EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


Research Group: EWI-SCS: Services, Cyber security and Safety
Home Policy Brochure Browse Search User Area Contact Help

2017

Chomsiri, T. and He, Xiangjian and Nanda, P. and Tan, Zhiyuan (2017) Hybrid tree-rule firewall for high speed data transmission. IEEE Transactions on Cloud Computing, online pre-publication. pp. 1-13. ISSN 2168-7161
van Dam, C. (2017) From Image Sequence to Frontal Image: Reconstruction of the Unknown Face, A Forensic Case. PhD thesis, Univ. of Twente. CTIT Ph.D. Thesis Series No. 17-429 ISBN 978-90-365-4324-8
Guardia, G.D.A. and Ferreira Pires, L. and Goncalves da Silva, E.M. and Guareis de Farias, C.R. (2017) SemanticSCo: a platform to support the semantic composition of services for gene expression analysis. Journal of biomedical informatics, 66 ( ). 116-128. ISSN 1532-0464 *** ISI Impact 2,447 ***
Junger, M. and Montoya Morales, A.L. and Overink, F.J. (2017) Priming and warnings are not effective to prevent social engineering attacks. Computers in Human Behavior, 66. pp. 75-87. ISSN 0747-5632 *** ISI Impact 2,880 ***
Kuhrmann, M. and Méndez Fernández, D. and Daneva, M. (2017) On the pragmatic design of literature studies in software engineering: An experience-based guideline. Journal of Empirical Software Engineering, 22 (1). pp. 1-40. ISSN 1382-3256 *** ISI Impact 1,393 ***
Lammers, I. and Vasenev, A. (2017) Grid resilience governance of the future: analyzing the role of associations in experimental smart grid projects in the Netherlands. In: 2nd EAI International Conference on Smart Grid Inspired Future, 27-28 March 2017, London, United Kingdom. pp. 1-6. Springer Verlag.
Mendez-Fernandez, D. and Wagner, S. and Kalinowski, N. and Felderer, M. and Mafra, P. and Vetro, A. and Conte, T. and Christianson, M.-T. and Greer, D. and Lassenius, C. and Mannisto, T. and Nayabi, M. and Oivo, M. and Penzenstadler, B. and Pfahl, D. and Prikladnicki, R. and Ruhe, G. and Schekelmann, A. and Sen, S. and Spinola, R. and Tuzcu, A. and De la Vara, J.J. and Wieringa, R.J. (2017) Naming the pain in requirements engineering: Contemporary problems, causes, and effects in practice. Empirical Software Engineering Journal. ISSN 1382-3256 *** ISI Impact 1,393 ***
Meuwly, D. and Ramos, D. and Haraksim, R. (2017) A guideline for the validation of likelihood ratio methods used for forensic evidence evaluation. Forensic Science International. pp. 1-12. ISSN 0379-0738 *** ISI Impact 1,950 ***
Tseng Lau, Eng and Keong Chai, Kok and Chen, Yue and Vasenev, A. (2017) Towards Improving Resilience of Smart Urban Electricity Networks by Interactively Assessing Potential Microgrids. In: 6th International Conference on Smart Cities and Green ICT Systems (SMARTGREENS), 22-24 April 2017, Porto, Portugal. pp. 1-8. SCITEPRESS Digital Library.
Vasenev, A. and Ionita, D. and Zoppi, T. and Ceccarelli, A. and Wieringa, R.J. (2017) Towards security requirements: Iconicity as a feature of an informal modeling language. In: REFSQ 2017 Joint Proceedings of the Co-Located Events: Joint Proceedings of REFSQ-2017 Workshops, 27 Feb 2017, Essen, Germany. pp. 1-15. CEUR Workshop Proceedings 1796. CEUR-WS.org. ISSN 1613-0073
Vasenev, A. and Montoya Morales, A.L. and Ionita, D. (2017) Outlining an ‘Evaluation continuum’: Structuring evaluation methodologies for infrastructure-related decision making tools. In: 2nd EAI International Conference on Smart Grid Inspired Future, 27-28 March 2017, London, United Kingdom. pp. 1-6. Springer Verlag.
Zoppi, T. and Bessler, S. and Ceccarelli, A. and Lambert, E. and Tseng Lau, Eng and Vasenev, A. (2017) A Modeling Framework to Support Resilient Evolution Planning of Smart Grids. In: 2nd EAI International Conference on Smart Grid Inspired Future, 27 Mar 2017, London, UK. pp. 1-10. Springer Verlag.

2016

Daneva, M. and Pastor, O., ed. (2016) Requirements engineering: foundation for software quality. Lecture Notes in Computer Science 9619. Springer Verlag, London. ISBN 978-3-319-30281-2
Abbasi, A. (2016) Ghost in the PLC: stealth on-the-fly manipulation of programmable logic controllers’ I/O. Technical Report TR-CTIT-16-02, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Abbasi, A. and Hashemi, M. (2016) Ghost in the PLC: Designing an Undetectable Programmable Logic Controller Rootkit via Pin Control Attack. In: Black Hat Europe, 03-04 Nov 2016, London, United Kingdom. pp. 1-35. Black Hat. ISBN not assigned
Albuquerque de Medeiros, R.W. and Rosa, N.S. and Ferreira Pires, L. (2016) Cost management of service compositions. International Journal of Services Computing, 4 (4). pp. 35-50. ISSN 2330-4464
Ambusaidi, M. A. and He, Xiangjian and Nanda, P. and Tan, Zhiyuan (2016) Building an intrusion detection system using a filter-based feature selection algorithm. IEEE transactions on computers, 65 (10). pp. 2986-2998. ISSN 0018-9340 *** ISI Impact 1,723 ***
Belov, A. and Kartak, V. and Vasenev, A. and Meratnia, N. and Havinga, P.J.M. (2016) A hierarchical scheme for balancing user comfort and electricity consumption of tank water heaters. In: Proceedings of Seventh IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT) , 6-9 Sep 2016, Minneapolis, USA. IEEE. ISBN 978-1-5090-5167-0
Belov, A. and Kartak, V. and Vasenev, A. and Meratnia, N. and Havinga, P.J.M. (2016) Load shifting of domestic water heaters under double price tariffs: Bringing together money savings and comfort. In: Proceedings of 2016 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe) , 9-12 Oct 2016, Ljubljana, Slovenia. IEEE. ISBN 978 -1-5090-3358-4
Belov, A. and Vasenev, A. and Havinga, P.J.M. and Meratnia, N. (2016) Enhancing user comfort models for Demand Response solutions for domestic water heating systems. In: Proceedings of the 5th International Conference on Smart Cities and Green ICT Systems, April 23-25, 2016, Rome, Italy. pp. 201-212. ScitePress. ISBN 978-989-758-184-7
Belov, A. and Vasenev, A. and Kartak, V. and Meratnia, N. and Havinga, P.J.M. (2016) Peak load reduction of multiple water heaters: Respecting consumer comfort and money savings. In: Proceedings of 2016 IEEE Online Conference on Green Communications (OnlineGreenComm), 14-17 Nov 2016. IEEE. ISBN 978-1-5090-2753-8
Bol Raap, W. and Iacob, M.-E. and van Sinderen, M.J. and Piest, S. (2016) An architecture and common data model for open data-based cargo-tracking in synchromodal logistics. In: On the Move to Meaningful Internet Systems: OTM 2016 Conferences, 24-28 Oct 2016, Rhodos, Greece. pp. 327-343. Lecture Notes in Computer Science 10033. Springer International Publishing. ISSN 0302-9743 ISBN 978-3-319-48471-6
Bortolameotti, R. and Peter, A. and Everts, M.H. and Jonker, W. and Hartel, P.H. (2016) Reliably determining data leakage in the presence of strong attackers. In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016. pp. 484-495. ACM. ISBN 978-1-4503-4771-6
Bullee, J.H. and Montoya Morales, A.L. and Junger, M. and Hartel, P.H. (2016) Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention. In: Proceedings of the inaugural Singapore Cyber Security R&D Conference (SG-CRC 2016), 14-15 Jan 2016, Singapore, Singapore. pp. 107-114. Cryptology and Information Security Series 14. IOS Press. ISSN 1871-6431 ISBN 978-1-61499-616-3
Caselli, M. (2016) Intrusion Detection in Networked Control Systems: From System Knowledge to Network Security. PhD thesis, Univ. of Twente. CTIT Ph.D. Thesis Series No. 16-401 ISBN 978-90-365-4177-0
Caselli, M. and Zambon, Emmanuele and Amann, J. and Sommer, R. and Kargl, F. (2016) Specification Mining for Intrusion Detection in Networked Control Systems. In: Proceedings of the 25th USENIX Security Symposium, 10-12 Aug 2016, Austin, TX, USA. pp. 791-806. USENIX Association. ISBN 978-1-931971-32-4
Chomsiri, T. and He, Xiangjian and Nanda, P. and Tan, Zhiyuan (2016) An improvement of tree-Rule firewall for a large network: supporting large rule size and low delay. In: 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 23-26 August 2016, Tianjin, China. pp. 178-184. IEEE Computer Society. ISSN 2324-9013
van Dam, C. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2016) Face reconstruction from image sequences for forensic face comparison. IET biometrics, 5 (2). pp. 140-146. ISSN 2047-4938 *** ISI Impact 0,764 ***
Dockhorn Costa, P. and Almeida, J.P.A. and Pereira, I.S.A. and van Sinderen, M.J. and Ferreira Pires, L. (2016) Rule-based support for situation management. In: Fusion Methodologies in Crisis Management. Springer, Switzerland, pp. 341-364. ISBN 978-3-319-22526-5
Erasmus, I.P. and Daneva, M. (2016) An empirical study on memory bias situations and correction strategies in ERP effort estimation. In: 16th International Conference on Product-Focused Software Process Improvement, PROFES 2015 , 2-4 Dec 2015, Bolzano, Italy. pp. 227-242. Lecture Notes in Computer Science 9459. Springer Verlag. ISBN 978-3-319-26843-9
Esquivel Vargas, H.T. (2016) Automatic Deployment of Specification-based Intrusion Detection in the BACnet Protocol. Master's thesis, Univ. of Twente.
Feiri, M.P. (2016) Scalable Broadcast Authentication for V2V Communication. PhD thesis, Univ. of Twente. CTIT Ph.D. Thesis Series No. 16-407 ISBN 978-90-365-4200-5
Hartel, P.H. and Junger, M. (2016) Book review: Crime and Everyday Life by Marcus Felson and Mary Eckert, 5th edition. Crime Science, 5. 10:1-10:3. ISSN 2193-7680
Ionita, D. and Gordijn, J. and Yesuf, A.S. and Wieringa, R.J. (2016) Value-Driven Risk Analysis of Coordination Models. In: The Practice of Enterprise Modeling : 9th IFIP WG 8.1. Working Conference, PoEM 2016, Proceedings, 8-10 Nov 2016, Skovde, Sweden. pp. 102-116. Lecture Notes in Business Information Processing 267. Springer Verlag. ISBN 978-3-319-48392-4
Ionita, D. and Kaidalova, J. and Vasenev, A. and Wieringa, R.J. (2016) A study on tangible participative enterprise modelling. In: ER 2016 Workshops AHA, MoBID, MORE-BI, MReBA, QMMQ, and WM2SP, Gifu, Japan, November 14-17, 2016, Proceedings, Nov. 14-17, 2016, Gifu, Japan. pp. 139-148. Lecture Notes in Computer Science 9975. Springer Verlag. ISBN 978-3-319-47716-9
Ionita, D. and Kegel, R.H.P. and Baltuta, A. and Wieringa, R.J. (2016) ArgueSecure: Out-of-the-box Risk Assessment. In: Proceedings of the 2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE), 12 Sept 2016, Beijing, China. pp. 74-79. IEEE Computer Society. ISBN 978-1-5090-3694-3
Ionita, D. and Wieringa, R.J. and Gordijn, J. (2016) Automated Identification and Prioritization of Business Risks in e-service Networks. In: Proceedings of the 7th International Conference on Exploring Service Science, IESS 2016, 25-27 May 2016, Bucharest, Romania. pp. 547-560. Lecture Notes in Business Information Processing 247. Springer Verlag. ISSN 1865-1348 ISBN 978-3-319-32689-4
Jung, O. and Besser, S. and Ceccarelli, A. and Zoppi, T. and Vasenev, A. and Montoya Morales, A.L. and Clarke, T. and Chappell, K. (2016) Towards a Collaborative Framework to Improve Urban Grid Resilience. In: Proceedings of the IEEE International Energy Conference, ENERGYCON 2016, 4-8 Apr 2016, Leuven, Belgium. pp. 1-6. IEEE. ISBN 978-1-4673-8464-3
van de Kamp, T.R. and Peter, A. and Everts, M.H. and Jonker, W. (2016) Private Sharing of IOCs and Sightings. In: 3rd ACM Workshop on Information Sharing and Collaborative Security, WISCS 2016. pp. 35-38. ACM. ISBN 978-1-4503-4565-1
Kegel, R.H.P. and Wieringa, R.J. (2016) Measuring Computer Literacy Without Questionnaires. In: Fourth International Workshop on Behavior Change Support Systems (BCSS 2016), 05 Apr 2016, Salzburg, Austria. pp. 61-65. CEUR Workshop Proceedings 1573. CEUR-WS.org. ISSN 1613-0073
Knapik, P. (2016) Automotive Security Functions; The Use of New Technologies to Tackle Vehicle-Related Crime. PhD thesis, Univ. of Twente. ISBN 978-90-365-4010-0
Kotzerke, J. (2016) BioTwist : overcoming severe distortions in ridge-based biometrics for succesful identification. PhD thesis, Univ. of Twente. CTIT Ph.D.-thesis series No. 16-383 ISBN 978-90-365-4061-2
Kotzerke, J. and Hao, Hao and Davis, S.A. and Hayes, R. and Spreeuwers, L.J. and Veldhuis, R.N.J. and Horadam, K. (2016) Identification performance of evidential value estimation for ridge-based biometrics. EURASIP Journal on Information Security, 2016 (24). pp. 1-10. ISSN 1687-417X
Koukoulis, Y. (2016) Dual Laser Fault Injection Attack. Master's thesis, Univ. of Twente.
Larburu Rubio, N. and Bults, R.G.A. and van Sinderen, M.J. and Widya, I.A. and Hermens, H.J. (2016) Quality-of-data broker for quality-of-data-aware telemedicine systems. Ingenierie et Recherche Bio-Medicale (IRBM), 37 (4). pp. 210-218. ISSN 1959-0318 *** ISI Impact 0,628 ***
Le, Anhtuan and Chen, Yue and Chai, Kok Keong and Vasenev, A. and Montoya Morales, A.L. (2016) Assessing loss event frequencies of smart grid cyber threats: Encoding flexibility into FAIR using Bayesian network approach. In: 1st EAI International Conference on Smart Grid Inspired Future, 19-20 May 2016, Liverpool, United Kingdom. pp. 43-51. Springer Verlag. ISBN 978-3-319-47729-9
Mahmood, Z. and Ali, T. and Khan, S. (2016) Effects of pose and image resolution on automatic face recognition. IET Biometrics, 5 (2). pp. 111-119. ISSN 2047-4938 *** ISI Impact 0,764 ***
Montoya Morales, A.L. and Junger, M. and Ongena, Y.P. (2016) The Relation Between Residential Property and its Surroundings and Day- and Night-Time Residential Burglary. Environment and behavior, 48 (4). pp. 515-549. ISSN 0013-9165 *** ISI Impact 2,892 ***
Moreira, J.L.R. and van Sinderen, M.J. and Ferreira Pires, L. and Dockhorn Costa, P. (2016) Improving semantic interoperability of big data for epidemiological surveillance. In: Enterprise Interoperability in the Digitized and Networked Factory of the Future, I-ESA 2016, 29-30 Mar 2016, Guimaraes, Portugal. pp. 314-324. ISTE Press. ISBN 9781847040442
Nardi, J.C. and Almeida, J.P.A. and Pereira, M.C. and de Almeida Falco, R. and Iacob, M.-E. and van Sinderen, M.J. and Ferreira Pires, L. (2016) Service commitments and capabilities across ArchiMate architectural layers. In: Proceedings of the IEEE 20th International Enterprise Distributed Object Computing Workshop, EDOCW 2016, 5-6 Sep 2016, Vienna, Austria. pp. 139-148. IEEE Computer Society. ISSN 2325-6605 ISBN 978-1-4673-9934-0
Noort, W. (2016) Gathering Intelligence from the Bitcoin Peer-to-Peer network. Master's thesis, University of Twente.
Parthasarathy, S. and Daneva, M. (2016) An approach to estimation of degree of customization for ERP projects using prioritized requirements. Journal of systems and software, 117. pp. 471-487. ISSN 0164-1212 *** ISI Impact 1,424 ***
Peng, Yuxi and Spreeuwers, L.J. and Veldhuis, R.N.J. (2016) Designing a Low-Resolution Face Recognition System for Long-Range Surveillance. In: 2016 International Conference of the Biometrics Special Interest Group (BIOSIG), 21-23 Sep 2016, Darmstadt, Germany. 16429137. IEEE. ISBN 978-1-5090-0780-6
Pieters, W. and Hadžiosmanović, D. and Dechesne, F. (2016) Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace. Science and Engineering Ethics, 22 (3). pp. 831-850. ISSN 1353-3452 *** ISI Impact 1,454 ***
Schramm, M. and Daneva, M. (2016) Implementations of service oriented architecture and agile software development: What works and what are the challenges? In: Proceedings of the Tenth IEEE International Conference on Research Challenges in Information Science, RCIS 2016 , 1-3 June 2016 , Grenoble, France. pp. 1-12. IEEE Computer Society. ISSN 2151-1357 ISBN 978-1-4799-8711-5
van Sinderen, M.J. and Iacob, M.-E. (2016) Workshop C2 Report - Big Data Interoperability for Enterprises. In: Enterprise Interoperability in the Digitized and Networked Factory of the Future. ISTE, UK, pp. 268-269. ISBN 9781847040442
Singh, P.M. and van Sinderen, M.J. (2016) Big data interoperability challenges for logistics. In: Enterprise Interoperability in the Digitized and Networked Factory of the Future, 29-30 Mar 2016, Guimaraes, Portugal. pp. 325-335. ISTE Press. ISBN 9781847040442
Stoker, J.I. and Garretsen, H. and Spreeuwers, L.J. (2016) The Facial Appearance of CEOs: Faces Signal Selection but Not Performance. PLos ONE, 11 (7). e0159950:1-11. ISSN 1932-6203 *** ISI Impact 3,057 ***
Susyanto, N. (2016) Semiparametric Copula Models for Biometric Score Level. PhD thesis, Univ. of Amsterdam. ISBN 978-94-6295-513-4
Susyanto, N. and Veldhuis, R.N.J. and Spreeuwers, L.J. and Klaassen, C.A.J. (2016) Two-step calibration method for multi-algorithm score-based face recognition systems by minimizing discrimination loss. In: International Conference on Biometrics, ICB 2016, 13-16 June 2016, Halmstad, Sweden. 16252593. IEEE. ISBN 978-1-5090-1870-3
Susyanto, N. and Veldhuis, R.N.J. and Spreeuwers, L.J. and Klaassen, C.A.J. (2016) Fixed FAR correction factor of score level fusion. In: 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), 6-9 Sep 2016, Washington, DC, USA. 16555751. IEEE. ISBN 978-1-4673-9734-6
Vasenev, A. and Hartmann, T. and Miller, S.R. and Dorée, A.G. (2016) Visualization environment for reviewing and experimenting with compaction equipment trajectories in context. Advanced engineering informatics, 30 (2). pp. 95-108. ISSN 1474-0346 *** ISI Impact 2,000 ***
Vasenev, A. and Montoya Morales, A.L. (2016) Analysing non-malicious threats to urban smart grids by interrelating threats and threat taxonomies. In: 2016 IEEE International Smart Cities Conference (ISC2), 12-15 Sept 2016, Trento, Italy. pp. 1-4. IEEE. ISBN 978-1-5090-1847-5
Vasenev, A. and Montoya Morales, A.L. and Ceccarelli, A. (2016) A Hazus-Based Method for Assessing Robustness of Electricity Supply to Critical Smart Grid Consumers during Flood Events. In: 11th International Conference on Availability, Reliability and Security, ARES 2016, 31 Aug - 02 Sept 2016, Salzburg, Austria. pp. 223-228. IEEE. ISBN 978-1-5090-0990-9
Vasenev, A. and Montoya Morales, A.L. and Ceccarelli, A. and Le, A. and Ionita, D. (2016) Threat navigator: grouping and ranking malicious external threats to current and future urban smart grids. In: 1st EAI International Conference on Smart Grid Inspired Future, 19-20 May 2016, Liverpool, United Kingdom. pp. 184-192. Springer Verlag. ISBN 978-3-319-47729-9
Veneberg, R.K.M. and Iacob, M.-E. and van Sinderen, M.J. and Bodenstaff, L. (2016) Relating business intelligence and enterprise architecture - A method for combining operational data with architectural metadata. International Journal of Cooperative Information Systems, 25 (02). 1650007. ISSN 0218-8430 *** ISI Impact 0,526 ***
Vissers, C.A. and Ferreira Pires, L. and Quartel, D.A.C. and van Sinderen, M.J. (2016) Architectural design - Conception and specification of interactive systems. 1 edition. Springer International Publishing, Switzerland. ISBN 978-3-319-43297-7
de Vries, S.H.S. (2016) Achieving 128-bit Security Against Quantum Computer Attacks in Open VPN. Master's thesis, University of Twente.
Vriezekolk, E. (2016) Technical Report on Raster field test at a Water Board. Technical Report TR-CTIT-16-06, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Vriezekolk, E. (2016) Assessing Telecommunication Service Availability Risks for Crisis Organisations. PhD thesis, Univ. of Twente. CTIT Ph.D.-thesis series No. 16-393 ISBN 978-90-365-4141-1
Yüksel, Ö. and den Hartog, J.I. and Etalle, S. (2016) Reading between the fields: practical, effective intrusion detection for industrial control systems. In: SAC '16 Proceedings of the 31st Annual ACM Symposium on Applied Computing, April 4-8, 2016, Pisa, Italy. pp. 2063-2070. ACM. ISBN 978-1-4503-3739-7
Zeinstra, C.G. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2016) Discriminating Power of FISWG Characteristic Descriptors Under Different Forensic Use Cases. In: nternational Conference of the Biometrics Special Interest Group, BIOSIG 2016, 21-23 Sep 2016, Darmstadt, Germany. 16429109. IEEE. ISBN 978-1-5090-0780-6

2015

Akoushideh, A. and Veldhuis, R.N.J. and Spreeuwers, L.J. and Maybodi, B.M.-N. (2015) Facial recognition using new LBP representations. In: Proceedings of the 36th WIC Symposium on Information Theory in the Benelux, 6-7 May 2015, Brussels. pp. 34-41. Université libre de Bruxelles. ISBN 978-2-8052-0277-3
Alì, G. and Bilotta, E. and Gabriele, L. and Pantano, P. and Sepulveda, J. and Servidio, R. and Vasenev, A. (2015) eLearning in industrial mathematics with applications to nanoelectronics. In: Coupled multiscale simulation and optimization in nanoelectronics. The European Consortium for Mathematics in Industry 21. Springer Verlag, Berlin, pp. 503-559. ISBN 978-3-662-46671-1
Albuquerque de Medeiros, R.W. and Ferreira Pires, L. and Souto Rosa, N. (2015) Predicting service composition costs with complex cost behavior. In: 12th IEEE International Conference on Service Computing, SCC 2015, 27 Jun - 02 Jul 2015, New York, USA. pp. 419-426. IEEE Computer Society. ISBN 978-1-4673-7280-0
Ali, T. and Spreeuwers, L.J. and Veldhuis, R.N.J. and Meuwly, D. (2015) Sampling variability in forensic likelihood-ratio computation: A simulation study. Science & Justice, 55 (6). pp. 499-508. ISSN 1355-0306 *** ISI Impact 1,959 ***
Ali, T. and Tome, P. and Fierrez, J. and Vera-Rodriguez, R. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2015) A Study of Identification Performance of Facial Regions from CCTV Images. In: Computational Forensics. Lecture Notes in Computer Science 8915. Springer International Publishing, Switzerland, pp. 83-91. ISSN 0302-9743 ISBN 978-3-319-20124-5
Ameller, D. and Franch , X. and Gómez, C. and Araújo, J. and Berntsson Svensson, R. and Biffle, S. and Cabot, J. and Cortelessa, V. and Daneva, M. and Méndez Fernández, D. and Moreira, A. and Muccini, H. and Vallecillo, A. and Wimmer, M. and Amaral, V. and Brunelière, H. and Burgueño, L. and Goulão, M. and Schätz, B. and Teufl, S. (2015) Handling non-functional requirements in model-driven development: an ongoing industrial survey. In: 23rd International Conference on Requirements Engineering (RE), 24-29 Aug 2015, Ottawa, Canada. pp. 208-213. IEEE Computer Society. ISBN 978-1-4673-6905-3
Anish, P. and Daneva, M. and Cleland-Huang, J. and Wieringa, R.J. and Ghaisas, S. (2015) What you ask is what you get: Understanding architecturally significant functional requirements. In: 23rd IEEE Internatioanl Conference on Requirements Engineering (RE), 24-28 Aug 2015, Ottawa, Canada. pp. 86-95. IEEE Computer Society. ISBN 978-1-4673-6905-3
Azevedo, C.L.B. and Almeida, J.P.A. and van Sinderen, M.J. and Ferreira Pires, L. (2015) Towards capturing strategic planning in EA. In: 19th IEEE International Enterprise Object Computing Conference, EDOC 2015, 21-25 Sep 2015, Adelaide, Australia. pp. 159-168. IEEE. ISBN 978-1-4673-9203-7
Azevedo, C.L.B. and Iacob, M.-E. and Almeida, J.P.A. and van Sinderen, M.J. and Ferreira Pires, L. and Guizzardi, G. (2015) Modeling resources and capabilities in enterprise architecture: a well-founded ontology-based proposal for ArchiMate. Information Systems, 54. pp. 235-262. ISSN 0306-4379 *** ISI Impact 1,832 ***
Azevedo, C.L.B. and van Sinderen, M.J. and Ferreira Pires, L. and Almeida, J.P.A. (2015) Aligning enterprise architecture with strategic planning. In: CAiSE International Workshops 2015, 8-9 Jun 2015, Stockholm, Sweden. pp. 426-437. Lecture Notes in Business Information Processing 215. Springer. ISBN 978-3-319-19242-0
Bakondi, B.G. and Peter, A. and Everts, M.H. and Hartel, P.H. and Jonker, W. (2015) Publicly Verifiable Private Aggregation of Time-Series Data. In: 10th International Conference on Availability, Reliability and Security, ARES 2015, 24-27 Aug 2015, Toulouse, France. pp. 50-59. IEEE. ISBN 978-1-4673-6590-1
Batubara, F.R. (2015) Balancing functionality, risk, and cost in smart service networks. In: ICSOFT 2015 Doctoral Consortium, 20 -23 July 2015, Colmar, Alsace, France. pp. 7-14. Scitepress Digital Library. ISBN not assigned
Bösch, C.T. (2015) Cryptographically Enforced Search Pattern Hiding. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 14-340 ISBN 978-90-365-3817-6
Belov, A. and Vasenev, A. and Havinga, P.J.M. and Meratnia, N. and van der Zwaag, B.J. (2015) Reducing user discomfort in direct load control of domestic water heaters. In: Proceedings of the IEEE Innovative Smart Grid Technologies - Asia (ISGT ASIA 2015), 3-6 Nov 2015, Bangkok, Thailand. pp. 1-6. IEEE Computer Society. ISBN 978-1-5090-1237-4
Berntsson-Svensson, R. and Daneva, M. and Ernst, N. and Marczak, S. and Madhavji, N. (2015) Welcome from the Workshop Chairs. In: Fifth International Workshop on Empirical Requirements Engineering, EmpiRE 2015 at RE'15, 24 Aug 2015, Ottawa, ON, Canada. pp. 3-5. IEEE Computer Society. ISBN 978-1-5090-0116-3
Bilgin, B. (2015) Threshold Implementations, As Countermeasure Against Higher-Order Differential Power Analysis (Cum Laude). PhD thesis, Univ. of Twente. CTIT Ph.D. thesis series No. 14-337 ISBN 978-90-365-3891-6
Bilgin, B. and Nikova, S.I. and Nikov, V. and Rijmen, V. and Tokareva, N. and Vitkup, V. (2015) Threshold implementations of Small S-boxes. Cryptography and Communications, 7 (1). pp. 3-33. ISSN 1936-2447 *** ISI Impact 0,742 ***
Bortolameotti, R. and Peter, A. and Everts, M.H. and Bolzoni, D. (2015) Indicators of Malicious SSL Connections. In: 9th International Conference on Network and System Security, NSS 2015, 3-5 Nov 2015, New York, USA. pp. 162-175. Lecture Notes in Computer Science 9408. Springer Verlag. ISBN 978-3-319-25645-0
Bosems, S. and van Sinderen, M.J. (2015) Model-driven Development for User-centric Well-being Support: From Dynamic Well-being Domain Models to Context-aware Applications. In: 3rd International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2015), 9-11 Feb 2015, Angers, France. pp. 425-432. SCITEPRESS. ISBN 978-989-758-083-3
Bosems, S. and van Sinderen, M.J. (2015) Prediction of domain behaviour through dynamic well-being domain model analysis. The Scientific World Journal, 2015. 11. ISSN 1537-744X
Brand, A. and Iacob, M.-E. and van Sinderen, M.J. (2015) Interoperability architecture for electric mobility. In: Enterprise Interoperability - Proceedings of the 6th International IFIP Working Conference, IWEI 2015, 28-29 May 2015, Nimes, France. pp. 126-140. Lecture Notes in Business Information Processing 213. Springer. ISSN 1865-1348 ISBN 978-3-662-47156-2
Bukhsh, Z.A. and van Sinderen, M.J. and Singh, P.M. (2015) SOA and EDA: a comparative study - similarities, difference and conceptual guidelines on their usage. In: Twelfth International Conference on e-Business, ICE-B 2015, 20-22 Jul 2015, Colmar, France. pp. 213-220. SciTePress. ISBN 978-989-758-113-7
Bullee, J.H. and Montoya Morales, A.L. and Pieters, W. and Junger, M. and Hartel, P.H. (2015) The persuasion and security awareness experiment: reducing the success of social engineering attacks. Journal of Experimental Criminology, 11 (1). pp. 97-115. ISSN 1573-3750 *** ISI Impact 2,229 ***
Bullee, J.H. and Montoya Morales, A.L. and Pieters, W. and Junger, M. and Hartel, P.H. (2015) Regression Nodes: Extending attack trees with data from social sciences. In: Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015), 13 Jul 2015, Verona, Italy. pp. 17-23. IEEE Computer Society. ISBN 978-1-5090-0178-1
Carvajal Gallardo, I. (2015) Privacy-Preserving Social DNA-Based Recommender. Master's thesis, Univ. of Twente.
Caselli, M. and Zambon, Emmanuele and Kargl, F. (2015) Sequence-aware intrusion detection in industrial control systems. In: Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 14-17 April 2015, Singapore. pp. 13-24. CPSS Workshop - AsiaCCS'15. ACM. ISBN 978-1-4503-3448-8
Caselli, M. and Zambon, Emmanuele and Petit, J.Y. and Kargl, F. (2015) Modeling message sequences for intrusion detection in industrial control systems. In: Proceedings of the Ninth IFIP 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2015, 16-18 March 2015, Arlington, Virginia, US. pp. 49-71. Critical Infrastructure Protection IX. Springer Verlag. ISSN 1868-4238 ISBN 978-3-319-26566-7
van Cleeff, A. (2015) Physical and Digital Security Mechanisms: Properties, Combinations and Trade-offs. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 15-360 ISBN 978-90-365-3884-8
Daneva, M. (2015) Play-testing and requirements engineering: implications for research and teaching. In: 2nd IEEE/ACM International Workshop on Requirements Engineering and Testing, RET@ICSE 2015, 18 May 2015, Florence, Italy. pp. 9-12. ACM. ISBN 978-1-4673-7073-8
Daneva, M. (2015) Focus group: cost-effective and methodologically sound ways to get practitioners involved in your empirical RE research. In: Research Methodology Track of the REFSQ 2015 Conference, 23 Mar 2015, Essen, Germany. pp. 211-216. CEUR Workshop Proceedings 1342. CEUR. ISSN 1613-0073
Dietzel, S. (2015) Resilient In-Network Aggregation for Vehicular Networks. PhD thesis, Univ. of Twente. CTIT Ph.D. thesis series No. 14-336 ISBN 978-90-365-3852-7
Dietzel, S. and Peter, A. and Kargl, F. (2015) Secure Cluster-Based In-Network Information Aggregation for Vehicular Networks. In: IEEE 81st Vehicular Technology Conference, VTC Spring 2015, 11-14 May 2015, Glasgow, UK. pp. 1-5. IEEE. ISBN 978-1-4799-8088-8
Dutta, A. (2015) Predicting Performance of a Face Recognition System Based on Image Quality. PhD thesis, Univ. of Twente. CTIT Ph.D. Thesis Series No. 15-353 ISBN 978-90-365-3872-5
Dutta, A. and Günther, M. and El Shafey, L.J. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2015) Impact of eye detection error on face recognition performance. IET Biometrics, 4 (3). pp. 137-150. ISSN 2047-4938 *** ISI Impact 0,764 ***
Erasmus, I.P. and Daneva, M. (2015) An experience report on ERP effort estimation driven by quality requirements. In: 6th Workshop on Requirements Prioritization and Communication (RePriCo) at REFSQ 2015, 23 March 2015, Essen, Germany. pp. 126-139. CEUR Workshop Proceedings 1342. CEUR-WS.org. ISSN 1613-0073
Erasmus, I.P. and Daneva, M. (2015) ERP services effort estimation strategies based on early requirements. In: 2nd International Workshop on Requirements Engineering for the Precontract Phase (RE4P2) at REFSQ 2015, 23 March 2015, Essen, Germany. pp. 83-99. CEUR Workshop Proceedings 1342. CEUR-WS.org.
Ferreira, M.I.G.B and Moreira, J.L.R. and Campos, M.L.M. and Braga, B.F.B and Sales, T.P. and de Cordeiro, K.F. and Borges, M.R.S. (2015) OntoEmergePlan: variability of emergency plans supported by a domain ontology. In: 12th International Conference on Information Systems for Crisis Response and Management (ISCRAM), 24-27 May 2015, Kristiansand, Norway. pp. 1-9. Univ. of Agder, Norway. ISSN 2411-3387 ISBN 978-82-7117-788-1
Gollmann, D. and Herley, C. and Koenig, V. and Pieters, W. and Sasse, M. A. (2015) Socio-Technical Security Metrics (Dagstuhl Seminar 14491). Dagstuhl Reports, 4 (12). pp. 1-28. ISSN 2192-5283
Guardia, G.D.A. and Ferreira Pires, L. and Vêncio, R.Z.N. and Malmegrim, K.C.R. and Guareis de Farias, C.R. (2015) A methodology for the development of RESTful semantic web services for gene expression analysis. PLOS one, 10 (7). e0134011:1-e0134011:28. ISSN 1932-6203 *** ISI Impact 3,057 ***
Herley, C. and Pieters, W. (2015) “If you were attacked, you’d be sorry”: Counterfactuals as security arguments. In: New Security Paradigm Workshop (NSPW), 8-11 Sept 2015, Twente, Netherlands. pp. 112-123. ACM. ISBN 978-1-4503-3754-0
Inayat, I. and Moraes, M. and Daneva, M. and Salim, S. (2015) A reflection on agile requirements engineering: solutions brought and challenges posed. In: 1st International Workshop on Requirements Engineering in Agile Development (READ), 25 May 2015, Helsinki, Finnland. pp. 61-67. ACM. ISBN 978-1-4503-3409-9
Inayat, I. and Salim, S.S. and Marczak, S. and Daneva, M. and Shamshirband , S. (2015) A systematic literature review on agile requirements engineering practices and challenges. Computers in Human Behavior, 51 (Part B). pp. 915-929. ISSN 0747-5632 *** ISI Impact 2,880 ***
Ionita, D. and Wieringa, R.J. and Bullee, J.H. and Vasenev, A. (2015) Investigating the usability and utility of tangible modelling of socio-technical architectures. Technical Report TR-CTIT-15-03, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Ionita, D. and Wieringa, R.J. and Bullee, J.H. and Vasenev, A. (2015) Tangible Modelling to Elicit Domain Knowledge: An Experiment and Focus Group. In: 34th International Conference on Conceptual Modeling, ER 2015, 19-22 Oct 2015, Stockholm, Sweden. pp. 558-565. Lecture Notes in Computer Science 9381. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-25263-6
Ionita, D. and Wieringa, R.J. and Wolos, L. and Gordijn, J. and Pieters, W. (2015) Using Value Models for Business Risk Analysis in e-Service Networks. In: 8th IFIP WG 8.1. Working Conference on the Practice of Enterprise Modelling, PoEM 2015, 10-12 Nov 2015, Valencia, Spain. pp. 239-253. Lecture Notes in Business Information Processing 235. Springer Verlag. ISSN 1865-1348 ISBN 978-3-319-25896-6
Karampatzakis, E. (2015) Evaluation of the robustness of payment terminals with the use of fuzzing. Master's thesis, Univ. of Twente.
Kegel, R.H.P. (2015) The Personal Information Security Assistant. In: 2015 IEEE 23rd International Requirements Engineering Conference (RE) , 24-28 Aug 2015, Ottawa, Canada. pp. 393-397. IEEE . ISSN 1090-705X ISBN 978-146736905-3
Kegel, R.H.P. and Wieringa, R.J. (2015) Behavior Change Support Systems for Privacy and Security. In: Proceedings of the Third International Workshop on Behavior Change Support Systems, 03 Jun 2015, Chicago, IL, United States. pp. 51-55. CEUR Workshop Proceedings Vol-1369. CEUR.org. ISSN 1613-0073
Kleber, S. and van der Heijden, R.W. and Kopp, H. and Kargl, F. (2015) Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions. In: 2015 International Conference and Workshops on Networked Systems (NetSys), March 9-12 2015, Cottbus, Germany. pp. 1-8. IEEE Computer Society. ISBN 978-1-4799-5804-7
Kotzerke, J. and Davis, S. and Hayes, R. and Spreeuwers, L.J. and Veldhuis, R.N.J. and Horadam, K. (2015) Identification Performance of Evidential Value Estimation for Fingermarks. In: Proceedings of the 2015 International Conference of the Biometrics Special Interest Group (BIOSIG), 9-11 Sept 2015, Darmstadt, Germany. pp. 1-6. Lecture Notes in Informatics (LNI) - Proceedings P-245. Gesellschaft für Informatik (GI). ISSN 1617-5468 ISBN 978-3-88579-639-8
Kotzerke, J. and Davis, S.A. and Hayes, R. and Spreeuwers, L.J. and Veldhuis, R.N.J. and Horadam, K.J. (2015) Discriminating fingermarks with evidential value for forensic comparison. In: Proceedings of the 3rd International Workshop on Biometrics and Forensics, IWBF 2015, 03-04 Mar 2015, Gjovik, Norway. pp. 1-6. IEEE. ISBN 978-1-4799-8105-2
Kumar, A. (2015) Security Analysis of Mobile Payment Systems. Master's thesis, Univ. of Twente.
Larburu Rubio, N. and Bults, R.G.A. and van Sinderen, M.J. and Hermens, H.J. (2015) Quality-of-Data Management for Telemedicine Systems. In: 5th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2015), 27-30 Sep 2015, Berlin. pp. 451-458. Procedia Computer Science (2015) 63. Elsevier. ISSN 1877-0509
Larburu Rubio, N. and Bults, R.G.A. and van Sinderen, M.J. and Widya, I.A. and Hermens, H.J. (2015) An ontology for telemedicine systems resiliency to technological context variations in pervasive healthcare. IEEE Journal of Translational Engineering in Health and Medicine, 3. 10. ISSN 2168-2372
Larburu Rubio, N. and van Schooten, B.W. and Shalom, E. and Fung, Nick Lik San and van Sinderen, M.J. and Hermens, H.J. and Jones, V.M. (2015) A quality-of-data aware mobile decision support system for patients with chronic illnesses. In: Knowledge representation for health care. Lecture Notes in Artificial Intelligence 9485 (1). Springer, Switzerland, pp. 126-139. ISBN 978-3-319-26584-1
Lastdrager, E.E.H. and Hartel, P.H. and Junger, M. (2015) Apate: Anti-Phishing Analysing and Triaging Environment (Poster). In: 36th IEEE Symposium on Security and Privacy, 18-21 May 2015, San Jose, CA, USA. IEEE Computer Society. ISBN not assigned
Müller, M.C. (2015) SIDekICk: SuspIcious DomaIn Classification in the .nl zone. Master's thesis, Univ. of Twente.
Mian, U.S. and den Hartog, J.I. and Etalle, S. and Zannone, N. (2015) Auditing with incomplete logs. In: Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust 2015, 18 Apr 2015, London, UK. pp. 1-23. Technische Universiteit Eindhoven. ISBN not assigned
Montoya Morales, A.L. (2015) Modelling urban crime through workforce size: a test of the activity support concept. Environment and Planning B: Planning and Design, 42 (3). pp. 399-414. ISSN 0265-8135 *** ISI Impact 1,195 ***
Moreira, J.L.R. (2015) From situation modelling to a distributed rule-based platform for situation awareness: an ontological framework for disaster management applications. In: 34th International Conference on Conceptual Modeling (ER 2015). pp. 1-13. PhD Symposium. Springer International Publishing. ISSN 0302-9743 ISBN 978-3-319-25263-6
Moreira, J.L.R. and Cordeiro, K. and Campos, M.L.M. and Borges, M. (2015) Hybrid multidimensional design for heterogeneous data supported by ontological analysis: an application case in the Brazilian electric system operation. In: 4th Workshop on Energy Data Management (EnDM) in the 18th International Conference on Extending Database Technology (EDBT), 27 Mar 2015, Brussels, Belgium. pp. 72-77. CEUR-WS.org. ISSN 1613-0073
Moreira, J.L.R. and Ferreira Pires, L. and van Sinderen, M.J. and Dockhorn Costa, P. (2015) Developing situation-aware applications for disaster management with a distributed rule-based platform. In: Proceedings of the RuleML 2015 Challenge, Special Track on Rule-based Recommender Systems for the Web of Data, Special Industry Track, and RuleML 2015 Doctoral Consortium, 2-5 August, Berlin. CEUR Workshop Proceedings 1417. CEUR-WS.org. ISSN 1613-0073
Moreira, J.L.R. and Ferreira Pires, L. and van Sinderen, M.J. and Dockhorn Costa, P. (2015) Towards ontology-driven situation-aware disaster management. Journal of Applied Ontology, 10 (3-4). pp. 339-353. ISSN 1570-5838 *** ISI Impact 0,526 ***
Nardi, J.C. and Falbo, R. de and Almeida, J.P.A. and Guizzardi, G. and Ferreira Pires, L. and van Sinderen, M.J. and Guarino, N. and Fonseca, C.M. (2015) A commitment-based reference ontology for services. Information systems, 54. pp. 263-288. ISSN 0306-4379 *** ISI Impact 1,832 ***
Nibbelke, V. (2015) Vascular pattern recognition for finger veins using biometric graph matching. Master's thesis, Univ. of Twente.
Pacini, L.A. and de Prado, A.F. and Lopes de Souza, W. and Ferreira Pires, L. (2015) An approach to business process recovery from source code. In: 12th International Conference on Information Technology: New Generations, ITNG 2015, 13-15 Apr 2015, Las Vegas, USA. pp. 361-366. IEEE Computer Society. ISBN 978-1-4799-8828-0
Peng, Yuxi and Spreeuwers, L.J. and Veldhuis, R.N.J. (2015) Likelihood Ratio Based Mixed Resolution Facial Comparison. In: Proceedings of the 3rd International Workshop on Biometrics and Forensics, IWBF 2015, 3-4 March 2015, Gjøvic, Norway. pp. 1-5. IEEE Computer Society. ISBN 978-1-4799-8105-2
Petit, J.Y. and Schaub, F. and Feiri, M.P. and Kargl, F. (2015) Pseudonym schemes in vehicular networks: a survey. IEEE communications surveys & tutorials, 17 (1). pp. 228-255. ISSN 1553-877X *** ISI Impact 9,220 ***
Pieters, W. and Davarynejad, M. (2015) Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers. In: 9th International Workshop on Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance (DPM), 10-11 Sep 2014, Wroclaw, Poland. pp. 201-215. Lecture Notes in Computer Science 8872 . Springer. ISSN 0302-9743 ISBN 978-3-319-17015-2
Pieters, W. and Padget, J. and Dechesne, F. and Dignum, V. and Aldewereld, H. (2015) Effectiveness of qualitative and quantitative security obligations. Journal of Information Security and Applications, 22. pp. 3-16. ISSN 2214-2126
Razo-Zapata, I.S. and Gordijn, J. and De Leenheer, P. and Wieringa, R.J. (2015) e3service: a critical reflection and future research. Business & Information Systems Engineering, 57 (1). pp. 51-59. ISSN 0937-6429
Scrinzi, F. (2015) Behavioral Analysis of obfuscated Code. Master's thesis, Univ. of Twente.
van Sinderen, M.J. and Ivanov, I. (2015) Editorial for special section of grid computing journal on “Cloud Computing and Services Science”. Cluster Computing, 18 (1). pp. 453-455. ISSN 1386-7857 *** ISI Impact 1,514 ***
Singh, P.M. and van Sinderen, M.J. (2015) Lightweight metrics for enterprise architecture analysis. In: Business Information Workshops - Revised Papers of BIS 2015 International Workshops, 24-26 June 2015, Poznan, Poland. pp. 113-125. Lecture Notes in Business Information Processing 228. Springer. ISSN 1865-1348 ISBN 978-3-319-26761-6
Singh, P.M. and van Sinderen, M.J. (2015) Interoperability challenges for context aware logistics services - the case of synchromodal logistics. In: Proceedings of the Workshops of the 6th International IFIP Working Conference on Enterprise Interoperability, IWEI-WS 2015, 27 May 2015, Nîmes, France. 9. CEUR Workshop Proceedings 1414. CEUR-WS.org. ISSN 1613-0073
Spreeuwers, L.J. (2015) Breaking the 99% barrier: optimisation of 3D face recognition. IET Biometrics, 4 (3). pp. 169-177. ISSN 2047-4938 *** ISI Impact 0,764 ***
Spreeuwers, L.J. (2015) Setting a world record in 3D face recognition. De Vonk, 33 (4). pp. 11-21. ISSN 0925-5427
Stottelaar, B. (2015) Practical Cyber-Attacks on Autonomous Vehicles. Master's thesis, Univ. of Twente.
Susyanto, N. and Klaassen, C.A.J. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2015) Semiparametric score level fusion: Gaussian copula approach. In: Proceedings of the 36th WIC Symposium on Information Theory in the Benelux, 6-7 May 2015, Brussels. pp. 26-33. Université Libre de Bruxelles. ISBN 978-2-8052-0277-3
Tan, Zhiyuan and Jamdagni, Aruna and He, Xiangjian and Nanda, Priyadarsi and Liu, Ren Ping and Hu, Jiankun (2015) Detection of denial-of-service attacks based on computer vision techniques. IEEE transactions on computers, 64 (9). pp. 2519-2533. ISSN 0018-9340 *** ISI Impact 1,723 ***
Veldhuis, R.N.J. (2015) The relation between the secrecy rate of biometric template protection and biometric recognition performance. In: International Conference on Biometrics, ICB 2015 , 19-22 May 2015, Phuket, Thailand. pp. 311-318. IEEE . ISBN 978-1-4799-7824-3
Vriezekolk, E. and Etalle, S. and Wieringa, R.J. (2015) Experimental Validation of a Risk Assessment Method. In: 21st International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2015, 23-26 Mar 2015, Essen, Germany. pp. 1-16. Lecture Notes in Computer Science 9013. Springer. ISSN 0302-9743 ISBN 978-3-319-16100-6
Vriezekolk, E. and Etalle, S. and Wieringa, R.J. (2015) Validating the raster risk assessment method in practice. In: Proceedings of the ISCRAM 2015 Conference, 24-27 May 2015, Kristiansand, Norway. International Association for Information Systems for Crisis Response and Management (ISCRAM). ISSN 2411-3387 ISBN 978-82-7117-788-1
van der Wagen, W. and Pieters, W. (2015) From Cybercrime to Cyborg Crime: Botnets as Hybrid Criminal Actor-Networks. British journal of Criminology, 55 (2). pp. 1-18. ISSN 0007-0955 *** ISI Impact 1,643 ***
Wang, Lei (2015) Robust collaborative service interactions under system crashes and network failures. PhD thesis, Univ. of Twente. CTIT Ph.D.-thesis series No. 15-357 ISBN 978-90-365-3868-8
Wang, Lei and Ferreira Pires, L. and van Sinderen, M.J. and Wombacher, A. and Chi, Chi-Hung (2015) Deriving robust distributed business processes with automated transformations of fallible component processes. International Journal on Advances in Networks and Services, 8 (3 and 4). pp. 192-202. ISSN 1942-2644
Wang, Lei and Wombacher, A. and van Sinderen, M.J. and Ferreira Pires, L. and Chi, Chi-Hung (2015) Robust interactions under system crashes and network failures of collaborative processes with arbitrary control flows. In: Seventh International Conference on Advanced Service Computing, Service Computation 2015, 22-27 Mar 2015, Nice, France. pp. 27-34. IARIA. ISSN 2308-3549 ISBN 978-1-61208-387-2
de Wide, L. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2015) Exploring How User Routine Affects the Recognition Performance of a Lock Pattern. In: Proceedings of the 2015 International Conference of the Biometrics Special Interest Group (BIOSIG), 9-11 Sept 2015, Darmstadt, Germany. pp. 1-8. Lecture Notes in Informatics (LNI) - Proceedings P-245. Gesellschaft für Informatik. ISSN 1617-5468 ISBN 978-3-88579-639-8
Wieringa, R.J. and Daneva, M. (2015) Six strategies for generalizing software engineering theories. Science of computer programming, 101. pp. 136-152. ISSN 0167-6423 *** ISI Impact 0,828 ***
Xia, Chao and Chi, Chi Hung and Wong, Raymond and Wombacher, A. and Ferreira Pires, L. and van Sinderen, M.J. and Ding, Chen (2015) Workflow-based service selection under multi-constraints. In: Twelfth IEEE International Conference on Services Computing, SCC 2015, 27 Jun - 02 Jul 2015, New York. pp. 332-339. IEEE. ISBN 978-1-4673-7280-0
Yu, Yijun and Franqueira, V.N.L. and Tun, T.T. and Wieringa, R.J. and Nuseibeh, B. (2015) Automated analysis of security requirements through risk-based argumentation. Journal of systems and software, 106. pp. 102-116. ISSN 0164-1212 *** ISI Impact 1,424 ***
Zeinstra, C.G. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2015) Examining the examiners: an online eyebrow verification experiment inspired by FISWG. In: International Workshop on Biometrics and Forensics, IWBF 2015 , 3-4 March 2015, Gløvik, Norway. pp. 1-6. IEEE Computer Society. ISBN 978-1-4799-8105-2
Zeinstra, C.G. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2015) Beyond the eye of the beholder: on a forensic descriptor of the eye region. In: 23rd European Signal Processing Conference, EUSIPCO 2015, 31 Aug-04 Sep 2015, Nice. pp. 779-783. IEEE Signal Processing Society. ISBN 978-0-9928626-3-3

2014

Cordeiro, J. and van Sinderen, M.J., ed. (2014) Software Technologies - 8th International Joint Conference, ICSOFT 2013 : Revised Selected Papers. Communications in Computer and Information Science 457. Springer, Heidelberg. ISSN 1865-0929 ISBN 978-3-662-44919-6
Kordy, B. and Mauw, S. and Pieters, W., ed. (2014) Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, 12th April, 2014. EPTCS 148. EPTCS.ORG. ISSN 2075-2180
Abbasi, A. and Wetzel, J. (2014) APTs way: Evading Your EBNIDS. In: Black Hat Europe, 16-19 Oct 2014, Amsterdam, The Netherlands. pp. 1-87. Black Hat. ISBN not assigned
Abbasi, A. and Wetzel, J. and Bokslag, W. and Zambon, Emmanuele and Etalle, S. (2014) On Emulation-Based Network Intrusion Detection Systems. In: Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 17-19 September 2014, Gothenburg, Sweden. pp. 384-404. Lecture Notes in Computer Science 8688. Springer. ISSN 0302-9743 ISBN 978-3-319-11379-1
Akbar, N. (2014) Analysing Persuasion Principles in Phishing Emails. Master's thesis, University of Twente.
Ali, T. (2014) Biometric Score Calibration for Forensic Face Recognition. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 14-336 ISBN 978-90-365-3689-9
Ali, T. and Spreeuwers, L.J. and Veldhuis, R.N.J. and Meuwly, D. (2014) Biometric evidence evaluation: an empirical assessment of the effect of different training data. IET Biometrics, online pre-publication. pp. 1-12. ISSN 2047-4938 *** ISI Impact 0,764 ***
Ambusaidi, Mohammed A. and He, Xiangjian and Tan, Zhiyuan and Nanda, Priyadarsi and Lu, Liang Fu and Nagar, Upasana T. (2014) A novel feature selection approach for intrusion detection data classification. In: Proceedings of 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, 24-26 Sep 2014, Beijing, China. 246. IEEE Computer Society.
Ambusaidi, Mohammed A. and Tan, Zhiyuan and He, Xiangjian and Nanda, Priyadarsi and Lu, Liang Fu and Jamdagni, Aruna (2014) Intrusion detection method based on nonlinear correlation measure. International Journal of Internet Protocol Technology, 8 (2/3). pp. 77-86. ISSN 1743-8217
Amrin, N. (2014) The Impact of Cyber Security on SMEs. Master's thesis, Univ. of Twente.
Amrit, C. and Daneva, M. and Damian, D. (2014) Human factors in software development: On its underlying theories and the value of learning from related disciplines. A guest editorial introduction to the special issue. Information and software technology, 56 (12). pp. 1537-1542. ISSN 0950-5849 *** ISI Impact 1,569 ***
Andreeva, E. and Bilgin, B. and Bogdanov, A. and Luykx, A. and Mennink, B. and Mouha, N. and Yasuda, K. (2014) APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography. In: 21st International Workshop on Fast Software Encryption (FSE), 3-5 March 2014, London, UK. pp. 168-186. LNCS 8540. Springer Verlag. ISBN 978-3-662-46706-0
Armknecht, F. and Gagliardoni, T. and Katzenbeisser, S. and Peter, A. (2014) General Impossibility of Group Homomorphic Encryption in the Quantum World. In: 17th International Conference on Practice and Theory in Public-Key Cryptography. PKC 2014, 26-28 Mar 2014, Buenos Aires, Argentina. pp. 556-573. Lecture Notes in Computer Science 8383. Springer Verlag. ISBN 978-3-642-54630-3
Arnold, F. and Pieters, W. and Stoelinga, M.I.A. (2014) Quantitative Penetration Testing with Item Response Theory. Journal of Information Assurance and Security, 9 (3). pp. 118-127. ISSN 1554-1010
Baartmans, C. and Meuwly, D. and Kosta, E. (2014) Privacy of fingermarks data in forensic science: forensic evaluation and individual data protection. In: Proceedings of the 9th International Conference on Forensic Inference and Statistics, ICFIS 2014, 19-22 Aug 2014, Leiden. pp. 1-1. Netherlands Forensic Institute. ISBN not assigned
Badarinath Hampiholi, B. (2014) Secure and privacy-preserving national eID systems with Attribute-based credential technologies. Master's thesis, Univ. of Twente.
Bakalova, Z. (2014) Towards the understanding the value-creation in agile projects. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 13-288 ISBN 978-90-365-3605-9
Bösch, C.T. and Hartel, P.H. and Jonker, W. and Peter, A. (2014) A Survey of Provably Secure Searchable Encryption. ACM computing surveys, 47 (2). 18:1-18:51. ISSN 0360-0300 *** ISI Impact 5,243 ***
Bösch, C.T. and Peter, A. and Hartel, P.H. and Jonker, W. (2014) SOFIR: Securely Outsourced Forensic Image Recognition. In: 39th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2014, May 4-9, 2014, Florence, Italy. pp. 2694-2698. IEEE. ISBN 978-1-4799-2893-4
Bösch, C.T. and Peter, A. and Leenders, B. and Lim, Hoon Wei and Tang, Qiang and Wang, Huaxiong and Hartel, P.H. and Jonker, W. (2014) Distributed Searchable Symmetric Encryption. In: Twelfth Annual International Conference on Privacy, Security and Trust, PST 2014, 23-24 July 2014, Toronto, Canada. pp. 330-337. IEEE. ISBN 978-1-4799-3502-4
Biedermann, S. and Karvelas, N. and Katzenbeisser, S. and Strufe, T. and Peter, A. (2014) ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation. In: Proceedings of the 40th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2014), 26-29 Jan 2014, Nový Smokovec, Slovakia. pp. 114-125. Lecture Notes in Computer Science 8327. Springer Verlag. ISBN 978-3-319-04297-8
Bilgin, B. and Gierlichs, B. and Nikov, V. and Nikova, S.I. and Rijmen, V. (2014) Higher-Order Threshold Implementation. In: Proceedings of Advances in Cryptology (ASIACRYPT), 07-11 Dec 2014, Kaohsiung, Taiwan (R.O.C.). pp. 326-343. Lecture Notes in Computer Science (8874). Springer Verlag. ISSN 0302-9743 ISBN 978-3-662-45607-1
Bilgin, B. and Gierlichs, B. and Nikova, S.I. and Nikov, V. and Rijmen, V. (2014) A More Efficient AES Threshold Implementation. In: Proceedings of 7th International Conference on Cryptology in Africa (AfricaCrypt), 28-30 May 2014, Marrakesh, Morocco. pp. 267-284. Lecture Notes in Computer Science 8469. Springer. ISBN 978-3-319-06733-9
Bortolameotti, R. (2014) C&C Botnet detection over SSL. Master's thesis, Univ. of Twente.
Bosems, S. and van Sinderen, M.J. (2014) Improving context-aware applications for the well-being domain: Model-driven design guided by medical knowledge. In: Proceedings of the third International Conference on Sensor Networks, SENSORNETS 2014, 7-9 Jan 2014, Lisbon, Portugal. pp. 397-403. INSTICC. ISBN 978-989-758-001-7
Bosems, S. and van Sinderen, M.J. (2014) Models in the design of context-aware well-being applications. In: On the Move to Meaningful Internet Systems, OnTheMove 2014, 27-31 Oct 2014, Amantea, Italy. pp. 37-42. Lecture Notes in Computer Science (8842). Springer. ISSN 0302-9743 ISBN 978-3-662-45549-4
Broekhuis, D. (2014) Sousveillance on Intelligent Transportations Systems. Master's thesis, University of Twente.
Broenink, R. (2014) Finding Relations Between Botnet C&Cs for Forensic Purposes. Master's thesis, Univ. of Twente.
Buchenscheit, A. and Könings, B. and Neubert, A. and Schaub, F. and Schneider, M. and Kargl, F. (2014) Privacy implications of presence sharing in mobile messaging applications. In: Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia (IEEE MUM 2014), 25-28 Sept 2014, Melbourne, Victoria, Australia. pp. 20-29. ACM. ISBN 978-1-4503-3304-7
Campos, G.M.M. and Rosa, N.S. and Ferreira Pires, L. (2014) A Survey of formalization approaches to service composition. In: IEEE International Conference on Services Computing, SCC 2014 , 27 Jun - 02 Jul 2014, Alaska, USA. pp. 179-186. IEEE Computer Society. ISBN 978-1-4799-5065-2
Cardoso de Moraes, J.L. (2014) Methodological Support to Develop Interoperable Applications for Pervasive Healthcare. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 14-321 ISBN 978-90-365-3729-2
Cardoso de Moraes, J.L. and Lopes de Souza, W. and Ferreira Pires, L. and Francisco do Prado, A. (2014) An Architecture for Health Information Exchange in Pervasive Healthcare Environment. In: Enterprise Information Systems. Lecture Notes in Business Information Processing 190. Springer International Publishing Switzerland, Switzerland, pp. 384-401. ISSN 1865-1348 ISBN 978-3-319-09491-5
Caselli, M. and Kargl, F. (2014) A Security Assessment Methodology for Critical Infrastructures. In: Critical Information Infrastructures Security: Ninth International Conference, CRITIS 2014, 13-15 Oct 2014, Limassol, Cyprus. pp. 332-343. Critical Information Infrastructures Security. Springer Verlag. ISBN 978-3-319-31663-5
Chomsiri, Thawatchai and He, Xiangjian and Nanda, Priyadarsi and Tan, Zhiyuan (2014) A stateful mechanism for the tree-rule firewall. In: Proceedings of 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, 24-26 Sep 2014, Beijing, China. 256. IEEE Computer Society.
Condori-Fernández, N. and Espana, S. and Sikkel, K. and Daneva, M. and Gonzlez, A. (2014) Analyzing the Effect of the Collaborative Interactions on Performance of Requirements Validation. In: 20th International Working Conference on Requirements Engineering: Foundation for Software Quality, 7-10 April 2014, Essen, Germany. pp. 216-231. Lecture Notes in Computer Science 8396. Springer Verlag. ISSN 0302-9743
Constante, E. and den Hartog, J.I. and Petkovic, M. and Etalle, S. and Pechenizkiy, M. (2014) Hunting the Unknown. In: 28th Annual IFIP WG 11.3 Working ConferenceData and Applications Security and Privacy (DBSec), July 14-16, 2014, Vienna, Austria. pp. 243-259. Lecture Notes in Computer Science 8566. Springer. ISBN 978-3-662-43936-4
Corradin, M.C. (2014) Then and Now: On The Maturity of Cybercrime Markets. Master's thesis, University of Twente.
Dacer, M.C. and Kargl, F. and König, H. and Valdes, A. (2014) Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292). Dagstuhl Reports, 4 (7). pp. 62-79. ISSN 2192-5283
Dacier, M.C and Kargl, F. and van der Heijden, R. and König, H. and Valdes, A. (2014) Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures. Informatik Spektrum, 37 (6). pp. 605-607. ISSN 0170-6012
Daneva, M. (2014) Understanding Functional Reuse of ERP Requirements in the Telecommunication Sector: an Empirical Study. In: 2014 Joint Conference of the International Workshop on Software Measurement and the International Conference on Software Process and Product Measurement, IWSM-Mensura 2014, 6-8 Oct 2014 , Rotterdam, The Netherlands. pp. 216-221. IEEE Computer Society. ISBN 978-1-4799-4174-2
Daneva, M. (2014) How practitioners approach gameplay requirements? An exploration into the context of massive multiplayer online role-playing games. In: 2014 IEEE 22nd International Requirements Engineering Conference, RE 2014, 23-26 Aug 2014, Karlskrona, Sweden. pp. 3-12. IEEE Computer Society. ISBN 978-1-4799-3031-9
Daneva, M. and Berntsson Svensson, R. and Marczak, S. and Franch, X. and Madhavji, N. (2014) Welcome from the Workshop Chairs. In: Fourth International Workshop on Empirical Requirements Engineering, EmpiRE 2014, 25 Aug 2014, Karlskrona, Sweden. pp. 1-3. IEEE Computer Society. ISBN 978-1-4799-6337-9
Daneva, M. and Damian, D. and Marchetto, A. and Pastor, O. (2014) Empirical research methodologies and studies in Requirements Engineering: How far did we come? Journal of systems and software, 95 (12). pp. 1-9. ISSN 0164-1212 *** ISI Impact 1,424 ***
Daneva, M. and Herrmann, A. and Buglione, L. (2014) Understanding quality requirements engineering in contract-based projects from the perspective of software architects: an exploratory study. In: Relating System Quality and Software Architecture. Morgan Kaufmann, Amsterdam, pp. 325-357. ISBN 9780124170094
Daneva, M. and Marczak, S. and Herrmann, A. (2014) Engineering of quality requirements as perceived by near-shore development centers' architects in eastern Europe: the hole in the whole. In: Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2014, 18-21 Sep 2014, Torino, Italy. pp. 191-200. ACM. ISBN 978-1-4503-2774-9
Davelaar, K.I. (2014) Protecting high school students from bullying: Bully Shield. Master's thesis, University of Twente.
Dechesne, F. and Hadžiosmanović, D. and Pieters, W. (2014) Experimenting with Incentives: Security in Pilots for Future Grids. IEEE Security & Privacy, 12 (6). pp. 59-66. ISSN 1540-7993 *** ISI Impact 0,902 ***
Dietzel, S. and Gürtler, J.Y. and van der Heijden, R. and Kargl, F. (2014) Redundancy-based Statistical Analysis for Insider Attack Detection in VANET Aggregation Schemes. In: Proceedings of the IEEE Vehicular Networking Conference 2014 (VNC 2014), 3-5 Dec 2014, Paderborn, Germany. pp. 135-142. IEEE. ISBN 978-1-4799-7660-7
Dietzel, S. and van der Heijden, R. and Decke, H and Kargl, F. (2014) A flexible, subjective logic-based framework for misbehavior detection in V2V networks. In: IEEE 15th International Symposium on A World of Wireless, Mobile and Multimedia Networks, WoWMoM 2014, 16-19 Jun 2014, Sydney, Australia. pp. 513-516. IEEE. ISBN 978-1-4799-4785-0
Dietzel, S. and Petit, J.Y. and Kargl, F. and Scheuermann, B. (2014) In-Network Aggregation for Vehicular Ad Hoc Networks. IEEE communications surveys & tutorials, 16 (4). pp. 1909-1932. ISSN 1553-877X *** ISI Impact 9,220 ***
Duipmans, E.F. and Ferreira Pires, L. and Bonino da Silva Santos, L.O. (2014) A transformation-based approach to business process management in the cloud. Journal of Grid Computing, 12 (2). pp. 191-219. ISSN 1570-7873 *** ISI Impact 1,561 ***
Dutta, A. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2014) Automatic Eye Detection Error as a Predictor of Face Recognition Performance. In: 35rd WIC Symposium on Information Theory in the Benelux, 12-13 May 2014, Eindhoven, Netherlands. pp. 89-96. Centre for Telematics and Information Technology, University of Twente. ISBN 978-90-365-3383-6
Dutta, A. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2014) A Bayesian model for predicting face recognition performance using image quality. In: 2014 IEEE International Joint Conference on Biometrics (IJCB), 29 Sep - 02 Oct 2014, Clearwater, FL, USA. pp. 1-8. IEEE. ISBN 978-1-4799-3584-0
Ehrich, F. and Amrit, C. and Daneva, M. (2014) Cooperation between information system development and operations: a literature review. In: Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2014, 18-21 Sep 2014, Torino, Italy. pp. 1-1. ACM. ISBN 978-1-4503-2774-9
Engelsman, W. and Wieringa, R.J. (2014) Understandability of Goal-Oriented Requirements Engineering Concepts for Enterprise Architects. In: 26th International Conference on Advanced Information Systems Engineering, CAiSE 2014, 16-20 Jun 2014, Thessaloniki, Greece. pp. 105-119. Lecture Notes in Computer Science 8484. Springer. ISBN 978-3-319-07880-9
Engelsman, W. and Wieringa, R.J. (2014) Understandability of Goal Concepts by Requirements Engineering Experts. In: Advances in conceptual modeling: ER 2014 Workshops, ENMO, MoBiD, MReBA, QMMQ, SeCoGIS, WISM, and ER Demos, 27-29 Oct 2014, Atlanta, USA. pp. 97-106. Lecture Notes in Computer Science 8823. Springer Verlag. ISBN 978-3-319-12255-7
Erich, F. and Amrit, C. and Daneva, M. (2014) A Mapping Study on Cooperation between Information System Development and Operations. In: 15th International Conference on Product-Focused Software Process Improvement, PROFES 2014, 10-12 Dec 2014, Helsinki, Finland. pp. 277-280. Lecture Notes in Computer Science 8892. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-13834-3
Etalle, S. and Zannone, N. (2014) Understanding computer security. Frontiers in ICT, 1 (3). pp. 1-2. ISSN 2297-198X
Förster, D. and Kargl, F. and Löhr, H. (2014) PUCA: A Pseudonym Scheme with User-Controlled Anonymity for Vehicular Ad-Hoc Networks (VANET). In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2014), 3-5 Dec 2014, Paderborn, Germany. pp. 25-32. IEEE. ISBN 978-1-4799-7660-7
Feiri, M.P. and Petit, J.Y. and Kargl, F. (2014) Real world privacy expectations in VANETs real world privacy expectations in VANETs. In: Proceedings of the 2nd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2014), 20-21 Feb 2014, Luxembourg City, Luxembourg. pp. 30-32. Vehicular Lab, University of Luxembourg. ISBN 978-2-87971-124-9
Feiri, M.P. and Petit, J.Y. and Kargl, F. (2014) An evaluation framework for pre-distribution strategies of certificates in VANETs. In: Proceedings of 2nd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2014), 20-21 February 2014, Luxembourg City, Luxembourg. pp. 22-23. Vehicular Lab, University of Luxemburg. ISBN 978-2-87971-124-9
Feiri, M.P. and Petit, J.Y. and Kargl, F. (2014) Formal Model of Certificate Omission Schemes in VANET. In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2014), 3-5 Dec 2014, Paderborn, Germany. pp. 41-44. IEEE. ISBN 978-1-4799-7660-7
Folmer, E.J.A. and van Sinderen, M.J. and Oude Luttighuis, P.H.W.M. (2014) Enterprise interoperability: information, services and processes for the interoperable economy and society. Information Systems and e-Business Management, 12 (4). pp. 491-494. ISSN 1617-9846 *** ISI Impact 0,953 ***
van Galen, R. (2014) Design and feasibility of mobile peer-to-peer payment systems. Master's thesis, University of Twente.
Günther, F. and Manulis, M. and Peter, A. (2014) Privacy-enhanced participatory sensing with collusion resistance and data aggregation. In: 13th International Conference on Cryptology and Network Security (CANS 2014), 22-24 Oct 2014, Heraklion, Crete, Greece. pp. 321-336. Lecture Notes in Computer Science 8813. Springer Verlag. ISBN 978-3-319-12279-3
Gielen, M.W. (2014) Prioritizing Computer Forensics Using Triage Techniques. Master's thesis, University of Twente.
Gong, Zheng and Hartel, P.H. and Nikova, S.I. and Tang, Shao-Hua and Zhu, Bo (2014) TuLP:A family of lightweight message authentication codes for body sensor networks. Journal of Computer Science and Technology, 29 (1). pp. 53-68. ISSN 1000-9000 *** ISI Impact 0,475 ***
Hadžiosmanović, D. (2014) The process matters: cyber security in industrial control systems. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 13-282 ISBN 978-90-365-3604-2
Hadžiosmanović, D. and Sommer, R. and Zambon, Emmanuele and Hartel, P.H. (2014) Through the eye of the PLC: semantic security monitoring for industrial processes. In: ACSAC'14 Proceedings of the 30th Annual Computer Security Applications Conference, 8-12 Dec 2014, New Orleans, LA, USA. pp. 126-135. ACM. ISBN 978-1-4503-3005-3
Haraksim, R. (2014) Validation of Likelihood Ratio Methods Used for Forensic Evidence Evaluation: Application in Forensic Fingerprints. PhD thesis, Univ. of Twente. CTIT Ph.D.-thesis series No. 13-302 ISBN 978-90-365-3648-6
He, Xiangjian and Chomsiri, Thawatchai and Nanda , Priyadarsi and Tan, Zhiyuan (2014) Improving cloud network security using tree-rule firewall. Future Generation Computer Systems, 30. pp. 116-126. ISSN 0167-739X *** ISI Impact 2,430 ***
van der Heijden, R.W. and Kargl, F. (2014) Open issues in differentiating misbehavior and anomalies for VANETs. In: Proceedings of 2nd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2014), 20-21 Feb 2014, Luxembourg City, Luxembourg. pp. 24-26. Vehicular Lab, University of Luxembourg. ISBN 978-2-87971-124-9
Hendrikse, A.J. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2014) Likelihood ratio based verification in high dimensional spaces. IEEE transactions on pattern analysis and machine intelligence, 36 (1). pp. 127-139. ISSN 0162-8828 *** ISI Impact 6,077 ***
Hillerström, F.H.J. and Kumar, A. and Veldhuis, R.N.J. (2014) Generating and analyzing synthetic finger vein images. In: Proceedings of the 13th International Conference of the Biometrics Special Interest Group, BIOSIG 2014, 10-12 Sep 2014, Darmstadt, Germany. pp. 121-132. Lecture Notes in Informatics (LNI) P-230. Gesellschaft für Informatik. ISSN 1617-5468 ISBN 978-3-88579-624-4
Iacob, M.-E. and Meertens, L.O. and Jonkers, H. and Quartel, D.A.C. and Nieuwenhuis, L.J.M. and van Sinderen, M.J. (2014) From enterprise architecture to business models and back. Software & Systems Modeling, 13 (3). pp. 1059-1083. ISSN 1619-1366 *** ISI Impact 0,990 ***
Ionita, D. (2014) Context-sensitive Information security Risk identification and evaluation techniques. In: 22nd IEEE International Requirements Engineering Conference (RE14), 25-29 Aug. 2014, Karlskrona, Sweden. pp. 485-488. IEEE Computer Society. ISBN 978-1-4799-3033-3
Ionita, D. and Bullee, J.H. and Wieringa, R.J. (2014) Argumentation-Based Security Requirements Elicitation: The Next Round. In: Proceedings of the 2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE), 25 August 2014, Karlskrona, Sweden. pp. 7-12. IEEE Computer Society. ISBN 978-1-4799-6340-9
Ionita, D. and Koenen, S. K. and Wieringa, R.J. (2014) Modelling telecom fraud with e3value. Technical Report TR-CTIT-14-11, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Jan, Mian Ahmad and Nanda, Priyadarsi and He, Xiangjian and Tan, Zhiyuan and Liu, Ren Ping (2014) A robust authentication scheme for observing resources in the internet of things environment. In: Proceedings of 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, 24-26 Sep 2014, Beijing, China. 370. IEEE Computer Society.
Jeckmans, A.J.P. (2014) Cryptographically-Enhanced Privacy for Recommender Systems. PhD thesis, Univ. of Twente. CTIT Ph.D.-thesis series No. 13-290 ISBN 978-90-365-3593-9
Johnson, P. and Iacob, M.-E. and Välja, M. and van Sinderen, M.J. and Magnusson, C. and Ladhe, T. (2014) A method for predicting the probability of business network profitability. Information Systems and e-Business Management, 12 (4). pp. 567-593. ISSN 1617-9846 *** ISI Impact 0,953 ***
Kargl, F. and van der Heijden, R. and König, H. and Valdes, A. and Dacier, M.C. (2014) Insights on the Security and Dependability of Industrial Control Systems. IEEE Security and Privacy Magazine, 12 (6). pp. 75-78. ISSN 1540-7993 *** ISI Impact 0,902 ***
Karvelas, N. and Peter, A. and Katzenbeisser, S. and Tews, E. and Hamacher, K. (2014) Privacy preserving whole genome sequence processing through proxy-aided ORAM. In: 13th Annual ACM Workshop on Privacy in the Electronic Society (WPES 2014), 3-7 Nov 2014, Scottsdale, AZ, USA. pp. 1-10. ACM. ISBN 978-1-4503-3148-7
Kegel, R.H.P. (2014) Development and Validation of a Personal Information Security Assistant Architecture. Master's thesis, University of Twente.
Kegel, R.H.P. and Wieringa, R.J. (2014) Persuasive technologies: a systematic literature review and application to PISA. Technical Report TR-CTIT-14-07, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Knapik, P. and Petit, J.Y. and Kargl, F. and Schoch, E. (2014) Cooperative home light: assessment of a security function for the automotive field. International Journal on Advances in Security, 7 (1&2). pp. 1-14. ISSN 1942-2636
Lastdrager, E.E.H. (2014) Achieving a Consensual Definition of Phishing Based on a Systematic Review of the Literature. Crime Science, 3. 9:1-9:16. ISSN 2193-7680
Li, Wenjuan and Meng, Weizhi and Tan, Zhiyuan and Xiang, Yang (2014) Towards designing an email classification system using multi-view based semi-supervised learning. In: Proceedings of 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, 24-26 Sep 2014, Beijing, China. 266. IEEE Computer Society.
Mahmood, Z. and Ali, T. and Khattak, S. and Hasan, L. and Khan, S.U. (2014) Automatic player detection and identification for sports entertainment applications. Pattern Analysis and Applications, 18 (4). pp. 971-982. ISSN 1433-7541 *** ISI Impact 1,104 ***
Makri, E. and Everts, M.H. and de Hoogh, S. and Peter, A. and op den Akker, H. and Hartel, P.H. and Jonker, W. (2014) Privacy-Preserving Verification of Clinical Research. In: Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19-21 Mar 2014, Wien, Österreich. pp. 481-500. Lecture Notes in Informatics (LNI). Gesellschaft für Informatik e.V.. ISBN 978-3-88579-622-0
Medeiros, R.W.A. and Rosa, N.S. and Campos, G.M.M. and Ferreira Pires, L. (2014) A survey of cost accounting in service-oriented computing. In: IEEE World Congress on Services, SERVICES 2014, 27 Jun - 02 Jul 2014, Alaska, USA. pp. 77-84. IEEE Computer Society. ISBN 978-1-4799-5068-3
de Medeiros, R.W.A. and Rosa, N.S. and Ferreira Pires, L. (2014) A metamodel for modeling cost behavior in service composition. In: 11th ACS/IEEE International Conference on Computer Systems and Applications, AICSSA 2014, 10-13 Nov 2014, Doha, Qatar. pp. 84-91. IEEE eXpress Conference Publishing. ISBN 978-1-4799-7100-8
Mehmood, Z. and Ali, T. and Khattak, S. and Khan, S. (2014) A comparative study of baseline algorithms of face recognition. In: 12th International Conference on Frontiers of Information Technology, FIT 2014, 17-19 Dec 2014, Islamabad, Pakistan. pp. 263-268. IEEE Computer Society. ISBN 978-1-4799-7505-1
Mendez, D. and Ognawala, S. and Wagner, S. and Daneva, M. (2014) Where do we stand in requirements engineering improvement today? First results from a mapping study. In: Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2014, 18-21 Sep 2014, Torino, Italy. pp. 1-4. ACM. ISBN 978-1-4503-2774-9
Meuwly, D. (2014) Forensic use of fingermarks and fingerprints. In: Encyclopedia of Biometrics. Springer Verlag, London, pp. 1-15. ISBN 978-3-642-27733-7
Meuwly, D. and Veldhuis, R.N.J. (2014) Biometrics — Developments and Potential. In: Wiley Encyclopedia of Forensic Science. John Wiley & Sons Ltd, Chichester, UK, pp. 1-8. ISBN 978-0-47006-158-9
Mu, Meiru and Spreeuwers, L.J. and Veldhuis, R.N.J. (2014) Face identification in videos from mobile cameras. In: Proceedings of Netherlands Conference on Computer Vision, NCCV 2014, 24-25 April 2014, Ermelo, The Netherlands. pp. 1-4. ASCI. ISBN not assigned
Neisse, R. and Wegdam, M. and van Sinderen, M.J. (2014) Trust management support for context-aware service platforms. In: User-Centric Networking - Future Perspectives. Lecture Notes in Social Networks. Springer International Publishing, Switzerland, pp. 75-106. ISSN 2190-5428 ISBN 978-3-319-05217-5
Parthasarathy, S. and Daneva, M. (2014) Customer requirements based ERP customization using AHP technique. Business Process Management Journal , 20 (5). pp. 730-751. ISSN 1463-7154
Petit, J.Y. and Feiri, M.P. and Kargl, F. (2014) Revisiting attacker model for smart vehicles. In: IEEE 6th International Symposium on Wireless Vehicular Communications (WiVeC 2014), 14-15 Sept 2014, Vancouver, Canada. pp. 1-5. IEEE. ISBN 978-1-4799-4452-1
Pieters, W. and Hadžiosmanović, D. and Dechesne, F. (2014) Cyber Security as Social Experiment. In: NSPW '14 Proceedings of the 2014 workshop on New Security Paradigms, NSPW 2014, 15-18 Sep. 2014, Victoria, BC, Canada. pp. 15-24. ACM. ISBN 978-1-4503-3062-6
Pieters, W. and Hadžiosmanović, D. and Lenin, A. and Montoya Morales, A.L. and Willemson, J. (2014) TREsPASS: Plug-and-Play Attacker Profiles for Security Risk Analysis (Poster). In: 35th IEEE Symposium on Security and Privacy, May 17-18, 2014, San Jose, California. IEEE Computer Society. ISBN not assigned
Pieters, W. and Lukszo, Z. and Hadžiosmanović, D. and van den Berg, Jan (2014) Reconciling Malicious and Accidental Risk in Cyber Security. Journal of Internet Services and Information Security, 4 (2). pp. 4-26. ISSN 2182-2069
Pieters, W. and Probst, C.W. and Lukszo, S. and Montoya Morales, A.L. (2014) Cost-effectiveness of Security Measures: A model-based Framework. In: Approaches and Processes for Managing the Economics of Information Systems. IGI Global, Hershey, PA, pp. 139-156. ISBN 978-1-4666-4983-5
van Sinderen, M.J. and Ferreira Pires, L. and Iacob, M.-E. (2014) Message from the 3M4SE 2014 Workshop Chairs. In: 18th IEEE International Enterprise Distributed Object Computing Conference Workshops and Demonstrations, EDOCW 2014, 1-2 Sep 2014, Ulm, Germany. pp. 333-334. IEEE. ISBN 978-1-4799-5470-4
Singh, P.M. (2014) Developing a Service Oriented IT Platform for Synchromodal Transportation. In: On the Move to Meaningful Internet Systems, OTM 2014 Workshops, 27-31 Oct 2014, Calabria, Rome. pp. 30-36. Lecture Notes in Computer Science Volume 8842 (8842). Springer Verlag. ISSN 0302-9743
Singh, P.M. and Jonkers, H. and Iacob, M.-E. and van Sinderen, M.J. (2014) Modeling value creation with enterprise architecture. In: Sixteenth International Conference on Enterprise Information Systems, ICEIS 2014, Volume 3, 27-30 Apr 2014, Lisbon, Portugal. pp. 343-351. SciTePress. ISBN 978-989-758-029-1
Spreeuwers, L.J. (2014) Derivation of LDA log likelihood ratio one-to-one classifier. University of Twente Students Journal of Biometrics and Computer Vision, 2014 (1). 5. ISSN 2451-9642
Spreeuwers, L.J. and Veldhuis, R.N.J. and Sultanali, S. and Diephuis, J. (2014) Fixed FAR Vote Fusion of regional Facial Classifiers. In: BIOSIG 2014: Proceedings of the 13th International Conference of the Biometrics Special Interest Group, 11-13 September 2014, Darmstadt, Germany. pp. 1-4. IEEE. ISBN 978-3-88579-624-4
Stottelaar, B. and Senden, J. and Montoya Morales, A.L. (2014) Online social sports networks as crime facilitators. Crime Science, 3 (8). pp. 1-20. ISSN 2193-7680
Tan, Zhiyuan and Jamdagni, Aruna and He, Xiangjian and Nanda, Priyadarsi and Liu, Ren Ping (2014) A system for denial-of-service attack detection based on multivariate correlation analysis. IEEE Transactions on Parallel and Distributed Systems, 25 (2). pp. 447-456. ISSN 1045-9219 *** ISI Impact 2,661 ***
Tan, Zhiyuan and Nagar, Upasana T. and He, Xiangjian and Nanda, Priyadarsi and Liu, Ren Ping and Wang, Song and Hu, Jiankun (2014) Enhancing big data security with collaborative intrusion detection. IEEE Cloud Computing, 1 (3). pp. 27-33. ISSN 2325-6095
Tistarelli, M. and Grosso , E. and Meuwly, D. (2014) Biometrics in Forensic Science: Challenges, Lessons and New Technologies. In: Biometric Authentication. Lecture Notes in Computer Science 8897. Springer Verlag, Switzerland, pp. 153-164. ISBN 978-3-319-13386-7
Trivellato, D. and Zannone, N. and Etalle, S. (2014) GEM: A distributed goal evaluation algorithm for trust management. Theory and Practice of Logic Programming, 14 (3). pp. 293-337. ISSN 1471-0684 *** ISI Impact 0,952 ***
Veneberg, R.K.M. and Iacob, M.-E. and van Sinderen, M.J. and Bodenstaff, L. (2014) Enterprise architecture intelligence. In: Eighteenth IEEE International Enterprise Distributed Object Computing Conference, EDOC 2014, 3-5 Sep 2014, Ulm, Germany. pp. 22-31. IEEE Computer Society. ISSN 1541-7719 ISBN 978-1-4799-5470-4
Venezian Povoa, L. and Lopes de Souza, W. and Ferreira Pires, L. and do Prado, A.F. (2014) An approach to the decomposition of business processes for execution in the cloud. In: 11th ACS/IEEE International Conference on Computer Systems and Applications, AICSSA 2014, 10-13 Nov 2014, Doha, Qatar. pp. 470-477. IEEE eXpress Conference Publishing. ISBN 978-1-4799-7100-8
Verbij, R.P. (2014) Dutch e-voting opportunities. Risk assessment framework based on attacker resources. Master's thesis, Univ. of Twente.
Vriezekolk, E. (2014) Testing reliability of raster - report of experiment with Kerckhoffs students. Technical Report TR-CTIT-14-05, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Wang, Lei and Wombacher, A. and Ferreira Pires, L. and van Sinderen, M.J. and Chi, Chi-Hung (2014) A collaborative processes synchronization method with regard to system crashes and network failures. In: 29th Symposium on Applied Computing, SAC 2014, 24-28 Mar 2014, Gyeongju, Korea. pp. 1393-1398. ACM. ISBN 978-1-4503-2469-4
Wang, Ruifang and Ramos, D. and Veldhuis, R.N.J. and Fierrez, J. and Spreeuwers, L.J. and Xu, Haiyun (2014) Regional fusion for high-resolution palmprint recognition using spectral minutiae representation. IET Biometrics, 3 (2). pp. 94-100. ISSN 2047-4938 *** ISI Impact 0,764 ***
Wieringa, R.J. (2014) Empirical research methods for technology validation: Scaling up to practice. Journal of systems and software, 95. pp. 19-31. ISSN 0164-1212 *** ISI Impact 1,424 ***
Wieringa, R.J. (2014) Design science methodology for information systems and software engineering. Springer Verlag, London. ISBN 978-3-662-43838-1
Wieringa, R.J. (2014) Towards middle-range usable design theories for software engineering. In: Proceedings of the 3rd SEMAT Workshop on General Theories of Software Engineering, GTSE 2014, 31 may - 7 june 2014, Hyderabad, India. pp. 1-4. ACM. ISBN 978-1-4503-2850-0
Zeinstra, C.G. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2014) Towards the automation of forensic facial individualisation: Comparing forensic to non forensic eyebrow features. In: Proceedings of the 35th WIC Symposium on Information Theory in the Benelux, 12-13 May 2014, Eindhoven, Netherlands. pp. 73-80. Centre for Telematics and Information Technology, University of Twente. ISBN 978-90-365-3383-6