EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


Research Program: UT-CST: Crime Science Twente
Home Policy Brochure Browse Search User Area Contact Help

2017

Junger, M. and Montoya Morales, A.L. and Overink, F.J. (2017) Priming and warnings are not effective to prevent social engineering attacks. Computers in Human Behavior, 66. pp. 75-87. ISSN 0747-5632 *** ISI Impact 2,880 ***

2016

Bullee, J.H. and Montoya Morales, A.L. and Junger, M. and Hartel, P.H. (2016) Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention. In: Proceedings of the inaugural Singapore Cyber Security R&D Conference (SG-CRC 2016), 14-15 Jan 2016, Singapore, Singapore. pp. 107-114. Cryptology and Information Security Series 14. IOS Press. ISSN 1871-6431 ISBN 978-1-61499-616-3
Hartel, P.H. and Junger, M. (2016) Book review: Crime and Everyday Life by Marcus Felson and Mary Eckert, 5th edition. Crime Science, 5. 10:1-10:3. ISSN 2193-7680
Jung, O. and Besser, S. and Ceccarelli, A. and Zoppi, T. and Vasenev, A. and Montoya Morales, A.L. and Clarke, T. and Chappell, K. (2016) Towards a Collaborative Framework to Improve Urban Grid Resilience. In: Proceedings of the IEEE International Energy Conference, ENERGYCON 2016, 4-8 Apr 2016, Leuven, Belgium. pp. 1-6. IEEE. ISBN 978-1-4673-8464-3
Le, Anhtuan and Chen, Yue and Chai, Kok Keong and Vasenev, A. and Montoya Morales, A.L. (2016) Assessing loss event frequencies of smart grid cyber threats: Encoding flexibility into FAIR using Bayesian network approach. In: 1st EAI International Conference on Smart Grid Inspired Future, 19-20 May 2016, Liverpool, United Kingdom. pp. 43-51. Springer Verlag. ISBN 978-3-319-47729-9
Montoya Morales, A.L. and Junger, M. and Ongena, Y.P. (2016) The Relation Between Residential Property and its Surroundings and Day- and Night-Time Residential Burglary. Environment and behavior, 48 (4). pp. 515-549. ISSN 0013-9165 *** ISI Impact 2,892 ***
Vasenev, A. and Montoya Morales, A.L. (2016) Analysing non-malicious threats to urban smart grids by interrelating threats and threat taxonomies. In: 2016 IEEE International Smart Cities Conference (ISC2), 12-15 Sept 2016, Trento, Italy. pp. 1-4. IEEE. ISBN 978-1-5090-1847-5
Vasenev, A. and Montoya Morales, A.L. and Ceccarelli, A. (2016) A Hazus-Based Method for Assessing Robustness of Electricity Supply to Critical Smart Grid Consumers during Flood Events. In: 11th International Conference on Availability, Reliability and Security, ARES 2016, 31 Aug - 02 Sept 2016, Salzburg, Austria. pp. 223-228. IEEE. ISBN 978-1-5090-0990-9
Vasenev, A. and Montoya Morales, A.L. and Ceccarelli, A. and Le, A. and Ionita, D. (2016) Threat navigator: grouping and ranking malicious external threats to current and future urban smart grids. In: 1st EAI International Conference on Smart Grid Inspired Future, 19-20 May 2016, Liverpool, United Kingdom. pp. 184-192. Springer Verlag. ISBN 978-3-319-47729-9

2015

Bullee, J.H. and Montoya Morales, A.L. and Pieters, W. and Junger, M. and Hartel, P.H. (2015) The persuasion and security awareness experiment: reducing the success of social engineering attacks. Journal of Experimental Criminology, 11 (1). pp. 97-115. ISSN 1573-3750 *** ISI Impact 2,229 ***
Bullee, J.H. and Montoya Morales, A.L. and Pieters, W. and Junger, M. and Hartel, P.H. (2015) Regression Nodes: Extending attack trees with data from social sciences. In: Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015), 13 Jul 2015, Verona, Italy. pp. 17-23. IEEE Computer Society. ISBN 978-1-5090-0178-1
Ionita, D. and Wieringa, R.J. and Bullee, J.H. and Vasenev, A. (2015) Tangible Modelling to Elicit Domain Knowledge: An Experiment and Focus Group. In: 34th International Conference on Conceptual Modeling, ER 2015, 19-22 Oct 2015, Stockholm, Sweden. pp. 558-565. Lecture Notes in Computer Science 9381. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-25263-6
Lastdrager, E.E.H. and Hartel, P.H. and Junger, M. (2015) Apate: Anti-Phishing Analysing and Triaging Environment (Poster). In: 36th IEEE Symposium on Security and Privacy, 18-21 May 2015, San Jose, CA, USA. IEEE Computer Society. ISBN not assigned
Montoya Morales, A.L. (2015) Modelling urban crime through workforce size: a test of the activity support concept. Environment and Planning B: Planning and Design, 42 (3). pp. 399-414. ISSN 0265-8135 *** ISI Impact 1,195 ***
Spreeuwers, L.J. (2015) Setting a world record in 3D face recognition. De Vonk, 33 (4). pp. 11-21. ISSN 0925-5427

2014

Dechesne, F. and Hadžiosmanović, D. and Pieters, W. (2014) Experimenting with Incentives: Security in Pilots for Future Grids. IEEE Security & Privacy, 12 (6). pp. 59-66. ISSN 1540-7993 *** ISI Impact 0,902 ***
Ionita, D. and Bullee, J.H. and Wieringa, R.J. (2014) Argumentation-Based Security Requirements Elicitation: The Next Round. In: Proceedings of the 2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE), 25 August 2014, Karlskrona, Sweden. pp. 7-12. IEEE Computer Society. ISBN 978-1-4799-6340-9
Lastdrager, E.E.H. (2014) Achieving a Consensual Definition of Phishing Based on a Systematic Review of the Literature. Crime Science, 3. 9:1-9:16. ISSN 2193-7680
Pieters, W. and Hadžiosmanović, D. and Dechesne, F. (2014) Cyber Security as Social Experiment. In: NSPW '14 Proceedings of the 2014 workshop on New Security Paradigms, NSPW 2014, 15-18 Sep. 2014, Victoria, BC, Canada. pp. 15-24. ACM. ISBN 978-1-4503-3062-6
Pieters, W. and Hadžiosmanović, D. and Lenin, A. and Montoya Morales, A.L. and Willemson, J. (2014) TREsPASS: Plug-and-Play Attacker Profiles for Security Risk Analysis (Poster). In: 35th IEEE Symposium on Security and Privacy, May 17-18, 2014, San Jose, California. IEEE Computer Society. ISBN not assigned
Pieters, W. and Probst, C.W. and Lukszo, S. and Montoya Morales, A.L. (2014) Cost-effectiveness of Security Measures: A model-based Framework. In: Approaches and Processes for Managing the Economics of Information Systems. IGI Global, Hershey, PA, pp. 139-156. ISBN 978-1-4666-4983-5
Schaff, G. and Harpes, C. and Aubigny, M. and Junger, M. and Martin, R. (2014) RISK-DET: ICT Security Awareness Aspect Combining Education and Cognitive Sciences. In: Ninth International Multi-Conference on Computing in the Global Information Technology, ICCGI 2014, 22-26 Jun 2014, Seville, Spain. pp. 51-53. IARIA. ISBN 978-1-61208-346-9
Stottelaar, B. and Senden, J. and Montoya Morales, A.L. (2014) Online social sports networks as crime facilitators. Crime Science, 3 (8). pp. 1-20. ISSN 2193-7680

2013

Bleikertz, S. and Mastelic, T. and Pape, S. and Pieters, W. and Dimkov, T. (2013) Defining the cloud battlefield - supporting security assessments by cloud customers. In: International Conference on Cloud Engineering (IC2E 2013), 25-27 Mar 2013 , Redwood City, CA . pp. 78-87. IEEE Computer Society. ISBN 978-1-4673-6473-7
Bullee, J.H. (2013) Detection of leadership in informal (small)groups based on CCTV information. Master's thesis, University of Twente.
Hartel, P.H. (2013) Situative Prävention von Cybercrime: ein chancenreicher Bekämpfungsansatz. In: Cybercrime - Bedrohung, Intervention, Abwehr, 12-13 Nov 2013, Wiesbaden, Germany. pp. 96-108. Bundeskriminalamt. ISBN not assigned
Hartel, P.H. and van den Berg, Jan and Junger, M. (2013) Wat gaan we doen tegen de cyberaanvallen? Informatiebeveiliging, 4 (4). pp. 10-11. ISSN 1569-1063
Jansen, J. and Junger, M. and Montoya Morales, A.L. and Hartel, P.H. (2013) Offenders in a digitized society. In: Cybercrime and the police. Safety & Security Studies. Eleven International Publishing, The Hague, The Netherlands, pp. 45-59. ISBN 978-94-6236-069-3
Junger, M. and Montoya Morales, A.L. and Hartel, P.H. and Karemaker, M. (2013) Modus operandi onderzoek naar door informatie en communicatie technologie (ICT) gefaciliteerde criminaliteit. Technical Report TR-CTIT-13-07, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Lastdrager, E.E.H. and Montoya Morales, A.L. and Hartel, P.H. and Junger, M. (2013) Applying the Lost-Letter Technique to Assess IT Risk Behaviour. In: Proceedings of the 3rd Workshop on Socio-Technical Aspects in Security and Trust, 29 Jun 2013, New Orleans, USA. pp. 2-9. IEEE Computer Society. ISBN 978-0-7695-5065-7
Misra, G. (2013) Permeance of ICT in Crime in India. Master's thesis, University of Twente.
Montoya Morales, A.L. (2013) The TREsPASS project. In: ICTOpen2013, 27-28 November 2013, Eindhoven. pp. 1-1. ICTopen. ISBN not assigned
Montoya Morales, A.L. and Junger, M. and Hartel, P.H. (2013) How 'Digital' is Traditional Crime? In: European Intelligence and Security Informatics Conference, EISIC 2013, 12-14 Aug 2013, Uppsala, Sweden. pp. 31-37. IEEE Computer Society. ISBN 978-0-7695-5062-6
Montoya Morales, A.L. and Junger, M. and Hartel, P.H. (2013) Modus operandi study of information and communication technology (ICT) facilitated crime. In: NVC Congres, 13-14 June 2013, Leiden, The Netherlands. 93. Nederlandse Vereniging voor Criminologie. ISBN not assigned
Pieters, W. (2013) On thinging things and serving services: technological mediation and inseparable goods. Ethics and information technology, 15 (3). pp. 195-208. ISSN 1388-1957 *** ISI Impact 0,739 ***
Pieters, W. and Dimkov, T. and Pavlovic, D. (2013) Security Policy Alignment: A Formal Approach. IEEE Systems Journal, 7 (2). pp. 275-287. ISSN 1932-8184 *** ISI Impact 2,114 ***
Schaff, G. and Harpes, C. and Martin, R. and Junger, M. (2013) An application to estimate the cyber-risk detection skill of mobile device users (IDEA). In: Sixth International Conference on Advances in Human oriented and Personalized Mechanisms, Technologies, and Services (CENTRIC), 27 Oct - 01 Nov 2013, Venice, Italy. Article 7. IARIA. ISBN 978-1-62993-302-3
Stoelinga, M.I.A. and Pieters, W. (2013) Attack navigator vindt en verhelpt zwakke plekken. Bits en chips, 4. ISSN 1879-6443

2012

Ali, T. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2012) A review of calibration methods for biometric systems in forensic applications. In: 33rd WIC Symposium on Information Theory in the Benelux, 24-25 May 2012, Boekelo, Netherlands. pp. 126-133. WIC. ISBN 978-90-365-3383-6
Ali, T. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2012) Forensic Face Recognition: A Survey. In: Face Recognition: Methods, Applications and Technology. Computer Science, Technology and Applications. Nova Publishers, 9. ISBN 978-1-61942-663-4
Bullee, J.H. and Veldhuis, R.N.J. (2012) Biometric features and privacy : condemned, based upon your finger print. In: Proceedings of the 33rd WIC Symposium on Information Theory in the Benelux and the 2nd Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelu, 24-25 May 2012, Boekelo, The Netherlands. pp. 44-51. Twente University Press. ISBN 978-90-365-3383-6
Dimkov, T. (2012) Alignment of Organizational Security Policies -- Theory and Practice. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 12-218 ISBN 978-90-365-3331-7
Dutta, A. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2012) The Impact of Image Quality on the Performance of Face Recognition. In: 33rd WIC Symposium on Information Theory in the Benelux, 24-25 May 2012, Boekelo, The Netherlands. pp. 141-148. Centre for Telematics and Information Technology, University of Twente. ISBN 978-90-365-3383-6
Hartel, P.H. and Junger, M. (2012) Teaching Engineering students to "Think thief". Technical Report TR-CTIT-12-19, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Hartel, P.H. and Suryana, N. (2012) Information Security. In: Cyber Safety: An Introduction. Eleven International Publishers, The Hague, pp. 281-291. ISBN 978-94-90947-75-0
Junger, M. and Laycock, G. and Hartel, P.H. and Ratcliffe, J. (2012) Crime science: editorial statement. Crime science, 1 (1). 1:1-1:3. ISSN 2193-7680
Junger, M. and Ottenhof, R.H.J. and Hartel, P.H. (2012) New opportunities in the digital age: mobile phone ownership, usage and truancy by high school students. In: KLM Van Dijk : Liber Amicorum prof.dr.mr. J.J.M. van Dijk. Wolf Legal Publishers, Nijmegen, pp. 191-206. ISBN 978-90-5850-932-1
Knapik, P. and Schoch, E. and Müller, M. and Kargl, F. (2012) Understanding Vehicle Related Crime to Elaborate on Countermeasures Based on ADAS and V2X Communication. In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2012), 14-16 Nov 2012, Seoul, Korea. pp. 86-93. IEEE. ISSN 2157-9865 ISBN 978-1-4673-4995-6
Pieters, W. and van der Ven, S. and Probst, C.W. (2012) A Move in the Security Measurement Stalemate: Elo-Style Ratings to Quantify Vulnerability. In: Proceedings of the 2012 workshop on New security paradigms (NSPW 2012), 18-21 Sep 2012, Bertinoro, Italy. pp. 1-14. ACM. ISBN 978-1-4503-1794-8
Probst, C.W. and Sasse, A.M. and Pieters, W. and Dimkov, T. and Luysterborg, E. and Arnaud, M. (2012) Privacy penetration testing -- how to establish trust in your cloud provider. In: European Data Protection: In Good Health? International, Foreign and Comparative Law XVIII. Springer, London, pp. 251-266. ISBN 978-94-007-2902-5

2011

Ali, T. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2011) Towards automatic forensic face recognition. In: International Conference on Informatics Engineering and Information Science (ICIEIS 2011), 14-16 Nov 2011, Kuala Lumpur, Malaysia. pp. 47-55. Communications in Computer and Information Science 252. Springer Verlag. ISSN 1865-0929
van Cleeff, A. and Dimkov, T. and Pieters, W. and Wieringa, R.J. (2011) Realizing Security Requirements with Physical Properties: A Case Study on Paper Voting. In: Proceedings of the International Conference on IT Convergence and Security (ICITCS 2011), 14-16 Dec, 2011, Suwon, South Korea. pp. 51-67. Lecture Notes in Electrical Engineering 120. Springer Verlag. ISSN 1876-1100 ISBN 978-94-007-2910-0
Dimkov, T. and Pieters, W. (2011) Physical Penetration Testing: A Whole New Story in Penetration Testing. PenTest Magazine, 2011 (2). pp. 20-23. ISSN not assigned
Lastdrager, E.E.H. (2011) Securing Patient Information in Medical Databases. Master's thesis, University of Twente.
Montoya Morales, A.L. (2011) Effect of Land Use and Transportation Infrastructure on Residential Burglary. In: 11th Crime Mapping Research Conference: Crime, Social Ills, & Place-Based Solutions, 19-21 Oct 2011, Miami, U.S.A.. pp. 20-20. National Institute of Justice. ISBN not assigned
Montoya Morales, A.L. and Ongena, Y.P. and Junger, M. (2011) Der Einfluss von Bebauung und Nachbarschaft auf das Einbruchrisiko. Polizei & Wissenschaft, 2011 (3). pp. 41-57. ISSN 1439-7404
Nijenhuis, G. and Geurs, K. and Montoya Morales, A.L. (2011) Betere bereikbaarheid, meer criminaliteit? Literatuurstudie en case studie naar de relatie tussen infrastructuurkenmerken, bereikbaarheid en criminaliteit. In: Colloquium Vervoersplanologisch Speurwerk, 24-25 Nov 2011, Antwerp, Belgium. cvs11_092. Stichting Colloquium Vervoersplanologisch Speurwerk. ISBN not assigned
van Westen, C. and Kingma, N. and McCall, M. and Montoya Morales, A.L. (2011) Elements at Risk. In: Multi-hazard Risk Assessment. Distance Education Course Guide Book. UNU - ITC DGIM, Enschede, pp. 401-443. ISSN not assigned

2010

Boom, B.J. (2010) Face recognition's grand challenge: uncontrolled conditions under control. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 10-185 ISBN 978-90-365-2987-7
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Tang, Qiang and Veldhuis, R.N.J. (2010) Embedding Renewable Cryptographic Keys into Noisy Data. International Journal of Information Security, 9 (3). pp. 193-208. ISSN 1615-5262 *** ISI Impact 1,279 ***
Dimkov, T. and van Cleeff, A. and Pieters, W. and Hartel, P.H. (2010) Two methodologies for physical penetration testing using social engineering. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC), 06-10 Dec 2010, Austin, Texas, USA. pp. 399-408. ACM. ISBN 978-1-4503-0133-6
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Portunes: representing attack scenarios spanning through the physical, digital and social domain. In: Proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'10). Revised Selected Papers, 27-28 March 2010, Paphos, Cyprus. pp. 112-129. Lecture Notes in Computer Science 6186. Springer Verlag. ISBN 978-3-642-16074-5
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Laptop theft: a case study on effectiveness of security mechanisms in open organizations. In: Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS), 4-8 Oct 2010, Chicago, Illinois, US. pp. 666-668. ACM. ISBN 978-1-4503-0245-6
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Effectiveness of physical, social and digital mechanisms against laptop theft in open organizations. In: Proceedings of the 3rd IEEE/ACM International Conference on Cyber, Physical and Social Computing (CPSCom 2010), 18-20 Dec 2010, Hangzhou, China. pp. 727-732. IEEE Computer Society. ISBN 978-1-4244-9779-9
Hartel, P.H. and Junger, M. and Wieringa, R.J. (2010) Cyber-crime Science = Crime Science + Information Security. Technical Report TR-CTIT-10-34, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Junger, M. and Need, A. (2010) Criminaliteitsbeleid: wat werkt? Beleidsadvies 2010 Nederlands Genootschap van Burgemeesters, Den Haag. ISSN not assigned
Montoya Morales, A.L. and Junger, M. (2010) A Comparison Between Repeats and Non-Repeats Residential Burglaries: What is Significantly Different? In: 8th Crime Mapping Conference, 10-11 June 2010, Manchester, U.K.. University College London. ISBN not assigned
Poelman, W.A. and Junger, M. (2010) Anti Crime Design. Product, 3. pp. 16-18. ISSN 0929-7081

2009

Boom, B.J. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2009) Model-Based Illumination Correction for Face Images in Uncontrolled Scenarios. In: Computer Analysis of Images and Patterns 2009, 2-4 Sep 2009, Munster. pp. 33-40. Lecture Notes in Computer Science 5702/2009. Springer Verlag. ISBN 978-3-642-03766-5
Boom, B.J. and Tao, Qian and Spreeuwers, L.J. and Veldhuis, R.N.J. (2009) Combining Illumination Normalization Methods for Better Face Recognition. In: The 3rd IAPR/IEEE International Conference on Biometrics, 2 Jun - 5 Jun 2009, Alghero, Italy. pp. 404-413. Lecture Notes in Computer Science Advances in Biometrics (Volume 5558/2009). Springer Verlag. ISBN 978-3-642-01792-6
Buhan, I.R. and Boom, B.J. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2009) Secure pairing with biometrics. International Journal of Security and Networks, 4 (1/2). pp. 27-42. ISSN 1747-8405
Dimkov, T. (2009) The key-free society. In: Living the ICT future. Centre for Telematics and Information Technology University of Twente, Enschede, pp. 28-29. ISBN 978-90-365-2963-1
Junger, M. (2009) Criminaliteitspreventie: Beleid en Technologie. University of Twente, Enschede.
van Westen, C. and Kingma, N. and Montoya Morales, A.L. (2009) Elements at risk. In: Multi-hazard Risk Assessment. United Nations University – ITC School on Disaster Geoinformation, pp. 1-43. ISSN not assigned

2008

Boom, B.J. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2008) Model-based reconstruction for illumination variation in face images. In: 8th IEEE International Conference on Automatic Face and Gesture Recognition, 17 Sept - 19 Sept 2008, Amsterdam, The Netherlands. pp. 1-6. IEEE Computer Society. ISBN 978-1-4244-2154-1
Buhan, I.R. (2008) Cryptographic keys from noisy data, theory and applications. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 08-129 ISBN 978-9-03652-738-5
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. (2008) Controlling Leakage of Biometric Information using Dithering. In: 16th European Signal Processing Conference, 25-29 Aug 2008, Lausanne, Switzerland. 1569105382. EUSIPCO. EURASIP, European Association for Signal, Speech and Image Processing. ISBN 978-2-8399-0450-6
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Tang, Qiang and Veldhuis, R.N.J. (2008) Embedding Renewable Cryptographic Keys into Continuous Noisy Data. In: 10th International Conference on Information and Communications Security, 20 - 22 October, 2008, Birmingham, UK. pp. 294-310. Lecture Notes in Computer Science 5308. Springer. ISBN 978-3-540-88624-2
Shang, Xiaoxin (2008) Grip-pattern recognition: Applied to a smart gun. PhD thesis, University of Twente. ISBN 978-90-365-2732-3
Shang, Xiaoxin and Veldhuis, R.N.J. (2008) Grip-Pattern Recognition in Smart Gun Based on Likelihood-Ratio Classifier and Support Vector Machine. In: Lecture Notes in Computer Science: Image and Signal Processing, 1-3 July 2008, Cherbourg, France. pp. 289-295. Lecture Notes in Computer Science 5099/2008. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-69904-0
Shang, Xiaoxin and Veldhuis, R.N.J. (2008) Grip-Pattern Verification for Smart Gun Based on Maximum-Pairwise Comparison and Mean-Template Comparison. In: Biometrics: Theory, Applications and BTAS 2008. 2nd IEEE International Conference on Biometrics: Theory Applications and Systems, 2008., 29 Sept - 1 Oct 2008, Washington, USA. pp. 1-5. IEEE Computer Society. ISBN 978-1-4244-2729-1
Shang, Xiaoxin and Veldhuis, R.N.J. (2008) Grip-pattern verification for a smart gun. Journal of Electronic Imaging, 17 (1). 011017. ISSN 1017-9909 *** ISI Impact 0,616 ***

2007

Boom, B.J. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2007) Automatic face alignment by maximizing similarity score. In: Proceedings of the 7th International Workshop on Pattern Recognition in Information Systems, 12-13 Jun 2007, Madeira. Portugal. pp. 221-230. Biosignals. INSTICC Press. ISBN 978-972-8865-93-1
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Secure Ad-hoc Pairing with Biometrics: SAfE. In: First International Workshop on Security for Spontaneous Interaction, 16. September 2007, Innsbruck, Austria. pp. 450-456. Ubicomp 2007 Workshop Proceedings. ISBN 978-3-00-022599-4
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Fuzzy extractors for continuous distributions. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS), 20-22 March 2007, Singapore. pp. 353-355. ACM. ISBN 1-59593-574-6
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Feeling Is Believing: A Secure Template Exchange Protocol. In: Advances in Biometrics, International Conference (ICB), 27-29 Aug 2007, Seoul, Korea. pp. 897-906. Lecture Notes in Computer Science 4642. Springer Verlag. ISBN 978-3-540-74548-8
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) A unifying view on template protection schemes. In: Proceedings of the 28th Symposium on Information Theory in the Benelux, 24-25 May 2007, Enschede, The Netherlands. pp. 35-42. Werkgemeenschap voor Informatie- en Communicatietechniek. ISBN 978-90-365-2509-1
Shang, Xiaoxin and Veldhuis, R.N.J. (2007) Local absolute binary patterns as image preprocessing for grip-pattern recognition in smart gun. In: IEEE conference on Biometrics: Theory, Applications and Systems, 27-29 Sep 2007, Washington DC. pp. 1-6. University of Notre Dame. ISBN 978-1-4244-1597-7
Spreeuwers, L.J. and Boom, B.J. and Veldhuis, R.N.J. (2007) Better than best: matching score based face registration. In: Proceedings of the 28th Symposium on Information Theory in the Benelux, 24-25 May 2007, Enschede, The Netherlands. pp. 125-132. Werkgemeenschap voor Informatie- en Communicatietheorie. ISBN 978-90-365-2509-1

2006

Boom, B.J. and Beumer, G.M. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2006) The effect of image resolution on the performance of a face recognition system. In: Proceedings of the Ninth International Conference on Control, Automation, Robotics and Vision (ICARCV), 05-08 Dec 2006, Singapore, Malaysia. pp. 409-414. IEEE Computer Society. ISBN 1-4244-0342-1
Boom, B.J. and Beumer, G.M. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2006) Matching score based face recognition. In: 17th Annual Workshop on Circuits, 23-24 Nov 2006, Veldhoven, The Netherlands. pp. 1-4. Technology Foundation STW. ISBN 978-90-73461-44-4
Buhan, I.R. and Bazen, A.M. and Hartel, P.H. and Veldhuis, R.N.J. (2006) A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems (Poster Paper). In: 2nd Int. Conf. on Biometrics (ICB), Hong Kong, China. pp. 728-736. Lecture Notes in Computer Science 3832. Springer-Verlag. ISBN 3-540-31111-4
Montoya Morales, A.L. and Horn, J.A. (2006) Base de Datos para Producir Mapas de Riesgo Urbano con Imágenes Satelitales e Imágenes de Campo Generados por Video Digital. In: XII SELPER International Symposium SIG and Remote Sensing applied to “Natural Risks and Territory Management” , 24-29 September 2006, Cartagena, Colombia. pp. 1-7. Sociedad Especialistas Latinoamérica en Percepción Remota (SELPER). ISBN not assigned
Shang, Xiaoxin and Kooi, K. and Veldhuis, R.N.J. and Ganzevoort, W.P.T. (2006) Restoration of missing lines in grip patterns for biometrics authentication on a smart gun. In: Proceedings of SPS-DARTS 2006 the second annual IEEE Benelux/DSP Valley Signal Processing Symposium, 28-29 Mar 2006, Antwerp, Belgium. pp. 95-98. IEEE Benelux Signal Processing Chapter. ISBN 978-90-73461-44-4
Shang, Xiaoxin and Veldhuis, R.N.J. (2006) Registration of hand-grip pattern in smart gun. In: 17th Annual Workshop on Circuits, 23-24 Nov 2006, Veldhoven, The Netherlands. pp. 192-195. Technology Foundation STW. ISBN 978-90-73461-44-4

2005

Hofstee, P. and Montoya Morales, A.L. and van Genderen, J. (2005) Urban Risk Management: Essential Information and Role of Remote and Close Sensing. Asian Journal of Geoinformatics, 5 (4). pp. 43-48. ISSN 1513-6728
Montoya Morales, A.L. and Masser, I. (2005) Management of Natural Hazard Risk in Cartago, Costa Rica. Habitat International, 29 (3). pp. 493-509. ISSN 0197-3975 *** ISI Impact 2,029 ***
Peters-Guarin, G. and van Westen, C.J. and Montoya Morales, A.L. (2005) Community-based Flood Risk Assessment using GIS for the Town of San Sebastian, Guatemala. Journal of Human Security and Development, 1 (1). pp. 29-49. ISSN 1554-3617