In : Frontiers in ICT. 1, 3, 2 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
1 Citation (Scopus)
16 Downloads (Pure)

Understanding Functional Reuse of ERP Requirements in the Telecommunication Sector: an Empirical Study

Daneva, M., 6 Oct 2014, 2014 Joint Conference of the International Workshop on Software Measurement and the International Conference on Software Process and Product Measurement, IWSM-Mensura 2014. USA: IEEE Computer Society, p. 216-221 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)

Understanding quality requirements engineering in contract-based projects from the perspective of software architects: an exploratory study

Daneva, M., Herrmann, A. & Buglione, L., 1 Oct 2014, Relating System Quality and Software Architecture. Mistrik, I., Bahsoon, R., Eeles, P., Roshandel, R. & Stal, M. (eds.). Amsterdam: Morgan Kaufmann, p. 325-357 33 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

1 Citation (Scopus)

Validation of Likelihood Ratio Methods Used for Forensic Evidence Evaluation: Application in Forensic Fingerprints

Haraksim, R., 18 Jun 2014, Enschede: University of Twente. 186 p.

Research output: ThesisPhD Thesis - Research UT, graduation UT

File
175 Downloads (Pure)

Welcome from the Workshop Chairs

Daneva, M., Berntsson Svensson, R., Marczak, S., Franch, X. & Madhavji, N., 25 Aug 2014, Fourth International Workshop on Empirical Requirements Engineering, EmpiRE 2014. USA: IEEE Computer Society, p. 1-3 3 p.

Research output: Chapter in Book/Report/Conference proceedingForeword/postscriptAcademic

File
8 Downloads (Pure)

Where do we stand in requirements engineering improvement today? First results from a mapping study

Méndez Fernández, D., Ognawala, S., Wagner, S. & Daneva, M., 21 Sep 2014, Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2014. Torchiano, M. (ed.). New York: Association for Computing Machinery (ACM), p. 1-4 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
3 Citations (Scopus)
44 Downloads (Pure)
2013

An API-based search system for one click access to information

Ionita, D., Tax, N. & Hiemstra, D., Jun 2013, Proceedings of the 10th NTCIR Conference on Evaluation of Information Access Technologies. Tokyo, Japan: National Institute of Informatics, p. - 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
19 Downloads (Pure)

Approximate COSMIC Functional Size - Guideline for Approximate COSMIC Functional Size Measurement

Vogelezang, F., Symons, C., Lesterhuis, A., Meli, R. & Daneva, M., 23 Oct 2013, 2013 Joint Conference of the 23rd International Workshop on Software Measurement and the 2013 Eighth International Conference on Software Process and Product Measurement, IWSM-Mensura 2013. Demirors, O. (ed.). USA: IEEE Computer Society, p. 27-32 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
5 Citations (Scopus)
81 Downloads (Pure)

Business model risk analysis: predicting the probability of business network profitability

Johnson, P., Iacob, M. E., Valja, M., van Sinderen, M. J., Magnusson, C. & Ladhe, T., Mar 2013, Enterprise interoperability: 5th International IFIP Working Conference, IWEI 2013, Enschede, The Netherlands, March 27-28, 2013. Proceedings. van Sinderen, M. J., Oude Luttighuis, P. H. W. M., Folmer, E. J. A. & Bosems, S. (eds.). Heidelberg: Springer, p. 118-130 13 p. (Lecture notes in business information processing; vol. 144).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
1 Citation (Scopus)
171 Downloads (Pure)

Current established risk assessment methodologies and tools

Ionita, D., Hartel, P. H., Pieters, W. & Wieringa, R. J., 1 Sep 2013, Enschede: Centre for Telematics and Information Technology (CTIT). 131 p. (CTIT Technical Report Series; no. TR-CTIT-14-04)

Research output: Book/ReportReportProfessional

File
1691 Downloads (Pure)

Enterprise Interoperability: 5th International IFIP Working Conference, IWEI 2013, Enschede, The Netherlands, March 27-28, 2013. Proceedings

van Sinderen, M. (ed.), Oude Luttighuis, P. (ed.), Folmer, E. (ed.) & Bosems, S. (ed.), Mar 2013, Heidelberg: Springer. 224 p. (Lecture Notes in Business Information Processing; vol. 144)

Research output: Book/ReportBook editingPopular

Open Access
File
86 Downloads (Pure)

ERP Effort Estimation Based on Expert Judgments

Erasmus, I. P. & Daneva, M., 23 Oct 2013, 2013 Joint Conference of the 23rd International Workshop on Software Measurement and the 8th International Conference on Software Process and Product Measurement. Demirors, O. & Abran, A. (eds.). USA: IEEE Computer Society, p. 104-109 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
5 Citations (Scopus)
399 Downloads (Pure)

Handling requirements dependencies in agile projects: A focus group with agile software development practitioners

Martakis, A. & Daneva, M., 29 May 2013, IEEE 7th International Conference on Research Challenges in Information Science, RCIS 2013. Wieringa, R. J., Jean-Louis Cavarero, S., Rolland, C. & Cavarero, J. L. (eds.). USA: IEEE Computer Society, p. 1-11 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
14 Citations (Scopus)
456 Downloads (Pure)

Influence of the datasets size on the stability of the LR in the lower region of the within source distribution

Haraksim, R. & Meuwly, D., Oct 2013, Proceedings of Biometric Technologies in Forensic Science, BTFS 2013. Nijmegen: Radboud University Nijmegen, p. 34-38 5 p. (Biometric Technologies in Forensic Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
53 Downloads (Pure)

Information fusion of GNSS sensor readings, field notes, and expert's a priori knowledge

Vasenev, A., Ionita, D., Bijleveld, F., Hartmann, T. & Doree, A. G., 1 Jul 2013, eg-ice 2013 20th international workshop: intelligent computing in engineering, July 1 - 3, 2013, Vienna, Austria. Suter, G., de Wilde, P. & Rafiq, Y. (eds.). Vienna, Austria: TU Wien, p. 1-10 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2 Citations (Scopus)
17 Downloads (Pure)

Preface to the fourth international workshop on models and model-driven methods for service engineering - 3M4SE 2013

Van Sinderen, M., Pires, L. F. & Iacob, M. E., 2013, 2013 17th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW). p. 207-208 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Privacy-preserving architecture for forensic image recognition

Peter, A., Hartman, T., Muller, S. & Katzenbeisser, S., 5 Dec 2013, IEEE International Workshop on Information Forensics and Security, WIFS 2012. USA: IEEE Computer Society, p. 79-84 6 p. (Information Forensics and Security (WIFS), 2012 IEEE International Workshop; no. 13249609).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
7 Citations (Scopus)
123 Downloads (Pure)

Risk assessment as an argumentation game

Prakken, H., Ionita, D. & Wieringa, R. J., Sep 2013, 14th International Workshop on Computational Logic in Multi-Agent Systems, CLIMA XIV. Leite, J., Son, T. C., Torrini, P., Van Der Torre, L. & Woltran, S. (eds.). London: Springer, p. 357-373 17 p. (Lecture Notes in Computer Science; vol. 8143).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

12 Citations (Scopus)

Uma Abordagem para a Decomposição de Processos de Nego̿cio para Execução em Nuvens Computacionais (in Portugese; An approach to business processes decomposition for cloud deployment)

Povoa, L. V., Lopes de Souza, W., Ferreira Pires, L., Duipmans, E. F. & do Prado, A. F., Sep 2013, XXVII Brazilian Symposium on Software Engineering, SBES 2013. Brazil: Universidade de Brasília (UnB), Departamento de Ciência da Computação (DIMAp/UFRN), p. 124-133 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
26 Downloads (Pure)
2012

Crime science: editorial statement

Junger, M., Laycock, G., Hartel, P. H. & Ratcliffe, J., 11 Jun 2012, In : Crime science. 1, 1, 3 p., 1.

Research output: Contribution to journalArticleAcademic

Open Access
File
12 Downloads (Pure)

E-Government controls in service-oriented auditing perspective: Beyond Single Window

Bukhsh, F. A. & Weigand, H., 2012, In : International journal of electronic government research. 8, 4, p. 34-53 20 p.

Research output: Contribution to journalArticleAcademicpeer-review

5 Citations (Scopus)
2011

Breaking DVB-CSA

Tews, E., Wälde, J. & Weiner, M., 2011, Research in Cryptology: 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers. Armknecht, F. & Lucks, S. (eds.). Springer, p. 45-61 17 p. (Lecture Notes in Computer Science; vol. 7242).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
4 Citations (Scopus)
946 Downloads (Pure)

Interactive decryption of DECT phone calls

McHardy, P., Schuler, A. & Tews, E., 2011, Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011. Gollmann, D., Westhoff, D., Tsudik, G. & Asokan, N. (eds.). Association for Computing Machinery (ACM), p. 71-78 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)

Message from the 3M4SE 2011 chairs

van Sinderen, M. J., Ferreira Pires, L. & Iacob, M. E., Sep 2011, 2011 IEEE 15th International Enterprise Distributed Object Computing Conference Workshops. p. 55-56 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

4 Downloads (Pure)
2010

Cryptanalysis of the DECT Standard Cipher

Nohl, K., Tews, E. & Weinmann, R-P., 2010, Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers. Hong, S. & Iwata, T. (eds.). Berlin: Springer, p. 1-18 18 p. (Lecture Notes in Computer Science; vol. 6147).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

16 Citations (Scopus)

Inzicht en toezicht. Controle in de kennissamenleving: Inleiding Jaarboek Kennissamenleving

Pieters, W., Boersma, K., Alberts, G., Timmer, J., Dijkstra, A. & Popkema, M., 2010, Inzicht en toezicht. Jaarboek KennisSamenleving. Amsterdam: Aksant, Vol. 6. p. 7-17

Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

Open Access
File
13 Downloads (Pure)
2009

Attacks on the DECT Authentication Mechanisms

Lucks, S., Schuler, A., Tews, E., Weinmann, R-P. & Wenzel, M., 2009, Topics in Cryptology - CT-RSA 2009: The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings. Fischlin, M. (ed.). Berlin: Springer, p. 48-65 18 p. (Lecture Notes in Computer Science; vol. 5473).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

14 Citations (Scopus)

Practical attacks against WEP and WPA

Tews, E. & Beck, M., 2009, Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009. Basin, D. A., Capkun, S. & Lee, W. (eds.). Association for Computing Machinery (ACM), p. 79-86 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

106 Citations (Scopus)
2008

Describing Data Format Exploits Using Bitstream Segment Graphs

Hartle, M., Schumann, D., Botchak, A., Tews, E. & Mühlhäuser, M., 2008, The Third International Multi-Conference on Computing in the Global Information Technology, ICCGI 2008. Piscataway, NJ: IEEE, p. 119-124 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

On the design of context-aware applications

Shishkov, B. & van Sinderen, M. J., 2008, Proceedings of the 2nd International Workshop on Enterprise Systems and Technology (I-WEST 2008). Cordeiro, J., van Sinderen, M. J. & Shishkov, B. (eds.). Portugal: INSTICC PRESS, p. 21-34 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2007

Preface: 13th Open European Summer School and IFIP TC6.6 Workshop, EUNICE 2007 Enschede, The Netherlands, July 18-20, 2007 proceedings

Pras, A. & van Sinderen, M., 1 Jan 2007, Dependable and Adaptable Networks and Services - 13th Open European Summer School and IFIP TC6.6 Workshop, EUNICE 2007, Proceedings. Pras, A. & van Sinderen, M. (eds.). Springer, p. V-VI (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4606).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
8 Downloads (Pure)
2005

Improving Feedback and Classroom Interaction Using Mobile Phones

Bär, H., Tews, E. & Rößling, G., 2005, Mobile Learning 2005 Proceedings: Proceedings of the IADIS International Conference on Mobile Learning . Isaías, P., Borg, C., Kommers, P. & Bonanno, P. (eds.).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
2000

A Case Base for Requirements Engineering: Problem Categories and Solution Techniques

Sikkel, N., Wieringa, R. J. & Engmann, R. G. R., Jun 2000, Sixth International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ'2000). Pohl, K. & Rossi, M. (eds.). Stockholm, Sweden: Universität GH Essen, p. 80-85 6 p. (Essener Informatik Beiträge; vol. 5).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
68 Downloads (Pure)

Two Case Studies of Subsystem Design for General-Purpose CSCW Software Architectures

Grefen, P. W. P. J., Sikkel, N. & Wieringa, R. J., Nov 2000, Landelijk Architectuur congres. Amsterdam, The Netherlands: SERC, p. - 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionProfessional

File
25 Downloads (Pure)
1999

Het vervangen van een ziekenhuisinformatiesysteem: een voorbeeld van projektonderwijs bij Bedrijfsinformatietechnologie

Sikkel, N., Spil, A. A. M. & van de Weg, R. L. W., 1999, In : TINFON. 8, 3, p. 106-109

Research output: Contribution to journalArticleAcademic

Het vervangen van een ziekenhuisinformatiesysteem. Een voorbeeld van projektonderwijs bij Bedrijfsinformatietechnologie

Sikkel, N., Spil, A. A. M. & van de Weg, R. L. W., 1999, In : TINFON. 8, 3, p. 106-109 4 p.

Research output: Contribution to journalArticleProfessional

File
29 Downloads (Pure)

Replacing a Hospital Information System: an example of a real-world case study

Sikkel, N., Spil, A. A. M. & van de Weg, R. L. W., Mar 1999, 12th Conference on Software Engineering Education and Training (CSEE&T'99). Los Alamitos, California, USA: IEEE Computer Society, p. 6-15 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
5 Citations (Scopus)
854 Downloads (Pure)

The definition, selection and implementation of a new Clinical Information System to prepare the hospital for the electronic future: an example of project-based education

Spil, A. A. M., van de Meeberg, H. J. & Sikkel, N., Jan 1999, 32nd Hawaii International Conference on System Sciences (HICSS'99). Los Alamitos, CA: IEEE Computer Society, p. - 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Downloads (Pure)

Towards a Method for Evolutionary Implementation of Groupware

Sikkel, N., Ruel, H. J. M. & Wieringa, R. J., Jun 1999, Fifth International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ'99). Opdahl, A. L., Pohl, K. & Dubois, E. (eds.). Heidelberg, Germany: Presses Universitaires de Namur, p. 187-192 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
20 Downloads (Pure)
1998

Basic Support voor Cooperative Work

Sikkel, N., 25 Mar 1998, Maastricht

Research output: Other contributionOther research output

Groupware Technology and Software Reuse

Sikkel, N., 1 Nov 1998, Position papers European Reuse Workshop (ERW'98). Madrid, Spain, p. 45-48

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Parsing Schemata and Correctness of Parsing algorithms

Sikkel, N., 1998, In : Theoretical computer science. 1998, 199, p. 87-103

Research output: Contribution to journalArticleAcademicpeer-review

Process Support for Cooperative Work on the World Wide Web

Sikkel, N., Neumann, O. & Sachweh, S., Jan 1998, 6th EuroMicro Workshop on Parallel and Distributed Processing. Los Alamitos, California, USA: IEEE Computer Society, p. 325-334 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
49 Downloads (Pure)

Two Case Studies of Subsystem Design for Extensible General-Purpose Software

Grefen, P. W. P. J., Sikkel, N. & Wieringa, R. J., 1998, Centre for Telematics and Information Technology (CTIT). 16 p. (CTIT Technical Report Series; no. 98-14)

Research output: Book/ReportReportAcademic