Research Output

Filter
Article
2019

A multi-authority approach to various predicate encryption types

van de Kamp, T. R., Peter, A. & Jonker, W., 25 Oct 2019, In : Designs, codes and cryptography.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
15 Downloads (Pure)

An integrated conceptual model for information system security risk management supported by enterprise architecture management

Mayer, N., Grandry, E., Feltus, C., Goettelmann, E. & Wieringa, R. J., 1 Jun 2019, In : Software and systems modeling. 18, 3, p. 2285-2312 28 p.

Research output: Contribution to journalArticleAcademicpeer-review

5 Citations (Scopus)

A security risk mitigation framework for cyber physical systems

Zahid, M., Inayat, I., Daneva, M. & Mehmood, Z., 29 Aug 2019, In : Journal of software: Evolution and Process. e2219.

Research output: Contribution to journalArticleAcademicpeer-review

Low-resolution face recognition and the importance of proper alignment

Peng, Y., Spreeuwers, L. & Veldhuis, R. N. J., 17 Jun 2019, In : IET biometrics. 8, 4, p. 267-276 10 p., 18726042.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
1 Citation (Scopus)
9 Downloads (Pure)

Personalized support for well-being at work: an overview of the SWELL project

Kraaij, W., Verberne, S., Koldijk, S., de Korte, E., van Dantzig, S., Sappelli, M., Shoaib, M., Bosems, S., Achterkamp, R., Bonomi, A., Schavemaker, J., Hulsebosch, B., Wabeke, T., Vollenbroek-Hutten, M., Neerincx, M. & Sinderen, M. V., 20 Jun 2019, In : User modeling and user-adapted interaction. 34 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
19 Downloads (Pure)
Open Access
File
5 Citations (Scopus)
79 Downloads (Pure)

Quality requirements challenges in the context of large-scale distributed agile: An empirical study

Alsaqaf, W., Daneva, M. & Wieringa, R., 1 Jun 2019, In : Information and software technology. 110, p. 39-55 17 p.

Research output: Contribution to journalArticleAcademicpeer-review

2 Citations (Scopus)

Status Quo in Requirements Engineering: A Theory and a Global Family of Surveys

Wagner, S., Mendez Fernandez, D., Felderer, M., Vetro, A., Kalinowski, M., Wieringa, R. J., Pfahl, D., Conte, T., Christiansson, M-T., Greer, D., Lassenius, C., Mannisto, T., Nayebi, M., Oivo, M., Penzenstadler, B., Prikladnicki, R., Ruhe, G., Schekelmann, A., Sen, S., Spinola, R. & 3 others, Tuzcu, A., De La Vara, J. L. & Winkler, D., 26 Feb 2019, In : ACM Transactions on Software Engineering and Methodology. 28, 2, 9 p., 9.

Research output: Contribution to journalArticleAcademicpeer-review

5 Citations (Scopus)

Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of "Thinking Like a Thief"

Barth, S., Hartel, P. H., Junger, M. & Montoya, L., 14 May 2019, In : IEEE security & privacy. 17, 3, p. 8-16 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

1 Downloads (Pure)
2018

Het succes van social engineering

Bullee, J-W., Montoya, L., Junger, M. & Hartel, P., 2018, In : Tijdschrift voor veiligheid. 17, 1-2, p. 40-53 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
187 Downloads (Pure)

Incorporating FAIR into Bayesian Network for Numerical Assessment of Loss Event Frequencies of Smart Grid Cyber Threats

Le, A., Chen, Y., Chai, K. K., Vasenev, A. & Montoya, L., 1 Sep 2018, In : Mobile networks & applications. 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
2 Citations (Scopus)
100 Downloads (Pure)

Making Green Stuff? Effects of Corporate Greenwashing on Consumers

de Jong, M. D. T., Harkink, K. M. & Barth, S., 1 Jan 2018, In : Journal of business and technical communication. 32, 1, p. 77-112 36 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
10 Citations (Scopus)
858 Downloads (Pure)

On the anatomy of social engineering attacks: A literature-based dissection of successful attacks

Bullée, J-W. H., Montoya, L., Pieters, W., Junger, M. & Hartel, P., Jan 2018, In : Journal of Investigative Psychology and Offender Profiling. 15, 1, p. 20-45 26 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
4 Citations (Scopus)
79 Downloads (Pure)

Quantitative, Value-driven Risk Analysis of e-Services

Ionita, D., Gordijn, J., Yesuf, AS. & Wieringa, R. J., 22 May 2018, In : Journal of Information Systems.

Research output: Contribution to journalArticleAcademicpeer-review

1 Citation (Scopus)

Threat Analysis in Systems-of-Systems: An Emergence-Oriented Approach

Ceccarelli, A., Zoppi, T., Vasenev, A., Mori, M., Ionita, D., Montoya, L. & Bondavalli, A., Oct 2018, In : ACM Transactions on Cyber-Physical Systems. 3, 2, 24 p., 18.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
3 Citations (Scopus)
21 Downloads (Pure)
2017

A guideline for the validation of likelihood ratio methods used for forensic evidence evaluation

Meuwly, D., Ramos, D. & Haraksim, R., 2017, In : Forensic science international. 276, p. 142-153 12 p.

Research output: Contribution to journalArticleAcademicpeer-review

41 Citations (Scopus)
61 Downloads (Pure)

A qualitative study of DevOps usage in practice

Erich, F. M. A., Amrit, C. & Daneva, M., Jun 2017, In : Journal of software: Evolution and Process. 29, 6, 20 p., e1885.

Research output: Contribution to journalArticleAcademicpeer-review

29 Citations (Scopus)

ForenFace: A unique annotated forensic facial image dataset and toolset

Zeinstra, C. G., Veldhuis, R. N. J., Spreeuwers, L. J., Ruifrok, A. C. C. & Meuwly, D., 1 Nov 2017, In : IET biometrics. 6, 6, p. 487-494 8 p.

Research output: Contribution to journalArticleAcademicpeer-review

1 Citation (Scopus)

Hybrid tree-rule firewall for high speed data transmission

Chomsiri, T., He, X., Nanda, P. & Tan, Z., 14 Apr 2017, In : IEEE transactions on cloud computing. p. 1-13 13 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
43 Downloads (Pure)

Infrared drones in the construction industry: Designing a protocol for building thermography procedures

Entrop, A. G. & Vasenev, A., 2017, In : Energy procedia. 132, p. 63-68 6 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
13 Citations (Scopus)
554 Downloads (Pure)

Likelihood ratio data to report the validation of a forensic fingerprint evaluation method

Ramos, D., Haraksim, R. & Meuwly, D., 1 Feb 2017, In : Data in brief. 10, p. 75-92 18 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
4 Citations (Scopus)
82 Downloads (Pure)

Low-resolution face alignment and recognition using mixed-resolution classifiers

Peng, Y., Spreeuwers, L. & Veldhuis, R., Nov 2017, In : IET biometrics. 6, 6, p. 418-428

Research output: Contribution to journalArticleAcademicpeer-review

4 Citations (Scopus)
4 Downloads (Pure)

Making Likelihood Ratios Digestible for Cross-Application Performance Assessment

Nautsch, A., Meuwly, D., Ramos, D., Lindh, J. & Busch, C., 4 Sep 2017, In : IEEE signal processing letters. 24, 10, p. 1552-1556 5 p., 17176768.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
3 Citations (Scopus)
32 Downloads (Pure)

Naming the pain in requirements engineering: Contemporary problems, causes, and effects in practice

Méndez Fernández, D., Wagner, S., Kalinowski, N., Felderer, M., Mafra, P., Vetrò, A., Conte, T., Christianson, M-T., Greer, D., Lassenius, C., Männistö, T., Nayabi, M., Oivo, M., Penzenstadler, B., Pfahl, D., Prikladnicki, R., Ruhe, G., Schekelmann, A., Sen, S., Spinola, R. & 3 others, Tuzcu, A., de la Vara, J. L. & Wieringa, R., 2017, In : Empirical software engineering. 41 p.

Research output: Contribution to journalArticleAcademicpeer-review

50 Citations (Scopus)
22 Downloads (Pure)

On the pragmatic design of literature studies in software engineering: An experience-based guideline

Kuhrmann, M., Méndez Fernández, D. & Daneva, M., 5 Jan 2017, In : Empirical software engineering. 22, 1, p. 1-40 40 p.

Research output: Contribution to journalArticleAcademicpeer-review

32 Citations (Scopus)

Priming and warnings are not effective to prevent social engineering attacks

Junger, M., Montoya, L. & Overink, F. J., 2017, In : Computers in human behavior. 66, p. 75-87 13 p.

Research output: Contribution to journalArticleAcademicpeer-review

34 Citations (Scopus)
1 Downloads (Pure)

SemanticSCo: a platform to support the semantic composition of services for gene expression analysis

Guardia, G. D. A., Ferreira Pires, L., Goncalves da Silva, E. & Guareis de farias, C., Feb 2017, In : Journal of biomedical informatics. 66, p. 116-128 22 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
4 Citations (Scopus)
24 Downloads (Pure)

Spear phishing in organisations explained

Bullee, J-W., Montoya, L., Junger, M. & Hartel, P., Jul 2017, In : Information and Computer Security. 25, 5, p. 593-613 21 p.

Research output: Contribution to journalArticleAcademicpeer-review

7 Citations (Scopus)
1 Downloads (Pure)

Striving for balance: A look at gameplay requirements of massively multiplayer online role-playing games

Daneva, M., 20 Jul 2017, In : Journal of systems and software. 134, p. 54-75 22 p.

Research output: Contribution to journalArticleAcademicpeer-review

1 Citation (Scopus)
Open Access
File
84 Citations (Scopus)
542 Downloads (Pure)
2016

A 3D-printed anatomical pancreas and kidney phantom for optimizing SPECT/CT reconstruction settings in beta cell imaging using 111In-exendin

Woliner-van der Weg, W., Deden, L. N., Meeuwis, A. P. W., Koenrades, M., Peeters, L. H. C., Kuipers, H., Laanstra, G. J., Gotthardt, M., Slump, C. H. & Visser, E. P., Dec 2016, In : EJNMMI physics. 3, 29.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
6 Citations (Scopus)
132 Downloads (Pure)

A methodology based on openEHR archetypes and software agents for developing e-health applications reusing legacy systems

Moraes, J. L. C. D., Souza, W. L. D., Pires, L. F. & Prado, A. F. D., 2016, In : Computer methods and programs in biomedicine. 134, p. 267 - 287 21 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
12 Citations (Scopus)
41 Downloads (Pure)

An approach to estimation of degree of customization for ERP projects using prioritized requirements

Parthasarathy, S. & Daneva, M., 1 Jul 2016, In : Journal of systems and software. 117, p. 471-487 17 p.

Research output: Contribution to journalArticleAcademicpeer-review

9 Citations (Scopus)

Building an intrusion detection system using a filter-based feature selection algorithm

Ambusaidi, M. A., He, X., Nanda, P. & Tan, Z., Oct 2016, In : IEEE transactions on computers. 65, 10, p. 2986-2998 13 p.

Research output: Contribution to journalArticleAcademicpeer-review

176 Citations (Scopus)

Cost management of service compositions

Albuquerque de Medeiros, R. W., Rosa, N. S. & Ferreira Pires, L., Oct 2016, In : International journal of services computing. 4, 4, p. 35-50 16 p.

Research output: Contribution to journalArticleAcademicpeer-review

2 Downloads (Pure)

Effects of pose and image resolution on automatic face recognition

Mahmood, Z., Ali, T. & Khan, S. U., Jun 2016, In : IET biometrics. 5, 2, p. 111-119 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
23 Citations (Scopus)
87 Downloads (Pure)

Face reconstruction from image sequences for forensic face comparison

van Dam, C., Veldhuis, R. & Spreeuwers, L., 2016, In : IET biometrics. 5, 2, p. 140-146 7 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
4 Citations (Scopus)
93 Downloads (Pure)

Identification performance of evidential value estimation for ridge-based biometrics

Kotzerke, J., Hao, H., Davis, S. A., Hayes, R., Spreeuwers, L. J., Veldhuis, R. N. J. & Horadam, K. J., 26 Oct 2016, In : EURASIP journal on information security. 2016, 24, p. 1-10 10 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
2 Citations (Scopus)
84 Downloads (Pure)

Modeling and verification of insider threats using logical analysis

Kammüller, F. & Probst, C. W., 2016, In : IEEE systems journal. 11, 2, p. 534-545 12 p.

Research output: Contribution to journalArticleAcademicpeer-review

9 Citations (Scopus)

PUCA: A pseudonym scheme with strong privacy guarantees for vehicular ad-hoc networks

Förster, D., Kargl, F. & Löhr, H., Feb 2016, In : Ad hoc networks. 37, Part 1, p. 122-132 11 p.

Research output: Contribution to journalArticleAcademicpeer-review

21 Citations (Scopus)

Quality-of-data broker for quality-of-data-aware telemedicine systems

Larburu Rubio, N., Bults, R. G. A., van Sinderen, M. J., Widya, I. A. & Hermens, H. J., 2016, In : IRBM (Ingenierie et recherche biomedicale). 37, 4, p. 210-218 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
4 Citations (Scopus)
67 Downloads (Pure)

Relating business intelligence and enterprise architecture - A method for combining operational data with architectural metadata

Veneberg, R. K. M., Iacob, M. E., van Sinderen, M. J. & Bodenstaff, L., Jun 2016, In : International journal of cooperative information systems. 25, 02, p. - 36 p., 1650007.

Research output: Contribution to journalArticleAcademicpeer-review

7 Citations (Scopus)

Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace

Pieters, W., Hadžiosmanović, D. & Dechesne, F., Jun 2016, In : Science and engineering ethics. 22, 3, p. 831-850 20 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
6 Citations (Scopus)
61 Downloads (Pure)

The Facial Appearance of CEOs: Faces Signal Selection but Not Performance

Stoker, J. I., Windman, S. (ed.), Garretsen, H. & Spreeuwers, L. J., 27 Jul 2016, In : PLoS ONE. 11, 7, p. e0159950:1-11 11 p., e0159950.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
15 Citations (Scopus)
80 Downloads (Pure)

The navigation metaphor in security economics

Pieters, W., Barendse, J., Ford, M., Heath, C. P. R., Probst, C. W. & Verbij, R., 25 May 2016, In : IEEE security & privacy. 14, 3, p. 14-21 8 p.

Research output: Contribution to journalArticleAcademicpeer-review

4 Citations (Scopus)

The Relation Between Residential Property and its Surroundings and Day- and Night-Time Residential Burglary

Montoya, L., Junger, M. & Ongena, Y., Apr 2016, In : Environment and behavior. 48, 4, p. 515-549 35 p.

Research output: Contribution to journalArticleAcademicpeer-review

21 Citations (Scopus)

Visualization environment for reviewing and experimenting with compaction equipment trajectories in context

Vasenev, A., Hartmann, T., Miller, S. R. & Doree, A. G., Apr 2016, In : Advanced engineering informatics. 30, 2, p. 95-108 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

4 Citations (Scopus)
1 Downloads (Pure)
2015

A commitment-based reference ontology for services

Nardi, J. C., de Almeida Falbo, R., Andrade Almeida, J., Guizzardi, G., Ferreira Pires, L., van Sinderen, M. J., Guarino, N. & Fonseca, C. M., Dec 2015, In : Information systems. 54, p. 263-288 26 p.

Research output: Contribution to journalArticleAcademicpeer-review

51 Citations (Scopus)
1 Downloads (Pure)

A methodology for the development of RESTful semantic web services for gene expression analysis

Guardia, G. D. A., Ferreira Pires, L., Vêncio, R. Z. N., Malmegrim, K. C. R. & Guareis de farias, C., 24 Jul 2015, In : PLoS ONE. 10, 7, p. e0134011:1-e0134011:28 28 p., e0134011.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
4 Citations (Scopus)
20 Downloads (Pure)

An ontology for telemedicine systems resiliency to technological context variations in pervasive healthcare

Larburu Rubio, N., Bults, R. G. A., van Sinderen, M. J., Widya, I. A. & Hermens, H. J., 2015, In : IEEE journal of translational engineering in health and medicine. 3, p. 10 10 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
11 Citations (Scopus)
73 Downloads (Pure)