EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


Research School: UT-S-IPA
Home Policy Brochure Browse Search User Area Contact Help

Number of items: 2241.

2017

Ahmad, W. and Yildiz, B.M. and Rensink, A. and Stoelinga, M.I.A. (2017) A Model-Driven Framework for Hardware-Software Co-design of Dataflow Applications. In: Proceedings of the 6th International Workshop on Design, Modeling and Evaluation of Cyber Physical Systems, CyPhy 2016. Revised Selected Papers., 06 Oct 2016, Pittsburgh, PA, USA. pp. 1-16. Lecture Notes in Computer Science 10107. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-51737-7
Darabi, S. and Blom, S.C.C. and Huisman, M. (2017) A Verification Technique for Deterministic Parallel Programs (extended version). Technical Report TR-CTIT-17-01, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Greff, K. and van Damme, R.M.J. and Koutnik, J. and Broersma, H.J. and Mikhal, J. and Lawrence, C.P. and van der Wiel, W.G. and Schmidhuber, J. (2017) Using neural networks to predict the functionality of reconfigurable nano-material networks. International journal on advances in intelligent systems, 9 (3&4). pp. 339-351. ISSN 1942-2679
Guck, D. (2017) Reliable systems - Fault tree analysis via Markov reward automata. PhD thesis, Univeristy of Twente. CTIT Ph.D. Thesis Series No. 16-419 ISBN 978-90-365-4291-3
Kumar, Rajesh and Stoelinga, M.I.A. (2017) Quantitative security and safety analysis with attack-fault trees. In: Proceeding of the 18th IEEE International Symposium on High Assurance Systems Engineering, 12-14 Jan 2017, Singapore. IEEE Computer Society.
Li, Binlong and Zhang, Yanbo and Broersma, H.J. (2017) An exact formula for all star-kipas Ramsey numbers. Graphs and combinatorics, 33 (1). pp. 141-148. ISSN 0911-0119 *** ISI Impact 0,480 ***
Meuwly, D. and Ramos, D. and Haraksim, R. (2017) A guideline for the validation of likelihood ratio methods used for forensic evidence evaluation. Forensic Science International. pp. 1-12. ISSN 0379-0738 *** ISI Impact 1,950 ***
Ngo, Minh Tri and Huisman, M. (2017) Complexity and information flow analysis for multi-threaded programs. The European Physical Journal Special Topics, online pre-publication. pp. 1-18. ISSN 1951-6355 *** ISI Impact 1,417 ***
Ruijters, E.J.J. and Reijsbergen, D.P. and de Boer, P.T. and Stoelinga, M.I.A. (2017) Rare event simulation for dynamic fault trees. Technical Report TR-CTIT-17-02, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Ruijters, E.J.J. and Schivo, S. and Stoelinga, M.I.A. and Rensink, A. (2017) Uniform analysis of fault trees through model transformations. In: Proceedings of the 63rd Annual Reliabliity and Maintainability Symposium (RAMS 2017), 23-26 Jan 2017, Orlando, FL, USA. IEEE Reliability Society. ISBN 978-1-5090-5285-1

2016

Abraham, E. and Huisman, M., ed. (2016) Integrated Formal Methods: 12th International Conference, IFM 2016, Reykjavik, Iceland, June 1-5, 2016, Proceedings. Lecture Notes in Computer Science 9681. Springer Verlag, London. ISSN 0302-9743 ISBN 978-3-319-33692-3
Ahmad, W. and Jongerden, M.R. and Stoelinga, M.I.A. and van de Pol, J.C. (2016) Model checking and evaluating QoS of batteries in MPSoC dataflow applications via hybrid automata (extended version). Technical Report TR-CTIT-16-03, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Ahmad, W. and Jongerden, M.R. and Stoelinga, M.I.A. and van de Pol, J.C. (2016) Model checking and evaluating QoS of batteries in MPSoC dataflow applications via hybrid automata. In: Proceedings of the 16th International Conference on Application of Concurrency to System Design, ACSD 2016, 19 - 24 June 2016, Toruń, Poland. pp. 114-123. IEEE Computer Society. ISSN 1550-4808
Ahmad, W. and van de Pol, J.C. (2016) Synthesizing Energy-Optimal Controllers for Multiprocessor Dataflow Applications with UPPAAL STRATEGO. In: Proceedings of the 7th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, ISoLA 2016, 10-14 Oct 2016, Corfu, Greece. pp. 94-113. Lecture Notes in Computer Science 9952. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-47165-5
Ahmad, W. and Yildiz, B.M. and Rensink, A. and Stoelinga, M.I.A. (2016) A Model-Driven Framework for Hardware-Software Co-design of Dataflow Applications (extended version). Technical Report TR-CTIT-16-09, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Amighi, A. and Blom, S.C.C. and Huisman, M. (2016) VerCors: A Layered Approach to Practical Verification of Concurrent Software. In: Proceedings of the 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2016), 17-19 Feb 2016, Heraklion, Crete, Greece. pp. 495-503. IEEE Computer Society. ISSN 2377-5750 ISBN 978-1-4673-8775-0
Amighi, A. and Gomes, P. and Gurov, D. and Huisman, M. (2016) Provably correct control flow graphs from Java bytecode programs with exceptions. International journal on software tools for technology transfer, 18 (6). pp. 653-684. ISSN 1433-2779
Bendisposto, J. and Körner, P. and Leuschel, M. and Meijer, J.J.G. and van de Pol, J.C. and Treharne, H. and Whitefield, J. (2016) Symbolic Reachability Analysis of B through ProB and LTSmin. In: Proceedings of the 12th International Conference on integrated Formal Methods, iFM 2016, 1-5 Jun 2016, Reykjavik, Iceland. pp. 275-291. Lecture Notes in Computer Science 9681. Springer International Publishing. ISSN 0302-9743 ISBN 978-3-319-33692-3
Bloemen, V. (2016) Parallel Model Checking of ω-Automata. In: Proceedings of the Formal Methods 2016 Doctoral Symposium co-located with 21st International Symposium on Formal Methods (FM 2016), 8 Nov 2016, Limassol, Cyprus. 1. CEUR Workshop Proceedings. ISSN 1613-0073
Bloemen, V. and Laarman, A.W. and van de Pol, J.C. (2016) Multi-Core On-The-Fly SCC Decomposition. In: Proceedings of the 21st ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, PPoPP 2016, 12-16 March 2016, Barcelona, Spain. 8. ACM. ISBN 978-1-4503-4092-2
Bloemen, V. and van de Pol, J.C. (2016) Multi-core SCC-Based LTL Model Checking. In: Hardware and Software: Verification and Testing; Proceedings of the 12th International Haifa Verification Conference, HVC 2016, 14-17 Nov 2016, Haifa, Israel. pp. 18-33. Lecture Notes in Computer Science 10028. Springer International Publishing. ISSN 0302-9743 ISBN 978-3-319-49051-9
Broersma, H.J. and Li, Binlong and Zhang, Shenggui (2016) Forbidden subgraphs for hamiltonicity of 1-tough graphs. Discussiones Mathematicae Graph Theory, 36 (4). pp. 915-929. ISSN 1234-3099 *** ISI Impact 0,349 ***
Broersma, H.J. and Miller, J.F. and Nichele, S. (2016) Computational matter: evolving computational functions in nanoscale materials. In: Advances in Unconventional Computing, Volume 2: Prototypes, Models and Algorithms. Emergence, Complexity and Computation 23. Springer Verlag, London, pp. 397-428. ISSN 2194-7287 ISBN 978-3-319-33920-7
Caselli, M. (2016) Intrusion Detection in Networked Control Systems: From System Knowledge to Network Security. PhD thesis, Univ. of Twente. CTIT Ph.D. Thesis Series No. 16-401 ISBN 978-90-365-4177-0
Chen, Xiaodong and Li, MingChu and Liao, Wei and Broersma, H.J. (2016) Hamiltonian properties of almost locally connected claw-free graphs. Ars combinatoria, 124. pp. 95-109. ISSN 0381-7032 *** ISI Impact 0,265 ***
van Damme, R.M.J. and Broersma, H.J. and Mikhal, J. and Lawrence, C.P. and van der Wiel, W.G. (2016) A simulation tool for evolving functionalities in disordered nanoparticle networks. In: 2016 IEEE Congress on Evolutionary Computation (CEC 2016), 24-29 July 2016, Vancouver, Canada. pp. 5238-5245. IEEE Computer Society. ISBN 978-1-5090-0623-6
van Dijk, T. (2016) Sylvan - Multi-core decision diagrams. PhD thesis, University of Twente. CTIT Ph.D.-thesis no. 16-398 ISBN 978-90-365-4160-2
van Dijk, T. and van de Pol, J.C. (2016) Multi-core Symbolic Bisimulation Minimisation. In: Proceedings of the 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2016), 2-8 April 2016, Eindhoven, The Netherlands. pp. 332-348. Lecture Notes in Computer Science 9636. Springer Verlag. ISSN 0302-9743 ISBN 978-3-662-49673-2
Esquivel Vargas, H.T. (2016) Automatic Deployment of Specification-based Intrusion Detection in the BACnet Protocol. Master's thesis, Univ. of Twente.
Feiri, M.P. (2016) Scalable Broadcast Authentication for V2V Communication. PhD thesis, Univ. of Twente. CTIT Ph.D. Thesis Series No. 16-407 ISBN 978-90-365-4200-5
Geske, M. and Jasper, M. and Steffen, B. and Howar, F. and Schordan, M. and van de Pol, J.C. (2016) RERS 2016: Parallel and Sequential Benchmarks with Focus on LTL Verification. In: Proceedings of the 7th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (II), ISoLA 2016, 10-14 Oct 2016, Corfu, Greece. pp. 787-803. Lecture Notes in Computer Science 9953. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-47168-6
Gomes, P. and Gurov, D. and Huisman, M. (2016) Specification and Verification of Synchronization with Condition Variables. In: Proceedings of the Fifth International Workshop on Formal Techniques for Safety-Critical Systems (FTSCS 2016), November 14, 2016, Tokyo, Japan. pp. 3-19. Communications in Computer and Information Science 694. Springer Verlag. ISSN 1865-0929 ISBN 978-3-319-53946-1
Greff, K. and van Damme, R.M.J. and Koutnik, J. and Broersma, H.J. and Mikhal, J. and Lawrence, C.P. and van der Wiel, W.G. and Schmidhuber, J. (2016) Unconventional computing using evolution-in-nanomaterio: neural networks meet nanoparticle networks. In: The Eighth International Conference on Future Computational Technologies and Applications, FUTURE COMPUTING 2016, 20-24 March 2016, Rome, Italy. pp. 15-20. IARIA International Academy, Research and Industry Association. ISBN 978-1-61208-461-9
Gurov, D. and Havelund, K. and Huisman, M. and Monahan, R. (2016) Static and runtime verification, competitors or friends? (Track summary). In: Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques. Proceedings of the 7th International Symposium on Leveraging Applications of Formal Methods,ISoLA 2016, 10-14 Oct 2016, Corfu, Greece. pp. 397-401. Lecture Notes in Computer Science 9952. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-47165-5
Hartel, P.H. and Junger, M. (2016) Book review: Crime and Everyday Life by Marcus Felson and Mary Eckert, 5th edition. Crime Science, 5. 10:1-10:3. ISSN 2193-7680
Hermanns, H. and Krämer, J. and Krčál, J. and Stoelinga, M.I.A. (2016) The Value of Attack-Defence Diagrams. In: Proceedings of the 5th International Conference on Principles of Security and Trust, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, April 2-8, 2016, Eindhoven, Netherlands. pp. 163-185. Lecture Notes in Computer Science 9635. Springer Verlag. ISSN 0302-9743 ISBN 978-3-662-49634-3
Huisman, M. and Ahrendt, W. and Grahl, D. and Hentschel, M.G.B.G. (2016) Formal specification with the Java modeling language. In: Deductive Software Verification – The KeY Book. Lecture Notes in Computer Science 10001. Springer Verlag, London, pp. 193-241. ISSN 0302-9743 ISBN 978-3-319-49811-9
Huisman, M. and Bos, H. and Brinkkemper, S. and van Deursen, A. and Groote, J.F. and Lago, P. and van de Pol, J.C. and Visser, E. (2016) Software that meets its Intent. In: Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications. ISoLA 2016, 10-14 Oct 2016, Corfu, Greece. pp. 609-625. Lecture Notes in Computer Science 9953. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-47168-6
Huisman, M. and Klebanov, V. and Monahan, R. and Tautschnig, M. (2016) VerifyThis 2015: A program verification competition. International journal on software tools for technology transfer, oneline pre-publication. pp. 1-9. ISSN 1433-2779
Huisman, M. and Monahan, R. and Müller, P. and Poll, E. (2016) VerifyThis 2016: A Program Verification Competition. Technical Report TR-CTIT-16-07, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Huisman, M. and van de Pol, J.C. (2016) Preface of Special issue on Automated Verification of Critical Systems (AVoCS'14). Science of computer programming, 128. pp. 1-1. ISSN 0167-6423 *** ISI Impact 0,828 ***
Kammüller, F. and Probst, C.W. (2016) Modeling and Verification of Insider Threats Using Logical Analysis. IEEE Systems Journal. ISSN 1932-8184 *** ISI Impact 2,114 ***
Katoen, J.P. (2016) The Probabilistic Model Checking Landscape. (Invited) In: Proceedings of the 31st Annual ACM/IEEE Symposium on Logic in Computer Science (LICS 2016), 5-8 July 2016, New York, USA. pp. 31-45. IEEE Computer Society. ISBN 978-1-4503-4391-6
Knapik, P. (2016) Automotive Security Functions; The Use of New Technologies to Tackle Vehicle-Related Crime. PhD thesis, Univ. of Twente. ISBN 978-90-365-4010-0
Koukoulis, Y. (2016) Dual Laser Fault Injection Attack. Master's thesis, Univ. of Twente.
Laarman, A.W. and Pater, E. and van de Pol, J.C. and Hansen, H. (2016) Guard-based partial-order reduction. International journal on software tools for technology transfer, 18 (4). pp. 427-448. ISSN 1433-2779
Meijer, J.J.G. and van de Pol, J.C. (2016) Bandwidth and Wavefront Reduction for Static Variable Ordering in Symbolic Reachability Analysis. In: Proceedings of the 8th International Symposium on NASA Formal Methods, NFM 2016, 7-9 Jun 2016, Minneapolis, USA. pp. 255-271. Lecture Notes in Computer Science 9690. Springer International Publishing. ISSN 0302-9743 ISBN 978-3-319-40647-3
Mostowski, W.I. (2016) Dynamic Frames Based Verification Method for Concurrent Java Programs. In: Proceedings of the 7th Working Conference on Verified Software: Theories, Tools, and Experiments, VSTTE 2015. Revised Selected Papers, 18-19 Jul 2015, San Francisco, CA, U.S.A.. pp. 124-141. Lecture Notes in Computer Science 9593. Springer International Publishing Switzerland. ISSN 0302-9743 ISBN 978-3-319-29612-8
Neele, T. and Wijs, A. and Bosnacki, D. and van de Pol, J.C. (2016) Partial-Order Reduction for GPU Model Checking. In: Proceedings of the 14th International Symposium on Automated Technology for Verification and Analysis, ATVA 2016, 17-20 Oct 2016, Chiba, Japan. pp. 357-374. Lecture Notes in Computer Science 9938. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-46519-7
Oortwijn, W.H.M. and Blom, S.C.C. and Huisman, M. (2016) Static Verification of Message Passing Programs. In: ICT.Open 2016, 21-22 March 2016, Amersfoort, The Netherlands. University of Twente. ISBN not assigned
Oortwijn, W.H.M. and Blom, S.C.C. and Huisman, M. (2016) Future-based Static Analysis of Message Passing Programs. In: Proceedings of the Ninth Workshop on Programming Language Approaches to Concurrency- and Communication-cEntric Software, PLACES 2016, 8 April 2016, Eindhoven, The Netherlands. pp. 65-72. Electronic Notes in Theoretical Computer Science 211. Open Publishing Association. ISSN 2075-2180
Pieters, W. and Hadžiosmanović, D. and Dechesne, F. (2016) Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace. Science and Engineering Ethics, 22 (3). pp. 831-850. ISSN 1353-3452 *** ISI Impact 1,454 ***
Rensink, A. (2016) Verification Techniques for Graph Rewriting (Tutorial). (Invited) In: Verification of Evolving Graph Structures, 1-6 Nov 2015, Dagstuhl, Germany. pp. 18-18. Dagstuhl Reports 5 (11). Dagstuhl Publishing. ISSN 2192-5283
Rensink, A. (2016) Model Patterns - The Quest for the Right Level of Abstraction. In: Transactions on Foundations for Mastering Change I. Lecture Notes in Computer Science 9960. Springer Verlag, Berlin, pp. 47-70. ISSN 2509-8047 ISBN 978-3-319-46507-4
Ruijters, E.J.J. and Guck, D. and Drolenga, P. and Peters, M. and Stoelinga, M.I.A. (2016) Maintenance analysis and optimization via statistical model checking: Evaluating a train pneumatic compressor. In: Proceedings of the 13th International Conference on Quantitative Evaluation of SysTems, QEST 2016, 23-25 Aug 2016, Québec City, Canada. pp. 331-347. Lecture Notes in Computer Science 9826. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-43424-7
Ruijters, E.J.J. and Guck, D. and van Noort, M. and Stoelinga, M.I.A. (2016) Reliability-centered maintenance of the Electrically Insulated Railway Joint via Fault Tree Analysis: A practical experience report. In: Proceedings of the 46th annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016, 28 Jun - 01 Jul 2016, Toulouse, France. pp. 662-669. IEEE Computer Society. ISBN 978-1-4673-8891-7
Ruijters, E.J.J. and Stoelinga, M.I.A. (2016) Better railway engineering through statistical model checking. In: Proceedings of the 7th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, ISoLA 2016, 10-14 Oct 2016, Corfu, Greece. pp. 151-165. Lecture Notes in Computer Science. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-47166-2
de Vries, S.H.S. (2016) Achieving 128-bit Security Against Quantum Computer Attacks in Open VPN. Master's thesis, University of Twente.
Wevers, L. and Huisman, M. and van Keulen, M. (2016) Lazy Evaluation for Concurrent OLTP and Bulk Transactions. In: Proceedings of the 20th International Database Engineering & Applications Symposium (IDEAS 2016), 11-13 Jul 2016, Montreal, Canada. pp. 115-124. ACM. ISBN 978-1-4503-4118-9
Yüksel, Ö. and den Hartog, J.I. and Etalle, S. (2016) Reading between the fields: practical, effective intrusion detection for industrial control systems. In: SAC '16 Proceedings of the 31st Annual ACM Symposium on Applied Computing, April 4-8, 2016, Pisa, Italy. pp. 2063-2070. ACM. ISBN 978-1-4503-3739-7
Zhang, Xiaoyan and Zhang, Zan-Bo and Broersma, H.J. and Wen, Xuelian (2016) On the complexity of edge-colored subgraph partitioning problems in network optimization. Discrete mathematics and theoretical computer science, 17 (3). pp. 227-244. ISSN 1365-8050
Zhang, Yanbo and Broersma, H.J. and Chen, Y. (2016) On star-critical and upper size Ramsey numbers. Discrete applied mathematics, 202. pp. 174-180. ISSN 0166-218X *** ISI Impact 0,722 ***
Zhang, Yanbo and Broersma, H.J. and Chen, Y. (2016) Narrowing down the gap on cycle-star Ramsey numbers. Journal of combinatorics, 7 (2-3). pp. 481-493. ISSN 2156-3527
Zhang, Yanbo and Broersma, H.J. and Chen, Yaojun (2016) On fan-wheel and tree-wheel Ramsey numbers. Discrete mathematics, 339 (9). pp. 2284-2287. ISSN 0012-365X *** ISI Impact 0,600 ***

2015

Ahmad, W. and Hölzenspies, P.K.F. and Stoelinga, M.I.A. and van de Pol, J.C. (2015) Green computing: power optimisation of VFI-based real-time multiprocessor dataflow applications (extended version). Technical Report TR-CTIT-15-04, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Ahmad, W. and Hölzenspies, P.K.F. and Stoelinga, M.I.A. and van de Pol, J.C. (2015) Green computing: power optimisation of vfi-based real-time multiprocessor dataflow applications. In: 18th Euromicro Conference on Digital Systems Design (DSD 2015), 26-28 Aug 2015, Madeira, Portugal. pp. 271-275. IEEE Computer Society. ISBN 978-1-4673-8035-5
Alì, G. and Bilotta, E. and Gabriele, L. and Pantano, P. and Sepulveda, J. and Servidio, R. and Vasenev, A. (2015) eLearning in industrial mathematics with applications to nanoelectronics. In: Coupled multiscale simulation and optimization in nanoelectronics. The European Consortium for Mathematics in Industry 21. Springer Verlag, Berlin, pp. 503-559. ISBN 978-3-662-46671-1
Amighi, A. and Haack, C. and Huisman, M. and Hurlin, C. (2015) Permission-based separation logic for multi-threaded Java programs. Logical Methods in Computer Science, 11 (1). 2. ISSN 1860-5974 *** ISI Impact 0,569 ***
Arnold, F. and Guck, D. and Kumar, Rajesh and Stoelinga, M.I.A. (2015) Sequential and Parallel Attack Tree Modelling. In: Computer Safety, Reliability, and Security - Proceedings of the SAFECOM 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR, 22 September 2015, Delft, The Netherlands. pp. 291-299. Lecture Notes in Computer Science 9338. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-24248-4
Belov, A. and Vasenev, A. and Havinga, P.J.M. and Meratnia, N. and van der Zwaag, B.J. (2015) Reducing user discomfort in direct load control of domestic water heaters. In: Proceedings of the IEEE Innovative Smart Grid Technologies - Asia (ISGT ASIA 2015), 3-6 Nov 2015, Bangkok, Thailand. pp. 1-6. IEEE Computer Society. ISBN 978-1-5090-1237-4
Bilgin, B. (2015) Threshold Implementations, As Countermeasure Against Higher-Order Differential Power Analysis (Cum Laude). PhD thesis, Univ. of Twente. CTIT Ph.D. thesis series No. 14-337 ISBN 978-90-365-3891-6
Blom, S.C.C. and Darabi, S. and Huisman, M. (2015) Verification of Loop Parallelisations. In: ICT Open 2015, 24-25 March 2015, Amersfoort,The Netherlands. IPA-4. ICT Open 2015. ISBN not assigned
Blom, S.C.C. and Huisman, M. (2015) Witnessing the elimination of magic wands. International Journal on Software Tools for Technology Transfer, 17 (6). pp. 757-781. ISSN 1433-2779
Blom, S.C.C. and Huisman, M. and Zaharieva-Stojanovski, M. (2015) History-Based Verification of Functional Behaviour of Concurrent Programs. In: Proceedings of the 13th International Conference on Software Engineering and Formal Methods (SEFM 2015), 7-11 Sep 2015, York, United Kingdom. pp. 84-98. Lecture Notes in Computer Science 9276. Springer International Publishing. ISSN 0302-9743 ISBN 978-3-319-22968-3
Bose, S.K. and Lawrence, C.P. and Liu, Zhihua and Makarenko, K.S. and van Damme, R.M.J. and Broersma, H.J. and van der Wiel, W.G. (2015) Evolution of a designless nanoparticle network into reconfigurable Boolean logic. Nature nanotechnology, 10 (12). pp. 1048-1052. ISSN 1748-3387 *** ISI Impact 35,267 ***
te Brinke, S. (2015) Developing Energy-Aware Software. PhD thesis, Univ. of Twente. CTIT Ph.D. Thesis Series No. 15-359 ISBN 978-90-365-3875-6
Broersma, H.J. (2015) How tough is toughness? Bulletin of the European Association for Theoretical Computer Science, 117. pp. 28-52. ISSN 0252-9742
Broersma, H.J. and Fiala, J. and Golovach, P.A. and Kaiser, T. and Paulusma, D. and Proskurowski, A. (2015) Linear-time algorithms for scattering number and hamilton-connectivity of interval graphs. Journal of graph theory, 79 (4). pp. 282-299. ISSN 0364-9024 *** ISI Impact 0,796 ***
Carvajal Gallardo, I. (2015) Privacy-Preserving Social DNA-Based Recommender. Master's thesis, Univ. of Twente.
Chaudhary, K.C. and Fehnker, A. and van de Pol, J.C. and Stoelinga, M.I.A. (2015) Modeling and Verification of the Bitcoin Protocol. In: Proceedings of the Workshop on Models for Formal Analysis of Real Systems (MARS 2015), 23 Nov 2015, Suva, Fiji. pp. 46-60. Electronic Proceedings in Theoretical Computer Science 196. Open Publishing Association. ISSN 2075-2180
Dietzel, S. (2015) Resilient In-Network Aggregation for Vehicular Networks. PhD thesis, Univ. of Twente. CTIT Ph.D. thesis series No. 14-336 ISBN 978-90-365-3852-7
van Dijk, T. and Hahn, E.M. and Jansen, D.N. and Li, Yong and Neele, T. and Stoelinga, M.I.A. and Turrini, A. and Zhang, Lijun (2015) A Comparative Study of BDD Packages for Probabilistic Symbolic Model Checking. In: Proceedings of the First International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA 2015), 4-6 Nov 2015, Nanjing, China. pp. 35-51. Lecture Notes in Computer Science 9409. Springer International Publishing. ISSN 0302-9743 ISBN 978-3-319-25941-3
van Dijk, T. and van de Pol, J.C. (2015) Sylvan: Multi-core Decision Diagrams. In: Proceedings of the 21st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2015, 11-18 Apr 2015, London, UK. pp. 677-691. Lecture Notes in Computer Science 9035. Springer Verlag. ISSN 0302-9743 ISBN 978-3-662-46680-3
Dutta, A. (2015) Predicting Performance of a Face Recognition System Based on Image Quality. PhD thesis, Univ. of Twente. CTIT Ph.D. Thesis Series No. 15-353 ISBN 978-90-365-3872-5
Gollmann, D. and Herley, C. and Koenig, V. and Pieters, W. and Sasse, M. A. (2015) Socio-Technical Security Metrics (Dagstuhl Seminar 14491). Dagstuhl Reports, 4 (12). pp. 1-28. ISSN 2192-5283
Hartmanns, A. and Timmer, M. (2015) Sound statistical model checking for MDP using partial order and confluence reduction. International Journal on Software Tools for Technology Transfer, 17 (4). pp. 429-456. ISSN 1433-2779
Huisman, M. and Klebanov, V. and Monahan, R. (2015) VerifyThis 2012 - A Program Verification Competition. International journal on software tools for technology transfer, 17 (6). pp. 647-657. ISSN 1433-2779
Huisman, M. and Mostowski, W.I. (2015) A Symbolic Approach to Permission Accounting for Concurrent Reasoning. In: Proceedings of the 14th International Symposium on Parallel and Distributed Computing, ISPDC 2015, 29 Jun - 02 Jul 2015, Limassol, Cyprus. pp. 165-174. IEEE Computer Society. ISBN 978-1-4673-7148-3
Junges, S. and Guck, D. and Katoen, J.P. and Rensink, A. and Stoelinga, M.I.A. (2015) Fault Trees on a Diet - Automated Reduction by Graph Rewriting. In: Proceedings of the First International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA 2015), 4-6 Nov 2015, Nanjing, China. pp. 3-18. Lecture Notes in Computer Science 9409. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-25941-3
Kandziora, J. and Huisman, M. and Bockisch, C.M. and Zaharieva-Stojanovski, M. (2015) Run-time Assertion Checking of JML Annotations in Multithreaded Applications with e-OpenJML. In: Proceedings of the 17th Workshop on Formal Techniques for Java-like Programs (FTfJP 2015), 7 July 2015, Prague, Czech Republic. 8. ACM. ISBN 978-1-4503-3656-7
Kant, G. and Laarman, A.W. and Meijer, J.J.G. and van de Pol, J.C. and Blom, S.C.C. and van Dijk, T. (2015) LTSmin: High-Performance Language-Independent Model Checking. In: Tools and Algorithms for the Construction and Analysis of Systems. Lecture Notes in Computer Science 9035. Springer Verlag, London, pp. 692-707. ISSN 0302-9743 ISBN 978-3-662-46680-3
Karampatzakis, E. (2015) Evaluation of the robustness of payment terminals with the use of fuzzing. Master's thesis, Univ. of Twente.
Katoen, J.P. (2015) Probabilistic Programming: A True Verification Challenge. (Invited) In: Proceedings of the 13th International Symposium on Automated Technology for Verification and Analysis, ATVA 2015, 12-15 Oct 2015, Shanghai, China. pp. 1-3. Lecture Notes in Computer Science (9364). Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-24953-7
Kleber, S. and van der Heijden, R.W. and Kopp, H. and Kargl, F. (2015) Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions. In: 2015 International Conference and Workshops on Networked Systems (NetSys), March 9-12 2015, Cottbus, Germany. pp. 1-8. IEEE Computer Society. ISBN 978-1-4799-5804-7
Kumar, A. (2015) Security Analysis of Mobile Payment Systems. Master's thesis, Univ. of Twente.
Kumar, Rajesh and Ruijters, E.J.J. and Stoelinga, M.I.A. (2015) Quantitative Attack Tree Analysis via Priced Timed Automata. In: Proceedings of the 13th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS 2015), 2-4 Sept 2015, Madrid, Spain. pp. 156-171. Lecture Notes in Computer Science 9268 . Springer International Publishing. ISSN 0302-9743 ISBN 978-3-319-22974-4
Kwantes, P.M. and Van Gorp, P. and Kleijn, J. and Rensink, A. (2015) Towards Compliance Verification Between Global and Local Process Models. In: Proceedings of the 8th International Conference on Graph Transformation, ICGT 2015, 21-23 Jul 2015, L'Aquila, Italy. pp. 221-236. Lecture Notes in Computer Science 9151. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-21144-2
Li, Binlong and Ning, B0 and Broersma, H.J. and Zhang, Shenggui (2015) Characterizing heavy subgraph pairs for pancyclicity. Graphs and combinatorics, 31 (3). pp. 649-667. ISSN 0911-0119 *** ISI Impact 0,480 ***
Li, Binlong and Zhang, Yanbo and Bielak, H. and Broersma, H.J. and Holub, P. (2015) Closing the gap on path-kipas Ramsey numbers. Electronic journal of combinatorics, 22 (3). 3.21. ISSN 1077-8926 *** ISI Impact 0,612 ***
Malakuti Khah Olun Abadi, S. and Lohmann, W. and Akşit, M. (2015) Introduction to special issue on software engineering aspects of green computing (SEAGC). Sustainable Computing, 7. pp. 1-1. ISSN 2210-5379 *** ISI Impact 0,569 ***
Müller, M.C. (2015) SIDekICk: SuspIcious DomaIn Classification in the .nl zone. Master's thesis, Univ. of Twente.
Meijer, J.J.G. and van de Pol, J.C. (2015) Bandwidth and Wavefront Reduction for Static Variable Ordering in Symbolic Model Checking. Technical Report Number UNSPECIFIED, arXiv.org, Ithaca, NY, USA.
Mian, U.S. and den Hartog, J.I. and Etalle, S. and Zannone, N. (2015) Auditing with incomplete logs. In: Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust 2015, 18 Apr 2015, London, UK. pp. 1-23. Technische Universiteit Eindhoven. ISBN not assigned
Miller, J.F. and Broersma, H.J. (2015) Computational matter: evolving computational solutions in materials. In: Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, GECCO Companion 2015, 11-15 July 2015, Madrid, Spain. pp. 769-770. ACM. ISBN 978-1-4503-3488-4
Mostowski, W.I. and Ulbrich, M. (2015) Dynamic Dispatch for Method Contracts through Abstract Predicates. In: Proceedings of the 14th International Conference on Modularity (MODULARITY 2015), 16-19 Mar 2015, Fort Collins, CO, USA. pp. 109-116. MODULARITY 2015. ACM. ISBN 978-1-4503-3249-1
Oortwijn, W.H.M. and van Dijk, T. and van de Pol, J.C. (2015) A Distributed Hash Table for Shared Memory. In: Proceedings of the 11th International Conference on Parallel Processing and Applied Mathematics (PPAM 2016), Revised Selected Papers., 06-09 Sept 2015, Krakow, Poland. pp. 15-24. Lecture Notes in Computer Science 9574. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-32151-6
Petit, J.Y. and Schaub, F. and Feiri, M.P. and Kargl, F. (2015) Pseudonym schemes in vehicular networks: a survey. IEEE communications surveys & tutorials, 17 (1). pp. 228-255. ISSN 1553-877X *** ISI Impact 9,220 ***
Pieters, W. and Davarynejad, M. (2015) Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers. In: 9th International Workshop on Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance (DPM), 10-11 Sep 2014, Wroclaw, Poland. pp. 201-215. Lecture Notes in Computer Science 8872 . Springer. ISSN 0302-9743 ISBN 978-3-319-17015-2
Pieters, W. and Padget, J. and Dechesne, F. and Dignum, V. and Aldewereld, H. (2015) Effectiveness of qualitative and quantitative security obligations. Journal of Information Security and Applications, 22. pp. 3-16. ISSN 2214-2126
van de Pol, J.C. (2015) Automated Verification of Nested DFS. In: Proceedings of the 20th International Workshop on Formal Methods for Industrial Critical Systems (FMICS 2015), 22-23 Jun 2015, Oslo, Norway. pp. 181-197. Lecture Notes in Computer Science 9128. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-19457-8
Rensink, A. and Zambon, Eduardo (2015) Graphs as Models - Preface. In: Graphs as Models, 11-12 Apr 2015, London, U.K.. Electronic Proceedings in Theoretical Computer Science 181. Open Publishing Association. ISSN 2075-2180
Scrinzi, F. (2015) Behavioral Analysis of obfuscated Code. Master's thesis, Univ. of Twente.
Soleimanifard, S. and Gurov, D. and Huisman, M. (2015) Procedure-modular specification and verification of temporal safety properties. Software and systems modeling, 14 (1). pp. 83-100. ISSN 1619-1366 *** ISI Impact 0,990 ***
Stottelaar, B. (2015) Practical Cyber-Attacks on Autonomous Vehicles. Master's thesis, Univ. of Twente.
van der Wagen, W. and Pieters, W. (2015) From Cybercrime to Cyborg Crime: Botnets as Hybrid Criminal Actor-Networks. British journal of Criminology, 55 (2). pp. 1-18. ISSN 0007-0955 *** ISI Impact 1,643 ***
Wevers, L. and Hofstra, M. and Tammens, M. and Huisman, M. and van Keulen, M. (2015) A Benchmark for Online Non-Blocking Schema Transformations. In: Proceedings of 4th International Conference on Data Management Technologies and Applications, DATA 2015, 20-22 Jul 2015, Colmar, France. pp. 288-298. SciTePress. ISBN 978-989-758-103-8
Wevers, L. and Hofstra, M. and Tammens, M. and Huisman, M. and van Keulen, M. (2015) Analysis of the blocking behaviour of schema transformations in relational database systems. In: Proceedings of the 19th East European Conference on Advances in Databases and Information Systems, ADBIS 2015, 8-11 Sep 2015, Poitiers, France. pp. 169-183. Lecture Notes in Computer Science 9282. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-23134-1
Yildiz, B.M. and Rensink, A. and Bockisch, C.M. and Akşit, M. (2015) A Model-Derivation Framework for Timing Analysis of Java Software Systems. Technical Report TR-CTIT-15-08, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Zaharieva-Stojanovski, M. (2015) Closer to Reliable Software: Verifying Functional Behaviour of Concurrent Programs. PhD thesis, University of Twente. CTIT Ph.D. Thesis Series No. 15-375 ISBN 978-90-365-3924-1
Zhang, Yanbo (2015) Generalized Ramsey numbers for graphs. PhD thesis, Univ. of Twente. CTIT Ph.D.-thesis series No. 15-345 ISBN 978-90-365-3832-9
Zhang, Yanbo and Broersma, H.J. and Chen, Yaojun (2015) Three results on cycle-wheel Ramsey numbers. Graphs and combinatorics, 31 (6). pp. 2467-2479. ISSN 0911-0119 *** ISI Impact 0,480 ***
Zhang, Yanbo and Broersma, H.J. and Chen, Yaojun (2015) A note on Ramsey numbers for fans. Bulletin of the Australian Mathematical Society, 92 (1). pp. 19-23. ISSN 0004-9727 *** ISI Impact 0,566 ***

2014

Gnesi, S. and Rensink, A., ed. (2014) Fundamental Approaches to Software Engineering. Lecture Notes in Computer Science (8411). Springer Verlag, Berlin. ISSN 0302-9743 ISBN 978-3-642-54803-1
Abbasi, A. and Wetzel, J. and Bokslag, W. and Zambon, Emmanuele and Etalle, S. (2014) On Emulation-Based Network Intrusion Detection Systems. In: Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 17-19 September 2014, Gothenburg, Sweden. pp. 384-404. Lecture Notes in Computer Science 8688. Springer. ISSN 0302-9743 ISBN 978-3-319-11379-1
Ahrendt, W. and Beckert, B. and Bruns, D. and Bubel, R. and Gladisch, C. and Grebing, S. and Hähnle, R. and Hentschel, M. and Herda, M. and Klebanov, V. and Mostowski, W.I. and Scheben, C. and Schmitt, P.H. and Ulbrich, M. (2014) The KeY platform for verification and analysis of Java programs. In: Proceedings of the 6th International Conference on Verified Software: Theories, Tools and Experiments, VSTTE 2014, Revised Selected Papers, 17-18 Jul 2014, Vienna, Austria. pp. 55-71. Lecture Notes In Computer Science 8471. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-12153-6
Akbar, N. (2014) Analysing Persuasion Principles in Phishing Emails. Master's thesis, University of Twente.
Ali, T. (2014) Biometric Score Calibration for Forensic Face Recognition. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 14-336 ISBN 978-90-365-3689-9
Amighi, A. and Blom, S.C.C. and Darabi, S. and Huisman, M. and Mostowski, W.I. and Zaharieva-Stojanovski, M. (2014) Verification of concurrent systems with VerCors. In: Formal Methods for Executable Software Models - 14th International School on Formal Methods for the Design of Computer, Communication, and Software Systems. Lecture Notes in Computer Science 8483. Springer Verlag, Berlin, pp. 172-216. ISSN 0302-9743 ISBN 978-3-319-07316-3
Amighi, A. and Blom, S.C.C. and Huisman, M. and Mostowski, W.I. and Zaharieva-Stojanovski, M. (2014) Formal Specifications for Java's Synchronisation Classes. In: Proceedings of the 22nd Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2014), 12-14 Feb 2014, Torino, Italy. pp. 725-733. IEEE Conference Publications. IEEE Computer Society. ISSN 1066-6192
Amrin, N. (2014) The Impact of Cyber Security on SMEs. Master's thesis, Univ. of Twente.
Andreeva, E. and Bilgin, B. and Bogdanov, A. and Luykx, A. and Mennink, B. and Mouha, N. and Yasuda, K. (2014) APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography. In: 21st International Workshop on Fast Software Encryption (FSE), 3-5 March 2014, London, UK. pp. 168-186. LNCS 8540. Springer Verlag. ISBN 978-3-662-46706-0
Anjorin, A. and Cunha, A. and Giese, H. and Hermann, F. and Rensink, A. and Schürr, A. (2014) BenchmarX. In: Bidirectional Transformations (BX 2014), Proceedings of the Workshops of the EDBT/ICDT 2014 Joint Conference, 28 Mar 2014, Athens, Greece. pp. 82-86. CEUR Workshop Proceedings 1133. CEUR-WS.org. ISSN 1613-0073
Arnold, F. and Pieters, W. and Stoelinga, M.I.A. (2014) Quantitative Penetration Testing with Item Response Theory. Journal of Information Assurance and Security, 9 (3). pp. 118-127. ISSN 1554-1010
Badarinath Hampiholi, B. (2014) Secure and privacy-preserving national eID systems with Attribute-based credential technologies. Master's thesis, Univ. of Twente.
Belinfante, A.F.E. (2014) JTorX: Exploring Model-Based Testing. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 14-319 ISBN 978-90-365-3707-0
Bennaceur, A. and France, R. and Tamburelli, G. and Vogel, T. and Mosterman, P.J. and Cazzola, W. and Costa, F.M. and Pierantonio, A. and Tichy, M. and Akşit, M. and Emanuelson, P. and Gang, Huang and Georgantas, N. and Redlich, D. (2014) Mechanisms for Leveraging Models at Runtime in Self-adaptive Software. In: Models@run.time. Lecture Notes in Computer Science 8378. Springer International Publishing, Switzerland, pp. 19-46. ISSN 0302-9743 ISBN 978-3-319-08914-0
Beyer, D. and Huisman, M. and Klebanov, V. and Monahan, R. (2014) Evaluating Software Verification Systems: Benchmarks and Competitions (Dagstuhl Reports 14171). Dagstuhl reports, 4 (4). pp. 1-19. ISSN 2192-5283
Bloemen, V. and Diaz, D. and van der Bijl, H.M. and Abreu, S. (2014) Extending the Finite Domain Solver of GNU Prolog. In: Proceedings of the International Joint Workshop on Implementation of Constraint and Logic Programming Systems and Logic-based Methods in Programming Environments 2014, 17-18 Jul 2014, Vienna, Austria. pp. 47-62. Aachener Informatik-Berichte (AIB-2014-09). RWTH Aachen, Department of Computer Science. ISSN 0935-3232
Bockisch, C.M. and Hatun, K. and Akşit, M. (2014) Instance Pointcuts: Selecting Object Sets Based on Their Usage History. In: Proceedings of the 2014 International Conference on Principles and Practices of Programming on the Java platform: Virtual machines, Languages, and Tools, PPPJ 2014, 23-26 Sept 2014, Cracow, Poland. pp. 27-38. ACM. ISBN 978-1-4503-2926-2
Bortolameotti, R. (2014) C&C Botnet detection over SSL. Master's thesis, Univ. of Twente.
Bozzano, M. and Cimatti, A. and Katoen, J.P. and Katsaros, P. and Mokos, K. and Nguyen, Viet Yen and Noll, T. and Postma, B. and Roveri, M. (2014) Spacecraft early design validation using formal methods. Reliability engineering & system safety, 132. pp. 20-35. ISSN 0951-8320 *** ISI Impact 2,498 ***
te Brinke, S. (2014) Interpreting energy profiles with CEGAR. In: Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC 2014, 24-28 Mar 2014, Gyeongju, Korea. pp. 1221-1222. ACM. ISBN 978-1-4503-2469-4
te Brinke, S. and Malakuti Khah Olun Abadi, S. and Bockisch, C.M. and Bergmans, L.M.J. and Akşit, M. and Katz, S. (2014) A tool-supported approach for modular design of energy-aware software. In: Proceedings of the 29th Annual ACM Symposium on Applied Computing, 24-28 Mar 2014, Gyeongju, Korea. pp. 1206-1212. SAC. ACM. ISBN 978-1-4503-2469-4
Broekhuis, D. (2014) Sousveillance on Intelligent Transportations Systems. Master's thesis, University of Twente.
Buchenscheit, A. and Könings, B. and Neubert, A. and Schaub, F. and Schneider, M. and Kargl, F. (2014) Privacy implications of presence sharing in mobile messaging applications. In: Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia (IEEE MUM 2014), 25-28 Sept 2014, Melbourne, Victoria, Australia. pp. 20-29. ACM. ISBN 978-1-4503-3304-7
Constante, E. and den Hartog, J.I. and Petkovic, M. and Etalle, S. and Pechenizkiy, M. (2014) Hunting the Unknown. In: 28th Annual IFIP WG 11.3 Working ConferenceData and Applications Security and Privacy (DBSec), July 14-16, 2014, Vienna, Austria. pp. 243-259. Lecture Notes in Computer Science 8566. Springer. ISBN 978-3-662-43936-4
Corradin, M.C. (2014) Then and Now: On The Maturity of Cybercrime Markets. Master's thesis, University of Twente.
Dacer, M.C. and Kargl, F. and König, H. and Valdes, A. (2014) Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292). Dagstuhl Reports, 4 (7). pp. 62-79. ISSN 2192-5283
Dacier, M.C and Kargl, F. and van der Heijden, R. and König, H. and Valdes, A. (2014) Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures. Informatik Spektrum, 37 (6). pp. 605-607. ISSN 0170-6012
Davelaar, K.I. (2014) Protecting high school students from bullying: Bully Shield. Master's thesis, University of Twente.
Dechesne, F. and Hadžiosmanović, D. and Pieters, W. (2014) Experimenting with Incentives: Security in Pilots for Future Grids. IEEE Security & Privacy, 12 (6). pp. 59-66. ISSN 1540-7993 *** ISI Impact 0,902 ***
Delzanno, G. and Rensink, A. and Traverso, R. (2014) Graph- versus Vector-Based Analysis of a Consensus Protocol. In: Proceedings of the 3rd Workshop on GRAPH Inspection and Traversal Engineering (GRAPHITE 2014), 5 April 2014, Grenoble, France. pp. 44-57. Electronic Proceedings in Theoretical Computer Science 159. EPTCS. ISSN 2075-2180
Demirezen, Z. and Tanik, M.M. and Akşit, M. and Skjellum, A. (2014) A communication-channel-based representation system for software. Integrated Computer-Aided Engineering, 21 (3). pp. 235-247. ISSN 1069-2509 *** ISI Impact 4,981 ***
Dietzel, S. and Gürtler, J.Y. and van der Heijden, R. and Kargl, F. (2014) Redundancy-based Statistical Analysis for Insider Attack Detection in VANET Aggregation Schemes. In: Proceedings of the IEEE Vehicular Networking Conference 2014 (VNC 2014), 3-5 Dec 2014, Paderborn, Germany. pp. 135-142. IEEE. ISBN 978-1-4799-7660-7
Dietzel, S. and van der Heijden, R. and Decke, H and Kargl, F. (2014) A flexible, subjective logic-based framework for misbehavior detection in V2V networks. In: IEEE 15th International Symposium on A World of Wireless, Mobile and Multimedia Networks, WoWMoM 2014, 16-19 Jun 2014, Sydney, Australia. pp. 513-516. IEEE. ISBN 978-1-4799-4785-0
Dietzel, S. and Petit, J.Y. and Kargl, F. and Scheuermann, B. (2014) In-Network Aggregation for Vehicular Ad Hoc Networks. IEEE communications surveys & tutorials, 16 (4). pp. 1909-1932. ISSN 1553-877X *** ISI Impact 9,220 ***
van Dijk, T. and van de Pol, J.C. (2014) Lace: non-blocking split deque for work-stealing. In: Proceedings of the 7th International Euro-Par Workshop on Multi-/Many-core Computing Systems, MuCoCoS 2014, 26 Aug 2014, Porto, Portugal. pp. 206-217. Lecture Notes in Computer Science 8806. Springer International Publishing. ISSN 0302-9743 ISBN 978-3-319-14312-5
Duipmans, E.F. and Ferreira Pires, L. and Bonino da Silva Santos, L.O. (2014) A transformation-based approach to business process management in the cloud. Journal of Grid Computing, 12 (2). pp. 191-219. ISSN 1570-7873 *** ISI Impact 1,561 ***
Etalle, S. and Zannone, N. (2014) Understanding computer security. Frontiers in ICT, 1 (3). pp. 1-2. ISSN 2297-198X
Förster, D. and Kargl, F. and Löhr, H. (2014) PUCA: A Pseudonym Scheme with User-Controlled Anonymity for Vehicular Ad-Hoc Networks (VANET). In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2014), 3-5 Dec 2014, Paderborn, Germany. pp. 25-32. IEEE. ISBN 978-1-4799-7660-7
Feiri, M.P. and Petit, J.Y. and Kargl, F. (2014) Real world privacy expectations in VANETs real world privacy expectations in VANETs. In: Proceedings of the 2nd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2014), 20-21 Feb 2014, Luxembourg City, Luxembourg. pp. 30-32. Vehicular Lab, University of Luxembourg. ISBN 978-2-87971-124-9
Feiri, M.P. and Petit, J.Y. and Kargl, F. (2014) An evaluation framework for pre-distribution strategies of certificates in VANETs. In: Proceedings of 2nd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2014), 20-21 February 2014, Luxembourg City, Luxembourg. pp. 22-23. Vehicular Lab, University of Luxemburg. ISBN 978-2-87971-124-9
Feiri, M.P. and Petit, J.Y. and Kargl, F. (2014) Formal Model of Certificate Omission Schemes in VANET. In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2014), 3-5 Dec 2014, Paderborn, Germany. pp. 41-44. IEEE. ISBN 978-1-4799-7660-7
van Galen, R. (2014) Design and feasibility of mobile peer-to-peer payment systems. Master's thesis, University of Twente.
Göknil, A. and Kurtev, I. and van den Berg, K.G. (2014) Generation and validation of traces between requirements and architecture based on formal trace semantics. Journal of Systems and Software, 88. pp. 112-137. ISSN 0164-1212 *** ISI Impact 1,424 ***
Göknil, A. and Kurtev, I. and van den Berg, K.G. and Spijkerman, W. (2014) Change impact analysis for requirements: A metamodeling approach. Information and Software Technology, 56. pp. 950-972. ISSN 0950-5849 *** ISI Impact 1,569 ***
Gielen, M.W. (2014) Prioritizing Computer Forensics Using Triage Techniques. Master's thesis, University of Twente.
Gnesi, S. and Rensink, A. (2014) Fundamental Approaches to Software Engineering - Preface. In: 17th International Conference on Fundamental Approaches to Software Engineering, FASE 2014, 05-13 Apr 2014, Grenoble, France. VII-VII. Lecture Notes in Computer Science 8411. Springer Verlag. ISBN 978-3-642-54803-1
Gong, Zheng and Hartel, P.H. and Nikova, S.I. and Tang, Shao-Hua and Zhu, Bo (2014) TuLP:A family of lightweight message authentication codes for body sensor networks. Journal of Computer Science and Technology, 29 (1). pp. 53-68. ISSN 1000-9000 *** ISI Impact 0,475 ***
Guck, D. and Timmer, M. and Blom, S.C.C. (2014) Extending Markov Automata with State and Action Rewards. In: Proceedings of the 12th Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL 2014), 12-13 April 2014, Grenoble, France. Inria. ISBN not assigned
Hadžiosmanović, D. (2014) The process matters: cyber security in industrial control systems. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 13-282 ISBN 978-90-365-3604-2
Hadžiosmanović, D. and Sommer, R. and Zambon, Emmanuele and Hartel, P.H. (2014) Through the eye of the PLC: semantic security monitoring for industrial processes. In: ACSAC'14 Proceedings of the 30th Annual Computer Security Applications Conference, 8-12 Dec 2014, New Orleans, LA, USA. pp. 126-135. ACM. ISBN 978-1-4503-3005-3
Hansen, H. and Timmer, M. (2014) A comparison of confluence and ample sets in probabilistic and non-probabilistic branching time. Theoretical computer science, 538. pp. 103-123. ISSN 0304-3975 *** ISI Impact 0,643 ***
Haraksim, R. (2014) Validation of Likelihood Ratio Methods Used for Forensic Evidence Evaluation: Application in Forensic Fingerprints. PhD thesis, Univ. of Twente. CTIT Ph.D.-thesis series No. 13-302 ISBN 978-90-365-3648-6
van der Heijden, R.W. and Kargl, F. (2014) Open issues in differentiating misbehavior and anomalies for VANETs. In: Proceedings of 2nd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2014), 20-21 Feb 2014, Luxembourg City, Luxembourg. pp. 24-26. Vehicular Lab, University of Luxembourg. ISBN 978-2-87971-124-9
Hek, G.M. and Timmer, M. (2014) In de verdediging: Efficient Modelling, Generation and Analysis of Markov Automata. Nieuw archief voor wiskunde, 15 (1). pp. 25-26. ISSN 0028-9825
Huisman, M. (2014) SCP special issue on Bytecode 2012 - Preface. Science of Computer Programming, 92A. pp. 1-1. ISSN 0167-6423 *** ISI Impact 0,828 ***
Huisman, M. and Ahrendt, W. and Bruns, D. and Hentschel, M. (2014) Formal specification with JML. Technical Report 2014-10, Department of Informatics, Karlsruhe Institute of Technology, Karlsruhe. ISSN 2190-4782
Huisman, M. and van de Pol, J.C. (2014) Preface. In: Proceedings of the 14th International Workshop on Automated Verification of Critical Systems (AVoCS 2014), 24-26 Sep 2014, Enschede, The Netherlands. pp. 1-3. Electronic Communications of the EASST 70. European Association of Software Science and Technology. ISSN 1863-2122
Jakumeit, E. and Buchwald, S. and Wagelaar, D. and Dan, L. and Hegedüs, Á and Herrmannsdörfer, M. and Horn, T. and Kalnina, E. and Krause, C. and Lano, K. and Lepper, M. and Rensink, A. and Rose, L.M. and Wätzoldt, S. and Mazanek, S. (2014) A survey and comparison of transformation tools based on the transformation tool contest. Science of computer programming, 85 (A). pp. 41-99. ISSN 0167-6423 *** ISI Impact 0,828 ***
Jeckmans, A.J.P. (2014) Cryptographically-Enhanced Privacy for Recommender Systems. PhD thesis, Univ. of Twente. CTIT Ph.D.-thesis series No. 13-290 ISBN 978-90-365-3593-9
Kant, G. and van de Pol, J.C. (2014) Generating and Solving Symbolic Parity Games. In: Proceedings 3rd Workshop on GRAPH Inspection and Traversal Engineering (GRAPHITE 2014), 05 Apr 2014, Grenoble, France. pp. 2-14. Electronic Proceedings in Theoretical Computer Science 159. EPTCS. ISSN 2075-2180
Kargl, F. and van der Heijden, R. and König, H. and Valdes, A. and Dacier, M.C. (2014) Insights on the Security and Dependability of Industrial Control Systems. IEEE Security and Privacy Magazine, 12 (6). pp. 75-78. ISSN 1540-7993 *** ISI Impact 0,902 ***
Katoen, J.P. (2014) Model Checking Gigantic Markov Models. (Invited) In: Proceedings of the 12th International Conference on Software Engineering and Formal Methods, SEFM 2014, 1-5 Sep 2014, Grenoble, France. xv-xvii. Lecture Notes in Computer Science 8702. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-10430-0
Katoen, J.P. and Song, Lei and Zhang, Lijun (2014) Probably safe or live. In: Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), 14-18 July 2014, Vienna, Austria. 55. ACM. ISBN 978-1-4503-2886-9
Knapik, P. and Petit, J.Y. and Kargl, F. and Schoch, E. (2014) Cooperative home light: assessment of a security function for the automotive field. International Journal on Advances in Security, 7 (1&2). pp. 1-14. ISSN 1942-2636
Kordy, P.T. and Langerak, R. and Mauw, S. and Polderman, J.W. (2014) A Symbolic Algorithm for the Analysis of Robust Timed Automata. In: 19th International Symposium on Formal Methods, FM 2014, 12-16 May 2014, Singapore. pp. 351-366. Lecture Notes in Computer Science 8442. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-06409-3
Laarman, A.W. (2014) Scalable multi-core model checking. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 14-308 ISBN 978-90-365-3656-1
van Lenthe, J.M. (2014) Combining Multiple Malware Detection; Approaches for Achieving Higher Accuracy. Master's thesis, Univ. of Twente.
Mader, A.H. and Dertien, E.C. (2014) How to educate for creativity in creative technology? In: Proceedings of the E&PDE 2014 16th International conference on Engineering and Product Design, 3-4 Sept 2014, Enschede, Netherlands. pp. 562-567. E&PDE. The Design Society. ISBN 978-1-904670-56-8
Mader, A.H. and Eggink, W. (2014) A Design Process for Creative Technology. In: Proceedings of the 16th International conference on Engineering and Product Design, E&PDE 2014 , 3-5 september 2014, Enschede, Netherlands. pp. 568-573. E&PDE. The Design Society. ISBN 978-1-904670-56-8
Malakuti Khah Olun Abadi, S. and Akşit, M. (2014) Event Modules - Modularizing Domain-Specific Crosscutting RV Concerns. In: Transactions on Aspect-Oriented Software Development XI. Lecture Notes in Computer Science 8400. Springer Verlag, Berlin, Heidelberg, pp. 27-69. ISSN 0302-9743 ISBN 978-3-642-55098-0
Malakuti Khah Olun Abadi, S. and Akşit, M. (2014) Event-based Modularization: How Emergent Behavioral Patterns Must Be Modularized? In: Proceedings of the 13th Workshop on Foundations of Aspect-Oriented Languages, FOAL 2014, 22-25 April 2014, Lugano, Switzerland . pp. 7-12. ACM. ISBN 978-1-4503-2798-5
Malakuti Khah Olun Abadi, S. and Akşit, M. (2014) Event-Based Modularization of Reactive Systems. In: Concurrent Objects and Beyond: Papers dedicated to Akinori Yonezawa on the Occasion of His 65th Birthday. Lecture Notes in Computer Science 8665. Springer Verlag, Berlin, Heidelberg, pp. 367-407. ISSN 0302-9743 ISBN 978-3-662-44470-2
Malakuti Khah Olun Abadi, S. and Akşit, M. (2014) Emergent Gummy Modules: Modular Representation of Emergent Behavior. In: Proceedings of the 2014 International Conference on Generative Programming: Concepts and Experiences, GPCE 2014, 15-16 Sept 2014, Västerås, Sweden. pp. 15-24. ACM. ISBN 978-1-4503-3161-6
Meijer, J.J.G. and Kant, G. and Blom, S.C.C. and van de Pol, J.C. (2014) Read, Write and Copy Dependencies for Symbolic Model Checking. In: Proceedings of the 10th International Haifa Verification Conference, HVC 2014, 18-20 Nov 2014, Haifa, Israel. pp. 204-219. Lecture Notes in Computer Science 8855. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-13337-9
Ngo, Minh Tri (2014) Qualitative and Quantitative Information Flow Analysis for Multi-threaded Programs. PhD thesis, Univ. of Twente. CTIT Ph.D.-thesis series No. 14-305 ISBN 978-90-365-3652-3
Ngo, Minh Tri and Huisman, M. (2014) Quantitative security analysis for programs with low input and noisy output. In: Proceedings of the 6th International Symposium on Engineering Secure Software and Systems, ESSoS 2014, 26-28 Feb 2014, Munich, Germany. pp. 77-94. Lecture Notes in Computer Science 8364. Springer Verlag. ISBN 978-3-319-04896-3
Ngo, Minh Tri and Stoelinga, M.I.A. and Huisman, M. (2014) Effective verification of confidentiality for multi-threaded programs. Journal of computer security, 22 (2). pp. 269-300. ISSN 0926-227X
Petit, J.Y. and Feiri, M.P. and Kargl, F. (2014) Revisiting attacker model for smart vehicles. In: IEEE 6th International Symposium on Wireless Vehicular Communications (WiVeC 2014), 14-15 Sept 2014, Vancouver, Canada. pp. 1-5. IEEE. ISBN 978-1-4799-4452-1
Pieters, W. and Hadžiosmanović, D. and Dechesne, F. (2014) Cyber Security as Social Experiment. In: NSPW '14 Proceedings of the 2014 workshop on New Security Paradigms, NSPW 2014, 15-18 Sep. 2014, Victoria, BC, Canada. pp. 15-24. ACM. ISBN 978-1-4503-3062-6
Pieters, W. and Lukszo, Z. and Hadžiosmanović, D. and van den Berg, Jan (2014) Reconciling Malicious and Accidental Risk in Cyber Security. Journal of Internet Services and Information Security, 4 (2). pp. 4-26. ISSN 2182-2069
van de Pol, J.C. and Ruys, T.C. and te Brinke, S. (2014) Thoughtful brute-force attack of the RERS 2012 and 2013 Challenges. International journal on software tools for technology transfer, 16 (5). pp. 481-491. ISSN 1433-2779
Poskitt, C. and Dodds, M. and Paige, R.F. and Rensink, A. (2014) Towards Rigorously Faking Bidirectional Model Transformations. In: Proceedings of the Workshop on Analysis of Model Transformations, AMT 2014, 29 Sep 2014, Valencia, Spain. pp. 70-75. CEUR-WS 1277. RWTH Aachen, Germany. ISSN 1613-0073
Rensink, A. (2014) Forever software. In: 6th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, ISOLA 2014, 11 Oct 2014, Corfu, Greece. pp. 535-537. Lecture Notes in Computer Science 8802. Springer Verlag. ISSN 0302-9743 ISBN 978-3-662-45233-2
de Roo, A.J. and Sözer, H. and Akşit, M. (2014) Composing domain-specific physical models with general-purpose software modules in embedded control software. Software and Systems Modeling, 13 (1). pp. 55-81. ISSN 1619-1366 *** ISI Impact 0,990 ***
Schürr, A. and Rensink, A. (2014) Software and systems modeling with graph transformations: Theme issue of the Journal on Software and Systems Modeling. Software and systems modeling, 13 (1). pp. 171-172. ISSN 1619-1366 *** ISI Impact 0,990 ***
Sytema, M. and Belinfante, A.F.E. and Stoelinga, M.I.A. and Marinelli, L. (2014) Experiences with formal engineering: model-based specification, implementation and testing of a software bus at Neopost. Science of computer programming, 80 (Part A). pp. 188-209. ISSN 0167-6423 *** ISI Impact 0,828 ***
Timmer, M. (2014) Community of Learners: samen met vakcollega's werken aan didactiekverbetering. De Lerarenagenda 2013-2020, 2014. ISSN not assigned
Timmer, M. (2014) Community of Learners (2): samen met vakcollega's op zoek naar een betere introductie van telproblemen. De Lerarenagenda 2013-2020, 2014. ISSN not assigned
Timmer, M. (2014) Community of Learners (3): wat leert de docent nu eigenlijk? De Lerarenagenda 2013-2020, 2014. ISSN not assigned
Timmer, M. (2014) Efficient Modelling, Generation and Analysis of Markov Automata. Bulletin of the European Association for Theoretical Computer Science, 112. pp. 139-140. ISSN 0252-9742
Timmer, M. and Verhoef, N.C. (2014) Combinatoriek: meer dan trucjes. Euclides, 90 (3). pp. 12-13. ISSN 0165-0394
Trivellato, D. and Zannone, N. and Etalle, S. (2014) GEM: A distributed goal evaluation algorithm for trust management. Theory and Practice of Logic Programming, 14 (3). pp. 293-337. ISSN 1471-0684 *** ISI Impact 0,952 ***
Verbij, R.P. (2014) Dutch e-voting opportunities. Risk assessment framework based on attacker resources. Master's thesis, Univ. of Twente.
Verhoef, N.C. and Timmer, M. and Hoeksema, F.W. (2014) De introductie van analytische meetkunde. Euclides, 90 (2). pp. 4-6. ISSN 0165-0394
Wevers, L. (2014) Persistent Functional Languages: Toward Functional Relational Databases. In: Proceedings of the 2014 SIGMOD PhD Symposium, 22 Jun 2014, Snowbird, Utah, USA. pp. 21-25. ACM. ISBN 978-1-4503-2924-8
Wevers, L. and te Brinke, S. (2014) Monte-Carlo Tree Search for Poly-Y. In: Proceedings of the 26th Benelux Conference on Artificial Intelligence, BNAIC 2014, 6-7 Nov 2014, Nijmegen, the Netherlands. pp. 119-127. Radboud Universiteit Nijmegen. ISSN 1568-7805
Wevers, L. and Hofstra, M and Tammens, M and Huisman, M. and van Keulen, M. (2014) Towards Online Relational Schema Transformations. In: Dutch-Belgian Database Day 2014, 17 Oct 2014, Antwerp, Belgium. 1. Dutch-Belgian Database Day. ISBN not assigned
Wevers, L. and Hofstra, M. and Tammens, M. and Huisman, M. and van Keulen, M. (2014) Towards Online and Transactional Relational Schema Transformations. Technical Report TR-CTIT-14-10, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Yildiz, B.M. and Bockisch, C.M. and Rensink, A. and Akşit, M. (2014) A timed-automata approach for critical path detection in a soft real-time application. In: Proceedings of the 22nd Euromicro International Conference on Parallel, Distributed and network-based Processing, PDP 2014, Work In Progress Session, 12-14 Feb 2014, Turin, Italy. SEA-Johannes Kepler University Linz. ISBN 978-3-902457-39-4
Zaharieva-Stojanovski, M. and Huisman, M. (2014) Verifying class invariants in concurrent programs. In: Proceedings of the 17th International Conference on Fundamental Approaches to Software Engineering (FASE 2014), 5-13 April, 2014, Grenoble, France. pp. 230-245. Lecture Notes in Computer Science 8411. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-54803-1
Zaharieva-Stojanovski, M. and Huisman, M. and Blom, S.C.C. (2014) Verifying Functional Behaviour of Concurrent Programs. In: FTfJP'14: Proceedings of 16th Workshop on Formal Techniques for Java-like Programs, 28 Jul 2014, Uppsala, Sweden. 4:1-4:6. ACM. ISBN 978-1-4503-2866-1
Zambon, Eduardo and Rensink, A. (2014) Solving the N-Queens Problem with GROOVE - Towards a Compendium of Best Practices. In: Proceedings of the 13th International Workshop on Graph Transformation and Visual Modeling Techniques (GTVMT 2014), 5-6 April 2014, Grenoble, France. Electronic Communications of the EASST 67. European Association of Software Science and Technology. ISSN 1863-2122

2013

Gozalvez, J. and Kargl, F. and Mittag, J. and Kravets, R. and Tsai, M., ed. (2013) VANET '13: Proceeding of the Tenth ACM International Workshop on Vehicular Inter-networking, Systems, and Applications. ACM, New York. ISBN 978-1-4503-2073-3
Amighi, A. and Blom, S.C.C. and Huisman, M. and Mostowski, W.I. and Zaharieva-Stojanovski, M. (2013) Formal specifications for Java’s synchronisation classes. Technical Report TR-CTIT-13-18, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Armknecht, F. and Katzenbeisser, S. and Peter, A. (2013) Group homomorphic encryption: characterizations, impossibility results, and applications. Designs, Codes and Cryptography, 67 (2). pp. 209-232. ISSN 0925-1022 *** ISI Impact 0,781 ***
Arnold, F. and Belinfante, A.F.E. and Van der Berg, F.I. and Guck, D. and Stoelinga, M.I.A. (2013) DFTCalc: a tool for efficient fault tree analysis. In: Proceedings of the 32nd International Conference on Computer Safety, Reliability, and Security (SAFECOMP), 24-27 Sep 2013, Toulouse, France. pp. 293-301. Lecture Notes in Computer Science 8153. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-40793-2
Arnold, F. and Pieters, W. and Stoelinga, M.I.A. (2013) Quantitative penetration testing with item response theory. In: 9th International Conference on Information Assurance and Security, IAS 2013, 4-6 Dec 2013, Gammarth, Tunisia. pp. 49-54. IEEE. ISBN 978-1-4799-2989-4
Asveld, P.R.J. (2013) Permuting Operations on Strings and the Distribution of Their Prime Numbers. Discrete applied mathematics, 161 (13-14). pp. 1868-1881. ISSN 0166-218X *** ISI Impact 0,722 ***
Asveld, P.R.J. (2013) Queneau Numbers - Recent Results and a Bibliography. Technical Report TR-CTIT-13-16, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Baier, C. and Hahn, E.M. and Haverkort, B.R.H.M. and Hermanns, H. and Katoen, J.P. (2013) Model checking for performability. Mathematical Structures in Computer Science, 23 (Special Issue 04). pp. 751-795. ISSN 0960-1295 *** ISI Impact 0,758 ***
Belinfante, A.F.E. and Rensink, A. (2013) Publishing Your Prototype Tool on the Web: PUPTOL, a Framework. Technical Report TR-CTIT-13-15, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Bilgin, B. and Bogdanov, A. and Knezevic, M. and Mendel, F. and Wang, Qingju (2013) Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware. In: Cryptographic Hardware and Embedded Systems, CHES 2013, 20-23 Aug 2013, Santa Barbara, CA, USA. pp. 142-158. Lecture Notes in Computer Science 8086. Springer Berlin Heidelberg. ISBN 978-3-642-40348-4
Bilgin, B. and Daemen, J. and Nikov, V. and Nikova, S.I. and Rijmen, V. and Van Assche, G. (2013) Efficient and First-Order DPA Resistant Implementations of Keccak. In: 12th Smart Card Research and Advanced Application Conference (CARDIS), 27-29 Nov 2013, Berlin, Germany. pp. 187-199. Lecture Notes in Computer Science (8419). Springer International Publishing. ISBN 978-3-319-08302-5
Blakey, E. and Coecke, B. and Mislove, M. and Pavlovic, D. (2013) Information security as a resource. Information and computation, 226. pp. 1-2. ISSN 0890-5401 *** ISI Impact 0,873 ***
Bockisch, C.M. and Hatun, K. (2013) Instance Pointcuts for Program Comprehension. In: Proceedings of the 1st International Workshop on Comprehension of Complex Systems (CoCoS 2013), 25 Mar 2013, Fukuoka, Japan. pp. 7-12. ACM. ISBN 978-1-4503-1863-1
Bockisch, C.M. and Sewe, A. (2013) Efficient language implementation with ALIA4J and EMFText: forum demonstration. In: Proceedings of the 12th Annual International Conference Companion on Aspect-Oriented Software Development, AOSD 2013, 24-29 Mar 2013, Fukuoka, Japan. pp. 7-10. ACM. ISBN 978-1-4503-1873-0
te Brinke, S. and Bockisch, C.M. and Bergmans, L.M.J. and Malakuti Khah Olun Abadi, S. and Akşit, M. and Katz, S. (2013) Deriving minimal models for resource utilization. In: Proceedings of the 1st International Workshop Green In Software Engineering, Green By Software Engineering (GIBSE 2013), 26 Mar 2013, Fukuoka, Japan. pp. 15-18. ACM. ISBN 978-1-4503-1866-2
te Brinke, S. and Malakuti Khah Olun Abadi, S. and Bockisch, C.M. and Bergmans, L.M.J. and Akşit, M. (2013) A Design Method For Modular Energy-Aware Software. In: Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC 2013), 18-22 Mar 2013, Coimbra, Portugal. pp. 1180-1182. ACM. ISBN 978-1-4503-1656-9
Bruns, D. and Mostowski, W.I. and Ulbrich, M. (2013) Implementation-level verification of algorithms with KeY. International journal on software tools for technology transfer, 17 (6). pp. 729-744. ISSN 1433-2779
Bullee, J.H. (2013) Detection of leadership in informal (small)groups based on CCTV information. Master's thesis, University of Twente.
Cardoso de Moraes, J.L. and Lopes de Souza, W. and Cavalini, L.T. and Ferreira Pires, L. and do Prado, A.F. (2013) An approach for message exchange using archetypes. In: Proceedings of the 14th World Congress on Medical and Health Informatics, MEDINFO 2013, 20-23 Aug 2013, Copenhagen, Denmark. pp. 1136-1136. Studies in Health Technology and Informatics 192. IOS Press BV. ISSN 0926-9630 ISBN 978-1-61499-288-2
Cardoso de Moraes, J.L. and Lopes de Souza, W. and Ferreira Pires, L. and Cavalini, L.T. and do Prado, A.F. (2013) A novel architecture for message exchange in pervasive healthcare based on the use of intelligent agents. In: Proceedings of the 10th ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2013, 27-30 May 2013, Fez, Morroco. pp. 1-8. ACS/IEEE International Conference on Computer Systems and Applications. IEEE Computer Society. ISSN 2161-5322 ISBN 978-1-4799-0790-8
Cardoso de Moraes, J.L. and Lopes de Souza, W. and Ferreira Pires, L. and Cavalini, L.T. and do Prado, A.F. (2013) Using the dual-level modeling approach to developing applications in the pervasive healthcare environment. Journal of Mobile Multimedia, 9 (1&2). pp. 111-127. ISSN 1550-4646
Cardoso de Moraes, J.L. and Lopes de Souza, W. and Ferreira Pires, L. and Cavalini, L.T. and do Prado, A.F. (2013) A novel approach to developing applications in the pervasive healthcare environment through the use of archetypes. In: 13th International Conference on Computational Science and Its Applications, ICCSA 2013, 24-27 Jun 2013, Ho Chi Minh City, Vietnam. pp. 475-490. Lecture Notes in Computer Science 7975. Springer Verlag. ISBN 978-3-642-39639-7
Cardoso de Moraes, J.L. and Lopes de Souza, W. and Ferreira Pires, L. and do Prado, A.F. (2013) Message generation facilities for interoperability in pervasive healthcare environments. In: Proceedings of the 19th Americas Conference on Information Systems, AMCIS 2013, 15-17 Aug 2013, Chicago, USA. Association for Information Systems . ISBN not assigned
Cardoso de Moraes, J.L. and Lopes de Souza, W. and Ferreira Pires, L. and do Prado, A.F. (2013) Towards a reusable architecture for message exchange in pervasive healthcare. In: Proceedings of the 15th International Conference on Enterprise Information Systems, ICEIS 2013, 4-7 July 2013, Angers, France. pp. 391-400. SciTePress. ISBN 978-989-8565-60-0
Caselli, M. and Hadžiosmanović, D. and Zambon, Emmanuele and Kargl, F. (2013) On the feasibility of device fingerprinting in industrial control systems. In: Critical Information Infrastructures Security, 16-18 Sept 2013, Amsterdam. pp. 155-166. Lecture Notes in Computer Science (8328). Springer. ISSN 0302-9743 ISBN 978-3-319-03963-3
Cohen, A. and Donaldson, A.F. and Huisman, M. and Katoen, J.P. (2013) Correct and Efficient Accelerator Programming (Dagstuhl Seminar 13142). Dagstuhl reports 3(4), Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany. ISSN 2192-5283
Dacier, M. and Kargl, F. and Valdes, A. (2013) Securing critical infrastructures from targeted attacks (Dagstuhl Seminar 12502). Dagstuhl Reports, 2 (12). pp. 49-63. ISSN 2192-5283
Daniele, L.M. and Ferreira Pires, L. (2013) An ontological approach to logistics. In: Enterprise Interoperability, Research and Applications in the Service-oriented Ecosystem, IWEI'13 Proceedings, 26 Mar 2013, Enschede, the Netherlands. pp. 199-213. ISTE Ltd, John Wiley & Sons, Inc.. ISBN 978-1-84821-662-4
De Meyer, L. and Bilgin, B. and Preneel, B. (2013) Extended Analysis of DES S-boxes. In: Proceedings of the 34rd Symposium on Information Theory in the Benelux, 30-31 May 2013, Leuven, Belgium. pp. 140-146. Twente University Press. ISBN 978-90-365-0000-5
Dietzel, S. and Balanici, M. and Kargl, F. (2013) Short Paper: Towards Data-similarity-based Clustering for Inter-vehicle Communication. In: Proceedings of the IEEE Vehicular Networking Conference 2013 (VNC 2013), 16-18 Dec 2013, Boston, MA, USA. pp. 238-241. IEEE Communications Society. ISBN 978-1-4799-2687-9
Dietzel, S. and Petit, J.Y. and Heijenk, G.J. and Kargl, F. (2013) Graph-based metrics for insider attack detection in VANET multihop data dissemination protocols. IEEE Transactions on Vehicular Technology, 62 (4). pp. 1505-1518. ISSN 0018-9545 *** ISI Impact 2,243 ***
Drijfhout, W. and Oliver, J. and Wevers, L. and Hiemstra, D. (2013) Traitor: associating concepts using the world wide web. In: Proceedings of the 13th Dutch-Belgian Workshop on Information Retrieval, DIR 2013, 26 Apr 2013, Delft, The Netherlands. pp. 56-57. CEUR Workshop Proceedings 986. CEUR. ISSN 1613-0073
Etalle, S. (2013) Innovatie en R&D -- een Inleiding. Magazine nationale veiligheid en crisisbeheersing, 11 (1). pp. 3-5. ISSN 1875-7561
Etalle, S. and Hinrichs, T. and Lee, A. and Trivellato, D. and Zannone, N. (2013) Policy administration in tag-based authorization. In: 5th International Symposium on Foundations and Practice of Security, FPS 2012, 25-26 Oct 2012, Montreal, QC, Canada. pp. 162-179. Lecture Notes in Computer Science 7743. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-37119-6
Feiri, M.P. and Petit, J.Y. and Kargl, F. (2013) Efficient and secure storage of private keys for pseudonymous vehicular communication. In: First Workshop on Security, Privacy and Dependability for CyberVehicles (CyCar) at 20th ACM Conference on Computer and Communications Security (ACM CCS 2013), 04 Nov 2013, Berlin, Germany. pp. 9-18. ACM. ISBN 978-1-4503-2487-8
Ferreira Pires, L. and Johnson, P. (2013) Report Workshop 5. In: Enterprise Interoperability, Research and Applications in the Service-oriented Ecosystem, IWEI'13 Proceedings, 26 Mar 2013, Enschede, the Netherlands. pp. 181-183. ISTE Ltd, John Wiley & Sons, Inc.. ISBN 978-1-84821-662-4
Güleşir, G. and Bergmans, L.M.J. and Akşit, M. and van den Berg, K.G. (2013) Vibes: a visual language for specifying behavioral requirements of algorithms. Journal of Visual Languages & Computing, 24 (5). pp. 350-364. ISSN 1045-926X *** ISI Impact 0,634 ***
Guck, D. and Hatefi, H. and Hermanns, H. and Katoen, J.P. and Timmer, M. (2013) Modelling, Reduction and Analysis of Markov Automata (extended version). Technical Report arXiv:1305.7050, Cornell University, Ithaca, NY, USA. ISSN not assigned
Guck, D. and Hatefi, H. and Hermanns, H. and Katoen, J.P. and Timmer, M. (2013) Modelling, Reduction and Analysis of Markov Automata. In: Proceedings of the 10th International Conference on Quantitative Evaluation of Systems (QEST), 27-30 Aug 2013, Buenos Aires, Argentina. pp. 55-71. Lecture Notes in Computer Science 8054. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-40195-4
Gurov, D. and Huisman, M. (2013) Reducing Behavioural to Structural Properties of Programs with Procedures. Theoretical computer science, 480. pp. 69-103. ISSN 0304-3975 *** ISI Impact 0,643 ***
Hartel, P.H. (2013) Situative Prävention von Cybercrime: ein chancenreicher Bekämpfungsansatz. In: Cybercrime - Bedrohung, Intervention, Abwehr, 12-13 Nov 2013, Wiesbaden, Germany. pp. 96-108. Bundeskriminalamt. ISBN not assigned
Hartel, P.H. and van den Berg, Jan and Junger, M. (2013) Wat gaan we doen tegen de cyberaanvallen? Informatiebeveiliging, 4 (4). pp. 10-11. ISSN 1569-1063
Hartel, P.H. and Luiijf, E. (2013) Critical information infrastructures security - preface. In: 8th International Workshop on Critical Information Infrastructures Security, CRITIS 2013, 16-18 Sep 2013, Amsterdam. v-vi. Lecture Notes in Computer Science 8328. Springer. ISBN 978-3-319-03963-3
Hartmanns, A. and Timmer, M. (2013) On-the-fly confluence detection for statistical model checking (extended version). Technical Report TR-CTIT-13-04, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Hartmanns, A. and Timmer, M. (2013) On-the-fly confluence detection for statistical model checking. In: Proceedings of the 11th Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL 2013), 23-24 Mar 2013, Rome, Italy. 19. University of Trieste. ISBN not assigned
Hartmanns, A. and Timmer, M. (2013) On-the-Fly Confluence Detection for Statistical Model Checking. In: Proceedings of the 5th International Symposium on NASA Formal Methods (NFM 2013), 14-16 May 2013, Moffett Field, CA, USA. pp. 337-351. Lecture Notes in Computer Science 7871. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-38087-7
Höfer, C.N. (2013) POPCORN: Privacy-preserving charging for eMobility. Master's thesis, University of Twente.
van der Heijden, R. and Dietzel, S. and Kargl, F. (2013) SeDyA: secure dynamic aggregation in VANETs. In: WiSec '13 Proceedings of the sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 17-19 April 2013, Budapest, Hungary. pp. 131-142. ACM. ISBN 978-1-4503-1998-0
van der Heijden, R. and Dietzel, S. and Kargl, F. (2013) Misbehavior detection in vehicular ad-hoc networks. In: Proceedings of 1st GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2013), 21-22 Feb 2013, Innsbruck, Austria. University of Innsbruck. ISBN not assigned
Hoefer, C. and Petit, J.Y. and Schmidt, R. and Kargl, F. (2013) POPCORN: privacy-preserving charging for eMobility. In: First Workshop on Security, Privacy and Dependability for CyberVehicles (CyCar) at 20th ACM Conference on Computer and Communications Security (ACM CCS 2013), 04 Nov 2013, Berlin, Germany. pp. 37-48. ACM. ISBN 978-1-4503-2487-8
Hoefer, C. and Petit, J.Y. and Schmidt, R. and Kargl, F. (2013) POPCORN: Privacy-preserving Charging for e-Mobility. In: 29. VDI/VW-Gemeinschaftstagung Automotive Security, 25-26 Sep 2013, Kassel, Germany. pp. 33-46. VDI. ISBN not assigned
Huisman, M. and Mihelcic, M. (2013) Specification and Verification of GPGPU programs using Permission-based Separation logic. Technical Report TR-CTIT-13-12, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Jeckmans, A.J.P. and Beye, M.R.T. and Erkin, Z. and Hartel, P.H. and Lagendijk, R.L. and Tang, Qiang (2013) Privacy in Recommender Systems. In: Social Media Retrieval. Computer Communications and Networks. Springer Verlag, London, pp. 263-281. ISSN 1617-7975 ISBN 978-1-4471-4554-7
Jeckmans, A.J.P. and Peter, A. and Hartel, P.H. (2013) Efficient privacy-enhanced familiarity-based recommender system. In: Proceedings of the 18th European Symposium on Research in Computer Security, ESORICS 2013, 9-13 Sep 2013, Egham, UK. pp. 400-417. Lecture Notes in Computer Science 8134. Springer. ISBN 978-3-642-40203-6
Junger, M. and Montoya Morales, A.L. and Hartel, P.H. and Karemaker, M. (2013) Modus operandi onderzoek naar door informatie en communicatie technologie (ICT) gefaciliteerde criminaliteit. Technical Report TR-CTIT-13-07, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Kargl, F. (2013) Softwarepech op de weg. Computer Idee, 2013 (6). pp. 18-21. ISSN 1388-2376
Kargl, F. and Friedman, A. and Boreli, R. (2013) Differential privacy in intelligent transportation systems. In: WiSec '13 Proceedings of the sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 17-19 April 2013, Budapest, Hungary. pp. 107-112. ACM. ISBN 978-1-4503-1998-0
Katoen, J.P. (2013) Model checking meets probability: a gentle introduction. In: Engineering Dependable Software Systems. NATO Science for Peace and Security Series - D: Information and Communication Security 34. IOS Press, Amsterdam, pp. 177-205. ISSN 1874-6268 ISBN 978-1-61499-206-6
Katoen, J.P. (2013) Concurrency meets probability: theory and practice (abstract). (Invited) In: 24th International Conference on Concurrency Theory, CONCUR 2013, 27-30 Aug 2013, Buenos Aires, Argentina. pp. 44-45. Lecture Notes in Computer Science 8052. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-40183-1
Katoen, J.P. and Peled, D. (2013) Taming confusion for modeling and implementing probabilistic concurrent systems. In: Proceedings of the 22nd European Symposium on Programming (ESOP 2013), 16-24 Mar 2013, Rome, Italy. pp. 411-430. Lecture Notes in Computer Science 7792. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-37035-9
Keuper, D. (2013) XNU: a security evaluation. Master's thesis, University of Twente.
Knapik, P. and Schoch, E. and Kargl, F. (2013) Electronic decal: a security function based on V2X communication. In: 77th IEEE Vehicular Technology Conference (VTC 2013-Spring), 02-05 Jun 2013, Dresden, Germany. pp. 1-5. IEEE Vehicular Technology Society. ISSN 1550-2252
Knapik, P. and Schoch, E. and Kargl, F. (2013) Simulation of a Security Function Based on Vehicle-to-X Communication and Automotive Lighting. In: The Second International Conference on Advances in Vehicular Systems, Technologies and Applications (Vehicular 2013), 21-26 Jul 2013, Nice, France. pp. 8-11. IARIA. ISSN 2327-2058 ISBN 978-1-61208-288-2
Knapik, P. and Schoch, E. and Kargl, F. (2013) Security-Funktionen zur Bekämpfung fahrzeugbezogener Kriminalität. In: 29. VDI/VW-Gemeinschaftstagung Automotive Security, 24-25 Sep 2013, Kassel, Germany. pp. 47-62. VDI. ISBN not assigned
Laarman, A.W. and Faragó, D. (2013) Improved On-The-Fly Livelock Detection: Combining Partial Order Reduction and Parallelism for DFSFIFO In: Proceedings of the Fifth NASA Formal Methods Symposium, NFM 2013, 14-16 May 2013, Moffett Field, CA, USA. Lecture Notes in Computer Science . Springer Verlag.
Laarman, A.W. and Olesen, M.Chr. and Dalsgaard, A.E. and Larsen, K.G. and van de Pol, J.C. (2013) Multi-core emptiness checking of timed Büchi automata using inclusion abstraction. In: Proceedings of the 25th International Conference on Computer Aided Verification, CAV 2013, 13-19 July 2013, Saint Petersburg, Russia. pp. 968-983. Lecture Notes in Computer Science. Springer Verlag. ISBN 978-3-642-39798-1
Laarman, A.W. and Pater, E. and van de Pol, J.C. and Weber, Michael (2013) Guard-based Partial-Order Reduction. In: Proceedings of the 20th International SPIN Symposium on Model Checking of Software, SPIN 2013, 8-9 July 2013, Stony Brook, NY, USA. pp. 227-245. Lecture Notes in Computer Science . Springer Verlag. ISBN 978-3-642-39175-0
Lastdrager, E.E.H. and Montoya Morales, A.L. and Hartel, P.H. and Junger, M. (2013) Applying the Lost-Letter Technique to Assess IT Risk Behaviour. In: Proceedings of the 3rd Workshop on Socio-Technical Aspects in Security and Trust, 29 Jun 2013, New Orleans, USA. pp. 2-9. IEEE Computer Society. ISBN 978-0-7695-5065-7
Le, Viet Duc and Scholten, J. and Havinga, P.J.M. (2013) FLEAD: online frequency likelihood estimation anomaly detection for mobile sensing. In: Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '13, 8-12 Sep 2013, Zurich, Switzerland. pp. 1159-1166. ACM. ISBN 978-1-4503-2215-7
Montoya Morales, A.L. (2013) The TREsPASS project. In: ICTOpen2013, 27-28 November 2013, Eindhoven. pp. 1-1. ICTopen. ISBN not assigned
Mostowski, W.I. (2013) A case study in formal verification using multiple explicit heaps. In: Joint IFIP WG 6.1 International Conference on Formal Techniques for Distributed Systems, FMOODS/FORTE 2013, 3-6 June 2013, Florence, Italy. pp. 20-34. Lecture Notes in Computer Science 7892. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-38591-9
Ngo, Minh Tri and Huisman, M. (2013) Quantitative Security Analysis for Multi-threaded Programs. In: Proceedings of the 11th International Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL 2013), 22-23 Mar 2013, Rome, Italy. Electronic Proceedings in Theoretical Computer Science. Open Publishing Association.
Ngo, Minh Tri and Stoelinga, M.I.A. and Huisman, M. (2013) Confidentiality for Probabilistic Multi-Threaded Programs and Its Verification. In: Proceedings of the 5th International Conference on Engineering Secure Software and Systems, ESSoS 2013, 27 Feb - 01 Mar 2013, Paris, France. pp. 107-122. Lecture Notes in Computer Science (7781). Springer Verlag. ISBN 978-3-642-36562-1
Papotti, P.E. and do Prado, A.F. and Lopes de Souza, W. and Cirilo, C.E. and Ferreira Pires, L. (2013) A quantitative analysis of model-driven code generation through software experimentation. In: Proceedings of the 25th International Conference on Advanced Information Systems Engineering, CAiSE 2013, 17-21 Jun 2013, Valencia, Spain. pp. 321-337. Lecture Notes in Computer Science 7908. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-38708-1
Pavlovic, D. (2013) Monoidal computer I: Basic computability by string diagrams. Information and computation, 226. pp. 94-116. ISSN 0890-5401 ISBN 978-3-642-29891-2 *** ISI Impact 0,873 ***
Pavlovic, D. (2013) Bicompletions of distance matrices. In: Computation, Logic, games, and Quantum Foundations. Lecture Notes in Computer Science 7860. Springer Verlag, Berlin, pp. 291-310. ISSN 0302-9743 ISBN 978-3-642-38163-8
Peter, A. and Hartman, T. and Muller, S. and Katzenbeisser, S. (2013) Privacy-preserving architecture for forensic image recognition. In: IEEE International Workshop on Information Forensics and Security, WIFS 2012, 2-5 Dec 2012, Tenerife, Spain. pp. 79-84. Information Forensics and Security (WIFS), 2012 IEEE International Workshop (13249609). IEEE Computer Society. ISBN 978-1-4673-2285-0
Peter, A. and Tews, E. and Katzenbeisser, S. (2013) Efficiently outsourcing multiparty computation under multiple keys. IEEE transactions on information forensics and security, 8 (12). pp. 2046-2058. ISSN 1556-6013 *** ISI Impact 2,441 ***
Pieters, W. (2013) On thinging things and serving services: technological mediation and inseparable goods. Ethics and information technology, 15 (3). pp. 195-208. ISSN 1388-1957 *** ISI Impact 0,739 ***
Pieters, W. (2013) Defining "The Weakest Link" Comparative Security in Complex Systems of Systems. In: 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, CloudCom, 2-5 Dec 2013, Bristol, United Kingdom. pp. 39-44. IEEE Computer Society. ISBN 978-0-7695-5095-4
Pieters, W. and Dimkov, T. and Pavlovic, D. (2013) Security Policy Alignment: A Formal Approach. IEEE Systems Journal, 7 (2). pp. 275-287. ISSN 1932-8184 *** ISI Impact 2,114 ***
Pieters, W. and Padget, J. and Dechesne, F. and Dignum, V. and Aldewereld, H. (2013) Obligations to enforce prohibitions: on the adequacy of security policies. In: SIN '13 - Proceedings of the 6th International Conference on Security of Information and Networks, 26-28 Nov 2013, Aksaray, Turkey. pp. 54-61. Proceeding. ACM. ISBN 978-1-4503-2498-4
Povoa, L.V. and Lopes de Souza, W. and Ferreira Pires, L. and Duipmans, E.F. and do Prado, A.F. (2013) Uma Abordagem para a Decomposição de Processos de Negócio para Execução em Nuvens Computacionais (in Portugese; An approach to business processes decomposition for cloud deployment). In: XXVII Brazilian Symposium on Software Engineering, SBES 2013, 29 Sep - 04 Oct 2013, Brasília. pp. 124-133. Universidade de Brasília (UnB), Departamento de Ciência da Computação (DIMAp/UFRN). ISSN 2175-9677
van 't Riet, M and Yin, Haihan and Bockisch, C.M. (2013) The potential of omniscient debugging for aspect-oriented programming languages. In: Proceedings of the International Workshop on Comprehension of Complex Systems (CoCoS 2013), 25 Mar 2013, Fukuoka, Japan. pp. 13-16. ACM. ISBN 978-1-4503-1863-1
Rocha, B.P.S. and Conti, M. and Etalle, S. and Crispo, B. (2013) Hybrid static-runtime information flow and declassification enforcement. IEEE transactions on information forensics and security, 8 (8). pp. 1294-1305. ISSN 1556-6013 *** ISI Impact 2,441 ***
Roemers, A. and Hatun, K. and Bockisch, C.M. (2013) An adapter-aware, non-intrusive dependency injection framework for Java. In: Proceedings of the 2013 International Conference on Principles and Practices of Programming on the Java Platform: Virtual Machines, Languages, and Tools, PPPJ 2013, 11-13 Sep 2013, Stuttgart, Germany. pp. 57-66. ACM. ISBN 978-1-4503-2111-2
de Roo, A.J. and Sözer, H. and Bergmans, L.M.J. and Akşit, M. (2013) MOO: An architectural framework for runtime optimization of multiple system objectives in embedded control software. Journal of Systems and Software, 86 (10). pp. 2502-2519. ISSN 0164-1212 *** ISI Impact 1,424 ***
Sözer, H. and Tekinerdogan, B. and Akşit, M. (2013) Optimizing decomposition of software architecture for local recovery. Software Quality Journal, 21 (2). pp. 203-240. ISSN 0963-9314 *** ISI Impact 0,787 ***
Schaub, F. and Hipp, M. and Kargl, F. and Weber, M. (2013) On Credibility Improvements for Automotive Navigation Systems. Journal of Personal and Ubiquitous Computing, 17 (5). pp. 803-813. ISSN 1617-4909 *** ISI Impact 1,498 ***
Smid, W.B.T. and Rensink, A. (2013) Class diagram restructuring with GROOVE. In: Proceedings Sixth Transformation Tool Contest, 19-20 Jun 2013, Budapest. Hungary. pp. 83-87. Electronic Proceedings in Theoretical Computer Science 135. arXiv.org. ISSN 2075-2180
Stoelinga, M.I.A. and Pieters, W. (2013) Attack navigator vindt en verhelpt zwakke plekken. Bits en chips, 4. ISSN 1879-6443
Stokkink, W.G.J. and Timmer, M. and Stoelinga, M.I.A. (2013) Divergent Quiescent Transition Systems (extended version). Technical Report TR-CTIT-13-08, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Stokkink, W.G.J. and Timmer, M. and Stoelinga, M.I.A. (2013) Divergent quiescent transition systems. In: Proceedings of the 7th International Conference on Tests and Proofs (TAP 2013), 18-19 June 2013, Budapest, Hungary. pp. 214-231. Lecture Notes in Computer Science 7942. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-38915-3
Timmer, M. (2013) Efficient Modelling, Generation and Analysis of Markov Automata. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 13-261 ISBN 978-90-365-0592-5
Timmer, M. and van de Pol, J.C. and Stoelinga, M.I.A. (2013) Confluence reduction for Markov automata. In: Proceedings of the 11th Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL 2013), 23-24 Mar 2013, Rome, Italy. 18. University of Trieste. ISBN not assigned
Timmer, M. and van de Pol, J.C. and Stoelinga, M.I.A. (2013) Confluence reduction for Markov automata (extended version). Technical Report TR-CTIT-13-14, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Timmer, M. and van de Pol, J.C. and Stoelinga, M.I.A. (2013) Confluence Reduction for Markov Automata. In: Proceedings of the 11th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS), 29-31 Aug 2013, Buenos Aires, Argentina. pp. 243-257. Lecture Notes in Computer Science 8053. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-40228-9
Trivellato, D. and Etalle, S. and Luit, E. and Zannone, N. (2013) The POLIPO Security Framework. In: Situation Awareness with Systems of Systems. Springer Verlag, New York, pp. 189-208. ISBN 978-1-4614-6229-3
Trivellato, D. and Zannone, N. and Glaundrup, M. and Skowronek, J. and Etalle, S. (2013) A semantic security framework for systems of systems. International journal of cooperative information systems, 22 (1). pp. 1-35. ISSN 0218-8430 *** ISI Impact 0,526 ***
Verhoef, N.C. and Timmer, M. (2013) Lesson study - deel 3; ervaringen bij de introductie van periodieke bewegingen. Euclides, 88 (4). pp. 173-176. ISSN 0165-0394
Wevers, L. and Huisman, M. and de Keijzer, A. (2013) Parallel transaction processing in functional languages, towards practical functional databases. Technical Report TR-CTIT-13-06, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Yin, Haihan and Bockisch, C.M. and Akşit, M. (2013) A fine-grained, customizable debugger for aspect-oriented programming. Transactions on Aspect-Oriented Software Development X, 7800. pp. 1-38. ISSN 1864-3027
Zambon, Eduardo (2013) Abstract Graph Transformation - Theory and Practice. PhD thesis, University of Twente. CTIT Ph.D.-thesis Series No. 12-239 ISBN 978-90-365-3477-2

2012

Stoelinga, M.I.A. and Pinger, R., ed. (2012) Proceedings of the 17th International Workshop on Formal Methods for Industrial Critical Systems. Lecture Notes in Computer Science 7437. Springer Verlag, London. ISSN 0302-9743 ISBN 978-3-642-32468-0
Stoelinga, M.I.A. and Timmer, M., ed. (2012) Proceedings of the 17th Dutch Testing Day: Testing Evolvability. CTIT Workshop Proceedings Series (WP12-01). Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 0929-0672
Zlatanova, S. and Peters, R. and Dilo, A. and Scholten, J., ed. (2012) Intelligent Systems for Crisis Management. Lecture Notes in Geoinformation and Cartography. Springer Verlag, Berlin Heidelberg. ISSN 1863-2246 ISBN 978-3-642-33217-3
Amighi, A. and Blom, S.C.C. and Huisman, M. and Zaharieva-Stojanovski, M. (2012) The VerCors Project: Setting Up Basecamp. In: Sixth Workshop Programming Languages meets Program Verification (PLPV 2012), 24 Jan 2012, Philadelphia, USA. pp. 71-82. ACM. ISBN 978-1-4503-1125-0
Ansaloni, D. and Binder, W. and Bockisch, C.M. and Bodden, E. and Hatun, K. and Marek, L. and Qi, Zhengwei and Sarimbekov, A. and Sewe, A. and Tuma, P. and Zheng, Yudi (2012) Challenges for Refinement and Composition of Instrumentations: Position Paper. In: Proceedings of the 11th International Conference on Software Composition 2012 (SC 2012), 31 May - 1 June 2012, Prague, Czech Republic. pp. 86-96. Lecture Notes in Computer Science 7306. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-30563-4
Armknecht, F. and Katzenbeisser, S. and Peter, A. (2012) Shift-type homomorphic encryption and its application to fully homomorphic encryption. In: 5th International Conference on Cryptology in Africa, AFRICACRYPT 2012, 10-12 Jul 2012, Ifrane, Morocco. pp. 234-251. Lecture Notes in Computer Science 7374. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-31410-0
Asveld, P.R.J. (2012) Review of "T. Masopust, Regulated nondeterminism in pushdown automata: the non-regular case, Fund. Inform. 104 (2010) 111-124". Mathematical reviews, MR2791743 / 2012c:68145. pp. 3523-3524. ISSN 0025-5629
van der Berg, F.I. and Laarman, A.W. (2012) SpinS: Extending LTSmin with Promela through SpinJa. In: 11th International Workshop on Parallel and Distributed Methods in verifiCation, PDMC 2012, 17 Sept. 2012, London, UK. pp. 95-105. Electronic Notes in Theoretical Computer Science 296. Elsevier. ISSN 1571-0661
Bergmans, L.M.J. and te Brinke, S. and Bockisch, C.M. and Akşit, M. (2012) Free composition instead of language dictatorship. In: Proceedings of the 7th International Conference on Software Paradigm Trends, ICSOFT 2012, 24-27 July 2012, Rome, Italy. pp. 388-393. SciTePress. ISBN 978-989-8565-19-8
Bergmans, L.M.J. and Havinga, W.K. and Akşit, M. (2012) First-class Compositions--Defining and composing object and aspect compositions with first-class operators. Transactions on Aspect-Oriented Software Development, IX. pp. 216-267. ISSN 1864-3027
Beye, M.R.T. and Jeckmans, A.J.P. and Erkin, Z. and Hartel, P.H. and Lagendijk, R.L. and Tang, Qiang (2012) Privacy in Online Social Networks. In: Computational Social Networks: Security and Privacy. Springer Verlag, London, pp. 87-113. ISBN 978-1-4471-4050-4
Bißmeyer, N. and Mauthofer, S. and Bayarou, K.M. and Kargl, F. (2012) Assessment of Node Trustworthiness in VANETs Using Data Plausibility Checks with Particle Filters. In: Proceedings of the IEEE Vehicular Networking Conference 2012 (VNC 2012), 14-16 Nov 2012, Seoul, Korea. pp. 78-85. IEEE. ISSN 2157-9865 ISBN 978-1-4673-4995-6
Bilgin, B. and Nikova, S.I. and Rijmen, V. and Nikov, V. and Stütz, G. (2012) Threshold Implementations of all 3×3 and 4×4 S-boxes. In: Cryptographic Hardware and Embedded Systems, CHES 2012, 9-12 Sep 2012, Leuven, Belgium. pp. 76-91. Lecture Notes in Computer Science 7428. Springer Berlin Heidelberg. ISBN 978-3-642-33026-1
Bockisch, C.M. and Sewe, A. and Yin, Haihan and Mezini, M. and Akşit, M. (2012) An In-Depth Look at ALIA4J. Journal of Object Technology, 11 (1). 7:1-7:28. ISSN 1660-1769
Boneva, I.B. and Kreiker, J. and Kurban, M.E. and Rensink, A. and Zambon, Eduardo (2012) Graph abstraction and abstract graph transformations (Amended version). Technical Report TR-CTIT-12-26, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Bormer, T. and Brockschmidt, M. and Distefano, D. and Ernst, G. and Filliatre, J.-C. and Grigore, R. and Huisman, M. and Klebanov, V. and Marche, C. and Monahan, R. and Mostowski, W.I. and Poiikarpova, N. and Scheben, C. and Schellhorn, G. and Tofan, B. and Tschannen, J. and Ulbrich, M. (2012) The COST IC0701 Verification Competition 2011. In: International Conference on Formal Verification of Object-Oriented Software, FoVeOOS 2011, 5-7 Oct 2011, Turin, Italy. pp. 3-21. Lecture Notes in Computer Science 7421. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-31761-3
te Brinke, S. and Laarakkers, M. and Bockisch, C.M. and Bergmans, L.M.J. (2012) An Implementation Mechanism for Tailorable Exceptional Flow. In: Proceedings of the 5th International Workshop on Exception Handling (WEH 2012), 9 Jun 2012, Zurich, Switzerland. pp. 22-26. IEEE Computer Society. ISBN 978-1-4673-1767-2
te Brinke, S. and Malakuti Khah Olun Abadi, S. and Bockisch, C.M. and Bergmans, L.M.J. and Akşit, M. (2012) A design method for modular energy-aware software. Technical Report TR-CTIT-12-28, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
van den Broek, P.M. (2012) Intersection of Feature Models. In: 16th International Software Product Line Conference, SPLC 2012, 2-7 Sep 2012, Salvador, Brazil. pp. 61-65. ACM. ISBN 978-1-4503-1095-6
Brusó, M. and Chatzikokolakis, K. and Etalle, S. and den Hartog, J.I. (2012) Linking unlinkability. In: 7th International Symposium on Trustworthy Global Computing (TGC 2012), 07-08 Sep 2012, Newcastle upon Tyne, UK. pp. 129-144. Lecture Notes in Computer Science 8191. Springer Verlag. ISBN 978-3-642-41156-4
Bullee, J.H. and Veldhuis, R.N.J. (2012) Biometric features and privacy : condemned, based upon your finger print. In: Proceedings of the 33rd WIC Symposium on Information Theory in the Benelux and the 2nd Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelu, 24-25 May 2012, Boekelo, The Netherlands. pp. 44-51. Twente University Press. ISBN 978-90-365-3383-6
Coecke, B. and Pavlovic, D. and Vicary, J. (2012) A new description of orthogonal bases. Mathematical Structures in Computer Science, 23 (3). pp. 555-567. ISSN 0960-1295 *** ISI Impact 0,758 ***
Dalsgaard, A.E. and Laarman, A.W. and Larsen, K.G. and Olesen, M.Chr. and van de Pol, J.C. (2012) Multi-Core Reachability for Timed Automata. In: 10th International Conference on Formal Modeling and Analysis of Timed Systems, FORMATS 2012, 18-20 Sep 2012, London, UK. pp. 91-106. Lecture Notes in Computer Science 7595. Springer Verlag. ISBN 978-3-642-33365-1
Dietzel, S. and Kost, M. and Schaub, F. and Kargl, F. (2012) CANE: A Controlled Application Environment for Privacy Protection in ITS. In: Proceedings of the 12th International Conference on Intelligent Transport Systems Telecommunications (ITST 2012), 5-8 Nov 2012, Taipeh, Taiwan. pp. 71-76. IEEE Communications Society. ISBN 978-1-4673-3070-1
Dietzel, S. and Petit, J.Y. and Kargl, F. and Heijenk, G.J. (2012) Analyzing Dissemination Redundancy to Achieve Data Consistency in VANETs. In: Proceedings of the Ninth ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2012), 25 June 2012, Low Wood Bay, UK. pp. 131-134. ACM. ISBN 978-1-4503-1317-9
van Dijk, T. and Laarman, A.W. and van de Pol, J.C. (2012) Multi-Core BDD Operations for Symbolic Reachability. In: 11th International Workshop on Parallel and Distributed Methods in verifiCation, PDMC 2012, 17 Sept. 2012, London, UK. pp. 127-143. Electronic Notes in Theoretical Computer Science 296. Elsevier. ISSN 2075-2180
van Dijk, T. and Laarman, A.W. and van de Pol, J.C. (2012) Multi-core and/or symbolic model checking. (Invited) In: 12th International Workshop on Automated Verification of Critical Systems, AVoCS 2012, 18-20 Sep 2012, Bamberg, Germany. 773:1-773:7. Electronic Communications of the EASST 53. EASST. ISSN 1863-2122
Dimkov, T. (2012) Alignment of Organizational Security Policies -- Theory and Practice. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 12-218 ISBN 978-90-365-3331-7
Dressler, F. and Kargl, F. (2012) Security in Nano Communication: Challenges and Open Research Issues. In: Proceedings of the IEEE International Workshop on Molecular and Nanoscale Communications (MoNaCom 2012) at IEEE International Conference on Communications (ICC 2012), 11 Jun 2012, Ottawa, Canada. pp. 6183-6187. IEEE Communications Society. ISBN 978-1-4577-2052-9
Dressler, F. and Kargl, F. (2012) Towards security in nano-communication: Challenges and opportunities. Nano Communication Networks, 3 (3). pp. 151-160. ISSN 1878-7789
Duipmans, E. and Ferreira Pires, L. and Bonino da Silva Santos, L.O. (2012) Towards a BPM cloud architecture with data and activity distribution. In: IEEE 16th International Enterprise Distributed Object Computing Conference Workshops, 10 September 2012, Beijing, China. pp. 165-171. IEEE Computer Society. ISBN 978-1-4673-5005-1
Esteve, M.A. and Katoen, J.P. and Nguyen, Viet Yen and Postma, B. and Yushstein, Y. (2012) Formal correctness, safety, dependability, and performance analysis of a satellite. In: 34th International Conference on Software Engineering, ICSE 2012, 2-9 June 2012, Zürich, Switzerland. pp. 1022-1031. ACM Proceedings - International Conference on Software Engineering. IEEE Computer Society. ISSN 0270-5257 ISBN 978-1-4673-1066-6
Evangelista, S. and Laarman, A.W. and Petrucci, L. and van de Pol, J.C. (2012) Improved Multi-Core Nested Depth-First Search. In: Proceedings of the 10th International Symposium on Automated Technology for Verification and Analysis, ATVA 2012, 3-6 Oct 2012, Thiruvananthapuram (Trivandrum), Kerala. pp. 269-283. Lecture Notes in Computer Science 7561. Springer Verlag. ISBN 978-3-642-33386-6
Feiri, M.P. and Petit, J.Y. and Kargl, F. (2012) Congestion-based Certificate Omission in VANETs. In: Ninth ACM International Workshop on Vehicular Ad Hoc Networks, VANET 2012, June 25, 2012, Low Wood Bay, Lake District, United Kingdom. pp. 135-138. ACM. ISBN 978-1-4503-1317-9
Feiri, M.P. and Petit, J.Y. and Kargl, F. (2012) Evaluation of Congestion-based Certificate Omission in VANETs. In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2012), 14-16 Nov 2012, Seoul, Korea. pp. 101-108. IEEE. ISSN 2157-9865 ISBN 978-1-4673-4995-6
Ghamarian, A.H. and de Mol, M.J. and Rensink, A. and Zambon, Eduardo and Zimakova, M.V. (2012) Modelling and analysis using GROOVE. International journal on software tools for technology transfer, 14 (1). pp. 15-40. ISSN 1433-2779
Ghamarian, A.H. and Rensink, A. (2012) Graph Passing in Graph Transformation. Technical Report TR-CTIT-12-04, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Ghamarian, A.H. and Rensink, A. (2012) Generalised compositionality in graph transformation. Technical Report TR-CTIT-12-17, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Ghamarian, A.H. and Rensink, A. (2012) Generalised compositionality in graph transformation. In: 6th International Conference on Graph Transformation (ICGT 2012), 24-29 Sep 2012, Bremen, Germany. pp. 234-248. Lecture Notes in Computer Science 7562. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-33653-9
Ghamarian, A.H. and Rensink, A. (2012) Graph passing in graph transformation. In: 11th International Workshop on Graph Transformation and Visual Modeling Techniques, GTVMT 2012, 24-25 Mar 2012, Tallinn, Estonia. 723:1-723:14. Electronic Communications of the EASST 47. European Association for Software Science and Technology. ISSN 1863-2122
Goncalves da Silva, E.M. and Ferreira Pires, L. and van Sinderen, M.J. (2012) A-DynamiCoS: a flexible framework for user-centric service composition. In: IEEE 16th International Enterprise Distributed Object Computing Conference (EDOC 2012), 10-14 Sep 2012, Beijing, China. pp. 81-92. IEEE Computer Society. ISSN 1541-7719 ISBN 978-1-4673-2444-1
Hadžiosmanović, D. and Bolzoni, D. and Etalle, S. and Hartel, P.H. (2012) Challenges and opportunities in securing industrial control systems. In: Proceedings of the IEEE Workshop on Complexity in Engineering, COMPENG 2012, 11-13 June 2012, Aachen, Germany. pp. 1-6. IEEE. ISBN 978-1-4673-1614-9
Hadžiosmanović, D. and Bolzoni, D. and Hartel, P.H. (2012) A Log Mining Approach for Process Monitoring in SCADA. International Journal of Information Security, 11 (4). pp. 231-251. ISSN 1615-5262 *** ISI Impact 1,279 ***
Hadžiosmanović, D. and Simionato, L. and Bolzoni, D. and Zambon, Emmanuele and Etalle, S. (2012) N-gram Against the Machine: On the Feasibility of the N-gram Network Analysis for Binary Protocols. In: Proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2012), 12-14 Sep 2012, Amsterdam, The Netherlands. pp. 354-373. Lecture Notes in Computer Science 7462. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-33337-8
Hansen, H. and Timmer, M. (2012) Why Confluence is More Powerful than Ample Sets in Probabilistic and Non-Probabilistic Branching Time. In: 10th Workshop on Quantitative Aspects of Programming Languages (QAPL 2012), 31 March - 1 April 2012, Tallinn, Estonia. Istituto di Scienza e Tecnologie dell'Informazione. ISBN not assigned
Hartel, P.H. and Junger, M. (2012) Teaching Engineering students to "Think thief". Technical Report TR-CTIT-12-19, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Hartel, P.H. and Muller, H.L. (2012) Simple algebraic data types for C. Software: Practice and Experience, 42 (2). pp. 191-210. ISSN 0038-0644 *** ISI Impact 0,652 ***
Hartel, P.H. and Suryana, N. (2012) Information Security. In: Cyber Safety: An Introduction. Eleven International Publishers, The Hague, pp. 281-291. ISBN 978-94-90947-75-0
Hatun, K. and Bockisch, C.M. and Akşit, M. (2012) Aspect-Oriented Language Mechanisms for Component Binding. In: Proceedings of the Doctoral Symposium of the 5th International Conference on Software Language Engineering 2012, 25 Sep 2012, Dresden, Germany. pp. 11-14. CEUR Workshop Proceedings 935. CEUR Workshop Proceedings. ISSN 1613-0073
van der Heijden, R. (2012) SeDyA: Secure Dynamic Aggregation in VANETs. Master's thesis, University of Twente.
Huang, Liting (2012) Secure and Privacy-Preserving Broadcast Authentication for IVC. Master's thesis, University of Twente.
Huisman, M. and Klebanov, V. and Monahan, R. (2012) On the organisation of program verification competitions. In: 1st International Workshop on Comparative Empirical Evaluation of Reasoning Systems (COMPARE 2012), 30 June 2012, Manchester, UK. pp. 50-59. CEUR-WS Proceedings 873. Sun SITE Central Europe. ISSN 1613-0073
Huisman, M. and Ngo, Minh Tri (2012) Scheduler-Specific Confidentiality for Multi-Threaded Programs and Its Logic-Based Verification. In: 2nd International Conference on Formal Verification of Object-Oriented Software (FoVeOOS 2011), Revised Selected Papers, October 5-7, 2011, Turin, Italy. pp. 178-195. Lecture Notes in Computer Science 7421. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-31761-3
Jalali, A. and Ghamarian, A.H. and Rensink, A. (2012) Incremental pattern matching for regular expressions. In: 11th International Workshop on Graph Transformation and Visual Modeling Techniques, GTVMT 2012, 24-25 Mar 2012, Tallinn, Estonia. 736:1-736:12. Electronic Communications of the EASST 47. European Association for Software Science and Technology. ISSN 1863-2122
Jeckmans, A.J.P. and Tang, Qiang and Hartel, P.H. (2012) Privacy-Preserving Collaborative Filtering based on Horizontally Partitioned Dataset. In: International Conference on Collaboration Technologies and Systems (CTS 2012), 21-25 May 2012, Denver, CO, USA. pp. 439-446. IEEE Computer Society. ISBN 978-1-4673-1381-0
Junger, M. and Laycock, G. and Hartel, P.H. and Ratcliffe, J. (2012) Crime science: editorial statement. Crime science, 1 (1). 1:1-1:3. ISSN 2193-7680
Junger, M. and Ottenhof, R.H.J. and Hartel, P.H. (2012) New opportunities in the digital age: mobile phone ownership, usage and truancy by high school students. In: KLM Van Dijk : Liber Amicorum prof.dr.mr. J.J.M. van Dijk. Wolf Legal Publishers, Nijmegen, pp. 191-206. ISBN 978-90-5850-932-1
Kaggwa, F. (2012) Evaluation of Multiple Enrollment for Fingerprint Recognition. Master's thesis, University of Twente.
Kant, G. and van de Pol, J.C. (2012) Efficient Instantiation of Parameterised Boolean Equation Systems to Parity Games. In: First Workshop on GRAPH Inspection and Traversal Engineering (GRAPHITE 2012), 1 Apr 2012, Tallinn, Estonia. pp. 50-65. Electronic Proceedings in Theoretical Computer Science 99. EPTCS. ISSN 2075-2180
Kastenberg, H. and Rensink, A. (2012) Graph Attribution Through Sub-Graphs. Technical Report TR-CTIT-12-27, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Katoen, J.P. (2012) GSPNs Revisited: Simple Semantics and New Analysis Algorithms. (Invited) In: 12th International Conference on Application of Concurrency to System Design, ACSD 2012, 27-29 June 2012, Hamburg, Germany. pp. 6-11. IEEE Computer Society. ISSN 1550-4808 ISBN 978-1-4673-1687-3
Katoen, J.P. (2012) Model checking: one can do much more than you think! (Invited) In: 4th IPM International Conference on Fundamentals of Software Engineering, FSEN 2011, April 20-22, 2011, Teheran, Iran. pp. 1-14. Lecture Notes in Computer Science 7141. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-29319-1
Katoen, J.P. and van de Pol, J.C. and Stoelinga, M.I.A. and Timmer, M. (2012) A linear process-algebraic format with data for probabilistic automata. Theoretical Computer Science, 413 (1). pp. 36-57. ISSN 0304-3975 *** ISI Impact 0,643 ***
Ketema, J. (2012) Reinterpreting Compression in Infinitary Rewriting. In: Proceedings of the 23rd International Conference on Rewriting Techniques and Applications (RTA 2012), 30 May - 01 Jun 2012, Nagoya, Japan. pp. 209-224. Leibniz International Proceedings in Informatics (LIPIcs) 15. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik. ISSN 1868-8969 ISBN 978-3-939897-38-5
Knapik, P. and Schoch, E. and Müller, M. and Kargl, F. (2012) Understanding Vehicle Related Crime to Elaborate on Countermeasures Based on ADAS and V2X Communication. In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2012), 14-16 Nov 2012, Seoul, Korea. pp. 86-93. IEEE. ISSN 2157-9865 ISBN 978-1-4673-4995-6
Kocabas, U. and Peter, A. and Katzenbeisser, S. and Sadeghi, A. (2012) Converse PUF-based authentication. In: 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, 13-15 Jun 2012, Vienna, Austria. pp. 142-158. Lecture Notes in Computer Science 7344. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-30920-5
Kuijper, W. (2012) Compositional Synthesis of Safety Controllers. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 13-243 ISBN 978-90-365-3487-1
Kulikova, O. and Heil, R. and van den Berg, Jan and Pieters, W. (2012) Cyber crisis management: a decision-support framework for disclosing security incident information. In: International Conference on Cyber Security, CyberSecurity 2012, 14-16 Dec 2012, Washington, USA. pp. 103-112. Cyber Security (CyberSecurity), 2012 International Conference . IEEE Computer Society. ISBN 978-1-4799-0219-4
Loker, A. and te Brinke, S. and Bockisch, C.M. (2012) A unified model of aspect-instantiation policies. In: Proceedings of the 3rd International Workshop on Free Composition (FREECO@SPLASH 2012), 22 Oct 2012, Tucson, AZ, USA. pp. 1-4. ACM. ISBN 978-1-4503-1635-4
Lopes de Souza, W. and Ferreira Pires, L. and Duipmans, E.F. and Prado, A.F. and Povoa, L.V. (2012) Processo como um serviço na computação em nuvem para o desenvolvimento de aplicações na saúde. In: Revista Workshop de Informática Biomédica, WIBm 2012, 2 Oct 2012, Ribeirão Preto, Brazil. pp. 5-11. Universidade de São Paulo. ISSN 2237-3594
Malakuti Khah Olun Abadi, S. and Akşit, M. (2012) Evolution of Composition Filters to Event Composition. In: 27th ACM Symposium on Applied Computing (SAC 2012), 26-30 Mar 2012, Riva del Garda, Italy. pp. 1850-1857. ACM. ISBN 978-1-4503-0857-1
Malakuti Khah Olun Abadi, S. and te Brinke, S. and Bergmans, L.M.J. and Bockisch, C.M. (2012) Towards Modular Resource-Aware Applications. In: Proceedings of the 3rd international workshop on Variability & Composition (VariComp 2012), 26 Mar 2012, Potsdam, Germany. pp. 13-17. ACM. ISBN 978-1-4503-1101-4
Marincic, J. and Mader, A.H. and Wieringa, R.J. (2012) Explaining Embedded Software Modelling Decisions. In: IEEE CS International Conference on Software Science, Technology, and Engineering, SWSTE 2012, 12-13 June 2012, Herzlia, Israel. pp. 80-89. IEEE Computer Society. ISBN 978-0-7695-4716-9
Meadows, C. and Pavlovic, D. (2012) Formalizing physical security procedures. In: 8th International Workshop on Security and Trust Management, STM 2012, 13-14 Sep 2012, Pisa, Italy. pp. 193-208. Lecture Notes in Computer Science 7783. Springer Verlag. ISBN 978-3-642-38004-4
de Mol, M.J. and Rensink, A. and Hunt, J.J. (2012) Graph Transforming Java Data. In: Proceedings of the 15th International Conference on Fundamental Approaches to Software Engineering (FASE 2012), 26-29 Mar 2012, Talinn, Estonia. pp. 209-223. Lecture Notes in Computer Science 7212. Springer Verlag. ISBN 978-3-642-28872-2
Ngo, Minh Tri and Stoelinga, M.I.A. and Huisman, M. (2012) Confidentiality for Probabilistic Multi-Threaded Programs and Its Verification. Technical Report TR-CTIT-13-01, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Ottow, C. (2012) Hacking the NextWeb: Penetration Testing over IPv6. Master's thesis, University of Twente.
Pavlovic, D. (2012) Quantitative Concept Analysis. In: 10th International Conference on Formal Concept Analysis (ICFCA), 7-10 May 2012, Leuven, Belgium. pp. 260-277. Lecture Notes in Computer Science 7278. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-29891-2
Pavlovic, D. (2012) Tracing the Man in the Middle in Monoidal Categories. In: 11th International Workshop on Coalgebraic Methods in Computer Science, CMCS 2012, 31 Mrt - 01 Apr 2012, Tallinn, Estonia. pp. 191-217. Lecture Notes in Computer Science 7399. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-32783-4
Pavlovic, D. and Meadows, C. (2012) Actor-Network Procedures. In: 8th International Conference on Distributed Computing and Internet Technology, ICDCIT 2012, 2-4 Feb 2012, Bhubaneswar, India. pp. 7-26. Lecture Notes in Computer Science 7154. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-28072-6
Peter, A. and Kronberg, M. and Trei, W. and Katzenbeisser, S. (2012) Additively homomorphic encryption with a double decryption mechanism, revisited. In: 15th International Conference on Information Security, ISC 2012, 19-21 Sep 2012, Passau, Gemany. pp. 242-257. Lecture Notes in Computer Science 7483. Springer Verlag. ISSN 1611-3349 ISBN 978-3-642-33383-5
Petit, J.Y. and Bösch, C.T. and Feiri, M.P. and Kargl, F. (2012) On the Potential of PUF for Pseudonym Generation in Vehicular Networks. In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2012), 14-16 Nov 2012, Seoul, Korea. pp. 94-100. IEEE. ISSN 2157-9865 ISBN 978-1-4673-4995-6
Pieters, W. and van der Ven, S. and Probst, C.W. (2012) A Move in the Security Measurement Stalemate: Elo-Style Ratings to Quantify Vulnerability. In: Proceedings of the 2012 workshop on New security paradigms (NSPW 2012), 18-21 Sep 2012, Bertinoro, Italy. pp. 1-14. ACM. ISBN 978-1-4503-1794-8
Polderman, J.W. and Langerak, R. (2012) Stability and robustness of planar switching linear systems. Systems and control letters, 61 (9). pp. 904-910. ISSN 0167-6911 *** ISI Impact 1,908 ***
Polenkova, S.V. and Polderman, J.W. and Langerak, R. (2012) Stability of reset systems. In: Proceedings of the 20th International Symposium on Mathematical Theory of Networks and Systems, 9-13 Jul 2012, Melbourne, Australia. 0074. Think Business Events. ISBN 978-0-646-58062-3
Probst, C.W. and Sasse, A.M. and Pieters, W. and Dimkov, T. and Luysterborg, E. and Arnaud, M. (2012) Privacy penetration testing -- how to establish trust in your cloud provider. In: European Data Protection: In Good Health? International, Foreign and Comparative Law XVIII. Springer, London, pp. 251-266. ISBN 978-94-007-2902-5
Rensink, A. and Rozenberg, G. and Schürr, A. (2012) Recent Developments in the Theory of Graph Transformation, 2010. Fundamenta Informaticae, 118 (1-2). v-vii. ISSN 0169-2968 *** ISI Impact 0,658 ***
Rensink, A. and Zambon, Eduardo (2012) Pattern-Based Graph Abstraction. In: International Conference on Graph Transformation (ICGT 2012), 24-29 Sep 2012, Bremen, Germany. pp. 66-80. Lecture Notes in Computer Science 7562. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-33653-9
de Roo, A.J. and Sözer, H. and Akşit, M. (2012) Verification and analysis of domain-specific models of physical characteristics in embedded control software. Information and Software Technology, 54 (12). pp. 1432-1453. ISSN 0950-5849 *** ISI Impact 1,569 ***
Schaub, F. and Könings, B. and Weber, M. and Kargl, F. (2012) Towards context adaptive privacy decisions in ubiquitous computing. In: IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), 19-23 Mar 2012, Lugano, Switzerland. pp. 407-410. IEEE Computer Society. ISBN 978-1-4673-0905-9
Schaub, F. and Koenings, B. and Dietzel, S. and Weber, M. and Kargl, F. (2012) Privacy context model for dynamic privacy adaptation in ubiquitous computing. In: Proceedings of the 2012 ACM Conference on Ubiquitous Computing, UbiComp 2012, CASEMANS 2012 Workshop, 8 Sep 2012, Pittsburgh, PA, USA. pp. 752-757. ACM. ISBN 978-1-4503-1224-0
Sedghi, S. (2012) Towards Provably Secure Efficiently Searchable Encryption. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 12-219 ISBN 978-90-365-3333-1
Stemmer, J. (2012) Detecting outliers in web-based network traffic. Master's thesis, University of Twente.
Stoelinga, M.I.A. and Timmer, M. (2012) Preface. In: Proceedings of the 17th Dutch Testing Day: Testing Evolvability, 29 Nov 2011, Enschede, The Netherlands. pp. 3-3. CTIT Workshop Proceedings Series (WP12-01). Centre for Telematics and Information Technology, University of Twente. ISSN 0929-0672
Stokkink, W.G.J. and Timmer, M. and Stoelinga, M.I.A. (2012) Talking quiescence: a rigorous theory that supports parallel composition, action hiding and determinisation (extended version). Technical Report TR-CTIT-12-05, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Stokkink, W.G.J. and Timmer, M. and Stoelinga, M.I.A. (2012) Talking quiescence: a rigorous theory that supports parallel composition, action hiding and determinisation. In: Proceedings of the 7th Workshop on Model-Based Testing (MBT 2012), 25 Mar 2012, Tallinn, Estonia. pp. 73-87. Electronic Proceedings in Theoretical Computer Science 80. Open Publishing Association. ISSN 2075-2180
Tang, Qiang (2012) Cryptographic framework for analyzing the privacy of recommender algorithms. In: International Conference on Collaboration Technologies and Systems, CTS 2012, 21-25 may. 2012, Denver, USA. pp. 455-462. IEEE Computer Society. ISBN 978-1-4673-1381-0
Tang, Qiang (2012) Public key encryption supporting plaintext equality test and user-specified authorization. Security and Communication Networks, 5 (12). pp. 1351-1362. ISSN 1939-0114 *** ISI Impact 0,806 ***
Tang, Qiang (2012) Public key encryption schemes supporting equality test with authorisation of different granularity. International Journal of Applied Cryptography, 2 (4). pp. 304-321. ISSN 1753-0563
Tekinerdogan, B. and Sözer, H. and Akşit, M. (2012) Feature-based rational management system for supporting software architecture adaptation. International Journal of Software Engineering and Knowledge Engineering, 22 (7). pp. 945-964. ISSN 0218-1940 *** ISI Impact 0,240 ***
Timmer, M. and Jeurnink, G.A.M. and Verhoef, N.C. (2012) Analytische meetkunde door een synthetische bril. In: Conferentiegids van de 18e Nationale Wiskunde Dagen, 3-4 Feb 2012, Noordwijkerhout. pp. 44-44. Freudenthal Instituut. ISBN not assigned
Timmer, M. and Katoen, J.P. and van de Pol, J.C. and Stoelinga, M.I.A. (2012) Efficient Modelling and Generation of Markov Automata. In: 10th Workshop on Quantitative Aspects of Programming Languages, QAPL 2012, 31 March - 1 April 2012, Tallinn, Estonia. Istituto di Scienza e Tecnologie dell'Informazione. ISBN not assigned
Timmer, M. and Katoen, J.P. and van de Pol, J.C. and Stoelinga, M.I.A. (2012) Efficient Modelling and Generation of Markov Automata (extended version). Technical Report TR-CTIT-12-16, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Timmer, M. and Katoen, J.P. and van de Pol, J.C. and Stoelinga, M.I.A. (2012) Efficient Modelling and Generation of Markov Automata. In: Proceedings of the 23rd International Conference on Concurrency Theory, CONCUR 2012, 3-8 Sep 2012, Newcastle upon Tyne, United Kingdom. pp. 364-379. Advanced Research in Computing and Software Science, Lecture Notes in Computer Science (ARCoSS/LNCS) 7454. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-32939-5
Timmer, M. and Verhoef, N.C. (2012) Increasing insightful thinking in analytic geometry. Nieuw Archief voor Wiskunde, 5/13 (3). pp. 217-219. ISSN 0028-9825
Timmer, M. and Verhoef, N.C. and Jeurnink, G.A.M. (2012) Analytische meetkunde door een synthetische bril. Nieuwe Wiskrant, 31 (4). pp. 13-18. ISSN 0928-7167
Verberkt, S.L.C. (2012) Claiming Security Properties in a Service Oriented Architecture. Master's thesis, University of Twente.
Wagenaar, P. (2012) Detecting botnets using file system indicators. Master's thesis, University of Twente.
Yin, Haihan and Bockisch, C.M. and Akşit, M. (2012) A fine-grained debugger for aspect-oriented programming. In: Proceedings of the 11th Annual International Conference on Aspect-oriented Software Development, AOSD 2012, 25-30 Mar 2012, Potsdam, Germany. pp. 59-70. ACM. ISBN 978-1-4503-1092-5
Zaharieva-Stojanovski, M. and Huisman, M. and Blom, S.C.C. (2012) A history of BlockingQueues. In: Proceedings Sixth Workshop on Formal Languages and Analysis of Contract-Oriented Software (FLACOS 2012), 19 Sep 2012, Bertinoro, Italy. pp. 31-35. Electronic Proceedings in Theoretical Computer Science 94. EPTCS. ISSN 2075-2180
Zambon, Eduardo and Rensink, A. (2012) Graph Subsumption in Abstract State Space Exploration. In: Proceedings of First Workshop on Graph Inspection and Traversal Engineering (GRAPHite 2012), 1 Apr 2012, Tallinn, Estonia. pp. 35-49. Electronic Proceedings in Theoretical Computer Science 99. Open Publishing Association. ISSN 2075-2180
Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. (2012) A2thOS: availability analysis and optimisation in SLAs International Journal of Network Management, 22 (2). pp. 104-130. ISSN 1055-7148 *** ISI Impact 0,681 ***

2011

Barthe, G. and Datta, A. and Etalle, S., ed. (2011) Formal aspects of security and trust : 8th international workshop, FAST 2011 Leuven, Belgium, September 12-14, 2011: revised selected papers. Lecture Notes in Computer Science 7140. Springer Verlag, Berlin. ISSN 0302-9743 ISBN 978-3-642-29419-8
Johnson, M. and Pavlovic, D., ed. (2011) Algebraic methodology and software technology : 13th international conference, AMAST 2010. Lecture Notes in Computer Science 6486. Springer Verlag, Berlin. ISSN 0302-9743 ISBN 978-3-642-17795-8
Aceto, L. and Chen, Taolue and Ingolfsdottir, A. and Luttik, B. and van de Pol, J.C. (2011) On the axiomatizability of priority II. Theoretical computer science, 412 (28). pp. 3035-3044. ISSN 0304-3975 *** ISI Impact 0,643 ***
Alberink, M. and Muijlwijk, H. and Timmer, M. (2011) De sinus: van meetkundige definitie naar analytisch begrip. Euclides, 86 (6). pp. 250-252. ISSN 0165-0394
Alberts, G. and Boersma, K. and Broekhans, B. and Dijkstra, Anne and Pieters, W. and Popkema, M. and Vanheste, T. (2011) Inleiding: Kennisklimaat. In: Kennisklimaat: (On)macht van de wetenschap in het klimaatdebat. Jaarboek Kennissamenleving 7. Amsterdam University Press, Amsterdam, pp. 7-11. ISSN 1871-0034 ISBN 978-90-8964-401-5
Amighi, A. and de Carvalho Gomes, P. and Huisman, M. (2011) Provably Correct Control-Flow Graphs from Java Programs with Exceptions. In: Papers the of 2nd International Conference on Formal Verification of Object-Oriented Software, FoVeOOS'11, 5-7 Oct 2011, Turin, Italy. pp. 31-48. Karlsruhe Reports in Informatics (26). Karlsruhe Institute of Technology. ISSN 2190-4782
van Amstel, M. and Bosems, S. and Kurtev, I. and Ferreira Pires, L. (2011) Performance in model transformations: experiments with ATL and QVT. In: 4th International Conference on Theory and Practice of Model Transformations, ICMT 2011, 27-28 Jun 2011, Zurich, Switzerland. pp. 198-212. Lecture Notes in Computer Science 6707. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-21731-9
Asveld, P.R.J. (2011) Review of "Elements of Automata Theory" by J. Sakarovitch(2009), Cambridge University Press, Cambridge, UK. - ISBN 978-0-521-84425-3. Mathematical reviews, MR2567276 / 2011g:68003. pp. 7930-7931. ISSN 0025-5629
Asveld, P.R.J. (2011) Permuting Operations on Strings and Their Relation to Prime Numbers. Discrete applied mathematics, 159 (17). pp. 1915-1932. ISSN 0166-218X *** ISI Impact 0,722 ***
Asveld, P.R.J. (2011) Review of "K. Ruohonen, Equivalence of set- and bag-valued orbits, J. Automat. Lang. Comb. 14 (2009) 247-253". Mathematical reviews, MR2683400 / 2011j:68065. pp. 11158-11158. ISSN 0025-5629
Asveld, P.R.J. (2011) Permuting Operations on Strings and the Distribution of Their Prime Numbers. Technical Report TR-CTIT-11-24, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Barbot, B. and Chen, Taolue and Han, Tingting and Katoen, J.P. and Mereacre, A. (2011) Efficient CTMC Model Checking of Linear Real-Time Objectives. In: 17th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2011), 26 March - 3 April 2011, Saarbrücken, Germany. pp. 128-142. Lecture Notes in Computer Science 6605. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-19834-2
Bergstra, J.A. and van de Pol, J.C. (2011) A Calculus for Four-Valued Sequential Logic. Theoretical computer science, 412 (28). pp. 3122-3128. ISSN 0304-3975 *** ISI Impact 0,643 ***
van der Bijl, H.M. (2011) On changing models in Model-Based Testing. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 11-198 ISBN 978-90-365-3195-5
Bockisch, C.M. and Malakuti Khah Olun Abadi, S. and Akşit, M. and Katz, S. (2011) Making aspects natural: events and composition. In: Tenth International Conference on Aspect-Oriented Software Development, AOSD 2011, 21-25 Mar 2011, Porto de Galinhas, Brazil. pp. 285-299. ACM. ISBN 978-1-4503-0605-8
Bockisch, C.M. and Sewe, A. and Mezini, M. and Akşit, M. (2011) An Overview of ALIA4J: An Execution Model for Advanced-Dispatching Languages. In: Proceedings of the 49th International Conference on Objects, Models, Components, Patterns (TOOLS Europe 2011), 28-30 Jun 2011, Zurich, Switzerland. pp. 131-146. Lecture Notes In Computer Science 6705. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-21951-1
Bolzoni, D. and Schade, C. L. and Etalle, S. (2011) A Cuckoo's Egg in the Malware Nest: On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large Networks. In: Proceedings of the 25th Large Installation System Administration Conference (LISA 2011), 4-9 Dec 2011, Boston, USA. pp. 201-216. The USENIX Association. ISBN 978-931971-881-3
te Brinke, S. and Bergmans, L.M.J. and Bockisch, C.M. (2011) The Keyword Revolution: Promoting language constructs for data access to first class citizens. In: Proceedings of the 1st International Workshop on Free Composition, FREECO 2011, 26 Jul 2011, Lancaster, United Kingdom. 4:1-4:5. ACM. ISBN 978-1-4503-0892-2
te Brinke, S. and Bockisch, C.M. and Bergmans, L.M.J. (2011) Reuse of Continuation-based Control-flow Abstractions. In: Proceedings of the 2nd workshop on Free composition @ onward! (FREECO 2011), 23 Oct 2011, Portland, Oregon, USA. pp. 13-18. ACM. ISBN 978-1-4503-1025-3
van den Broek, P.M. and Noppen, J.A.R. (2011) Exact Membership Functions for the Fuzzy Weighted Average. In: Computational Intelligence. Studies in Computational Intelligence 343. Springer, Berlin / Heidelberg, pp. 85-99. ISBN 978-3-642-20206-3
Chen, Taolue and Han, Tingting and Katoen, J.P. and Mereacre, Alexandru (2011) Model Checking of Continuous-Time Markov Chains Against Timed Automata Specifications. Logical Methods in Computer Science, 7 (1). 12:1-12:34. ISSN 1860-5974 *** ISI Impact 0,569 ***
Chevalking, S.K.L. (2011) Reviewing and Optimizing the Security of FIGO. Master's thesis, University of Twente.
Dertien, E.C. and Mader, A.H. and Reidsma, D. (2011) Single Value Devices. Technical Report TR-CTIT-11-04, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dietzel, S. (2011) Privacy Implications of In-Network Aggregation Mechanisms for VANETs. (Invited) In: Proceedings of the 8th International Conference on Wireless On-demand Network Systems and Services, 26-28 Jan 2011, Bardonecchia, Italy. pp. 91-95. IEEE Communications Society. ISBN 978-1-61284-189-2
Dietzel, S. and Kargl, F. and Heijenk, G.J. and Schaub, F. (2011) Modeling In-Network Aggregation in VANETs. IEEE communications magazine, 49 (11). pp. 142-148. ISSN 0163-6804 *** ISI Impact 5,125 ***
Dimkov, T. and Pieters, W. (2011) Physical Penetration Testing: A Whole New Story in Penetration Testing. PenTest Magazine, 2011 (2). pp. 20-23. ISSN not assigned
Dimkov, T. and Pieters, W. and Hartel, P.H. (2011) Training Students to Steal: A Practical Assignment in Computer Security Education. In: Proceedings of the 42nd ACM Technical Symposium on Computer Science Education (SIGCSE 2011), 9-12 Mar 2011, Dallas, Texas, USA. pp. 21-26. ACM. ISBN 978-1-4503-0500-6
Dressler, F. and Kargl, F. and Ott, J. and Tonguz, O.K. and Wischof, L. (2011) Research Challenges in Intervehicular Communication: Lessons of the 2010 Dagstuhl Seminar. IEEE communications magazine, 49 (5). pp. 158-164. ISSN 0163-6804 *** ISI Impact 5,125 ***
Ferreira Pires, L. (2011) Wat is Cloud Computing? Computerrecht, 2011 (3). pp. 104-107. ISSN 0771-7784
Fokkinga, M.M. (2011) The Hough transform. Journal of Functional Programming, 21 (2). pp. 129-133. ISSN 0956-7968 *** ISI Impact 1,357 ***
Franz, M. and Williams, P. and Carbunar, B. and Katzenbeisser, S. and Peter, A. and Sion, R. and Sotakova, M. (2011) Oblivious outsourced storage with delegation. In: 15th International Conference on Financial Cryptography and Data Security, FC 2011, 28 Feb - 04 Mar 2011, Gros Islet, St. Lucia. pp. 127-140. Lecture Notes in Computer Science 7035. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-27575-3
Galvao Lourenco da Silva, I. and Akşit, M. and van den Broek, P.M. and Hendriks, M.F.H. (2011) Using design rationale to improve SPL traceability. In: Aspect-oriented, Model-driven Software Product Lines. Cambridge University Press, Cambridge, UK, pp. 263-283. ISBN 978-0-521-76722-4
Galvao Lourenco da Silva, I. and Zambon, Eduardo and Rensink, A. and Wevers, L. and Akşit, M. (2011) Knowledge-based Graph Exploration Analysis. In: Fourth International Symposium on Applications of Graph Transformation with Industrial Relevance, AGTIVE 2011, 4-7 Oct 2011, Budapest, Hungary. pp. 105-120. Lecture Notes in Computer Science 7233. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-34175-5
Ghamarian, A.H. and de Mol, M.J. and Rensink, A. and Zambon, Eduardo (2011) Saying Hello World with GROOVE - A Solution to the TTC 2011 Instructive Case. In: Proceedings of the Fifth Transformation Tool Contest (TTC 2011), 29-30 June 2011, Zurich, Switzerland. pp. 215-222. Electronic Proceedings in Theoretical Computer Science (EPTCS) 74. Open Publishing Association. ISSN 2075-2180
Goncalves da Silva, E.M. (2011) User-centric Service Composition - Towards Personalised Service Composition and Delivery. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 11-191 ISBN 978-90-365-3182-5
Goncalves da Silva, E.M. and Ferreira Pires, L. and van Sinderen, M.J. (2011) Towards Runtime Discovery, Selection and Composition of Semantic Services. Computer communications, 34 (2). pp. 159-168. ISSN 0140-3664 *** ISI Impact 2,099 ***
Gong, Zheng and Nikova, S.I. and Law, Yee Wei (2011) KLEIN: A New Family of Lightweight Block Ciphers. In: 7th International Workshop on RFID, Security and Privacy (RFIDSec 2011), June 26-28, 2011, Amherst, MA, USA. pp. 1-18. Lecture Notes in Computer Science 7055. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-25285-3
Haack, C. and Huisman, M. and Hurlin, C. (2011) Permission-Based Separation Logic for Multithreaded Java Programs. Nieuwsbrief van de Nederlandse Vereniging voor Theoretische Informatica, 15. pp. 13-23. ISSN not assigned
Hadžiosmanović, D. and Bolzoni, D. and Hartel, P.H. and Etalle, S. (2011) MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures. In: Proceedings of the European Conference on Computer Network Defense, EC2ND 2011, 6-8 Sept 2011, Gothenburg, Sweden. pp. 41-48. IEEE Computer Society. ISBN 978-0-7695-4762-6
Hansen, H. and Timmer, M. (2011) Confluence versus Ample Sets in Probabilistic Branching Time. In: Proceedings of the 3rd Young Researchers Workshop on Concurrency Theory, 10 Sep 2011, Aachen, Germany. École normale supérieure de Cachan. ISBN not assigned
Hatun, K. and Bockisch, C.M. and Sözer, H. and Akşit, M. (2011) A feature model and development approach for schedulers. In: Proceedings of the 1st workshop on Modularity in systems software (MISS 2011), 21-25 March 2011, Porto de Galinhas, Brazil. pp. 1-5. ACM. ISBN 978-1-4503-0647-8
Herrmann, A. and Morali, A. and Etalle, S. and Wieringa, R.J. (2011) RiskREP: Risk-Based Security Requirements Elicitation and Prioritization. In: Perspectives in Business Informatics Research, 6-8 Oct 2011, Riga, Latvia. pp. 155-162. Riga Technical University. ISBN 978-9984-30-197-6
Hoppen dos Santos, J. and Ferreira Pires, L. and Goncalves da Silva, E.M. and Iacob, M.-E. (2011) Public service improvement with user-centric service composition. In: Electronic Government and Electronic Participation, Joint Proceedings of the Ongoing Research and Projects of IFIP EGOV and ePart 2011, 29 Aug - 1 Sep 2011, Delft, the Netherlands. pp. 276-284. Schriftenreihe Informatik 37. Trauner Verlag. ISBN 978-3-85499-515-9
Huisman, M. and Blondeel, H.-C. (2011) Model-checking Secure Information Flow for Multi-Threaded Programs. In: Proceedings of the Joint Workshop on Theory of Security and Applications, TOSCA 2011, 31 March - 1 April 2011, Saarbruecken, Germany. pp. 148-165. Lecture Notes in Computer Science 6993. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-27374-2
Huisman, M. and Ngo, Minh Tri (2011) Scheduler-specific Confidentiality for Multi-Threaded Programs and Its Logic-Based Verification. Technical Report TR-CTIT-11-22, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Jeckmans, A.J.P. and Tang, Qiang and Hartel, P.H. (2011) Privacy-Preserving Profile Matching Using the Social Graph. Technical Report TR-CTIT-11-13, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Jeckmans, A.J.P. and Tang, Qiang and Hartel, P.H. (2011) Privacy-Preserving Profile Matching Using the Social Graph. In: International Conference on Computational Aspects of Social Networks, CASoN 2011, 19-21 Oct 2011 , Salamanca, Spain. pp. 42-47. IEEE Computer Society. ISBN 978-1-4577-1132-9
Jeckmans, A.J.P. and Tang, Qiang and Hartel, P.H. (2011) POSTER: Privacy-Preserving Profile Similarity Computation in Online Social Networks. In: Proceedings of the 18th ACM conference on Computer and communications security (CCS), 17-21 Oct 2011 , Chicago, IL, USA. pp. 793-795. ACM. ISBN 978-1-4503-0948-6
Kargl, F. and Papadimitratos, P. (2011) ACM WiSec 2011 poster and demo session. ACM SIGMOBILE Mobile Computing and Communications Review, 15 (3). pp. 34-34. ISSN 1559-1662
Katoen, J.P. and Zapreev, I.S. and Hahn, E.M. and Hermanns, H. and Jansen, D.N. (2011) The ins and outs of the probabilistic model checker MRMC. Performance evaluation, 68 (2). pp. 90-104. ISSN 0166-5316 *** ISI Impact 0,944 ***
Klink, D. and Remke, A.K.I. and Haverkort, B.R.H.M. and Katoen, J.P. (2011) Time-bounded reachability in tree-structured QBDs by abstraction. Performance evaluation, 68 (2). pp. 105-125. ISSN 0166-5316 *** ISI Impact 0,944 ***
Kolesnichenko, A.V. and de Boer, P.T. and Remke, A.K.I. and Zambon, Emmanuele and Haverkort, B.R.H.M. (2011) Is Quantitative Analysis of Stuxnet Possible? In: QEST 2011: Fast Abstracts, 5-8 Sep 2011, Aachen, Germany. pp. 9-10. CTIT Workshop Proceedings WP11-03. Centre for Telematics and Information Technology University of Twente. ISSN 0929-0672
Kost, M. and Freytag, J.-C. and Kargl, F. and Kung, A. (2011) Privacy Verification Using Ontologies. In: Proceedings of the Sixth International Conference on Availability, Reliability and Security, ARES 2011, 22-26 Aug 2011, Vienna, Austria. pp. 627-632. IEEE Computer Society. ISBN 978-1-4577-0979-1
Kung, A. and Freytag, J.-C. and Kargl, F. (2011) Privacy-by-Design in ITS Applications : The Way Forward. In: Second International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN), 20 Jun 2011, Lucca, Italy. pp. 1-6. IEEE Computer Society. ISBN 978-1-4577-0351-5
Laarman, A.W. and Langerak, R. and van de Pol, J.C. and Weber, Michael and Wijs, A. (2011) Multi-Core Nested Depth-First Search. In: Proceedings of the 9th International Symposium on Automated Technology for Verification and Analysis, ATVA 2011, 11-14 Oct 2011, Tapei, Taiwan. pp. 321-335. Lecture Notes in Computer Science 6996. Springer Verlag. ISBN 978-3-642-24372-1
Laarman, A.W. and van de Pol, J.C. (2011) Variations on Multi-Core Nested Depth-First Search. (Invited) In: Proceedings of the 10th International Workshop on Parallel and Distributed Methods in verifiCation, PDMC 2011, 14 Jul 2011, Snowbird, Utah. pp. 13-28. Electronic Proceedings in Theoretical Computer Science 72. EPTCS. ISSN 2075-2180
Laarman, A.W. and van de Pol, J.C. and Weber, Michael (2011) Parallel Recursive State Compression for Free. Technical Report arXiv:1104.3119, ArXiv, Ithaca, NY. ISSN not assigned
Laarman, A.W. and van de Pol, J.C. and Weber, Michael (2011) Multi-Core LTSmin: Marrying Modularity and Scalability. In: Proceedings of the Third International Symposium on NASA Formal Methods, NFM 2011, 18-20 Apr 2011, Pasadena, CA, USA. pp. 506-511. Lecture Notes in Computer Science 6617. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-20397-8
Laarman, A.W. and van de Pol, J.C. and Weber, Michael (2011) Parallel Recursive State Compression for Free. In: Proceedings of the 18th International SPIN Workshop, SPIN 2011, 14-15 Jul 2011, Snow Bird, Utah. pp. 38-56. Lecture Notes in Computer Science 6823. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-22305-1
Lastdrager, E.E.H. (2011) Securing Patient Information in Medical Databases. Master's thesis, University of Twente.
Law, Yee Wei and Moniava, G. and Gong, Zheng and Hartel, P.H. and Palaniswami, M. (2011) KALwEN: a new practical and interoperable key management scheme for body sensor networks. Security and Communication Networks, 4 (11). pp. 1309-1329. ISSN 1939-0114 *** ISI Impact 0,806 ***
Makri, E. and Konstantinou, E. (2011) Constant round group key agreement protocols: A comparative study. Computers & Security, 30 (8). pp. 643-678. ISSN 0167-4048 *** ISI Impact 1,640 ***
Malakuti Khah Olun Abadi, S. (2011) Event Composition Model: Achieving Naturalness in Runtime Enforcement. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 11-205 ISBN 978-90-365-3246-4
Marincic, J. and Mader, A.H. and Wieringa, R.J. (2011) Validation of Embedded System Verification Models. In: Proceedings of Model-Driven Requirements Engineering Workshop (MoDRE), 29 Aug 2011, Trento, Italy. pp. 48-54. IEEE Computer Society. ISBN 978-1-4577-0957-9
Morali, A. (2011) IT Architecture-Based Confidentiality Risk Assessment in Networks of Organizations. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 11-197 ISBN 978-90-365-3165-8
Nikova, S.I. and Rijmen, V. and Schläffer, M. (2011) Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches. Journal of Cryptology, 24 (2). pp. 292-321. ISSN 0933-2790 *** ISI Impact 1,617 ***
Noppen, J.A.R. and van den Broek, P.M. (2011) Imperfect information in software product line engineering. In: Aspect-Oriented, Model-driven Software Product Lines: the AMPLE way. Cambridge University Press, Cambridge, pp. 378-410. ISBN 978-0-521-76722-4
Pavlovic, D. (2011) Relating Toy Models of Quantum Computation: Comprehension, Complementarity and Dagger Mix Autonomous Categories. In: 6th International Workshop on Quantum Physics and Logic (QPL 2009), 8-9 April 2009, Oxford, UK. pp. 121-139. Electronic Notes in Theoretical Computer Science 270 (2). Elsevier. ISSN 1571-0661
Pavlovic, D. (2011) Gaming security by obscurity. In: New Security Paradigms Workshop, September 12-15, 2011, Marin County, California. pp. 125-140. ACM. ISBN 978-1-4503-1078-9
Peng, Yuxi (2011) Face Recognition at a Distance: a study of super resolution. Master's thesis, University of Twente.
Petit, J.Y. and Feiri, M.P. and Kargl, F. (2011) Spoofed Data Detection in VANETs using Dynamic Thresholds. In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2011), 14-16 Nov 2011, Amsterdam, Netherlands. pp. 25-32. IEEE Communications Society. ISBN 978-1-4673-0049-0
Petit, J.Y. and Mammeri, Z. (2011) Dynamic Consensus for Secured Vehicular Ad Hoc Networks. In: Proceedings of the 7th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, IEEE WiMob 2011, 10-12 Oct 2011, Shanghai, China. pp. 1-8. IEEE Computer Society. ISSN 2160-4886 ISBN 978-1-4577-2013-0
Pieters, W. (2011) Explanation and trust: what to tell the user in security and AI? Ethics and information technology, 13 (1). pp. 53-64. ISSN 1388-1957 *** ISI Impact 0,739 ***
Pieters, W. (2011) Cloud security in vogelvlucht. Informatiebeveiliging, 2011 (1). pp. 16-17. ISSN 1569-1063
Pieters, W. (2011) High security, human significance: Informatiebeveiliging in Twente. Informatiebeveiliging, 2011 (2). pp. 14-17. ISSN 1569-1063
Pieters, W. (2011) Representing humans in system security models: An actor-network approach. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2 (1). pp. 75-92. ISSN 2093-5374
Pieters, W. (2011) The (social) construction of information security. The Information Society, 27 (5). pp. 326-335. ISSN 0197-2243 *** ISI Impact 1,333 ***
Pieters, W. (2011) Risicopersonalisatie en haar falen in collectieve vraagstukken. In: Kennisklimaat: (On)macht van de wetenschap in het klimaatdebat. Jaarboek Kennissamenleving 7. Amsterdam University Press, Amsterdam, pp. 197-207. ISSN 1871-0034 ISBN 978-90-8964-401-5
Pieters, W. (2011) Security and privacy in the clouds: a bird's eye view. In: Computers, Privacy and Data Protection: an Element of Choice. Springer, Dordrecht, pp. 445-457. ISBN 978-94-007-0640-8
Pieters, W. (2011) How devices transform voting. In: Innovating Government. Normative, policy and technological dimensions of modern government. Information Technology and Law Series 20. T.M.C. Asser Press, The Hague, pp. 439-452. ISSN 1570-2782 ISBN 978-90-6704-730-2
Pieters, W. and Coles-Kemp, L. (2011) Reducing normative conflicts in information security. In: Proceedings of the 2011 New security paradigms workshop, NSPW '11, 12-15 Sep 2011, Marin County, CA. pp. 11-24. ACM. ISBN 978-1-4503-1078-9
Popkema, M. and Pieters, W. and Boersma, K. and Broekhans, B. (2011) Epiloog: Het klimaat voor kennis in de kennissamenleving. In: Kennisklimaat: (On)macht van de wetenschap in het klimaatdebat. Jaarboek Kennissamenleving 7. Amsterdam University Press, Amsterdam, pp. 225-231. ISSN 1871-0034 ISBN 978-90-8964-401-5
Rebelo, H. and Coelho, R. and Lima, R. and Leavens, G.T. and Huisman, M. and Mota, A. and Castor, F. (2011) On the Interplay of Exception Handling and Design by Contract: An Aspect-Oriented Recovery Approach. In: Proceedings of the 13th Workshop on Formal Techniques for Java-like Programs, FTfJP 2011, 26th of July 2011, Lancaster, UK. 7:1-7:6. ACM. ISBN 978-1-4503-0893-9
Rensink, A. (2011) Graven in Software. Universiteit Twente, Enschede. ISBN not assigned
Rensink, A. (2011) Modelleren is het Nieuwe Programmeren. In: i&i conferentie, 23-24 Nov 2011, Lunteren, Nederland. Vereniging i&i . ISBN not assigned
Rensink, A. and Zambon, Eduardo (2011) Neighbourhood Abstraction in GROOVE. In: Proceedings of the Fourth International Workshop on Graph-Based Tools (GraBaTs 2010), 28 Sep 2010, Enschede, NL. pp. 1-13. Electronic Communications of the EASST 32. European Association for the Study of Science and Technology. ISSN 1863-2122
Rensink, A. and Zambon, Eduardo (2011) Solving the TTC 2011 Compiler Optimization Case with GROOVE. In: Proceedings of the Fifth Transformation Tool Contest (TTC 2011), 29-30 June 2011, Zurich, Switzerland. pp. 126-130. Electronic Proceedings in Theoretical Computer Science (EPTCS) 74. Open Publishing Association. ISSN 2075-2180
Ribeiro, R.A. and Moreira, A.M. and van den Broek, P.M. and Pimentel, A. (2011) Hybrid Assessment Method for Software Engineering Decisions. Decision Support Systems, 51 (1). pp. 208-219. ISSN 0167-9236 *** ISI Impact 2,604 ***
Sözer, H. and Hofmann, C. and Tekinerdogan, B. and Akşit, M. (2011) Runtime Verification of Component-Based Embedded Software. In: Proceedings of the 26th International Symposium on Computer and Information Sciences, 26-28 September 2011, London, UK. pp. 471-477. Springer Verlag. ISBN 978-1-4471-2154-1
Schmidt, R.K. and Brakemeier, A. and Leinmüller, T. and Kargl, F. and Schäfer, G. (2011) Advanced carrier sensing to resolve local channel congestion. In: Proceedings of the Eighth ACM international workshop on Vehicular inter-networking, VANET 2011, 23 Sep 2011, Las Vegas, Nevada, USA. pp. 11-20. ACM. ISBN 978-1-4503-0869-4
Sedghi, S. and Hartel, P.H. and Jonker, W. and Nikova, S.I. (2011) Privacy Enhanced Access Control by Means of Policy Blinding. In: Proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, 30 May - 1 Jun 2011, Guangzhou, China. pp. 108-122. Lecture Notes in Computer Science 6672. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-21030-3
Sijtema, M. and Stoelinga, M.I.A. and Belinfante, A.F.E. and Marinelli, L. (2011) Experiences with Formal Engineering: Model-Based Specification, Implementation and Testing of a Software Bus at Neopost. In: 16th International Workshop on Formal Methods for Industrial Critical Systems, FMICS 2011, 29-30 Aug 2011, Trento, Italy. pp. 117-133. Lecture Notes in Computer Science 6959. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-24430-8
van Sinderen, M.J. and Ferreira Pires, L. and Iacob, M.-E. (2011) Message from the 3M4SE 2011 chairs. In: Proceedings of the 15th IEEE International Enterprise Distributed Object Computing Conference Workshops, EDOCW 2011, 30 Aug 2011, Helsinki, Finland. pp. 55-56. IEEE Computer Society. ISBN 978-1-4577-0869-5
Soleimanifard, S. and Gurov, D. and Huisman, M. (2011) ProMoVer: Modular Verification of Temporal Safety Properties. In: Proceedings of the 9th International Conference on Software Engineering and Formal Methods (SEFM 2011), 14-18 Nov 2011, Montevideo, Uruguay. pp. 366-381. Lecture Notes in Computer Science 7041. Springer Verlag. ISBN 978-3-642-24690-6
Stoelinga, M.I.A. (2011) Model- en risicogebaseerd testen voeren boventoon op Nederlandse Testdag. Bits en chips, 113 (15). pp. 14-15. ISSN 1879-6443
Stoelinga, M.I.A. and Timmer, M. (2011) Efficiënt zoeken in grote tekstbestanden. Nieuwe Wiskrant, 30 (4). pp. 35-38. ISSN 0928-7167
Stuurman, G. and Kurtev, I. (2011) Action semantics for defining dynamic semantics of modeling languages. In: Proceedings of the Third Workshop on Behavioural Modelling, BM-FA 2011, 6 June 2011, Birmingham, UK. pp. 64-71. ACM. ISBN 978-1-4503-0617-1
Tang, Qiang (2011) Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization. In: Proceedings of the 16th Australian conference on information security and privacy, 11-13 Jul 2011, Melbourne, Australia. pp. 389-406. Lecture Notes in Computer Science 6812. Springer Verlag. ISBN 978-3-642-22497-3
Tang, Qiang (2011) Public Key Encryption Supporting Plaintext Equality Test and User-Specified Authorization. Technical Report TR-CTIT-11-20, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang and Chen, Liqun (2011) Extended KCI attack against two-party key establishment protocols. Information processing letters, 111 (15). pp. 744-747. ISSN 0020-0190 *** ISI Impact 0,605 ***
Tang, Qiang and Jeckmans, A.J.P. (2011) Towards a security model for computational puzzle schemes. International Journal of Computer Mathematics, 88 (11). pp. 2246-2257. ISSN 0020-7160 *** ISI Impact 0,577 ***
Tekinerdogan, B. and Akşit, M. (2011) A Comparative Analysis of Software Engineering with Mature Engineering Disciplines Using a Problem-Solving Perspective. In: Modern Software Engineering Concepts and Practices: Advanced Approaches. Information Science Reference, Hershey, pp. 1-18. ISBN 978-1-60960-215-4
Timmer, M. (2011) SCOOP: A Tool for SymboliC Optimisations Of Probabilistic Processes. In: Proceedings of the 8th International Conference on Quantitative Evaluation of SysTems, QEST 2011, 5-8 Sep 2011, Aachen, Germany. pp. 149-150. IEEE Computer Society. ISBN 978-1-4577-0973-9
Timmer, M. and Brinksma, H. and Stoelinga, M.I.A. (2011) Model-Based Testing. In: Software and Systems Safety: Specification and Verification. NATO Science for Peace and Security Series D: Information and Communication Security 30. IOS Press, Amsterdam, pp. 1-32. ISSN 1874-6268 ISBN 978-1-60750-710-9
Timmer, M. and Stoelinga, M.I.A. and van de Pol, J.C. (2011) Confluence Reduction for Probabilistic Systems. In: Proceedings of the 17th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2011, 26 Mar - 3 Apr 2011, Saarbrücken, Germany. pp. 311-325. Lecture Notes in Computer Science 6605. Springer Verlag. ISBN 978-3-642-19834-2
Trivellato, D. and Zannone, N. and Etalle, S. (2011) A Security Framework for Systems of Systems. In: 2011 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY , 6-8 Jun 2011, Pisa, Italy. pp. 182-183. IEEE Computer Society. ISBN 978-1-4244-9879-6
Trivellato, D. and Zannone, N. and Etalle, S. (2011) Protecting Information in Systems of Systems. In: 18th ACM Conference on Computer and Communications Security (CCS), 17-21 Oct 2011, Chicago, USA . pp. 865-867. ACM. ISBN 978-1-4503-0948-6
van der Vegt, S. and Laarman, A.W. (2011) A Parallel Compact Hash Table. In: Proceedings of Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, MEMICS 2011, 14-16 Oct 2011, Lednice, Czech Republic. pp. 191-204. Lecture Notes in Computer Science 7119. Springer Verlag. ISBN 978-3-642-25929-6
Warmer, M. (2011) Detection of Web Based Command & Control Channels. Master's thesis, University of Twente.
Yin, Haihan and Bockisch, C.M. and Akşit, M. and De Borger, W. and Lagaisse, B. and Joosen, W. (2011) Debugging Scandal: The Next Generation. In: Proceedings of the Workshop on Reflection, AOP and Meta-Data for Software Evolution (RAM-SE 2011), 27 Jun 2011, Zurich, Switzerland. 1. University of York. ISBN not assigned
Zambon, Eduardo and Rensink, A. (2011) Using Graph Transformations and Graph Abstractions for Software Verification. Electronic Communications of the EASST, 38. pp. 1-13. ISSN 1863-2122
Zambon, Emmanuele (2011) Towards Optimal IT Availability Planning: Methods and Tools. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 10-188 ISBN 978-90-365-3102-3
Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. and Hartel, P.H. (2011) Model-based Qualitative Risk Assessment for Availability of IT Infrastructures. Software and Systems Modeling, 10 (4). pp. 553-580. ISSN 1619-1366 *** ISI Impact 0,990 ***

2010

Degano, P. and Etalle, S. and Guttman, J., ed. (2010) Formal aspects of security and trust : 7th international workshop, FAST 2010 Pisa, Italy, September 16-17, 2010: revised selected papers. Lecture Notes in Computer Science 6561. Springer Verlag, Berlin. ISBN 978-3-642-19751-2
Ehrig, H. and Rensink, A. and Rozenberg, G. and Schürr, A., ed. (2010) Graph Transformations: 5th International Conference. Lecture Notes in Computer Science 6372. Springer Verlag, Berlin. ISSN 0302-9743 ISBN 978-3-642-15927-5
Mazanek, S. and Rensink, A. and Van Gorp, P., ed. (2010) Transformation Tool Contest 2010, 1-2 July 2010, Malaga, Spain. CTIT Workshop Proceedings Series 10-03. Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1574-0846
Asveld, P.R.J. (2010) Permuting Operations on Strings and Their Relation to Prime Numbers. Technical Report TR-CTIT-10-22, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Asveld, P.R.J. (2010) Review of "N. Moreira & R. Reis, Series-parallel automata and short regular expressions, Fund. Inform. 91 (2009) 611-629". Mathematical reviews, MR2518215 / 2010d:68084. pp. 3708-3708. ISSN 0025-5629
Baier, C. and Cloth, L. and Haverkort, B.R.H.M. and Hermanns, H. and Katoen, J.P. (2010) Performability assessment by model checking of Markov reward models. Formal methods in system design, 36 (1). pp. 1-36. ISSN 0925-9856 *** ISI Impact 1,132 ***
Baier, C. and Haverkort, B.R.H.M. and Hermanns, H. and Katoen, J.P. (2010) Performance Evaluation and Model Checking Join Forces. Communications of the ACM, 53 (9). pp. 76-85. ISSN 0001-0782 *** ISI Impact 3,301 ***
Ballarini, P. and Barnat, J. and Weber, Michael (2010) Preface. In: Proceedings of the 9th International Workshop on Parallel and Distributed Methods in verifiCation (PDMC) and the 2nd International Workshop on High Performance Computational Systems Biology (HiBi), 30 Sep - 1 Oct 2010, Enschede, the Netherlands. vii-viii. IEEE Computer Society. ISBN 978-0-7695-4265-2
Barreto, P.S. and Nikov, V. and Nikova, S.I. and Rijmen, V. and Tischhouser, E. (2010) Wirlwind: a New Cryptographic Hash Function. Designs, Codes and Cryptography, 56 (2-3). pp. 141-162. ISSN 0925-1022 *** ISI Impact 0,781 ***
Bauer, L. and Etalle, S. and den Hartog, J.I. and Viganò, L. (2010) Preface of Special Issue on “Computer Security: Foundations and Automated Reasoning”. Journal of Automated Reasoning, 46 (3-4). pp. 223-224. ISSN 0168-7433 *** ISI Impact 2,113 ***
Böhm, K. and Etalle, S. and den Hartog, J.I. and Hütter, C. and Trabelsi, S. and Trivellato, D. and Zannone, N. (2010) A flexible architecture for privacy-aware trust management. Journal of Theoretical and Applied Electronic Commerce Research, 5 (2). pp. 77-96. ISSN 0718-1876
Belinfante, A.F.E. (2010) JTorX: A Tool for On-Line Model-Driven Test Derivation and Execution. In: Tools and Algorithms for the Construction and Analysis of Systems, 16th International Conference, TACAS 2010, 22-25 March 2010, Paphos, Cyprus. pp. 266-270. Lecture Notes in Computer Science 6015. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-12001-5
Bijker, R. and Bockisch, C.M. and Sewe, A. (2010) Optimizing the Evaluation of Patterns in Pointcuts. In: Fourth workshop on Virtual Machines and Intermediate Languages, 17 Oct 2010, Reno/Tahoe, Nevada, USA. 2:1-2:10. ACM. ISBN 978-1-4503-0545-7
Blom, S.C.C. and Kant, G. and Rensink, A. (2010) Distributed Graph-Based State Space Generation. In: Proceedings of the Fourth International Workshop on Graph-Based Tools (GraBaTs 2010), 28 Sep 2010, Enschede, The Netherlands. 8. Electronic Communications of the EASST 32. European Association of Software Science and Technology (EASST). ISSN 1863-2122
Blom, S.C.C. and van de Pol, J.C. and Weber, Michael (2010) LTSmin: Distributed and Symbolic Reachability. In: Computer Aided Verification, 15-19 Jul 2010, Edinburgh. pp. 354-359. Lecture Notes in Computer Science 6174. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-14294-9
Bockisch, C.M. and Sewe, A. (2010) Generic IDE Support for Dispatch-Based Composition. In: Proceedings of the First International Workshop on Composition: Objects, Aspects, Components, Services and Product Lines, 15 Mar 2010, Rennes, France. CEUR Workshop Proceedings 564. M. Jeusfeld c/o Redaktion Sun SITE, Informatik V, RWTH Aachen. ISSN 1613-0073
Bonino da Silva Santos, L.O. and Ferreira Pires, L. and van Sinderen, M.J. (2010) Service Provisioning Support for Non-technical Service Clients. In: Proceedings of the 7th International Conference on Information Technology, 12-14 Apr 2010, Las Vegas, USA. pp. 672-677. IEEE Computer Society. ISBN 978-0-7695-3984-3
Boudali, H. and Crouzen, P. and Stoelinga, M.I.A. (2010) A Rigorous, Compositional, and Extensible Framework for Dynamic Fault Tree Analysis. IEEE Transactions on Dependable and Secure Computing, 7 (2). pp. 128-143. ISSN 1545-5971 *** ISI Impact 1,592 ***
van den Broek, P.M. (2010) Optimization of Product Instantiation using Integer Programming. In: Proceedings of the 14th International Software Product Line Conference, Volume 2, 14 Sep 2010, Jeju Island, South Korea. pp. 107-111. Lancaster University, Lancaster, UK. ISBN 978-1-86220-274-0
van den Broek, P.M. and Galvao Lourenco da Silva, I. and Noppen, J.A.R. (2010) Merging Feature Models. In: 14th International Software Product Line Conference, Volume 2, 14 Sep 2010, Jeju Island, South Korea. pp. 83-89. Lancaster University, Lancaster, UK. ISBN 978-1-86220-274-0
Brzuska, C. and Busch, H. and Dagdelen, O. and Fischlin, M. and Franz, M. and Katzenbeisser, S. and Manulis, M. and Onete, C. and Peter, A. and Poetering, B. and Schröder, D. (2010) Redactable signatures for tree-structured data: definitions and constructions. In: 8th International Conference on Applied Cryptography and Network Security, ACNS 2010, 22-25 Jun 2010, Beijing, China. pp. 87-104. Lecture Notes in Computer Science 6123. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-13707-5
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Tang, Qiang and Veldhuis, R.N.J. (2010) Embedding Renewable Cryptographic Keys into Noisy Data. International Journal of Information Security, 9 (3). pp. 193-208. ISSN 1615-5262 *** ISI Impact 1,279 ***
Ciraci, S. and van den Broek, P.M. and Akşit, M. (2010) Graph-Based Verification of Static Program Constraints. In: Proceedings of the 25th Annual ACM Symposium on Applied Computing 2010, 22-26 March, 2010, Sierre, Switzerland. pp. 2265-2273. ACM. ISBN 978-1-60558-638-0
Ciraci, S. and van den Broek, P.M. and Akşit, M. (2010) Verifying Runtime Reconfiguration Requirements on UML Models. In: Views on Evolvability of Embedded Systems. Springer, pp. 209-225. ISBN 978-90-481-9848-1
Ciraci, S. and Havinga, W.K. and Akşit, M. and Bockisch, C.M. and van den Broek, P.M. (2010) A graph-based aspect interference detection approach for UML-based aspect-oriented models. Transactions on Aspect-Oriented Software Development, 6210. pp. 321-374. ISSN 0302-9743 ISBN 978-3-642-16085-1
Ciraci, S. and Malakuti Khah Olun Abadi, S. and Katz, S. and Akşit, M. (2010) Checking the Correspondence Between UML models and Implementation. In: 1st International Conference on Runtime Verification, 1-4 Nov 2010, Malta. pp. 198-213. Lecture Notes in Computer Science 6418. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-16611-2
Conejero, J.M. and Hernández, J. and Jurado, E. and van den Berg, K.G. (2010) Mining Early Aspects based on Syntactical and Dependency Analyses. Science of Computer Programming, 75 (11). pp. 1113-1141. ISSN 0167-6423 *** ISI Impact 0,828 ***
Corradini, A. and de Mol, M.J. (2010) ICGT 2010 Doctoral Symposium [Preface]. In: Proceedings of the Fifth Internal Conference on Graph Transformations (ICGT 2010), 27 Sep - 02 Oct 2010, Enschede, Netherlands. pp. 379-380. Lecture Notes in Computer Science 6372. Springer Verlag. ISBN 978-3-642-15927-5
Costa, A. (2010) Context - Free - Language Parser for Advanced Network Intrusion Detection. Master's thesis, University of Twente.
Dietzel, S. and Kargl, F. and Heijenk, G.J. and Schaub, F. (2010) On the Potential of Generic Modeling for VANET Data Aggregation Protocols. In: Proceedings of the 2nd IEEE Vehicular Networking Conference, 13-15 Dec 2010, Jersey City, New Jersey, USA. pp. 78-85. IEEE Communications Society. ISBN 978-1-4244-9524-5
Dietzel, S. and Schoch, E. and Kargl, F. and Könings, B. and Weber, M. (2010) Resilient Secure Aggregation for Vehicular Networks. IEEE Network, 24 (1). pp. 26-31. ISSN 0890-8044 *** ISI Impact 2,899 ***
Dimkov, T. and van Cleeff, A. and Pieters, W. and Hartel, P.H. (2010) Two methodologies for physical penetration testing using social engineering. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC), 06-10 Dec 2010, Austin, Texas, USA. pp. 399-408. ACM. ISBN 978-1-4503-0133-6
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Portunes: representing attack scenarios spanning through the physical, digital and social domain. In: Proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'10). Revised Selected Papers, 27-28 March 2010, Paphos, Cyprus. pp. 112-129. Lecture Notes in Computer Science 6186. Springer Verlag. ISBN 978-3-642-16074-5
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Laptop theft: a case study on effectiveness of security mechanisms in open organizations. Technical Report TR-CTIT-10-07, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Portunes: analyzing multi-domain insider threats. Technical Report TR-CTIT-10-39, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Laptop theft: a case study on effectiveness of security mechanisms in open organizations. In: Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS), 4-8 Oct 2010, Chicago, Illinois, US. pp. 666-668. ACM. ISBN 978-1-4503-0245-6
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Effectiveness of physical, social and digital mechanisms against laptop theft in open organizations. In: Proceedings of the 3rd IEEE/ACM International Conference on Cyber, Physical and Social Computing (CPSCom 2010), 18-20 Dec 2010, Hangzhou, China. pp. 727-732. IEEE Computer Society. ISBN 978-1-4244-9779-9
Durr, P.E.A. and Bergmans, L.M.J. and Akşit, M. (2010) A Controlled Experiment for the Assessment of Aspects: Tracing in an Industrial Context. In: Empirical Evaluation of Software Composition Techniques (ESCOT 2010), 16 march 2010, Saint Malo, France. Aspect-Oriented Software Association. ISBN not assigned
Ehrig, H. and Rensink, A. and Rozenberg, G. and Schürr, A. (2010) Graph Transformationcs (ICGT 2010) - Preface. In: International Conference on Graph Transformationcs (ICGT 2010), 27 Sep - 2 Oct 2010, Enschede. V-VI. Lecture Notes in Computer Science 6372. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-15927-5
Ferreira Pires, L. and van Oostrum, A.R. and Wijnhoven, F. (2010) Service registry design: an information service approach. International Journal of Information Systems in the Service Sector, 2 (4). pp. 1-21. ISSN 1935-5688
Galvao Lourenco da Silva, I. and van den Broek, P.M. and Akşit, M. (2010) A model for variability design rationale in SPL. In: Proceedings of the Fourth European Conference on Software Architecture: Companion Volume, 23 Aug 2010, Copenhagen, Denmark. pp. 332-335. ACM International Conference Proceeding Series Companion Volume. ACM. ISBN 978-1-4503-0179-4
Göknil, A. and Kurtev, I. and van den Berg, K.G. (2010) Tool Support for Generation and Validation of Traces between Requirements and Architecture. In: Proceedings of the Sixth ECMFA Traceability Workshop (ECMFA-TW), 15 June 2010, Paris, France. pp. 39-46. ACM International Conference proceedings Series. ACM. ISBN 978-1-60558-993-0
Güleşir, G. and America, P. and Benschop, F. and van den Berg, K.G. and Akşit, M. (2010) Creating high-quality behavioural designs for software-intensive systems. In: Views on Evolvability of Embedded Systems. Springer, pp. 193-207. ISBN 978-90-481-9848-1
Ghamarian, A.H. and de Mol, M.J. and Rensink, A. and Zambon, Eduardo and Zimakova, M.V. (2010) Modelling and Analysis Using GROOVE. Technical Report TR-CTIT-10-18, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Ghamarian, A.H. and Rensink, A. and Jalali, A. (2010) Incremental Pattern Matching in Graph-Based State Space Exploration. In: Proceedings of the Fourth International Workshop on Graph-Based Tools (GraBaTs 2010), 28 Sept 2010, Enschede, The Netherlands. pp. 144-154. CTIT Workshop Proceedings (WP 10-06). Centre for Telematics and Information Technology University of Twente. ISSN 0929-0672
Goncalves da Silva, E.M. and Ferreira Pires, L. and van Sinderen, M.J. (2010) On the Support of Dynamic Service Composition at Runtime. In: Service-Oriented Computing. ICSOC/ServiceWave 2009 Workshops. Lecture Notes in Computer Science 6275. Springer Verlag, Berlin, pp. 530-539. ISBN 978-3-642-16131-5
Goncalves da Silva, E.M. and Ferreira Pires, L. and van Sinderen, M.J. (2010) On the Design of User-centric Supporting Service Composition Environments. In: Proceedings of IEEE International Conference on Information Technology: New Generations, 12-14 April 2010, Las Vegas, Las Vegas, Nevada, USA. pp. 666-671. IEEE Computer Society. ISBN 978-0-7695-3984-3
Gong, Zheng (2010) Review of "Robust defenses for cross-site request forgery" by A. Barth, C. Jackson, J. Mitchell. Computing reviews. CR137694. ISSN 1530-6585
Gong, Zheng and Long, Yu and Hong, Xuan and Chen, Kefei (2010) Practical Certificateless Aggregate Signatures From Bilinear Maps. Journal of Information Science and Engineering, 26 (6). pp. 2093-2106. ISSN 1016-2364 *** ISI Impact 0,392 ***
Gong, Zheng and Tang, Qiang and Law, Yee Wei and Chen, Hongyang (2010) KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks. In: Proceedings of the International Conference on Information Security and Cryptology, INSCRYPT 2010, 20-24 Oct 2010, Shanghai, China. pp. 268-283. Lecture Notes in Computer Science 6584. Springer Verlag. ISBN 978-3-642-21517-9
Hadžiosmanović, D. and Bolzoni, D. and Hartel, P.H. (2010) A Log Mining Approach for Process Monitoring in SCADA. Technical Report TR-CTIT-10-35, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hadžiosmanović, D. and Bolzoni, D. and Hartel, P.H. (2010) MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA. In: Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), 15-17 Sep 2010, Ottawa, Canada. pp. 500-501. Lecture Notes in Computer Science 6307. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-15511-6
Hansen, H.H. and Ketema, J. and Luttik, S.P. and Mousavi, M.R. and van de Pol, J.C. (2010) Towards Model Checking Executable UML Specifications in mCRL2. Innovations in Systems and Software Engineering, 6 (1-2). pp. 83-90. ISSN 1614-5046
Hartel, P.H. and Junger, M. and Wieringa, R.J. (2010) Cyber-crime Science = Crime Science + Information Security. Technical Report TR-CTIT-10-34, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hartel, P.H. and Muller, H.L. (2010) Simple algebraic data types for C. Technical Report TR-CTIT-10-10, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Haverkort, B.R.H.M. and Katoen, J.P. and Larsen, K.G. (2010) Quantitative Verification in Practice. In: 4th International Symposium on Leveraging Applications, ISoLA 2010, 18-21 Oct 2010, Heraklion, Greece. pp. 127-127. Lecture Notes in Computer Science 6416. Springer Verlag. ISBN 978-3-642-16560-3
Havinga, W.K. and Bergmans, L.M.J. and Akşit, M. (2010) A Model for Composable Composition Operators: Expressing object and aspect compositions with first-class operators. In: Proceedings of the 9th international conference on Aspect-Oriented Software Development, 15-19 Mar 2010, Rennes and Saint-Malo, France. pp. 145-156. ACM. ISBN 978-1-60558-958-9
Havinga, W.K. and Bockisch, C.M. and Bergmans, L.M.J. (2010) A Case for Custom, Composable Composition Operators. In: Proceedings of the 1st International Workshop on Composition: Objects, Aspects, Components, Services and Product Lines, 15 March 2010, Rennes, France. pp. 45-50. Workshop Proceedings 564. CEUR-WS. ISSN 1613-0073
Hüksbusch, M. and König, B. and Rensink, A. and Semenyak, M. and Soltenborn, C. and Wehrheim, H. (2010) Showing Full Semantics Preservation in Model Transformation - A Comparison of Techniques. In: 8th International Conference on Integrated Formal Methods, IFM 2010, 11-14 Oct 2010, Nancy, France. pp. 183-198. Lecture Notes in Computer Science 6396. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-16264-0
Hülsbusch, M. and König, B. and Rensink, A. and Semenyak, M. and Soltenborn, C. and Wehrheim, H. (2010) Full Semantics Preservation in Model Transformation - A Comparison of Proof Techniques. Technical Report TR-CTIT-10-09, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hermanns, H. and Katoen, J.P. (2010) The How and Why of Interactive Markov Chains. (Invited) In: Symposium on Formal Methods for Components and Objects, FMCO 2009, 04 - 06 November 2009, Eindhoven, the Netherlands. pp. 311-337. Lecture Notes in Computer Science 6286. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-17070-6
Herrmann, A. and Morali, A. (2010) RiskREP: Risk-Based Security Requirements Elicitation and Prioritization (extended version). Technical Report TR-CTIT-10-28, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hipp, M. and Schaub, F. and Kargl, F. and Weber, M. (2010) Interaction Weaknesses of Personal Navigation Devices. In: Proceedings of the Second International Conference on Automotive User Interfaces and Interactive Vehicular Applications, AutomotiveUI 2010, 11-12 Nov 2010, Pittsburgh, USA. pp. 129-136. ACM. ISBN 978-1-4503-0437-5
Huisman, M. and Gurov, D. (2010) CVPP: A Tool Set for Compositonal Verification of Control-Flow Safety Properties. In: Formal Verification of Object-Oriented Software (FoVeOOS) 2010., 28 - 30 June 2010. pp. 107-121. Lecture Notes in Computer Science 6528. Springer Verlag. ISBN 978-3-642-18070-5
Jongerden, M.R. and Mereacre, A. and Bohnenkamp, H.C. and Haverkort, B.R.H.M. and Katoen, J.P. (2010) Computing Optimal Schedules of Battery Usage in Embedded Systems. IEEE Transactions on Industrial Informatics, 6 (3). pp. 276-286. ISSN 1551-3203 *** ISI Impact 4,708 ***
Jonker, H.L. and Pieters, W. (2010) Anonymity in voting revisited. In: Towards Trustworthy Elections: New Directions in Electronic Voting. Lecture Notes in Computer Science 6000. Springer Verlag, Berlin, pp. 216-230. ISSN 0302-9743 ISBN 978-3-642-12979-7
Kant, G. (2010) Using Canonical Forms for Isomorphism Reduction in Graph-based Model Checking. Technical Report TR-CTIT-10-28, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Kant, G. (2010) Distributed State Space Generation for Graphs up to Isomorphism. Master's thesis, University of Twente.
Kargl, F. and Schaub, F. and Dietzel, S. (2010) Mandatory Enforcement of Privacy Policies using Trusted Computing Principles. In: Proceedings of the Intelligent Information Privacy Management Symposium, AAAI Spring Symposium, Stanford University, USA. pp. 104-109. AAAI. ISBN 978-1-57735-459-8
Katoen, J.P. (2010) Advances in Probabilistic Model Checking. (Invited) In: 11th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2010, 17-19 Jan 2010, Madrid, Spain. pp. 25-25. Lecture Notes in Computer Science 5944. Springer Verlag. ISBN 978-3-642-11318-5
Katoen, J.P. and van de Pol, J.C. and Stoelinga, M.I.A. and Timmer, M. (2010) A linear process-algebraic format for probabilistic systems with data (extended version). Technical Report TR-CTIT-10-11, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Katoen, J.P. and van de Pol, J.C. and Stoelinga, M.I.A. and Timmer, M. (2010) A linear process-algebraic format for probabilistic systems with data. In: Application of Concurrency to System Design, Tenth International Conference on, 21-25 Jun 2010, Braga, Portugal. pp. 213-222. IEEE Computer Society. ISSN 1550-4808 ISBN 978-0-7695-4066-5
Könings, B. and Schaub, F. and Kargl, F. and Weber, M. (2010) Towards Territorial Privacy in Smart Environments. In: Proceedings of the Intelligent Information Privacy Management Symposium, AAAI Spring Symposium, Stanford University, USA. pp. 113-118. AAAI. ISBN 978-1-57735-459-8
Kerkhoff, H.G. and Wan, Jinbo (2010) Dependable Digitally-Assisted Mixed-Signal IPs Based on Integrated Self-Test & Self-Calibration. In: IEEE 16th International Mixed-Signals, Sensors and Systems Test Workshop (IMS3TW 2010), 7-9 June 2010, La Grande Motte, France. pp. 1-6. IEEE Computer Society. ISBN 978-1-4244-7792-0
Ketema, J. and Simonsen, J.G. (2010) Least Upper Bounds on the Size of Church-Rosser Diagrams in Term Rewriting and λ-Calculus. In: Proceedings of the 10th International Symposium on Functional and Logic Programming (FLOPS 2010), 19-21 April 2010, Sendai, Japan. pp. 272-287. Lecture Notes in Computer Science 6009. Springer Verlag. ISBN 978-3-642-12250-7
Khatib, M.G. and Hartel, P.H. and van Dijk, H.W. (2010) Energy-Efficient Streaming Using Non-volatile Memory. Journal of Signal Processing Systems, 60 (2). pp. 149-168. ISSN 1939-8018 *** ISI Impact 0,508 ***
Kok, G. (2010) Cloud Computing & Confidentiality. Master's thesis, University of Twente.
Kordy, P.T. and Langerak, R. and Polderman, J.W. (2010) Re-verification of a Lip Synchronization Protocol using Robust Reachability. Electronic Proceedings in Theoretical Computer Science, 20. pp. 49-62. ISSN 2075-2180
Koster, S.R. and Iacob, M.-E. and Ferreira Pires, L. (2010) An evaluation framework for business process management products. In: Business Process Management Workshops, BPM 2009 International Workshops, Revised Papers, 7 Sept 2009, Ulm, Germany. pp. 441-452. Lecture Notes in Business Information Processing (43). Springer Verlag. ISSN 1865-1348 ISBN 978-3-642-12185-2
Krishnan, S. and Kerkhoff, H.G. (2010) Multivariate Model for Test Response Analysis. In: 15th IEEE European Test Symposium (ETS 2010), 24-28 May 2010 , Praha, Czech republic. pp. 250-251. IEEE Computer Society. ISSN 1530-1877 ISBN 978-1-4244-5834-9
Krishnan, S. and Kerkhoff, H.G. and Doornbosch, K.D. and Brand, R. (2010) BlockLevel Bayesian Diagnosis of Analogue Electronic Circuits. In: Design, Automation & Test in Europe Conference & Exhibition, DATE 2010, 8-12 Mar 2010, Dresden, Germany. pp. 1767-1772. IEEE. ISSN 1530-1591 ISBN 978-1-4244-7054-9
Kurtev, I. (2010) Application of reflection in a model transformation language. Software and Systems Modeling, 9 (3). pp. 311-333. ISSN 1619-1366 *** ISI Impact 0,990 ***
Laarman, A.W. and Kurtev, I. (2010) Ontological Metamodeling with Explicit Instantiation. In: 2nd Int. Conf. on Software Language Engineering (SLE), 5-6 Oct 2009, Denver, CO, USA. pp. 174-183. LNCS 5969. Springer Verlag. ISBN 978-3-642-12106-7
Laarman, A.W. and van de Pol, J.C. and Weber, Michael (2010) Boosting Multi-Core Reachability Performance with Shared Hash Tables. In: Proceedings of the 10th International Conference on Formal Methods in Computer-Aided Design, 20 Oct - 23 Oct 2010, Lugano, Switzerland. pp. 247-256. IEEE Computer Society. ISBN 978-1-4577-0734-6
Laarman, A.W. and van de Pol, J.C. and Weber, Michael (2010) Boosting Multi-Core Reachability Performance with Shared Hash Tables. Technical Report arXiv:1004.2772, ArXiv, Ithaca, NY.
Langer, L. and Jonker, H.L. and Pieters, W. (2010) Anonymity and Verifiability in Voting: Understanding (Un)Linkability. In: 12th International Conference Information and Communications Security, ICICS 2010, 15-17 Dec 2010, Barcelona, Spain. pp. 296-310. Lecture Notes in Computer Science 6476. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-17649-4
Leinmüller, T. and Schoch, E. and Kargl, F. and Maihöfer, C. (2010) Decentralized position verification in geographic ad hoc routing. Security and Communication Networks, 3 (4). pp. 289-302. ISSN 1939-0114 *** ISI Impact 0,806 ***
van Liesdonk, P. and Sedghi, S. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2010) Computationally Efficient Searchable Symmetric Encryption. In: Proceedings of the Seventh International Workshop on Secure Data Management, SDM 2010, 17 Sep 2010, Singapore. pp. 87-100. Lecture Notes in Computer Science (6358). Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-15545-1
Luo, Y. and Lai, X. and Gong, Zheng (2010) Pseudorandomness analysis of the (extended) Lai–Massey scheme. Information processing letters, 111 (2). pp. 90-96. ISSN 0020-0190 *** ISI Impact 0,605 ***
Ma, Zhendong and Kargl, F. and Weber, M. (2010) Measuring long-term location privacy in vehicular communication systems. Computer communications, 33 (12). pp. 1414-1427. ISSN 0140-3664 *** ISI Impact 2,099 ***
Mader, A.H. and Bohnenkamp, H.C. and Usenko, Y.S. and Jansen, D.N. and Hurink, J.L. and Hermanns, H. (2010) Synthesis and stochastic assessment of cost-optimal schedules. International journal on software tools for technology transfer, 12 (5). pp. 305-317. ISSN 1433-2779
Madureira, A. and den Hartog, F. and Goncalves da Silva, E.M. and Baken, N. (2010) Model for Trans-sector Digital Interoperability. In: International Conference on Interoperability for Enterprise Software and Applications, 14-15 April 2010, Coventry, UK. pp. 123-133. Springer Verlag. ISBN 978-1-84996-256-8
Marin-Perianu, M. and Bosch, S. and Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. (2010) Autonomous Vehicle Coordination with Wireless Sensor and Actuator Networks. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 5 (4). 13:1-13:29. ISSN 1556-4665 *** ISI Impact 1,118 ***
Marincic, J. and Mader, A.H. and Wieringa, R.J. and Lucas, Y. (2010) Structuring Problem Analysis for Embedded Systems Modelling. In: International Workshop on Applications and Advances of Problem-Orientation (IWAAPO), 8 May 2010, Cape Town, South Africa. International Academy, Research and Industry Association. ISBN not assigned
Müller, R.M. and Linders, S. and Ferreira Pires, L. (2010) Business intelligence and service-oriented architecture: a Delphi study. Information Systems Management, 27 (2). pp. 168-187. ISSN 1058-0530 *** ISI Impact 1,021 ***
de Mol, M.J. and Rensink, A. (2010) On A Graph Formalism for Ordered Edges. In: Proceedings of the Ninth International Workshop on Graph Transformation and Visual Modeling Techniques (GT-VMT 2010), 20 Mar - 21 Mar 2010, Paphos, Cyprus. Electronic Communications of the EASST 29. The European Association for the Study of Science and Technology. ISSN 1863-2122
Morali, A. and Wieringa, R.J. (2010) Risk-Based Confidentiality Requirements Specification for Outsourced IT Systems (Extended Version). Technical Report TR-CTIT-10-09, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Morali, A. and Wieringa, R.J. (2010) Risk-Based Confidentiality Requirements Specification for Outsourced IT Systems. In: Proceedings of the 18th IEEE International Requirements Engineering Conference (RE 2010), 27 Sept - 1 Oct 2010, Sydney, Australia. pp. 199-208. IEEE Computer Society. ISBN 978-0-7695-4162-4
Morali, A. and Wieringa, R.J. (2010) Towards Validating Risk Indicators Based on Measurement Theory (Extended version). Technical Report TR-CTIT-10-31, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Morali, A. and Wieringa, R.J. (2010) Towards Validating Risk Indicators Based on Measurement Theory. In: ISSRE 2010 Supplemental Proceedings: 1st International Workshop on Risk and Trust in Extended Enterprises, 01 Nov 2010, USA. pp. 443-447. IEEE Computer Society. ISBN 978-0-7695-4255-3
Morali, A. and Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. (2010) CRAC: Confidentiality Risk Assessment and IT-Architecture Comparison. In: Proceedings of the 6th International Conference on Network and Service Management (CNSM 2010), 25-29 Oct 2010, Niagara Falls, Canada. pp. 322-325. IEEE Computer Society. ISBN 978-1-4244-8910-7
Nasution, S. and Hartel, P.H. and Suryana, N. and Azman, N. and Shahib, S. (2010) Trust Level and Routing Selection for Mobile Agents in a Smart Home. In: Second International Conference on Computer Modeling and Simulation (ICCMS), 22-24 Jan. 2010, Sanya, China. pp. 445-450. IEEE Computer Society. ISBN 978-0-7695-3941-6
Neuhausser, M. (2010) Model Checking Nondeterministic and Randomly Timed Systems. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 09-165 ISBN 978-90-365-2975-4
Neuhausser, M. and Zhang, Lijun (2010) Model Checking Interactive Markov Chains. In: 16th International Conferenceon Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2010, 20-28 Mar 2010, Paphos, Cyprus. pp. 53-68. Lecture Notes in Computer Science 6015. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-12001-5
Ngo, Minh Tri (2010) Verification of Confidentiality of Multi-threaded Programs. In: IPA PhD Workshop 2010, 01-03 Nov 2010, Veldhoven, The Netherlands. IPA. ISBN not assigned
Ottenhof, R.H.J. (2010) Towards automated truancy detection. Master's thesis, University of Twente.
Pavlovic, D. (2010) Quantifying and Qualifying Trust: Spectral Decomposition of Trust Networks. In: 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, 16-17 September 2010, Pisa, Italy. pp. 1-17. Lecture Notes in Computer Science 6561. Springer. ISBN 978-3-642-19751-2
Pavlovic, D. (2010) The Unreasonable Ineffectiveness of Security Engineering: An Overview. In: 8th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2010, 13-18 Sep 2010, Pisa, Italy. pp. 12-18. Software Engineering and Formal Methods. IEEE Computer Society. ISBN 978-1-4244-8289-4
Pavlovic, D. and Meadows, C. (2010) Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol. In: Proceedings of the 26th Conference on the Mathematical Foundations of Programming Semantics (MFPS 2010), 6-10 May 2010, Ottawa, Ontario, Canada . pp. 97-122. Electronic Notes in Theoretical Computer Science 265. Elsevier. ISSN 1571-0661
Pavlovic, D. and Pepper, P. and Smith, D.R. (2010) Formal Derivation of Concurrent Garbage Collectors. In: 10th International Conference on Mathematics of Program Construction, MPC 2010, June 21-23, 2010, Québec City, Canada. pp. 353-376. Springer. ISBN 978-3-642-13321-3
Pieters, W. (2010) ANKH: Information Threat Analysis with Actor-NetworK Hypergraphs. Technical Report TR-CTIT-10-16, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2010) Explanation and trust: what to tell the user in security and AI? Technical Report TR-CTIT-10-32, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2010) Security and privacy in the clouds: a bird's eye view. Technical Report TR-CTIT-10-31, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2010) Reve{a,i}ling the risks: a phenomenology of information security Techné: Research in Philosophy and Technology, 14 (3). pp. 176-188. ISSN 1091-8264
Pieters, W. (2010) Verifiability of electronic voting: between confidence and trust. In: Data Protection in a Profiled World. Springer, Dordrecht, pp. 157-175. ISBN 978-90-481-8864-2
Pieters, W. (2010) Informational precaution. In: 8th Conference on Computing and Philosophy (ECAP10), 4-6 Oct 2010, Munich, Germany. pp. 320-325. Verlag Dr. Hut. ISBN 978-3-86853-546-4
Pieters, W. and Boersma, K. and Alberts, G. and Timmer, J. and Dijkstra, Anne and Popkema, M. (2010) Inzicht en toezicht: controle in de kennissamenleving. In: Inzicht en toezicht: controle in de kennissamenleving. Jaarboek Kennissamenleving (6). Aksant, Amsterdam, pp. 7-17. ISSN 1871-0034 ISBN 978-90-5260-384-1
van de Pol, J.C. and Weber, Michael (2010) Preface. In: 17th International SPIN Workshop on Model Checking Software, 27-29 Sep 2010, Enschede, The Netherlands. v-vi. Lecture Notes in Computer Science 6349. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-16163-6
Pontes Soares Rocha, B. and Bandhakavi, S. and den Hartog, J.I. and Winsborough, W.H. and Etalle, S. (2010) Towards static flow-based declassification for legacy and untrusted programs. In: IEEE Symposium on Security and Privacy, May 16-19, 2010, Oakland, California. pp. 93-108. IEEE Computer Society. ISBN 978-0-7695-4035-1
Rensink, A. (2010) A First Study of Compositionality in Graph Transformation. Technical Report TR-CTIT-10-08, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Rensink, A. (2010) Isomorphism Checking for Symmetry Reduction. Technical Report TR-CTIT-10-27, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Rensink, A. (2010) Compositionality in Graph Transformation. In: Automata, Languages and Programming (ICALP), 5-10 Jul 2010, Bordeaux, France. pp. 309-320. Lecture Notes in Computer Science 6199. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-14161-4
Rensink, A. (2010) The Edge of Graph Transformation - Graphs for Behavioural Specification. In: Graph Transformations and Model-Driven Engineering. Lecture Notes in Computer Science 5765. Springer Verlag, Berlin, pp. 6-32. ISSN 0302-9743 ISBN 978-3-642-17321-9
Rensink, A. and Van Gorp, P. (2010) Graph transformation tool contest 2008. International journal on software tools for technology transfer, 12 (3-4). pp. 171-181. ISSN 1433-2779
Rensink, A. and Zambon, Eduardo (2010) Neighbourhood Abstraction in GROOVE - Tool Paper. In: Proceedings of the Fourth International Workshop on Graph-Based Tools (GraBaTs 2010), 28 Sep 2010, Enschede, NL. pp. 55-61. CTIT Workshop Proceedings (WP 10-06). Centre for Telematics and Information Technology University of Twente. ISSN 0929-0672
Saffarian, M. and Sadighi, B. (2010) Owner-Based Role-Based Access Control OB-RBAC. In: International Conference on Availability, Reliability, and Security (ARES), 15-18 Feb 2010, Krakow, Poland. pp. 236-241. IEEE Computer Society. ISBN 978-1-4244-5879-0
Sözer, H. and Abreu, R. and Akşit, M. and van Gemund, A.J.C. (2010) Increasing System Availability with Local Recovery based on Fault Localization. In: Proceedings of the 10th International Conference on Quality Software, QSIC 2010, 14-15 July 2010, Zhangjiajie, China. pp. 276-281. IEEE Computer Society. ISSN 1550-6002 ISBN 978-1-4244-8078-4
Schaub, F. and Kargl, F. and Ma, Zhendong and Weber, M. (2010) V-Tokens for Conditional Pseudonymity in VANETs. In: IEEE Wireless Communications and Networking Conference (WCNC 2010), Sydney, Australia. pp. 1-6. IEEE Computer Society. ISBN 978-1-4244-6396-1
Schmidt, R.K. and Leinmüller, T. and Schoch, E. and Kargl, F. and Schäfer, G. (2010) Exploration of Adaptive Beaconing for Efficient Intervehicle Safety Communication. IEEE Network, 24 (1). pp. 14-19. ISSN 0890-8044 *** ISI Impact 2,899 ***
Schoch, E. and Bako, B. and Dietzel, S. and Kargl, F. (2010) Dependable and Secure Geocast in Vehicular Networks. In: Proceedings of the Seventh ACM international workshop on VehiculAr InterNETworking, VANET 2010, 24 Sep 2010, Chicago, US. pp. 61-68. ACM. ISBN 978-1-4503-0145-9
Schoch, E. and Kargl, F. (2010) On the Efficiency of Secure Beaconing in VANETs. In: Proceedings of the third ACM conference on Wireless network security (ACM WiSec 2010), Hoboken, New Jersey, USA. pp. 111-116. ACM. ISBN 978-1-60558-923-7
Sedghi, S. and van Liesdonk, P. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2010) Searching Keywords with Wildcards on Encrypted Data. Technical Report TR-CTIT-10-14, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Sedghi, S. and van Liesdonk, P. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2010) Searching Keywords with Wildcards on Encrypted Data. In: Proceedings of the Seventh international Conference on Security and Cryptography for Networks (SCN), 13-15 September 2010, Amalfi, Italy. pp. 138-153. Lecture Notes in Computer Science 6280. Springer Verlag. ISBN 978-3-642-15316-7
Soleimanifard, S. and Gurov, D. and Huisman, M. (2010) Procedure-Modular Verification of Control Flow Safety Properties. In: 12th Workshop on Formal Techniques for Java-like Programs, FTfJP 2010, June 22, 2010, Maribor, Slovenia. 5:1-5:7. ACM. ISBN 978-1-4503-0540-2
Staijen, T. (2010) Graph-based Specification and Verification for Aspect-Oriented Languages. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 10-171 ISBN 978-90-365-3041-5
Steen, B. and Ferreira Pires, L. and Iacob, M.-E. (2010) Automatic generation of optimal business processes from business rules. In: 14th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW), 2010, 25 Oct 2010, Vitória, Brazil. pp. 117-126. IEEE Computer Society. ISBN 978-0-7695-4164-8
Tang, Qiang (2010) From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data. Technical Report TR-CTIT-10-01, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang (2010) User-friendly matching protocol for online social networks. In: ACM Conference on Computer and Communications Security, 4-8 Oct 2010, Chicago, IL, USA. pp. 732-734. ACM. ISBN 978-1-4503-0245-6
Tang, Qiang (2010) Privacy Preserving Mapping Schemes Supporting Comparison. In: ACM Cloud Computing Security Workshop (CCSW), 9 Oct 2010, Chicago, Illinois. pp. 53-58. ACM. ISBN 978-1-4503-0089-6
Tang, Qiang and Jeckmans, A.J.P. (2010) On Non-Parallelizable Deterministic Client Puzzle Scheme with Batch Verification Modes. Technical Report TR-CTIT-10-02, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang and Jeckmans, A.J.P. (2010) Efficient Client Puzzle Schemes to Mitigate DoS Attacks. In: International Conference on Computational Intelligence and Security (CIS 2010), 11-14 dec 2010, Nanning, China. pp. 293-297. IEEE Computational Intelligence Society. ISBN 978-1-4244-9114-8
Timmer, M. and van de Pol, J.C. and Stoelinga, M.I.A. (2010) Confluence reduction for probabilistic systems. In: Proceedings of the 2nd Young Researchers Workshop on Concurrency Theory, 4 Sep 2010, Paris, France. pp. 87-90. Eindhoven University of Technology. ISBN not assigned
Timmer, M. and Stoelinga, M.I.A. and van de Pol, J.C. (2010) Confluence Reduction for Probabilistic Systems (extended version). Technical Report 1011.2314, ArXiv e-prints.
Wang, Lei and Ferreira Pires, L. and Wombacher, A. and van Sinderen, M.J. and Chi, Chihung (2010) Stakeholder interactions to support service creation in cloud computing. In: 14th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW), 2010, 26 Oct 2010, Vitória, Brazil. pp. 173-176. IEEE Computer Society. ISBN 978-0-7695-4164-8
Wiedersheim, B. and Kargl, F. and Ma, Zhendong and Papadimitratos, P. (2010) Privacy in Inter-Vehicular Networks: Why simple pseudonym change is not enough. In: The Seventh International Conference on Wireless On-demand Network Systems and Services (WONS 2010), Kranska Gora, Slovenia. pp. 176-183. IEEE Computer Society. ISBN 978-1-4244-6059-5
Xing, Jian Sheng and Theelen, B.D. and Langerak, R. and van de Pol, J.C. and Tretmans, G.J. and Voeten, J.P.M. (2010) From POOSL to UPPAAL: Transformation and Quantitative Analysis. In: Application of Concurrency to System Design, Tenth International Conference on, 21-25 Jun 2010, Braga, Portugal. pp. 47-56. IEEE Computer Society. ISSN 1550-4808 ISBN 978-0-7695-4066-5
Xing, Jian Sheng and Theelen, B.D. and Langerak, R. and van de Pol, J.C. and Tretmans, G.J. and Voeten, J.P.M. (2010) UPPAAL in Practice: Quantitative Verication of a RapidIO Network. In: ISoLA 2010 - 4th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation, 18-20 Oct 2010, Amirandes, Heraclion, Crete. pp. 160-174. Lecture Notes in Computer Science 6416. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-16560-3
Yin, Haihan and Bockisch, C.M. (2010) Developing a Generic Debugger for Advanced-Dispatching Languages. In: Proceedings of the Third International Workshop on Academic Software Development Tools and Techniques, 20 Sep 2010, Antwerp, Belgium. WASDeTT. ISBN not assigned
Zambon, Eduardo (2010) Using Graph Transformations and Graph Abstractions for Software Verification. In: Fifth International Conference on Graph Transformations (ICGT 2010), 27 Sep - 02 Oct 2010, Enschede, NL. pp. 416-418. Lecture Notes in Computer Science 6372. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-15927-5
Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. (2010) A2THOS: Availability Analysis and Optimisation in SLAs Technical Report TR-CTIT-10-20, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Zannone, N. and Petkovic, M. and Etalle, S. (2010) Towards Data Protection Compliance. In: Proceedings of the 5th International Conference on Security and Cryptography (SECRYPT 2010), 26-28 July 2010, Athens, Greece. pp. 213-216. SciTePress. ISBN 978-989-8425-18-8
Zhang, Xiao and Kerkhoff, H.G. and Vermeulen, B. (2010) New scan-based test strategy for a dependable many-core processor using a NoC as a Test Access Mechanism. In: 15th IEEE European Test Symposium (ETS 2010), 24-28 May 2010, Praha, Czech Republic. pp. 243-244. IEEE Computer Society. ISSN 1530-1877 ISBN 978-1-4244-5834-9

2009

Paige, R.F. and Hartman, A. and Rensink, A., ed. (2009) Model Driven Architecture - Foundations and Applications. Lecture Notes in Computer Science 5562. Springer Verlag, Berlin. ISSN 0302-9743 ISBN 978-3-642-02673-7
Preneel, B. and Dodunekov, S. and Rijmen, V. and Nikova, S.I., ed. (2009) Enhancing cryptographic primitives with techniques from error correcting codes. NATO Science for Peace and Security Series D - Information and Communication Security 23. IOS Press, Amsterdam. ISSN 1874-6268 ISBN 978-1-60750-002-5
Aan de Brugh, N.H.M. and Nguyen, Viet Yen and Ruys, T.C. (2009) MoonWalker: Veri?cation of .NET Programs. In: Proceedings of the 15th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2009), 22-29 March 2009, York, UK. pp. 170-173. Lecture Notes in Computer Science 5505. Springer Verlag. ISBN 978-3-642-00767-5
Akşit, M. and Rensink, A. and Staijen, T. (2009) A Graph-Transformation-Based Simulation Approach for Analysing Aspect Interference on Shared Join Points. In: AOSD '09: Proceedings of the 8th ACM International Conference on Aspect-Oriented Software Development, 3-6 Mar 2009, Charlottesville, Virginia, USA. pp. 39-50. ACM. ISBN 978-1-60558-442-3
Albert, E. and Banerjee, A. and Drossopoulou, S. and Huisman, M. and Igarashi, A. and Leavens, G.T. and Müller, P. and Wrigstad, T. (2009) Formal Techniques for Java-Like Programs - Report on the 10th Workshop FTfJP at ECOOP 2008. In: Object-Oriented Technology. ECOOP 2008 Workshop Reader, July 8, 2008, Paphos, Cyprus. pp. 70-76. Lecture Notes in Computer Science 5475. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-02046-9
Asveld, P.R.J. (2009) Review of "J. Waldmann, Weighted automata for proving termination of string rewriting, J. Autom. Lang. Comb. 12 (2007) 545-570". Mathematical reviews, MR2401479 / 2009e:68056. pp. 4953-4953. ISSN 0025-5629
Asveld, P.R.J. (2009) Review of "Y. Moshe, On some questions regarding $k$-regular and $k$-context-free sequences, Theoret. Comput. Sci. 400 (2008) 62-69". Mathematical reviews, MR2424342/ 2009e:68063. pp. 4954-4954. ISSN 0025-5629
Asveld, P.R.J. (2009) Permuting Operations on Strings: Their Permutations and Their Primes. Technical Report TR-CTIT-09-26, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Asveld, P.R.J. (2009) Some Families of Permutations and Their Primes. Technical Report TR-CTIT-09-27, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Asveld, P.R.J. (2009) Review of "R. Ferrer-i-Cancho, Some word order biases from limited brain resources: a mathematical approach, Adv. Complex Syst. 11 (2008) 393-414". Mathematical reviews, MR2445403 / 2009i:68091. pp. 8922-8923. ISSN 0025-5629
Asveld, P.R.J. (2009) Review of "P. Jancar, F. Mraz, M. Platek & J. Vogel, Monotonicity of restarting automata, J. Autom. Lang. Combin. 12 (2007) 355-371". Mathematical reviews, MR2436368 / 2009k:68123. pp. 11026-11026. ISSN 0025-5629
Barnat, J. and Chaloupka, J. and van de Pol, J.C. (2009) Distributed Algorithms for SCC Decomposition. Journal of Logic and Computation, 21 (1). pp. 23-44. ISSN 0955-792X *** ISI Impact 0,585 ***
Blom, S.C.C. and Lisser, B. and van de Pol, J.C. and Weber, Michael (2009) A Database Approach to Distributed State-Space Generation. Journal of Logic and Computation, 21 (1). pp. 45-62. ISSN 0955-792X *** ISI Impact 0,585 ***
Blom, S.C.C. and van de Pol, J.C. (2009) Distributed Branching Bisimulation Minimization by Inductive Signatures. Technical Report TR-CTIT-09-37, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Blom, S.C.C. and van de Pol, J.C. (2009) Distributed Branching Bisimulation Minimization by Inductive Signatures. In: Proceedings 8th International Workshop on Parallel and Distributed Methods in verifiCation, 4 Nov 2009, Eindhoven, The Netherlands. pp. 32-46. Electronic Proceedings in Theoretical Computer Science 14. Open Publishing Association. ISSN 2075-2180
Blom, S.C.C. and van de Pol, J.C. and Weber, Michael (2009) Bridging the Gap between Enumerative and Symbolic Model Checkers. Technical Report TR-CTIT-09-30, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolzoni, D. (2009) Revisiting Anomaly-based Network Intrusion Detection Systems. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 09-147 ISBN 978-90-365-2853-5
Bolzoni, D. and Etalle, S. and Hartel, P.H. (2009) Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems. Technical Report TR-CTIT-09-10, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolzoni, D. and Etalle, S. and Hartel, P.H. (2009) Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems. In: Recent Advances in Intrusion Detection (RAID). pp. 1-20. Lecture Notes in Computer Science 5758. Springer Verlag. ISBN 978-3-642-04341-3
Boneva, I. and Kreiker, J. and Kurban, M.E. and Rensink, A. (2009) Graph Abstraction for a Modal Logic. Bulletin of the European Association for Theoretical Computer Science, 97. pp. 106-116. ISSN 0252-9742
Bonino da Silva Santos, L.O. and Goncalves da Silva, E.M. and Ferreira Pires, L. and van Sinderen, M.J. (2009) Towards a goal-based service framework for dynamic service discovery and composition. In: Proceedings of the 2009 Sixth International Conference on Information Technology: New Generations, 27-29 Apr 2009, Las Vegas, USA. pp. 302-307. IEEE Computer Society. ISBN 978-0-7695-3596-8
Bosch, S. and Marin-Perianu, M. and Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. (2009) FollowMe! Mobile Team Coordination in Wireless Sensor and Actuator Networks. In: Proceedings of the IEEE International Conference on Pervasive Computing and Communications 2009, 9-13 Mar 2009, Galveston, Texas, USA. pp. 151-161. IEEE Computer Society. ISBN 978-1-4244-3304-9
Boudali, H. and Nijmeijer, A.P. and Stoelinga, M.I.A. (2009) DFTSim: A Simulation Tool for Extended Dynamic Fault Trees. In: Proceedings of the 42nd Annual Simulation Symposium (ANSS 2009), March 22-27, 2009, San Diego. 31. Society for Modeling and Simulation International. ISBN 9781565553262
Boudali, H. and Sözer, H. and Stoelinga, M.I.A. (2009) Architectural Availability Analysis of Software Decomposition for Local Recovery. In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 8-10 July 2009, Shanghai, China. pp. 14-22. IEEE Computer Society. ISBN 978-0-7695-3758-0
Brim, L. and van de Pol, J.C. (2009) Preface. In: Proceedings 8th International Workshop on Parallel and Distributed Methods in verifiCation, 4 Nov 2009, Eindhoven, The Netherlands. Electronic Proceedings in Theoretical Computer Science 14. Open Publishing Association. ISSN 2075-2180
van den Broek, P.M. and Galvao Lourenco da Silva, I. (2009) Analysis of Feature Models using Generalised Feature Trees. In: Third International Workshop on Variability Modelling of Software-intensive Systems, 28-30 Jan 2009, Sevilla, Spain. pp. 29-35. ICB-Research Report (29). Universität Duisburg-Essen. ISSN 1860-2770
van den Broek, P.M. and Noppen, J.A.R. (2009) Fuzzy Weighted Average: Analytical Solution. In: Proceedings of the International Joint Conference on Computational Intelligence 2009, 5-7 Oct 2009, Madeira. pp. 31-38. INSTICC. ISBN 978-989-674-014-6
Bujorianu, L.M. and Katoen, J.P. (2009) Symmetry reduction for stochastic hybrid systems. In: 47th IEEE Conference on Decision and Control, CDC 2008, 9-11 Dec 2008, Cancun, Mexico. pp. 233-238. IEEE Computer Society. ISSN 0191-2216 ISBN 978-1-4244-3123-6
Chen, Taolue and Han, Tingting and Katoen, J.P. and Mereacre, A. (2009) Quantitative model checking of continuous-time Markov chains against timed automata specifications. In: 2009 24th Annual IEEE Symposium on Logic In Computer Science, 11-14 Aug 2009, Los Angeles. pp. 309-318. IEEE Computer Society. ISSN 1043-6871 ISBN 978-0-7695-3746-7
Chitchyan, R. and Fabry, J. and Katz, S. and Rensink, A. (2009) Editorial for Special Section on Dependencies and Interactions with Aspects. Lecture notes in computer science, 5490. pp. 133-134. ISSN 0302-9743
Chrząszcz, J. and Huisman, M. and Schubert, A. (2009) BML and Related Tools. In: Formal Methods for Components and Objects, 21-23 Oktober 2008, Sophia Antipolis, France. pp. 278-297. Lecture Notes in Computer Science 5751. Springer Verlag. ISBN 978-3-642-04166-2
Ciraci, S. (2009) Graph Based Verification of Software Evolution Requirements. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 09-162 ISBN 978-90-365-2956-3
Ciraci, S. and Kopreoglu, I. and Ulusoy, Ö. (2009) Reducing query overhead through route learning in unstructured peer-to-peer network. Journal of Network and Computer Applications, 32 (3). pp. 550-567. ISSN 1084-8045 *** ISI Impact 2,331 ***
Czenko, M.R. (2009) TuLiP : reshaping trust management. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 09-148 ISBN 978-90-365-2854-2
Czenko, M.R. and Etalle, S. (2009) LP with Flexible Grouping and Aggregates Using Modes. In: 19th International Symposium, LOPSTR, Revised Selected Papers, 9-11 Sep 2009, Coimbra, Portugal. pp. 67-81. LNCS 6037. Springer. ISBN 978-3-642-12591-1
Daniele, L.M. and Ferreira Pires, L. and van Sinderen, M.J. (2009) Towards automatic behavior synthesis of a coordinator component for context-aware mobile applications. In: 13th Enterprise Distributed Object Computing Conference Workshops, EDOCW 2009, 1-4 Sept 2009, Auckland, New Zealand. pp. 140-147. IEEE Computer Society. ISBN 978-1-4244-5563-8
De Alfaro, L. and Faella, M. and Stoelinga, M.I.A. (2009) Linear and Branching System Metrics. IEEE transactions on software engineering, 35 (2). pp. 258-273. ISSN 0098-5589 *** ISI Impact 1,516 ***
Dekker, M.A.C. (2009) Flexible Access Control for Dynamic Collaborative Environments. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 09-159 ISBN 978-90-365-2950-1
Dimkov, T. (2009) The key-free society. In: Living the ICT future. Centre for Telematics and Information Technology University of Twente, Enschede, pp. 28-29. ISBN 978-90-365-2963-1
Dimkov, T. and Pieters, W. and Hartel, P.H. (2009) Portunes: generating attack scenarios by finding inconsistencies between security policies in the physical, digital and social domain. Technical Report TR-CTIT-09-15, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dimkov, T. and Pieters, W. and Hartel, P.H. (2009) Two methodologies for physical penetration testing using social engineering. Technical Report TR-CTIT-09-48, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Durmaz Incel, O. (2009) Multi-Channel Wireless Sensor Networks: Protocols, Design and Evaluation. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 09-138 ISBN 978-90-365-2812-2
Etalle, S. and Winsborough, W.H. (2009) Maintaining control while delegating trust: Integrity constraints in trust management. ACM Transactions on Information and System Security, 13 (1). 5:1-5:27. ISSN 1094-9224 *** ISI Impact 0,759 ***
Figueiredo, E. and Galvao Lourenco da Silva, I. and Shakil Khan, S. and Garcia, A. and Sant'Anna, C. and Pimentel, A. and Medeiros, A.L. and Fernandes da Silva, L. and Vasconcelos Batista, T. and Almeida Ribeiro, R. and van den Broek, P.M. and Akşit, M. and Zschaler, S. and Moreira, A.M. (2009) Detecting architecture instabilities with concern traces: An exploratory study. In: Joint Working IEEE/IFIP Conference on Software Architecture 2009 and European Conference on Software Architecture 2009, WICSA/ECSA 2009, 14-17 Sep 2009, Cambridge, UK. pp. 261-264. IEEE Computer Society. ISBN 978-1-4244-4985-9
Göknil, A. and Kurtev, I. and van den Berg, K.G. and Veldhuis, J.-W. (2009) Semantics of trace relations in requirements models for consistency checking and inferencing. Software and Systems Modeling, 10 (1). pp. 31-54. ISSN 1619-1366 *** ISI Impact 0,990 ***
Güleşir, G. and van den Berg, K.G. and Bergmans, L.M.J. and Akşit, M. (2009) Experimental evaluation of a tool for the verification and transformation of source code in event-driven systems. Empirical Software Engineering, 14 (6). pp. 720-777. ISSN 1382-3256 *** ISI Impact 1,393 ***
Güleşir, G. and Bergmans, L.M.J. and Akşit, M. (2009) Method for an Event-Driven System. Patent WO2009058002 (A1) (Application).
Goncalves da Silva, E.M. and Ferreira Pires, L. and van Sinderen, M.J. (2009) Supporting Dynamic Service Composition at Runtime based on End-user Requirements. In: Proceedings of the International Workshop on User-generated Services, UGS 2009, located at the 7th International Conference on Service Oriented Computing, ICSOC 2009, 24 November 2009, Stockholm. CEUR Workshop Proceedings. ISSN 1613-0073
Goncalves da Silva, E.M. and Ferreira Pires, L. and van Sinderen, M.J. (2009) A Framework for the Evaluation of Semantics-based Service Composition Approaches. In: Proceeding of IEEE European Conference on Web Services, ECOWS 2009, 9-11 November 2009, Eindhoven. pp. 66-74. IEEE Computer Society. ISBN 978-0-7695-3854-9
Gong, Zheng and Hartel, P.H. and Nikova, S.I. and Zhu, Bo (2009) TuLP: A Family of Secure and Practical Message Authentication Codes for Body Sensor Networks. Technical Report TR-CTIT-09-32, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Gong, Zheng and Hartel, P.H. and Nikova, S.I. and Zhu, Bo (2009) Towards Secure and Practical MACs for Body Sensor Networks. In: 10th International Conference on Cryptology in India (INDOCRYPT), 13-16 Dec 2009, New Delhi, India. pp. 182-198. Lecture Notes in Computer Science 5922. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-10627-9
Gurov, D. and Huisman, M. (2009) Reducing Behavioural to Structural Properties of Programs with Procedures. In: Verification, Model Checking, and Abstract Interpretation, January 18-20, 2009, Savannah, GA, USA. pp. 136-150. Lecture Notes in Computer Science 5403. Springer Verlag. ISBN 978-3-540-93899-6
Han, Tingting (2009) Diagnosis, Synthesis and Analysis of Probabilistic Models. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 09-149 ISBN 978-90-365-2858-0
Han, Tingting and Katoen, J.P. and Damman, B. (2009) Counterexample Generation in Probabilistic Model Checking. IEEE Transactions on Software Engineering, 35 (2). pp. 241-257. ISSN 0098-5589 *** ISI Impact 1,516 ***
Haverkort, B.R.H.M. and Remke, A.K.I. and Hartel, P.H. (2009) Betere beveiliging Scada-systemen vitaal voor Nederlandse infrastructuren. Bits en chips, 11 (16). pp. 23-23. ISSN 1879-6443
Havinga, W.K. (2009) On the Design of Software Composition Mechanisms and the Analysis of Composition Conflicts. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 09-142 ISBN 978-90-365-2842-9
Hordijk, W.T.B. and Ponisio, M.L. and Wieringa, R.J. (2009) Harmfulness of Code Duplication - A Structured Review of the Evidence. In: 13th International Conference on Evaluation and Assessment in Software Engineering (EASE), 20 - 21 April 2009, Durham University, UK. British Computer Society. ISBN not assigned
ten Hove, D. and Göknil, A. and Kurtev, I. and van den Berg, K.G. and de Goede, K. (2009) Change Impact Analysis for SysML Requirements Models based on Semantics of Trace Relations. In: Proceedings of the ECMDA Traceability Workshop (ECMDA-TW) 2009, 23 June 2009, Enschede, the Netherlands. pp. 17-28. Centre for Telematics and Information Technology University of Twente. ISSN 0929-0672
Huisman, M. (2009) On the Interplay between the Semantics of Java's Finally Clauses and the JML Run-Time Checker. In: Proceedings of the 11th International Workshop on Formal Techniques for Java-like Programs, July 5, 2009, Genua. 8:1-8:6. ACM. ISBN 978-1-60558-540-6
Huisman, M. and Aldrich, J. and Barnett, M. and Giannakopoulou, D. and Leavens, G.T. and Sharagyna, N. (2009) Foreword. In: SAVCBS '09 - Proceedings of the 8th International Workshop on Specification and Verification of Component-Based Systems, 25 August 2009, Amsterdam. pp. 3-3. ACM. ISBN 978-1-60558-680-9
Huisman, M. and Tamalet, A. (2009) A Formal Connection between Security Automata and JML Annotations. In: Fundamental Approaches to Software Engineering, March 22- 29, 2009, York, UK. pp. 340-354. Lecture Notes in Computer Science 5503. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-00592-3
Hurlin, C. (2009) Specifying and Checking Protocols of Multithreaded Classes. In: Proceedings of the 24th Annual ACM Symposium on Applied Computing, 8-12 Mar 2009, Hawaii, USA. pp. 587-592. ACM. ISBN 978-1-60558-166-8
Hurlin, C. (2009) Automatic Parallelization and Optimization of Programs by Proof Rewriting. In: The 16th International Static Analysis Symposium, 9-11 Aug 2009, Los Angeles, USA. pp. 52-68. Lecture Notes in Computer Science 5673. Springer Verlag. ISBN 978-3-642-03236-3
Jacobs, B.P.F. and Pieters, W. (2009) Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment. In: Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures. Lecture Notes in Computer Science 5705. Springer Verlag, Berlin, pp. 121-144. ISSN 0302-9743 ISBN 978-3-642-03828-0
Jonker, W. and Brinkman, R. and Maubach, S. (2009) Secure storage system and method for secure storing. Patent WO2007125454 (Assigned).
Kardas, G. and Göknil, A. and Dikenelli, O. and Topaloglu, N.Y. (2009) Model Driven Development of Semantic Web Enabled Multi-Agent Systems. International Journal of Cooperative Information Systems, 18 (2). pp. 261-308. ISSN 0218-8430 *** ISI Impact 0,526 ***
Katoen, J.P. and Klink, D. and Neuhausser, M. (2009) Compositional Abstraction of Stochastic Systems. In: Formal Modeling and Analysis of Timed Systems. Lecture Notes in Computer Science 5813. Springer Verlag, Berlin, pp. 195-211. ISSN 0302-9743 ISBN 978-3-642-04367-3
Katoen, J.P. and Zapreev, I.S. (2009) Simulation-based CTMC Model Checking: An Empirical Evaluation. In: Sixth International Conference on the Quantitative Evaluation of Systems, 13-16 Sept 2009, Budapest, Hungary. pp. 31-40. IEEE Computer Society. ISBN 978-1-42444-942-2
Katoen, J.P. and Zapreev, I.S. and Hahn, E.M. and Hermanns, H. and Jansen, D.N. (2009) The Ins and Outs of the Probabilistic Model Checker MRMC. In: Sixth International Conference on the Quantitative Evaluation of Systems, 13-16 Sept 2009, Budapest, Hungary. pp. 167-176. IEEE Computer Society. ISBN 978-1-42444-942-2
Ketema, J. (2009) Comparing Böhm-Like Trees. In: Rewriting Techniques and Applications: 20th International Conference, RTA 2009, 29 Jun - 1 Jul 2009, Brasília, Brazil. pp. 239-254. Lecture Notes in Computer Science 5595. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-02347-7
Khatib, M.G. (2009) MEMS-Based Storage Devices - Integration in Energy-Constrained Mobile Systems. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 09-145 ISBN 978-90-365-2847-4
Kordy, P.T. and Langerak, R. and Polderman, J.W. (2009) Re-verification of a Lip Synchronization Algorithm using robust reachability. In: Formal Methods for Aerospace, 03 Nov 2009, Eindhoven, The Netherlands. Technische Universiteit Eindhoven. ISSN not assigned
Koster, S.R. and Iacob, M.-E. and Ferreira Pires, L. (2009) An evaluation framework for business process management products. In: First International Workshop on Empirical Research in Business Process Management (ER-BPM 2009), Workshop Proceedings, 7 Sep 2009, Ulm, Germany. pp. 17-28. University of Ulm. ISBN not assigned
Kuijper, W. and van de Pol, J.C. (2009) Compositional Control Synthesis for Partially Observable Systems. In: CONCUR 2009 - Concurrency Theory, 1-4 Sep 2009, Bologna, Italy. pp. 431-447. Lecture Notes in Computer Science 5710. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-04080-1
Kuijper, W. and van de Pol, J.C. (2009) Computing Weakest Strategies for Safety Games of Imperfect Information. In: Tools and Algorithms for the Construction and Analysis of Systems, 22-29 Mar 2009, York, UK. pp. 92-106. Lecture Notes in Computer Science 5505. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-00767-5
Laarman, A.W. (2009) An Ontology-Based Metalanguage with Explicit Instantiation. Master's thesis, University of Twente.
Laarman, A.W. (2009) Achieving QVTO & ATL Interoperability: An Experience Report on the Realization of a QVTO to ATL Compiler. In: 1st International Workshop on Model Transformation with ATL, MtATL 2009, 8-9 Jul 2009, Nantes, France. pp. 119-133. CEUR Workshop Proceedings. Sun SITE Central Europe. ISSN 1613-0073
Malakuti Khah Olun Abadi, S. and Bockisch, C.M. and Akşit, M. (2009) Applying the Composition Filter Model for Runtime Verification of Multiple-Language Software. In: The 20th annual International Symposium on Software Reliability Engineering,ISSRE 2009, 16-19 Nov 2009, Mysore, India. pp. 31-40. IEEE Computer Society. ISBN 978-0-7695-3878-5
Malakuti Khah Olun Abadi, S. and Bockisch, C.M. and Akşit, M. (2009) A Rule Set to Detect Interference of Runtime Enforcement Mechanisms. In: The 20th annual International Symposium on Software Reliability Engineering, ISSRE 2009, 16-19 Nov 2009, Mysore, India. IEEE Computer Society. ISBN not assigned
Marincic, J. and Mader, A.H. and Wieringa, R.J. (2009) A Handbook Supporting Model-Driven Software Development - a Case Study. Technical Report TR-CTIT-09-11, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
de Mol, M.J. and Zimakova, M.V. (2009) A GROOVE Solution for the BPMN to BPEL Model Transformation. Technical Report TR-CTIT-09-31, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Morali, A. and Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. (2009) CRAC: Confidentiality Risk Analysis and IT-Architecture Comparison of Business Networks (extended version). Technical Report TR-CTIT-09-30, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Morali, A. and Zambon, Emmanuele and Houmb, S.H. and Sallhammar, K. and Etalle, S. (2009) Extended eTVRA vs. Security Checklist: Experiences in a Value-Web. In: 31st International Conference on Software Engineering - Companion Volume, 16-24 May 2009, Vancouver, Canada. pp. 130-140. IEEE Computer Society. ISBN 978-1-4244-3494-7
Nasution, S. and Hartel, P.H. and Suryana, N. and Azman, N. and Shahib, S. (2009) Trust Level and Routing Selection for Mobile Agents in a Smart Home (Extended version). Technical Report TR-CTIT-09-36, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Neuhausser, M. and Stoelinga, M.I.A. and Katoen, J.P. (2009) Delayed Nondeterminism in Continuous-Time Markov Decision Processes. In: Foundations of Software Science and Computational Structures. Lecture Notes in Computer Science 5504. Springer Verlag, Berlin, pp. 364-379. ISSN 0302-9743 ISBN 978-3-642-00595-4
Nguyen, Viet Yen and Ruys, T.C. (2009) Memoised Garbage Collection for Software Model Checking. In: Proceedings of the 15th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2009), 22-29 March 2009, York, UK. pp. 201-214. Lecture Notes in Computer Science 5505. Springer Verlag. ISBN 978-3-642-00767-5
Noppen, J.A.R. and van den Broek, P.M. and Weston, N. and Rashid, A. (2009) Modelling Imperfect Product Line Requirements with Fuzzy Feature Diagrams. In: Third International Workshop on Variability Modelling of Software-intensive Systems, 28-30 Jan 2009, Sevilla, Spain. pp. 93-102. ICB-Research Report (29). Universität Duisburg Essen. ISSN 1860-2770
Pieters, W. (2009) De monsterlijke trekjes van beveiligingsproblemen. Informatiebeveiliging, 2009 (3). pp. 23-25. ISSN 1569-1063
Pieters, W. (2009) Combatting electoral traces: the Dutch tempest discussion and beyond. Technical Report TR-CTIT-09-21, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2009) Converging technologies and de-perimeterisation: towards risky active insulation. In: Proceedings of SPT 2009: Converging technologies, changing societies, 7-10 Jul 2009, Enschede, The Netherlands. pp. 58-60. CEPTES, University of Twente. ISBN not assigned
Pieters, W. (2009) Reve{a,i}ling the risks: a phenomenology of information security Technical Report TR-CTIT-09-33, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2009) Combatting electoral traces: the Dutch tempest discussion and beyond. In: E-Voting and Identity: Second International Conference, VOTE-ID 2009, 7-8 Sep 2009, Luxembourg city, Luxembourg. pp. 172-190. Lecture Notes in Computer Science 5767. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-04134-1
Pieters, W. and van Cleeff, A. (2009) The Precautionary Principle in a World of Digital Dependencies. IEEE Computer, 42 (6). pp. 50-56. ISSN 0018-9162 *** ISI Impact 1,115 ***
Pieters, W. and van Cleeff, A. (2009) The precautionary principle in a world of digital dependencies. Technical Report TR-CTIT-09-23, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. and van Cleeff, A. and Wieringa, R.J. (2009) Voor goede keuzes heb je tijd nodig. Trouw, 67 (19855, 5 Aug 2009). 25. ISSN not assigned
Pieters, W. and Consoli, L. (2009) Vulnerabilities and responsibilities: dealing with monsters in computer security. Journal of information, communication and ethics in society, 7 (4). pp. 243-257. ISSN 1477-996X
Pieters, W. and Popkema, M. and Broekhans, B. and Dijkstra, Anne and Boersma, K. and Alberts, G. (2009) Gevoel voor kennis: emoties in de kennissamenleving. In: Gevoel voor kennis. Jaarboek Kennissamenleving 5. Aksant, Amsterdam, pp. 7-20. ISSN 1871-0034 ISBN 978-90-5260-351-3
Pieters, W. and Tang, Qiang (2009) Data is key: introducing the data-based access control paradigm. Technical Report TR-CTIT-09-22, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. and Tang, Qiang (2009) Data is key: introducing the data-based access control paradigm. In: Data and Applications Security 2009, 12-15 Jul 2009, Montreal, Canada. pp. 240-251. Lecture Notes in Computer Science 5645. Springer Verlag. ISBN 978-3-642-03006-2
van de Pol, J.C. and Timmer, M. (2009) State Space Reduction of Linear Processes using Control Flow Reconstruction. Technical Report TR-CTIT-09-24, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
van de Pol, J.C. and Timmer, M. (2009) State Space Reduction of Linear Processes Using Control Flow Reconstruction. In: ATVA 2009 - Automated Technology for Verification and Analysis. 7th International Symposium, 13 Oct - 16 Oct 2009, Macao SAR, China. pp. 54-68. Lecture Notes in Computer Science 5799. Springer Verlag. ISBN 978-3-642-04760-2
Rensink, A. and Kuperus, J.-H. (2009) Repotting the geraniums: on nested graph transformation rules. In: Graph transformation and visual modelling techniques, 28-29 Mar 2009, York, U.K.. Electronic Communications of the EASST 18. EASST. ISSN 1863-2122
Rensink, A. and Zambon, Eduardo (2009) A Type Graph Model for Java Programs. Technical Report TR-CTIT-09-01, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Rensink, A. and Zambon, Eduardo (2009) A Type Graph Model for Java Programs. In: Proceedings of the IFIP International Conference on Formal Techniques for Distributed Systems, FMOODS/FORTE 2009, 9-12 Jun 2009, Lisbon, Portugal. pp. 237-242. Lecture Notes in Computer Science 5522. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-02137-4
Rensink, A. and Zimakova, M.V. (2009) Flow Diagram Decomposition Using Graph Transformations. Technical Report TR-CTIT-09-30, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Rensink, A. and Zimakova, M.V. (2009) Towards model structuring based on flow diagram decomposition. In: Proceedings of the 1st Workshop on Behaviour Modelling in Model-Driven Architecture, 23 Jun 2009, Enschede, The Netherlands. 5:1-5:8. ACM International Conference Proceeding Series 379. ACM. ISBN 978-1-60558-503-1
de Roo, A.J. and Sözer, H. and Akşit, M. (2009) An Architectural Style for Optimizing System Qualities in Adaptive Embedded Systems using Multi-Objective Optimization. In: Proceedings of the 8th Working IEEE/IFIP Conference on Software Architecture, 14-17 Sep 2009, Cambridge, UK. pp. 349-352. IEEE Computer Society. ISBN 978-1-4244-4985-9
Sözer, H. (2009) Architecting Fault-Tolerant Software Systems. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 09-135 ISBN 978-90-365-2788-0
Sözer, H. and Tekinerdogan, B. and Akşit, M. (2009) FLORA: A framework for decomposing software architecture to introduce local recovery. Software: Practice and Experience, 39 (10). pp. 869-889. ISSN 0038-0644 *** ISI Impact 0,652 ***
Sözer, H. and Tekkalmaz, M. and Korpeoglu, I. (2009) A peer-to-peer file search and download protocol for wireless ad-hoc networks. Computer Communications, 32 (1). pp. 41-50. ISSN 0140-3664 *** ISI Impact 2,099 ***
Scholten, J. and Westenberg, R. and Schoemaker, M. (2009) Sensing train integrity. In: IEEE Sensors 2009 Conference, 25-28 Oct 2009, Christchurch, New Zealand. pp. 669-674. IEEE Computer Society. ISSN 1930-0395 ISBN 978-1-4244-5335-1
Sedghi, S. and van Liesdonk, P. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2009) Adaptively Secure Computationally Efficient Searchable Symmetric Encryption. Technical Report TR-CTIT-09-13, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
van Sinderen, M.J. and Pras, A. and Haverkort, B.R.H.M. and Apers, P.M.G. and Hartel, P.H. and van de Pol, J.C. and Nijholt, A. and Wieringa, R.J. and Havinga, P.J.M. and Akşit, M. (2009) Research Self-Evaluation 2003-2008, Computer Science Department, University of Twente. Technical Report Number UNSPECIFIED, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Spiessens, F. and den Hartog, J.I. and Etalle, S. (2009) Know what you trust. In: Formal Aspects in Security and Trust, 5th International Workshop, Malaga, Spain. pp. 129-142. Lecture Notes in Computer Science 5491. Springer Verlag. ISBN 978-3-642-01464-2
Staijen, T. and Rensink, A. (2009) Graph-Based Specification and Simulation of Featherweight Java with Around Advice. In: FOAL '09: Proceedings of the 2009 workshop on Foundations of aspect-oriented languages, 2 Mar 2009, Charlottesville, Virginia, USA. pp. 25-30. ACM. ISBN 978-1-60558-452-2
Stoelinga, M.I.A. (2009) Compositional dependability modeling using arcade. (Invited) In: Proceedings of the 8th international workshop on Specification and verification of component-based systems (SAVCBS 2009), 25 August 2009, Amsterdam, The Netherlands. pp. 1-2. ACM. ISBN 978-1-60558-680-9
Stoelinga, M.I.A. and Timmer, M. (2009) Interpreting a Successful Testing Process: Risk and Actual Coverage. Technical Report TR-CTIT-09-17, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Stoelinga, M.I.A. and Timmer, M. (2009) Interpreting a Successful Testing Process: Risk and Actual Coverage. In: Proceedings of the Third IEEE International Symposium on Theoretical Aspects of Software Engineering, 29 Jul - 31 Jul 2009, Tianjin, China. pp. 251-258. IEEE Computer Society. ISBN 978-0-7695-3757-3
Sundramoorthy, V. and Hartel, P.H. and Scholten, J. (2009) A Taxonomy of Service Discovery Systems. In: Context-Aware Computing and Self-Managing Systems. CRC Studies in Informatics. Chapman and Hall, Boca Raton, pp. 43-77. ISBN 1-420-07771-6
Tang, Qiang (2009) Timed-Ephemerizer: Make Assured Data Appear and Disappear. In: Sixth European Workshop on Public Key Services, Applications and Infrastructures, 10-11 September, 2009, Pisa, Italy. pp. 195-208. Lecture Notes in Computer Science 6391. Springer Verlag. ISBN 978-3-642-16440-8
Tang, Qiang and Chen, Liqun (2009) Public-key Encryption with Registered Keyword Search. In: Sixth European Workshop on Public Key Services, Applications and Infrastructures, 10-11 September, 2009, Pisa, Italy. pp. 163-178. Lecture Notes in Computer Science 6391. Springer Verlag. ISBN 3-642-16440-4
Tang, Qiang and Hartel, P.H. and Jonker, W. (2009) Inter-domain Identity-Based Proxy Re-encryption. In: Information Security and Cryptology, 4th International Conference (Inscrypt), December 14-17, 2008, Beijing China. pp. 332-347. Lecture Notes in Computer Science 5487. Springer Verlag. ISBN 978-3-642-01439-0
Tekinerdogan, B. and Scholten, F. and Hofmann, C. and Akşit, M. (2009) Concern-oriented analysis and refactoring of software architectures using dependency structure matrices. In: EA '09: Proceedings of the 15th Workshop on Early Aspects, Charlottesville, Virginia, USA. pp. 13-18. ACM. ISBN 978-1-60558-456-0
Trivellato, D. and Spiessens, A.O.D. and Zannone, N. and Etalle, S. (2009) Reputation-based ontology alignment for autonomy and interoperability in distributed access control. In: Proceedings 12th IEEE International conference on Computational Science and Engineering, 29-31 Aug. 2009, Vancouver BC, Canada. pp. 252-258. IEEE. ISBN 978-0-7695-3823-5
Trivellato, D. and Spiessens, A.O.D. and Zonnone, N. and Etalle, S. (2009) POLIPO: Policies & ontologies for interoperability, portability, and autonomy. In: IEEE International Symposium on Policies for Distributed Systems and Networks, 20-22 July 2009, London, UK. pp. 110-113. IEEE. ISBN 978-0-7695-3742-9
Weng, J. and Yang, Yanjiang and Tang, Qiang and Deng, R. and Bao, F. (2009) Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. In: Information Security - 12th International Conference, ISC, Pisa, Italy, September 7-9, 2009, Pisa, Italy. pp. 151-166. Lecture Notes in Computer Science 5735. Springer Verlag. ISBN 978-3-642-04473-1
Wijs, A.J. and van de Pol, J.C. and Bortnik, E.M. (2009) Solving scheduling problems by untimed model checking. The clinical chemical analyser case study. International journal on software tools for technology transfer, 11 (5). pp. 375-392. ISSN 1433-2779
Zambon, Eduardo and Rensink, A. (2009) Using Graph Transformations and Graph Abstractions for Software Verification. Technical Report TR-CTIT-10-03, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

2008

Mostéfaoui, S.K. and Maamar, Z. and Ferreira Pires, L. and Hammoudi, S. and Rinderle-Ma, S.B. and Sadiq, S. and Schulz, K., ed. (2008) Joint Proceedings of the Workshops: IWUC, MDEIS and TCoB. INSTICC Press, Portugal. ISBN 978-989-8111-49-4
Akşit, M. and Kurtev, I. (2008) Elsevier special issue on foundations and applications of model driven architecture. Science of computer programming, 73 (1). pp. 1-2. ISSN 0167-6423 *** ISI Impact 0,828 ***
de Alfaro, L. and Majumdar, R. and Raman, V. and Stoelinga, M.I.A. (2008) Game Refinement Relations and Metrics. Logical Methods in Computer Science, 4 (3). 7. ISSN 1860-5974 *** ISI Impact 0,569 ***
Anquetil, N. and Grammel, B. and Galvao Lourenco da Silva, I. and Noppen, J.A.R. and Shakil Khan, S. and Arboleda, H. and Rashid, A. and Garcia, A. (2008) Traceability for Model Driven, Software Product Line Engineering. In: ECMDA Traceability Workshop Proceedings, 12 Jun 2008, Berlin, Germany. pp. 77-86. SINTEF. ISBN 978-82-14-04396-9
Anquetil, N. and Noppen, J.A.R. and Galvao Lourenco da Silva, I. (2008) La traçabilité dans les lignes de produits logiciels. L'Objet, 14 (3). pp. 47-57. ISSN 1262-1137
Asveld, P.R.J. (2008) Review of "S. Bensch & H. Bordihn, Active symbols in pure systems, Fund. Inform. 76 (2007) 239-254". Mathematical reviews, MR2311438 / 2008b:68057. pp. 1456-1456. ISSN 0025-5629
Asveld, P.R.J. (2008) Review of "Y. Gurevich, M. Veanes & C. Wallace, Can abstract state machines be useful in language theory? Theoret. Comput. Sci. 365 (2007) 17-29". Mathematical reviews, MR2316387 / 2008c:68023. pp. 2335-2335. ISSN 0025-5629
Asveld, P.R.J. (2008) Review of "V. Geffert, C. Mereghetti & G. Pighizzini, Complementing two-way finite automata, Inform. and Comput. 205 (2007) 1173-1187". Mathematical reviews, MR2340899 / 2008f:68065. pp. 4860-4860. ISSN 0025-5629
Asveld, P.R.J. (2008) Review of "J. Gloeckler, Forgetting automata and unary languages, Internat. J. Found. Comput. Sci. 18 (2007) 813-827". Mathematical reviews, MR22341385 / 2008f:68067. pp. 4860-4860. ISSN 0025-5629
Asveld, P.R.J. (2008) Generating all permutations by context-free grammars in Greibach normal form. Theoretical computer science, 409 (3). pp. 565-577. ISSN 0304-3975 *** ISI Impact 0,643 ***
Asveld, P.R.J. (2008) Review of "M. Kutrib & A. Malcher, Finite turns and the regular closure of linear context-free languages, Discrete Appl. Math. 155 (2007) 2152-2164". Mathematical reviews, MR2354759 / 2008i:68064. pp. 7521-7522. ISSN 0025-5629
Asveld, P.R.J. (2008) Review of "F. Biegler, I. McQuillan & K. Salomaa, An infinite hierarchy induced by depth synchronization, Theoret. Comput. Sci. 387 (2007) 113-124". Mathematical reviews, MR2362183 / 2008k:68046. pp. 9502-9502. ISSN 0025-5629
Badban, B. and Fokkink, W.J. and van de Pol, J.C. (2008) Mechanical Verification of a Two-Way Sliding Window Protocol (Full version including proofs). Technical Report TR-CTIT-08-45, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Badban, B. and Fokkink, W.J. and van de Pol, J.C. (2008) Mechanical verification of a two-way sliding window protocol. In: Communicating Process Architectures 2008, 7-10 Sep 2008, York, UK. pp. 179-202. Concurrent Systems Engineering Series 66. IOS Press. ISBN 978-1-58603-907-3
Baier, C. and Haverkort, B.R.H.M. and Hermanns, H. and Katoen, J.P. (2008) Reachability in continuous-time Markov reward decision processes. In: Logic and Automata: History and Perspectives, 14-15 Dec 2007, Aachen, Germany. pp. 53-71. Texts in Logic and Games 2. Amsterdam University Press. ISBN 978-90-5356-576-6
Baier, C. and Katoen, J.P. (2008) Principles of Model Checking. MIT Press, New York. ISBN 978-0-262-02649-9
Bakhshi, R. and Fokkink, W.J. and Pang, J. and van de Pol, J.C. (2008) Leader Election in Anonymous Rings: Franklin Goes Probabilistic. In: Fifth IFIP International Conference On Theoretical Computer Science, 8-10 Sept 2008, Milano, Italy. pp. 57-72. IFIP International Federation for Information Processing 273/2008. Springer Verlag. ISSN 1571-5736 ISBN 978-0-387-09679-7
Barnat, J. and Brim, L. and Šimeček, P. and Weber, Michael (2008) Revisiting Resistance Speeds Up I/O-Efficient LTL Model Checking. In: 14th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2008, 29 Mar - 06 Apr 2008, Budapest, Hungary. pp. 48-62. Lecture Notes in Computer Science 4963. Springer Verlag. ISBN 978-3-540-78799-0
Barnat, J. and Chaloupka, J. and van de Pol, J.C. (2008) Improved Distributed Algorithms for SCC Decomposition. In: Proceedings of the 6th International Workshop on Parallel and Distributed Methods in verifiCation, 8 Jul 2007, Berlin. pp. 63-77. Electronic Notes in Theoretical Computer Science 198 (1). Elsevier. ISSN 1571-0661
Barosso, D. and Bartle, R. and Chazeran, C. and de Zwart, M. and Doumen, J.M. and Gorniak, S. and Kaźmierczak, M. and Kaskenmaa, M. and Benavente López, D. and Martin, A. and Naumann, I. and Reynolds, R. and Richardson, J. and Rossow, C. and Rywczyoska, A. and Thumann, M. (2008) Security and privacy in massively-multiplayer online games and social and corporate virtual worlds. ENISA Position Paper 1 ENISA (European Network and Information Security Agency), Crete. ISSN not assigned
Bauer, J. and Boneva, I.B. and Kurban, M.E. and Rensink, A. (2008) A Modal-Logic Based Graph Abstraction. In: International Conference on Graph Transformations (ICGT), 9-13 Sep 2008, Leicester, UK. pp. 321-335. Lecture Notes in Computer Science 5214. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-87404-1
Bergmans, L.M.J. and Ernst, E. and Gybels, K. (2008) SPLAT '08. In: Proceedings of the 2008 AOSD Workshop on Software engineering Properties of Languages and Aspect Technologies, 31 March 2008, Brussels. pp. 3-6. ACM International Conference Proceeding Series. ACM Press. ISBN 978-1-60558-144-6
Blom, S.C.C. and Deiß, T. and Ioustinova, N. and Kontio, A. and van de Pol, J.C. and Rennoch, A. and Sidorova, N. (2008) Simulated time for host-based testing with TTCN-3. Software Testing, Verification and Reliability, 18 (1). pp. 29-49. ISSN 0960-0833 *** ISI Impact 1,082 ***
Blom, S.C.C. and Haverkort, B.R.H.M. and Kuntz, G.W.M. and van de Pol, J.C. (2008) Distributed Markovian Bisimulation Reduction aimed at CSL Model Checking. In: Proceedings of the 7th International Workshop on Parallel and Distributed Methods in verifiCation, 29 Mar 2008, Budapest, Hungary. pp. 35-50. Electronic Notes in Theoretical Computer Science 220 (2). Elsevier. ISSN 1571-0661
Blom, S.C.C. and Lisser, B. and van de Pol, J.C. and Weber, Michael (2008) A Database Approach to Distributed State Space Generation. In: Proceedings of the 6th International Workshop on Parallel and Distributed Methods in verifiCation, 8 Jul 2007, Berlin. pp. 17-32. Electronic Notes in Theoretical Computer Science 198 (1). Elsevier. ISSN 1571-0661
Blom, S.C.C. and van de Pol, J.C. (2008) Symbolic Reachability for Process Algebras with Recursive Data Types. In: Theoretical Aspects of Computing - ICTAC 2008, 1-3 Sep 2008, Istanbul, Turkey. pp. 81-95. Lecture Notes in Computer Science 5160. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-85761-7
Bohnenkamp, H.C. and Stoelinga, M.I.A. (2008) Quantitative Testing. In: Proceedings of the 7th ACM International conference on Embedded software, October 19-24, 2008, Georgia, Atlanta. pp. 227-236. ACM. ISBN 978-1-60558-468-3
Bolzoni, D. and Crispo, B. and Etalle, S. (2008) ATLANTIDES: Automatic Configuration for Alert Verification in Network Intrusion Detection Systems. Technical Report TR-CTIT-08-17, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolzoni, D. and Etalle, S. (2008) Approaches in Anomaly-based Network Intrusion Detection Systems. In: Intrusion Detection Systems. Advances in Information Security 38. Springer Verlag, London, pp. 1-16. ISBN 978-0-387-77265-3
Bolzoni, D. and Etalle, S. (2008) Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. Technical Report TR-CTIT-08-43, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolzoni, D. and Etalle, S. (2008) Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. In: Confederated International Conferences On the Move to Meaningful Internet Systems (OTM), November 9-14, 2008, Monterrey, Mexico. pp. 938-955. Lecture Notes in Computer Science 5332. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-88872-7
Bonino da Silva Santos, L.O. and Ferreira Pires, L. and van Sinderen, M.J. (2008) A Trust-Enabling Support for Goal-Based Services. In: 9th International Conference for Young Computer Scientists (ICYCS 2008), 18-21 Nov 2008, Zhang Jia Jie, China. pp. 2002-2007. IEEE Computer Society. ISBN 978-0-7695-3398-8
Bonino da Silva Santos, L.O. and Ferreira Pires, L. and van Sinderen, M.J. (2008) A Goal-Based Framework for Dynamic Service Discovery and Composition. In: Proceedings of the 2nd International Workshop on Architectures, Concepts and Technologies for Service Oriented Computing - ACT4SOC 2008, 05 Jul 2008, Porto, Portugal. pp. 67-78. INSTICC Press. ISBN 978-989-8111-55-5
Boudali, H. and Crouzen, P. and Haverkort, B.R.H.M. and Kuntz, G.W.M. and Stoelinga, M.I.A. (2008) Architectural dependability evaluation with Arcade. In: Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, June 24-27, Anchorage, USA. pp. 512-521. IEEE Computer Society. ISBN 978-1-4244-2397-2
Boudali, H. and Crouzen, P. and Haverkort, B.R.H.M. and Kuntz, G.W.M. and Stoelinga, M.I.A. (2008) Arcade - A Formal, Extensible, Model-based Dependability Evaluation Framework. In: Proceedings of the 13th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS 2008), March 31, 2008 - April 3, 2008, Belfast, UK. pp. 243-248. IEEE Computer Society. ISBN 978-0-7695-3139-7
Boudali, H. and Crouzen, P. and Haverkort, B.R.H.M. and Kuntz, G.W.M. and Stoelinga, M.I.A. (2008) Rich Interfaces for Dependability: Compositional Methods for Dynamic Fault Trees and Arcade models. (Invited) In: Proceedings of the second workshop on foundations of interface theories (FIT), April 10, 2008, Budapest, Hungary. pp. 5-10. University of Aalborg. ISBN not assigned
Boudali, H. and Montani, S. (2008) Guest Editorial: Special session on Bayesian networks in dependability. Reliability Engineering & System Safety, 93 (7). pp. 921-921. ISSN 0951-8320 *** ISI Impact 2,498 ***
Bouyer, P. and Brinksma, H. and Larsen, K.G. (2008) Optimal infinite scheduling for multi-priced timed automata. Formal Methods in System Design, 32 (1). pp. 3-23. ISSN 0925-9856 *** ISI Impact 1,132 ***
Brinksma, H. and Hooman, J. (2008) Dependability for high-tech systems: an industry-as-laboratory approach. (Invited) In: Design, Automation and Test in Europe, 2008. DATE '08, 10-14 March 2008, Munich. pp. 1226-1231. IEEE Computer Society. ISBN 978-3-9810801-4-8
van den Broek, P.M. and Galvao Lourenco da Silva, I. and Noppen, J.A.R. (2008) Elimination of Constraints from Feature Trees. In: Proceedings of the 12th International Software Product Line Conference, 12 Sept 2008, Limerick, Ireland. pp. 227-232. Lero International Science Centre, University of Limerick, Ireland. ISBN 978-1-905952-06-9
Buhan, I.R. (2008) Cryptographic keys from noisy data, theory and applications. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 08-129 ISBN 978-9-03652-738-5
Buhan, I.R. (2008) A New Secure Pairing Protocol using Biometrics. Technical Report TR-CTIT-08-63, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. (2008) Controlling Leakage of Biometric Information using Dithering. In: 16th European Signal Processing Conference, 25-29 Aug 2008, Lausanne, Switzerland. 1569105382. EUSIPCO. EURASIP, European Association for Signal, Speech and Image Processing. ISBN 978-2-8399-0450-6
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Tang, Qiang and Veldhuis, R.N.J. (2008) Embedding Renewable Cryptographic Keys into Continuous Noisy Data. In: 10th International Conference on Information and Communications Security, 20 - 22 October, 2008, Birmingham, UK. pp. 294-310. Lecture Notes in Computer Science 5308. Springer. ISBN 978-3-540-88624-2
Bujorianu, L.M. and Bujorianu, M.C. (2008) Towards a Formal Framework for Multidimensional Codesign. Technical Report TR-CTIT-08-21, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bujorianu, L.M. and Bujorianu, M.C. (2008) Bisimulation, Logic and Reachability Analysis for Markovian Systems. Technical Report TR-CTIT-08-23, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bujorianu, L.M. and Bujorianu, M.C. (2008) Bisimulation, Logic and Mobility for Markovian Systems. In: Proceedings of the 18th International Symposium on Mathematical Theory of Networks & Systems, 28 July - 1 August 2008, Blacksburg, Virginia, USA. 12. SIAM. ISBN not assigned
Bujorianu, L.M. and Bujorianu, M.C. (2008) Topological superposition of abstractions of stochastic processes. In: MED '07. Mediterranean Conference on Control & Automation, 27-29 June 2007, Athens, Greece. pp. 1-6. IEEE Computer Society. ISBN 1-4244-1282-X
Bujorianu, L.M. and Katoen, J.P. (2008) Symmetry Reduction For Stochastic Hybrid Systems. Technical Report TR-CTIT-08-27, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bujorianu, L.M. and Lygeros, J. (2008) New insights on stochastic reachability. In: 46th IEEE Conference on Decision and Control, 12-14 Dec 2007, New Orleans, Louisiana USA. pp. 6172-6177. IEEE Computer Society. ISSN 0191-2216 ISBN 1-4244-1498-9
Bujorianu, L.M. and Lygeros, J. and Bujorianu, M.C. (2008) Abstractions of Stochastic Hybrid Systems. Technical Report TR-CTIT-08-24, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bujorianu, L.M. and Lygeros, J. and Bujorianu, M.C. (2008) Towards a General Theory of Stochastic Hybrid Systems. Technical Report TR-CTIT-08-25, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bujorianu, M.C. and Bujorianu, L.M. (2008) Uncertainty and Reconfigurability in Hilbertean Formal Methods. Technical Report TR-CTIT-08-20, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bujorianu, M.C. and Bujorianu, L.M. (2008) A Randomized Model for Communicating Embedded Systems. Technical Report TR-CTIT-08-22, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bujorianu, M.C. and Bujorianu, L.M. (2008) Formal Engineering Hybrid Systems: Semantic Underpinnings. Technical Report TR-CTIT-08-28, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bujorianu, M.C. and Bujorianu, L.M. (2008) Styles in Heterogeneous Modelling With UML. Technical Report TR-CTIT-08-29, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bujorianu, M.C. and Bujorianu, L.M. (2008) A randomized model for communicating embedded systems. In: 16th Mediterranean Conference on Control and Automation, 25-27 June 2008, Ajaccio, France. pp. 1435-1440. IEEE Computer Society. ISBN 978-1-4244-2505-1
Bujorianu, M.C. and Bujorianu, L.M. and Langerak, R. (2008) An Interpretation of Concurrent Hybrid Time Systems over Multi-clock Systems. In: Proceedings of the 17th IFAC World Congress, 6-11 Jul 2008, Seoul, Korea. pp. 3635-3640. IFAC. ISBN 978-3-902661-00-5
Bujorianu, M.C. and Bujorianu, L.M. and Maharaj, S. (2008) Formal Testing of Correspondence Carrying Software. Technical Report TR-CTIT-08-26, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Calamé, J.R. (2008) Testing reactive systems with data: enumerative methods and constraint solving. PhD thesis, University of Twente. IPA dissertation series 2008-20 ISBN 978-90-6464-273-9
Calamé, J.R. and van de Pol, J.C. (2008) Applying Model-based Testing to HTML Rendering Engines - A Case Study. In: Testing of Software and Communicating Systems, 10-13 Jun 2008, Tokyo, Japan. pp. 250-265. Lecture Notes in Computer Science 5047. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-68514-2
Chen, Taolue and Han, Tingting and Katoen, J.P. (2008) Time-Abstracting Bisimulation for Probabilistic Timed Automata. In: Proceedings of the 2nd IFIP/IEEE International Symposium on Theoretical Aspects of Software Engineering (TASE), 17-19 June 2008, Nanjing, China. pp. 177-184. IEEE Computer Society. ISBN 978-0-7695-3249-3
Chen, Taolue and van de Pol, J.C. and Wang, Yanjing (2008) PDL over Accelerated Labeled Transition Systems. In: 2008 2nd IFIP/IEEE International Symposium on Theoretical Aspects of Software Engineering, 17-19 Jun 2008, Nanjing, China. pp. 193-200. IEEE Computer Society. ISBN 978-0-7695-3249-3
Ciraci, S. and van den Broek, P.M. and Akşit, M. (2008) Framework for Computer-Aided Evolution of Object-Oriented Designs. In: The 2nd IEEE International Workshop on Quality Oriented Reuse of Software (QUORS 2008), 01-08-2009, Turku, Finland. pp. 757-764. 32nd Annual IEEE International Computer Software and Applications Conference 2. IEEE Computer Society. ISBN 978-0-7695-3262-2
Crouzen, P. and van de Pol, J.C. and Rensink, A. (2008) Applying Formal Methods to Gossiping Networks with mCRL and Groove. ACM SIGMETRICS performance evaluation review, 36 (3). pp. 7-16. ISSN 0163-5999
Czenko, M.R. and Doumen, J.M. and Etalle, S. (2008) Trust Management in P2P systems using Standard TuLiP. Technical Report TR-CTIT-08-09, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Czenko, M.R. and Doumen, J.M. and Etalle, S. (2008) Trust Management in P2P Systems Using Standard TuLiP. In: Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway. pp. 1-16. IFIP International Federation for Information Processing 263/2008. Springer. ISSN 1571-5736 ISBN 978-0-387-09427-4
Czenko, M.R. and Etalle, S. (2008) LP with Flexible Grouping and Aggregates Using Modes. Technical Report TR-CTIT-08-41, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Damman, B. and Han, Tingting and Katoen, J.P. (2008) Regular Expressions for PCTL Counterexamples. In: Proceedings of the 5th International Conference on the Quantitative Evaluaiton of Systems (QEST 2008), 14-17 Sept 2008, Saint Malo, France. pp. 179-188. IEEE Computer Society. ISBN 978-0-7695-3360-5
Daniele, L.M. and Ferreira Pires, L. and van Sinderen, M.J. (2008) Interaction patterns for refining behaviour specifications of context-aware mobile services. In: Joint Proceedings of the Workshops: IWUC, MDIES and TCoB, 12 Jun 2008, Barcelona, Spain. pp. 64-76. INSTICC Press. ISBN 978-989-8111-49-4
Daniele, L.M. and Ferreira Pires, L. and van Sinderen, M.J. (2008) Context handling in a SOA infrastructure for mobile applications. In: Proceedings of the 2nd International Workshop on Architectures, Concepts and Technologies for Service Oriented Computing (ACT4SOC 2008), 5 July 2008, Porto, Portugal. pp. 27-37. INSTICC Press. ISBN 978-989-8111-55-5
Dekker, M.A.C. and Crampton, J. and Etalle, S. (2008) RBAC administration in distributed systems. In: Proceedings of the 13th ACM symposium on Access control models and technologies, 11-13 June 2008, Estes Park, Colorado, USA. pp. 93-102. ACM. ISBN 978-1-60558-129-3
Dimkov, T. and Tang, Qiang and Hartel, P.H. (2008) On the inability of existing security models to cope with data mobility in dynamic organizations. In: Proceedings of the Workshop on Modeling Security (MODSEC08), 28 Sep 2008, Toulouse. 18. CEUR Workshop Proceedings. ISSN 1613-0073
Dimkov, T. and Tang, Qiang and Hartel, P.H. (2008) Inability of existing security models to cope with data mobility in dynamic organizations. Technical Report TR-CTIT-08-57, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dockhorn Costa, P. and Ferreira Pires, L. and van Sinderen, M.J. (2008) Concepts and architectures for mobile context-aware applications. In: Handbook of research on mobile multimedia. Information Science Reference, Hershey, New York, pp. 783-803. ISBN 978-1-60566-046-2
Durr, P.E.A. (2008) Resource-based Verification for Robust Composition of Aspects. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 08-119 ISBN 978-90-365-2685-2
Durr, P.E.A. and Bergmans, L.M.J. and Akşit, M. (2008) A Controlled Experiment for the Assessment of Aspects - Tracing in an Industrial Context. Technical Report TR-CTIT-08-04, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Engels, G. and Kleppe, A.G. and Rensink, A. and Semenyak, M. and Soltenborn, C. and Wehrheim, H. (2008) From UML Activities to TAAL: Towards behaviour-preserving model transformations. In: European Conference on Model Driven Architecture - Foundations and Applications (ECMDA-FA), 10-12 Jun 2008, Berlin, Germany. pp. 94-109. Lecture Notes in Computer Science 5095. Springer Verlag. ISSN 1611-3349 ISBN 978-3-540-69095-5
Ernst, E. and Bergmans, L.M.J. and Gybels, K. (2008) Editorial: Special Issue on SPLAT2008. Journal of Object Technology, 7 (9). ISSN 1660-1769
Etalle, S. (2008) Nice to know. Technical University of Eindhoven, Eindhoven. ISBN 978-90-386-1427-4
Faella, M. and Legay, A. and Stoelinga, M.I.A. (2008) Model checking Quantitative Linear Time Logic. In: Proceedings of the Sixth Workshop on Quantitative Aspects of Programming Languages (QAPL 2008), March 29-30, 2008, Budapest, Hungary. pp. 61-77. Electronic Notes in Theoretical Computer Science 220 (3). Elsevier. ISSN 1571-0661
Göknil, A. and Kurtev, I. and van den Berg, K.G. (2008) Change Impact Analysis based on Formalization of Trace Relations for Requirements. In: ECMDA Traceability Workshop (ECMDA-TW), 12 June 2008, Berlin, Germany. pp. 59-75. SINTEF Report. ISBN 978-82-14-04396-9
Göknil, A. and Kurtev, I. and van den Berg, K.G. (2008) A Metamodeling Approach for Reasoning about Requirements. In: 4th European Conference Model Driven Architecture - Foundations and Applications, ECMDA-FA 2008, 9-13 June 2008, Berlin, Germany. pp. 310-325. Lecture Notes in Computer Science 5095. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-69095-5
Göknil, A. and Topaloglu, N.Y. and van den Berg, K.G. (2008) Operation Composition in Model Transformations with Complex Source Patterns. Technical Report TR-CTIT-08-60, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Güleşir, G. (2008) Evolvable Behavior Specifications Using Context-Sensitive Wildcards. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 08-114 ISBN 978-90-365-2633-3
Goncalves da Silva, E.M. and Ferreira Pires, L. and van Sinderen, M.J. (2008) Dynamic Composition of Services: Why, Where and How. In: Proceedings of the Second International Workshop on Enterprise Systems and Technology (I-WEST 2008), 23 May 2008, Enschede, The Netherlands. pp. 73-85. INSTICC Press. ISBN 978-989-8111-50-0
Goncalves da Silva, E.M. and Martínez López, J. and Ferreira Pires, L. and van Sinderen, M.J. (2008) Defining and Prototyping a Life-cycle for Dynamic Service Composition. In: Proceeding of the Second International Workshop on Architectures, Concepts and Technologies for Service Oriented Computing (ACT4SOC 2008), In conjunction with ICSOFT 2008, 5 Jul 2008, Porto, Portugal. pp. 79-90. INSTICC Press. ISBN 978-989-8111-55-5
Gong, Zheng and Lai, X.J. and Chen, Kefei (2008) On the Design of Secure and Fast Double Block Length Hash Functions. Technical Report TR-CTIT-08-71, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Haack, C. and Huisman, M. and Hurlin, C. (2008) Reasoning about Java's Reentrant Locks. In: The Sixth ASIAN Symposium on Programming Languages and Systems, 9-11 Dec 2008, Bangalore, India. pp. 171-187. Lecture Notes in Computer Science 5356. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-89329-5
Han, Tingting and Katoen, J.P. and Mereacre, A. (2008) Compositional Modeling and Minimization of Time-Inhomogeneous Markov Chains. In: Hybrid Systems: Computation and Control (HSCC), St. Louis, U.S.. pp. 244-258. Lecture Notes in Computer Science 4981. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-78928-4
Han, Tingting and Katoen, J.P. and Mereacre, A. (2008) Approximate parameter synthesis for probabilistic time-bounded reachability. In: Proceedings of the IEEE Real-Time Systems Symposium (RTSS 2008), 1-3 Dec 2008, Barcelona, Spain. pp. 173-182. IEEE Computer Society. ISBN 978-0-7695-3477-0
Hartel, P.H. and Abelmann, L. and Khatib, M.G. (2008) Towards Tamper-Evident Storage on Patterned Media. In: 6th USENIX Conf. on File and Storage Technologies (FAST), Feb. 26-29, 2008, San Jose, California. pp. 283-296. USENIX Association. ISBN 978-1-931971-56-0
Hartel, P.H. and Ruys, T.C. and Geilen, M.C.W. (2008) Scheduling Optimisations for SPIN to Minimise Buffer Requirements in Synchronous Data Flow (with appendix). Technical Report TR-CTIT-08-16, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hartel, P.H. and Ruys, T.C. and Geilen, M.C.W. (2008) Scheduling Optimisations for SPIN to Minimise Buffer Requirements in Synchronous Data Flow. In: 8th Int. Conf. on Formal Methods in Computer Aided Design (FMCAD), 17-20 Nov. 2008, Portland, Oregon. pp. 161-170. IEEE Computer Society. ISBN 978-1-4244-2735-2
Hatun, K. and Duygulu, P. (2008) Pose Sentences: A new representation for action recognition using sequence of pose words. In: International Conference on Pattern Recognition, 8 - 11 Dec 2008, Tampa, Florida, USA. IEEE Computer Society. ISSN 1051-4651 ISBN 978-1-4244-2175-6
Havinga, W.K. and Bergmans, L.M.J. and Akşit, M. (2008) Prototyping and Composing Aspect Languages: using an Aspect Interpreter Framework. In: Proceedings of 22nd European Conference on Object-Oriented Programming (ECOOP 2008), 7-11 July 2008, Paphos, Cyprus. pp. 180-206. Lecture Notes in Computer Science 5142/2008. Springer Verlag. ISBN 978-3-540-70591-8
van Honschoten, J.W. and Koelmans, W.W. and Konings, S.M. and Abelmann, L. and Elwenspoek, M.C. (2008) Nanotesla torque magnetometry using a microcantilever. In: Eurosensors XXII, 7 - 10 Sept 2008, Dresden, Germany. pp. 597-600. Eurosensors Committee. ISBN 978-3-00-025217-4
Huisman, M. and Aktug, I. and Gurov, D. (2008) Program models for compositional verification. In: 10th International Conference on Formal Engineering Methods, 27-31 Oct 2008. pp. 147-166. Lecture Notes in Computer Science 5256. Springer Verlag. ISBN 978-3-540-88193-3
Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare. Technical Report TR-CTIT-08-31, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare. In: Proceedings of the 5th VLDB Workshop, SDM 2008, August 24, 2008, Auckland, New Zealand. pp. 185-198. Lecture Notes in Computer Science 5159. Springer Verlag. ISBN 978-3-540-85258-2
Jansen, D.N. and Katoen, J.P. and Oldenkamp, M. and Stoelinga, M.I.A. and Zapreev, I.S. (2008) How Fast and Fat Is Your Probabilistic Model Checker? An Experimental Performance Comparison. In: Hardware and Software: Verification and Testing, Proceedings of the Third International Haifa Verification Conference, HVC 2007, 23-25 Oct 2007, Haifa, Israel. pp. 69-85. Lecture Notes in Computer Science 4899. Springer Verlag. ISBN 978-3-540-77964-3
Jouault, F. and Allilaire, F. and Bézivin, J. and Kurtev, I. (2008) ATL: a model transformation tool. Science of computer programming, 72 (1-2). pp. 31-39. ISSN 0167-6423 *** ISI Impact 0,828 ***
Kastenberg, H. (2008) Graph-based software specification and verification. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 08-128 ISBN 978-90-365-2734-7
Kastenberg, H. and Rensink, A. (2008) Dynamic Partial Order Reduction Using Probe Sets. In: Concurrency Theory (CONCUR), 19-22 Aug 2008, Toronto, Canada. pp. 233-247. Lecture Notes in Computer Science 5201. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-85360-2
Katoen, J.P. (2008) Perspectives in probabilistic verification. (Invited) In: Proceedings 2nd IEEE/IFIP International Symposium on Theoretical Aspects of Software Engineering, Nanjing, China. pp. 3-10. IEEE Computer Society. ISBN 978-0-7695-3249-3
König, B. and Rensink, A. and Heckel, R. (2008) Graph Transformation for Concurrency and Verification - Preface. In: Graph Transformation for Verification and Concurrency, 3 Sep 2007, Lisbon, Portugal. pp. 1-2. Electronic Notes in Theoretical Computer Science 213 (1). Elsevier. ISSN 1571-0661
Khatib, M.G. and Engelen, J.B.C. and Hartel, P.H. (2008) Shutdown Policies for MEMS-Based Storage Devices -- Analytical Models. Technical Report TR-CTIT-08-03, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Kleppe, A.G. and Rensink, A. (2008) A Graph-Based Semantics for UML Class and Object Diagrams. Technical Report TR-CTIT-08-06, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Kleppe, A.G. and Rensink, A. (2008) On a Graph-Based Semantics for UML Class and Object Diagrams. In: Graph Transformation and Visual Modelling Techniques, 29-30 Apr 2008, Budapest, Hungary. Electronic Communications of the EASST 10. EASST. ISSN 1863-2122
Kurtev, I. (2008) Application of reflection in model transformation languages. In: Theory and Practice of Model Transformations, 1-2 Jul 2008, Zurich, Switzerland. pp. 199-213. Lecture Notes in Computer Science 5063. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-69926-2
Kurtev, I. (2008) State of the art of QVT: a model transformation language standard. (Invited) In: Applications of Graph Transformations with Industrial Relevance, Kassel, Germany. pp. 377-393. Lecture Notes in Computer Science 5088. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-89019-5
Law, Yee Wei and Moniava, G. and Gong, Zheng and Hartel, P.H. and Palaniswami, M. (2008) KALwEN: A New Practical and Interoperable Key Management Scheme for Body Sensor Networks. Technical Report TR-CTIT-08-67, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Lécué, F. and Goncalves da Silva, E.M. and Ferreira Pires, L. (2008) A Framework for Dynamic Web Services Composition. In: Emerging Web Services Technology, Volume II. Whitestein Series in Software Agent Technologies and Autonomic Computing. Springer-Birkhauser, Basel, pp. 59-75. ISBN 978-3-7643-8864-5
Mader, A.H. and Marincic, J. and Wupper, H. (2008) Modelling Embedded Systems by Non-Monotonic Refinement. Technical Report TR-CTIT-08-38, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Mader, A.H. and Wupper, H. and Boon, M. and Marincic, J. (2008) A Taxonomy of Modelling Decisions for Embedded Systems Veri?cation. Technical Report TR-CTIT-08-37, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marin-Perianu, M. and Lombriser, C. and Amft, O. and Havinga, P.J.M. and Troster, G. (2008) Distributed Activity Recognition with Fuzzy-Enabled Wireless Sensor Networks. In: Distributed Computing in Sensor Systems, 11-14 Jun 2008, Santorini, Greece. pp. 296-313. Springer Verlag. ISBN 978-3-540-69169-3
Marin-Perianu, R.S. (2008) Wireless Sensor Networks in Motion - Clustering Algorithms for Service Discovery and Provisioning. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 08-130 ISBN 978-90-365-2745-3
Marin-Perianu, R.S. and Hurink, J.L. and Hartel, P.H. (2008) A generalized clustering algorithm for dynamic wireless sensor networks. Technical Report TR-CTIT-08-56, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marin-Perianu, R.S. and Hurink, J.L. and Hartel, P.H. (2008) A Generalized Clustering Algorithm for Dynamic Wireless Sensor Networks. In: Proceedings of the International Symposium on Parallel and Distributed Processing with Applications (ISPA-08), 10-12 Dec 2008, Sydney, Australia. pp. 863-870. IEEE Computer Society. ISBN 978-0-7695-3471-8
Marin-Perianu, R.S. and Lombriser, C. and Havinga, P.J.M. and Scholten, J. and Tröster, G. (2008) Tandem: A Context-Aware Method for Spontaneous Clustering of Dynamic Wireless Sensor Nodes. In: Proceedings of the First International Conference on Internet of Things (IOT2008), March 2008, Zürich, Switzerland. pp. 341-359. Lecture Notes in Computer Science (4952). Springer Verlag. ISBN 978-3-540-78730-3
Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. and Hartel, P.H. (2008) Cluster-based service discovery for heterogeneous wireless sensor networks. International Journal of Parallel, Emergent and Distributed Systems, 23 (4). pp. 325-346. ISSN 1744-5760
Marincic, J. and Mader, A.H. and Wieringa, R.J. (2008) Classifying Assumptions Made During Requirements Verification of Embedded Systems. In: Requirements Engineering: Foundation for Software Quality, 14th International Working Conference, REFSQ 2008, 16-17 Jun 2008, Montpellier, France. pp. 141-146. Springer Verlag. ISBN 978-3-540-69060-3
Marincic, J. and Mader, A.H. and Wupper, H. and Wieringa, R.J. (2008) Non-monotonic modelling from initial requirements: a proposal and comparison with monotonic modelling methods. In: IWAAPF '08: Proceedings of the 3rd international workshop on Applications and advances of problem frames, 10 May 2008, Leipzig, Germany. pp. 67-73. ACM. ISBN 978-1-60558-020-3
Morali, A. and Zambon, Emmanuele and Etalle, S. and Overbeek, P. (2008) IT Confidentiality Risk Assessment for an Architecture-Based Approach. Technical Report TR-CTIT-08-05, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Morali, A. and Zambon, Emmanuele and Etalle, S. and Overbeek, P. (2008) IT Confidentiality Risk Assessment for an Architecture-Based Approach. In: Third IEEE International Workshop on Business-Driven IT Management, 07 Apr 2008, Salvador, Brazil. pp. 31-40. IEEE Computer Society. ISBN 978-1-4244-2191-6
Morali, A. and Zambon, Emmanuele and Houmb, S.H. and Sallhammar, K. and Etalle, S. (2008) Extended eTVRA vs. Security Checklist: Experiences in a Value-Web. Technical Report TR-CTIT-08-62, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Nguyen, Viet Yen and Ruys, T.C. (2008) Incremental Hashing for SPIN. In: Model Checking Software, Proceedings of the 15th International SPIN Workshop, 10-12 Aug 2008, Los Angeles, CA, USA. pp. 232-249. Lecture Notes in Computer Science 5156. Springer Verlag. ISBN 978-3-540-85113-4
Nikova, S.I. and Rijmen, V. and Schlaffer, M. (2008) Using normal bases for compact hardware implementations of the AES S-box. In: 6th International Conference Security in Communication Networks (SCN), 10-12 Sep 2008, Amalfi, Italy. pp. 236-245. Lecture Notes in Computer Science 5229. Springer Verlag. ISBN 978-3-540-85854-6
Noppen, J.A.R. and van den Broek, P.M. and Akşit, M. (2008) Software development with imperfect information. Soft Computing - A Fusion of Foundations, Methodologies and Applications, 12 (1). pp. 3-28. ISSN 1432-7643 *** ISI Impact 1,630 ***
Pieters, W. (2008) Vertrouwen en werkelijkheid in de stemcomputercontroverse. In: Burger in Uitvoering. Jaarboek Kennissamenleving 4. Aksant, Amsterdam, pp. 17-25. ISBN 978-90-5260-307-0
Pieters, W. (2008) De monsterlijke trekjes van beveiligingsproblemen. Informatiebeveiliging, 2008 (3). pp. 18-20. ISSN 1569-1063
Pieters, W. (2008) Betrouwbaarheid of vertrouwbaarheid : Vertrouwen in technologie en bestuur. Openbaar bestuur, 18 (10). pp. 27-30. ISSN 0925-7322
Pieters, W. (2008) La volonté machinale: understanding the electronic voting controversy. PhD thesis, Radboud University Nijmegen. ISBN 978-90-9022554-8
Pieters, W. and Becker, M.J. (2008) Ethics of e-voting: an essay on requirements and values in Internet elections. In: E-Democracy: Concepts and Practices. Icfai University Press, pp. 134-157. ISBN 978-81-314-1914-4
van de Pol, J.C. (2008) A Typical Verification Challenge for the GRID. (Invited) In: Dagstuhl Seminar Proceedings 08332 'Distributed Verification and Grid Computing ', 10-14 August 2008, Dagstuhl, Germany. Dagstuhl Seminar Proceedings (08332). Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany. ISSN 1862-4405
van de Pol, J.C. and Weber, Michael (2008) A Multi-Core Solver for Parity Games. In: Proceedings of the 7th International Workshop on Parallel and Distributed Methods in verifiCation, 29 Mar 2008, Budapest, Hungary. pp. 19-34. Electronic Notes in Theoretical Computer Science 220 (2). Elsevier. ISSN 1571-0661
Rensink, A. (2008) Explicit State Model Checking for Graph Grammars. In: Concurrency, Graphs and Models. Lecture Notes in Computer Science 5065. Springer Verlag, Berlin, pp. 114-132. ISSN 1611-3349 ISBN 978-3-540-68676-7
Rensink, A. and Dotor, A. and Ermel, C. and Jurack, S. and Kniemeyer, O. and De Lara, J. and Maier, S. and Staijen, T. and Zündorf, A. (2008) Ludo: A Case Study for Graph Transformation Tools. In: Applications of Graph Transformation with Industrial Relevance (AGTIVE), 10-12 Oct 2007, Kassel, Germany. pp. 493-513. Lecture Notes in Computer Science 5088. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-89019-5
Rensink, A. and Nederpel, R. (2008) Graph Transformation Semantics for a QVT Language. In: International Workshop on Graph Transformation and Visual Modeling Techniques (GT-VMT), Apr 2006, Vienna, Austria. pp. 51-62. Electronic Notes in Theoretical Computer Science 211. Elsevier. ISSN 1571-0661
Rensink, A. and Taentzer, G. (2008) AGTIVE 2007 Graph Transformation Tool Contest. In: Applications of Graph Transformation with Industrial Relevance (AGTIVE), 10-12 Oct 2007, Kassel, Germany. pp. 487-492. Lecture Notes in Computer Science 5088. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-89019-5
Rensink, A. and Van Gorp, P. (2008) Graph-Based Tools: The Contest. In: International Conference on Graph Transformations (ICGT), 9-13 Sep 2008, Leicester, UK. pp. 463-466. Lecture Notes in Computer Science 5214. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-87404-1
de Roo, A.J. and Hendriks, M.F.H. and Havinga, W.K. and Durr, P.E.A. and Bergmans, L.M.J. (2008) Compose*: a Language- and Platform-Independent Aspect Compiler for Composition Filters. In: First International Workshop on Advanced Software Development Tools and Techniques, WASDeTT 2008, 8 Jul 2008, Paphos, Cyprus. No publisher. ISBN not assigned
Sanen, F. and Chitchyan, R. and Bergmans, L.M.J. and Fabry, J. and Sudholt, M. and Mehner, K. (2008) Aspects, Dependencies and Interactions. In: Object-Oriented Technology. ECOOP 2007 Workshop Reader. Lecture Notes in Computer Science 4906. Springer Verlag, London, pp. 75-90. ISBN 978-3-540-78194-3
Sözer, H. and Tekinerdogan, B. (2008) Introducing Recovery Style for Modeling and Analyzing System Recovery. In: 7th IEEE/IFIP Working Conference on Software Architecture, 18-22 Feb 2008, Vancouver, Canada. pp. 167-176. IEEE Computer Society. ISBN 0-7695-3092-3
Scholten, J. and van Dijk, H.W. (2008) Home Network Security. In: ICN2008, The Seventh International Conference on Networking, 13-18 Apr 2008, Cancun, Mexico. pp. 249-255. IEEE Computer Society. ISBN 978-0-7695-3106-9
Sedghi, S. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2008) Towards an Information Theoretic Analysis of Searchable Encryption (Extended Version). Technical Report TR-CTIT-08-50, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Sedghi, S. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2008) Towards an Information Theoretic Analysis of Searchable Encryption. In: 10th international conference on information and communication security, 20-22 Oct 2008, Birmingham, UK. pp. 345-360. Lecture Notes in Computer Science 5308. Springer. ISSN 0302-9743 ISBN 978-3-540-88624-2
Sewe, A. and Bockisch, C.M. and Mezini, M. (2008) Redundancy-free residual dispatch: using ordered binary decision diagrams for efficient dispatch. In: Proceedings of the 7th Workshop on Foundations of Aspect-Oriented Languages, 1 Apr 2008, Brussels, Belgium. pp. 1-7. ACM. ISBN 978-1-60558-110-1
Sewe, A. and Bockisch, C.M. and Mezini, M. (2008) Aspects and Class-based Security: A Survey of Interactions between Advice Weaving and the Java 2 Security Model. In: Proceedings of the 2nd Workshop on Virtual Machines and Intermediate Languages (VMIL 2008), 19 Oct 2008, Nashville, TN, USA. 3. ACM. ISBN 978-1-60558-384-6
Shiaa, M. and Falcarin, P. and Pastor, A. and Lécué, F. and Goncalves da Silva, E.M. and Ferreira Pires, L. (2008) Towards the automation of the service composition process: case study and prototype implementations. In: ICT-MobileSummit 2008 Conference Proceedings, 10-12 June 2008, Stockholm, Sweden. pp. 1-8. IIMC International Information Management Corporation. ISBN 978-1-905824-08-3
Tang, Qiang (2008) Type-based Proxy Re-encryption and its Construction. Technical Report TR-CTIT-08-47, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang (2008) Type-Based Proxy Re-encryption and Its Construction. In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, December 14-17, 2008, Kharagpur, India. pp. 130-144. Lecture Notes in Computer Science 5365. Springer Verlag. ISBN 978-3-540-89753-8
Tang, Qiang and Bringer, J. and Chabanne, H. and Pointcheval, D. (2008) A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, April 21-23, 2008, Sydney, Australia. pp. 56-70. Lecture Notes in Computer Science 4991. Springer Verlag. ISBN 978-3-540-79103-4
Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) Inter-domain Identity-based Proxy Re-encryption. Technical Report TR-CTIT-08-32, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tekinerdogan, B. and Sözer, H. and Akşit, M. (2008) Software Architecture Reliability Analysis using Failure Scenarios. Journal of systems and software, 81 (4). pp. 558-575. ISSN 0164-1212 *** ISI Impact 1,424 ***
Timmer, M. (2008) Actual Test Coverage for Embedded Systems. In: Proceedings of the 14th Dutch Testing Day, 29 Nov 2008, Utrecht, The Netherlands. pp. 8-9. Valori. ISBN not assigned
Zapreev, I.S. (2008) Model Checking Markov Chains: Techniques and Tools. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 08-113 ISBN 978-90-8570-298-6
Zych, A.K. and Doumen, J.M. and Jonker, W. and Hartel, P.H. and Petkovic, M. (2008) Method of Key Management. Patent WO2008026184 (Assigned).

2007

Etalle, S. and Marsh, S., ed. (2007) Trust Management, Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30-August 2, 2007, New Brunswick, Canada. IFIP International Federation for Information Processing 238. Springer Verlag, Berlin. ISBN 978-0-387-73654-9
Rashid, A. and Akşit, M., ed. (2007) Transactions on Aspect-Oriented Software Development III. Lecture Notes in Computer Science 4620. Springer Verlag, Berlin. ISSN 0302-9743 ISBN 978-3-540-75161-8
Rashid, A. and Akşit, M., ed. (2007) Transactions on Aspect-Oriented Software Development IV. Lecture Notes in Computer Science 4640. Springer Verlag, Berlin. ISSN 0302-9743 ISBN 978-3-540-77041-1
de Alfaro, L. and Majumdar, R. and Raman, V. and Stoelinga, M.I.A. (2007) Game Relations and Metrics. In: Twenty-Second Annual IEEE Symposium on LOGIC IN COMPUTER SCIENCE (LICS 2007), 10–14 July 2007, Wroclav, Poland. pp. 99-108. IEEE Computer Society. ISBN 0-7695-2908-9
Alvisi, L. and Doumen, J.M. and Guerraoui, R. and Koldehofe, B. and Li, H. and van Renesse, R. and Tredan, G. (2007) How robust are gossip-based communication protocols? Operating Systems Review, 41 (5). pp. 14-18. ISSN 0163-5980
Asveld, P.R.J. (2007) Review of "T. Ceccherini-Silberstein; Growth and ergodicity of context-free languages. II. The linear case. Trans. Amer. Math. Soc. 359 (2007) 605-618". Mathematical reviews, MR2255188 / 2007g:68083. pp. 5545-5545. ISSN 0025-5629
Asveld, P.R.J. (2007) Review of "L. Kuppusamy; Anote on ambiguity of internal contextual grammars. Theoret. Comput. Sci. 369 (2006), no. 1-3, 436–441". Mathematical reviews, MR2277588 / 2007h:68108. pp. 6366-6367. ISSN 0025-5629
Asveld, P.R.J. (2007) Generating All Circular Shifts by Context-Free Grammars in Greibach Normal Form. International Journal of Foundations of Computer Science, 18 (6). pp. 1139-1149. ISSN 0129-0541 *** ISI Impact 0,467 ***
Asveld, P.R.J. (2007) Generating All Permutations by Context-Free Grammars in Greibach Normal Form. Technical Report TR-CTIT-07-83, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Asveld, P.R.J. (2007) Generating All Circular Shifts by Context-Free Grammars in Greibach Normal Form. Technical Report TR-CTIT-07-28, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Badban, B. and van de Pol, J.C. and Tveretina, O. and Zantema, H. (2007) Generalizing DPLL and satisfiability for equalities. Information and computation, 205 (8). pp. 1188-1211. ISSN 0890-5401 *** ISI Impact 0,873 ***
Belinfante, A.F.E. (2007) Extensible Synthetic File Servers? or: Structuring the Glue between Tester and System Under Test. In: Proceedings of the Second International Workshop on Plan 9 (IWP9 2007), 3-4 Dec 2007, Bell Labs, Murray Hill, NJ, USA. pp. 47-54. Bell Labs. ISBN not assigned
van den Berg, K.G. and Conejero, J.M. and Hernández, J. (2007) Analysis of Crosscutting in Early Software Development Phases Based on Traceability. In: Transactions on Aspect-Oriented Software Development III. Lecture Notes in Computer Science 4620. Springer Verlag, Berlin, pp. 73-104. ISSN 0302-9743 ISBN 978-3-540-75161-8
Bhargavan, K. and Corin, R.J. and Fournet, C. (2007) Crypto-Verifying Protocol Implementations in ML. In: 3rd Workshop on Formal and Computational Cryptography, FCC 2007, 4-5 Jul 2007, Venice, Italy. INRIA. ISBN not assigned
Bhargavan, K. and Corin, R.J. and Fournet, C. and Gordon, A.D. (2007) Secure Sessions for Web Services. ACM Transactions on Information and System Security (TISSEC), 10 (2). 8:1-8:46. ISSN 1094-9224 *** ISI Impact 0,759 ***
van der Bijl, H.M. and Rensink, A. and Tretmans, G.J. (2007) Atomic Action Refinement in Model Based Testing. Technical Report TR-CTIT-07-64, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Blom, S.C.C. and Calamé, J.R. and Lisser, B. and Orzan, S. and Pang, J. and van de Pol, J.C. and Torabi Dashti, M. and Wijs, A.J. (2007) Distributed Analysis with µCRL: a Compendium of Case Studies. In: Tools and Algorithms for the Construction and Analysis of Systems, 24 Mar - 01 Apr 2007, Braga, Portugal. pp. 683-689. Lecture Notes in Computer Science 4424. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-71208-4
Blom, S.C.C. and Deiß, T. and Ioustinova, N. and Kontio, A. and van de Pol, J.C. and Rennoch, A. and Sidorova, N. (2007) TTCN-3 for Distributed Testing Embedded Software. In: Perspectives of Systems Informatics, 27-30 Jun 2006, Novosibirsk, Russia. pp. 98-111. Lecture Notes in Computer Science 4378. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-70880-3
Blom, S.C.C. and Lisser, B. and van de Pol, J.C. and Weber, Michael (2007) A Database Approach to Distributed State Space Generation. In: Participants Proceedings of the Sixth International Workshop on Parallel and Distributed Methods in Verification, 08 Jul 2007, Berlin, Germany. pp. 17-32. Centre for Telematics and Information Technology University of Twente. ISSN 0929-0672
Bockisch, C.M. and Mezini, M. (2007) A Flexible Architecture For Pointcut-Advice Language Implementations. In: Proceedings of the 1st Workshop on Virtual Machines and Intermediate Languages for Emerging Modularization Mechanisms (VMIL 2007), 13 Mar 2007, Vancouver, British Columbia, Canada. 1. ACM. ISBN 978-1-59593-661-5
Bohnenkamp, H.C. and Belinfante, A.F.E. (2007) Timed model-based testing. In: Tangram: Model-based integration and testing of complex high-tech systems. Embedded Systems Institute ESI, Eindhoven, the Netherlands, pp. 115-128. ISBN 978-90-78679-02-8
Bohnenkamp, H.C. and Hermanns, H. and Katoen, J.P. (2007) Motor: The MoDeST Tool Environment. In: Proceedings of the 13th International Conference on Tools and Algorithms for Construction and Analysis of Systems, Braga, Protugal. pp. 500-504. Lecture Notes in Computer Science 4424. Springer Verlag. ISSN 0302-9743
Bolzoni, D. and Crispo, B. and Etalle, S. (2007) ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems. In: Proceedings of the 21st Large Installation System Administration Conference (LISA '07), 11-16 November 2007, Dallas, Texas. pp. 141-152. Usenix Association. ISBN 978-1-931971-55-3
Boneva, I.B. and Hermann, F. and Kastenberg, H. and Rensink, A. (2007) Simulating Multigraph Transformations Using Simple Graphs. In: Proceedings of the Sixth International Workshop on Graph Transformation and Visual Modeling Techniques, 31 March - 1 April 2007, Braga, Portugal. 42. Electronic Communications of the EASST 6. EASST. ISSN 1863-2122
Boneva, I.B. and Rensink, A. and Kurban, M.E. and Bauer, J. (2007) Graph Abstraction and Abstract Graph Transformation. Technical Report TR-CTIT-07-50, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bosch, H.G.P. and Farag, E.N. and Mullender, S.J. and Nathues, A. and Samuel, L.G. (2007) Method of synchronizing with an uplink channel and a method of determining a propagation delay in a wireless communications system. Patent US20070147337 (Application).
Bosch, H.G.P. and Kraml, M. and Mullender, S.J. and Polakos, P. and Samuel, L.G. (2007) Authenticating a tamper-resistant module in a base station router. Patent US20070271458 (Application).
Bosch, H.G.P. and Mullender, S.J. and Rana, A. and Samuel, L.G. (2007) Method of hard handover in a wireless communication system. Patent US20070010250 (Application).
Bosch, H.G.P. and Samuel, L.G. and Mullender, S.J. and Polakos, P. and Rittenhouse, G. (2007) Flat Cellular (UMTS) Networks. In: Wireless Communications and Networking Conference (WCNC), 11-15 March 2007, Kowloon, China. pp. 3864-3869. IEEE Communications Society. ISBN 1-4244-0659-5
Boudali, H. and Crouzen, P. and Stoelinga, M.I.A. (2007) A compositional reliability and availability evaluation tool. In: ARTIST workshop: Tool Platforms for Embedded Systems Modeling, Analysis and Validation. Presented at the 19th International conference on Computer Aided Verification, July 1-2, 2007, Berlin, Germany. ARTIST2 Network of Excellence on Embedded Systems Design. ISBN not assigned
Boudali, H. and Crouzen, P. and Stoelinga, M.I.A. (2007) A compositional semantics for Dynamic Fault Trees in terms of Interactive Markov Chains. In: 5th International Symposium on Automated Technology for Verification and Analysis (ATVA'07), October 22-25, 2007, Tokyo, Japan. pp. 441-456. Lecture Notes in Computer Science 4762. Springer. ISSN 0302-9743 ISBN 978-3-540-75595-1
Boudali, H. and Crouzen, P. and Stoelinga, M.I.A. (2007) Dynamic Fault Tree analysis using Input/Output Interactive Markov Chains. In: Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 25-28 June 2007, Edinburgh, UK. pp. 708-717. IEEE Computer Society. ISBN 0-7695-2855-4
Boudali, H. and Haverkort, B.R.H.M. and Kuntz, G.W.M. and Stoelinga, M.I.A. (2007) Best of Three Worlds: Towards Sound Architectural Dependability Models. In: 8th International Workshop on Performability Modeling of Computer and Communication Systems (PMCCS), September 20-21, 2007, Edinburgh, UK. pp. 45-49. Centre for Telematics and Information Technology University of Twente. ISSN 0929-0672
Brandán Briones, L. (2007) Theories for Model-based Testing: Real-time and Coverage. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 07-97 ISBN 978-90-365-2476-6
Brim, L. and Haverkort, B.R.H.M. and Leucker, M. and van de Pol, J.C. (2007) Preface. In: Formal Methods: Applications and Technology, 26-31 Aug 2006, Bonn, Germany. V-VI. Lecture Notes in Computer Science 4346. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-70951-0
Brinkman, R. (2007) Searching in encrypted data. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 07-98 ISBN 978-90-365-2488-9
Brinkman, R. (2007) Different search strategies on encrypted data compared. In: Security, Privacy and Trust in Modern Data Management. Data-Centric Systems and Applications XVIII. Springer Verlag, Berlin, pp. 183-196. ISBN 978-3-540-69860-9
Brinksma, H. (2007) The Challenges of Embedded Systems Engineering. In: Hybrid Systems: Computation and Control, 10th International Workshop, HSCC 2007, 03-05 April 2007, Pisa. 3. Lecture Notes in Computer Science 4416. Springer Verlag. ISBN 978-3-540-71492-7
Brinksma, H. and Hooman, J. (2007) Dependability for high-tech systems: an industry-as-laboratory approach. Technical Report ICIS-R07030, Radboud University, Nijmegen. ISSN 1571-5221
van den Broek, P.M. and Noppen, J.A.R. (2007) The Compositional Rule of Inference and Zadeh’s Extension Principle for Non-normal Fuzzy Sets. In: Theoretical Advances and Applications of Fuzzy Logic and Soft Computing. Advances in Soft Computing 42. Springer, Berlin Heidelberg, Germany, pp. 621-628. ISSN 1615-3871 ISBN 978-3-540-72433-9
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Secure Ad-hoc Pairing with Biometrics: SAfE. Technical Report TR-CTIT-07-69, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Constructing practical Fuzzy Extractors using QIM. Technical Report TR-CTIT-07-52, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Secure Ad-hoc Pairing with Biometrics: SAfE. In: First International Workshop on Security for Spontaneous Interaction, 16. September 2007, Innsbruck, Austria. pp. 450-456. Ubicomp 2007 Workshop Proceedings. ISBN 978-3-00-022599-4
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) From Watermarks to Fuzzy Extractors: a Practical Construction. Technical Report TR-CTIT-07-75, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Fuzzy extractors for continuous distributions. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS), 20-22 March 2007, Singapore. pp. 353-355. ACM. ISBN 1-59593-574-6
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Feeling Is Believing: A Secure Template Exchange Protocol. In: Advances in Biometrics, International Conference (ICB), 27-29 Aug 2007, Seoul, Korea. pp. 897-906. Lecture Notes in Computer Science 4642. Springer Verlag. ISBN 978-3-540-74548-8
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) A unifying view on template protection schemes. In: Proceedings of the 28th Symposium on Information Theory in the Benelux, 24-25 May 2007, Enschede, The Netherlands. pp. 35-42. Werkgemeenschap voor Informatie- en Communicatietechniek. ISBN 978-90-365-2509-1
Bujorianu, L.M. and Bujorianu, M.C. (2007) An Integrated Specification Framework for Embedded Systems. In: Proceedings of the Fifth IEEE International Conference on Software Engineering and Formal Methods, 2007. SEFM 2007, 10-14 September 2007, London. pp. 161-170. IEEE Computer Society. ISBN 978-0-7695-2884-7
Bujorianu, L.M. and Bujorianu, M.C. (2007) Viewpoint Development of Stochastic Hybrid Systems. In: 45th IEEE Conference on Decision and Control, 13-15 Dec 2006, San Diego, CA, USA. pp. 6241-6246. IEEE Computer Society. ISBN 1-4244-0171-2
Calamé, J.R. and Ioustinova, N. and van de Pol, J.C. (2007) Automatic Model-Based Generation of Parameterized Test Cases Using Data Abstraction. In: Proceedings of the Doctoral Symposium affiliated with the Fifth Integrated Formal Methods Conference (IFM 2005), 29 Nov 2005, Eindhoven, The Netherlands. pp. 25-48. Electronic Notes in Theoretical Computer Science 191. Elsevier. ISSN 1571-0661
Calamé, J.R. and Ioustinova, N. and van de Pol, J.C. and Sidorova, N. (2007) Bug Hunting with False Negatives Revisited. Technical Report SEN-R0708, Centrum voor Wiskunde en Informatica, Amsterdam. ISSN 1386-369X
Calamé, J.R. and Ioustinova, N. and van de Pol, J.C. and Sidorova, N. (2007) Bug Hunting with False Negatives. In: Integrated Formal Methods, 2-5 Jul 2007, Oxford, UK. pp. 98-117. Lecture Notes in Computer Science 4591. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-73209-9
Chen, Taolue and Ploeger, S.C.W. and van de Pol, J.C. and Willemse, T.A.C. (2007) Equivalence Checking for Infinite Systems Using Parameterized Boolean Equation Systems. In: CONCUR 2007 - Concurrency Theory, 3-8 Sep 2007, Lisbon, Portugal. pp. 120-135. Lecture Notes in Computer Science 4703. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-74406-1
Cheung, L. and Stoelinga, M.I.A. and Vaandrager, F.W. (2007) A testing scenario for probabilistic processes. Journal of the Association for Computing Machinery, 54 (6). 29:1-29:45. ISSN 0004-5411 *** ISI Impact 1,803 ***
Chitchyan, R. and Fabry, J. and Bergmans, L.M.J. (2007) Aspects, Dependencies, and Interactions. In: Object-Oriented Technology. ECOOP 2006 Workshop Reader. Lecture Notes in Computer Science 4379. Springer Verlag, Berlin, pp. 26-39. ISBN 978-3-540-71772-0
Chitchyan, R. and Rashid, A. and Moreira, A.M. and Araujo, J. and Clements, P. and Baniassad, E. and Tekinerdogan, B. (2007) Early Aspects at ICSE 2007: Workshop on Aspect-Oriented Requirements Engineering and Architecture Design. In: Workshop on Aspect-Oriented Requirements Engineering and Architecture Design, 21 May 2007, Minneapolis. pp. 127-128. IEEE Computer Society. ISBN 0-7695-2892-9
Ciraci, S. and van den Broek, P.M. and Akşit, M. (2007) A Taxonomy for a Constructive Approach to Software Evolution. Journal of Software, 2 (2). pp. 84-97. ISSN 1796-217X
Ciraci, S. and van den Broek, P.M. and Akşit, M. (2007) A Constructive Approach To Software Evolution. In: Workshop on Model-Driven Software Evolution - MoDSE2007, 20 March 2007, Amsterdam, the Netherlands. pp. 1-9. Vrije Universiteit Amsterdam. ISBN not assigned
Conejero, J.M. and van den Berg, K.G. and Hernández, J. (2007) Un marco conceptual para la formalización de crosscutting en desarrollos orientados a aspectos. IEEE Latin America Transactions, 5 (4). pp. 224-230. ISSN 1548-0992 *** ISI Impact 0,436 ***
Conejero, J.M. and Hernández, J. and Jurado, E. and van den Berg, K.G. (2007) Crosscutting, what is and what is not? A Formal definition based on a Crosscutting Pattern. Technical Report TR28/07, University of Extremadura, Spain, Extremadura. ISSN not assigned
Corin, R.J. (2007) Computational Soundness of Formal Encryption in Coq. In: 3rd Workshop on Formal and Computational Cryptography, FCC 2007, 4-5 Jul 2007, Venice, Italy. INRIA. ISBN not assigned
Corin, R.J. and Deniélou, P.-M. and Fournet, C. and Bhargavan, K. and Leifer, J. (2007) Secure Implementations for Typed Session Abstractions. In: 20th IEEE Computer Security Foundations Symposium (CSF), 6-8 July, Venice, Italy. pp. 170-186. IEEE Computer Society. ISBN 0-7695-2819-8
Corin, R.J. and Denielou, P-M. (2007) A Protocol Compiler for Secure Sessions in ML. In: 3rd Symposium on Trustworthy Global Computing (TGC) Revised Selected Papers, 5-6 Nov 2007, Sophia Antipolis, France. pp. 276-293. Lecture Notes in Computer Science 4912. Springer Verlag. ISBN 978-3-540-78662-7
Corin, R.J. and Etalle, S. and Hartel, P.H. and Mader, A.H. (2007) Timed Analysis of Security Protocols. Journal of Computer Security, 15 (6). pp. 619-645. ISSN 0926-227X
Czenko, M.R. and Etalle, S. (2007) Core TuLiP. Technical Report TR-CTIT-07-22, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Czenko, M.R. and Etalle, S. (2007) Core TuLiP - Logic Programming for Trust Management. In: Proceedings of the 23rd International Conference on Logic Programming, ICLP 2007, 8-13 Sep 2007, Porto, Portugal. pp. 380-394. Lecture Notes in Computer Science 4670. Springer Verlag. ISBN 978-3-540-74608-9
Czenko, M.R. and Etalle, S. and Li, Dongyi and Winsborough, W.H. (2007) An Introduction to the Role Based Trust Management Framework RT. Technical Report TR-CTIT-07-34, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Czenko, M.R. and Etalle, S. and Li, Dongyi and Winsborough, W.H. (2007) An Introduction to the Role Based Trust Management Framework RT. In: Foundations of Security Analysis and Design IV -- FOSAD 2006/2007 Tutorial Lectures. Lecture Notes in Computer Science 4677. Springer Verlag, Berlin, pp. 246-281. ISBN 978-3-540-74809-0
De Nicola, R. and Katoen, J.P. and Latella, D. and Loreti, M. and Massink, M. (2007) Model checking mobile stochastic logic. Theoretical computer science, 382 (1). pp. 42-70. ISSN 0304-3975 *** ISI Impact 0,643 ***
Dekker, M.A.C. and Etalle, S. (2007) Refinement for Administrative Policies. In: Proceedings of the fourth VLDB Workshop, SDM 2007, 23, 24 Sept 2007, Vienna, Austria. pp. 33-46. Lecture Notes in Computer Science 4721. Springer. ISBN 978-3-540-75247-9
van Dijk, H.W. and Scholten, J. and Tobalina, A. and García Muñoz, V. and Milanini, S. and Kung, A. (2007) Open Home Networks: the TEAHA Approach. In: Sixth International Conference on Networks (ICN2007), 22-28 Apr 2007, Sainte-Luce, France. 053. IEEE Computer Society. ISBN 0-7695-2805-8
Doumen, J.M. (2007) Non-interactive fuzzy private matching. Technical Report TR-CTIT-07-45, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Durmaz Incel, O. and Jansen, P.G. and Dulman, S.O. and Mullender, S.J. (2007) Capacity analysis of interfering channels. In: Proceedings of the 2nd ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, 26 October 2007, Crete, Greece. pp. 11-18. ACM. ISBN 978-1-59593-805-3
Durmaz Incel, O. and Mullender, S.J. and Jansen, P.G. and Dulman, S.O. (2007) Measurements on the Efficiency of Overlapping Channels. In: Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks SECON 2007, 18-21 June 2007, San Diego, USA. pp. 689-690. IEEE Computer Society. ISBN 1-4244-1268-4
Durr, P.E.A. and Bergmans, L.M.J. and Akşit, M. (2007) Initial Results for Quantifying AOP. Technical Report TR-CTIT-07-71, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Durr, P.E.A. and Bergmans, L.M.J. and Akşit, M. (2007) Reasoning about Behavioral Conflicts between Aspects. Technical Report TR-CTIT-07-15, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Durr, P.E.A. and Bergmans, L.M.J. and Akşit, M. (2007) Detecting behavioral conflicts among crosscutting concerns. In: Ideals: evolvability of software-intensive high-tech systems. Embedded Systems Institute ESI, Eindhoven, pp. 55-67. ISBN 978-90-78679-03-5
Durr, P.E.A. and Bergmans, L.M.J. and Akşit, M. (2007) Static and Dynamic Detection of Behavioral Conflicts Between Aspects. In: Proceedings of the Seventh International Workshop on Runtime Verification, Vancouver, Canada. pp. 38-50. Lecture Notes in Computer Science 4839. Springer Verlag. ISBN 978-3-540-77394-8
Edelkamp, S. and Rensink, A. (2007) Graph Transformation and AI Planning. In: Knowledge Engineering Competition (ICKEPS), 22 Sep 2007, Rhode Island, USA. Australian National University. ISBN not assigned
Etalle, S. and den Hartog, J.I. and Marsh, S. (2007) Trust and Punishment. (Invited) In: Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, Autonomics, Rome, Italy. 5:1-5:6. nstitute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST). ISBN 978-963-9799-09-7
Etalle, S. and Massacci, F. and Yautsiukhin, A. (2007) The Meaning of Logs. In: Fourth Int. Conf. on Trust, Privacy and Security in Digital Business, TRUSTBUS 2007, 4-6 September 2007, Germany. pp. 145-154. Lecture Notes in Computer Science 4657. Springer Verlag. ISBN 978-3-540-74408-5
Etalle, S. and Massacci, F. and Yautsiukhin, A. (2007) The Meaning of Logs. Technical Report TR-CTIT-07-24, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Etalle, S. and Samarati, P. (2007) Preface of special issue of the proceedings of theSecond International Workshop on Security and Trust Management (STM 2006). In: Proceedings of the Second International Workshop on Security and Trust Management, 20 Sep 2006, Hamburg, Germany. pp. 1-2. Electronic Notes in Theoretical Computer Science 179. Elsevier. ISSN 1571-0661
Etalle, S. and Winsborough, W.H. (2007) A Posteriori Compliance Control. In: 12th ACM Symposium on Access Control Models and Technologies (SACMAT), 20-22 June 2007, Nice, France. pp. 11-20. ACM Press. ISBN 978-1-59593-745-2
Fehnker, A. and van Hoesel, L.F.W. and Mader, A.H. (2007) Modelling and Verification of the LMAC Protocol for Wireless Sensor Networks. Technical Report TR-CTIT-07-09, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Fehnker, A. and van Hoesel, L.F.W. and Mader, A.H. (2007) Modelling and Verification of the LMAC Protocol for Wireless Sensor Networks. In: Proceedings of the 6th International Conference on Integrated Formal Methods, IFM 2007, 2-5 Jul 2007, Oxford, Britain. pp. 253-272. Lecture Notes in Computer Science 4591. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-73209-9
Galvao Lourenco da Silva, I. and Göknil, A. (2007) Survey of Traceability Approaches in Model-Driven Engineering. In: Proceedings of the Eleventh IEEE International EDOC Enterprise Computing Conference, 15-19 Oct 2007, Annapolis, MD, USA. pp. 313-324. IEEE Computer Society. ISSN 1541-7719 ISBN 978-0-7695-2891-5
Güleşir, G. and Bergmans, L.M.J. and Akşit, M. (2007) Designing and Documenting the Behavior of Software. In: Ideals: evolvability of software-intensive high-tech systems. Embedded Systems Institute ESI, Eindhoven, pp. 113-126. ISBN 978-90-78679-03-5
Han, Tingting and Katoen, J.P. (2007) Counterexamples in probabilistic model checking. In: Proceedings of the 13th International Conference on Tools and Algorithms for Construction and Analysis of Systems, 24 Mar - 01 Apr 2007, Braga, Portugal. pp. 72-86. Lecture Notes in Computer Science 4424. Springer Verlag. ISBN 978-3-540-71208-4
Han, Tingting and Katoen, J.P. (2007) Providing evidence of likely being on time - Counterexample generation for CTMC model checking. In: Providing evidence of likely being on time: Counterexample generation for CTMC model checking, 22-25 Oct 2007, Tokyo, Japan. pp. 331-346. Lecture Notes in Computer Science 4762. Springer. ISBN 978-3-540-75595-1
Hartel, P.H. and Abelmann, L. (2007) Towards compliant data retention with probe storage on patterned media. Technical Report TR-CTIT-07-49, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hartel, P.H. and Vree, W.G. (2007) Lambda Calculus for Engineers. In: Reflections on Type Theory, Lambda Calculus, and the Mind: Essays Dedicated to Henk Barendregt on the Occasion of his 60th Birthday. Radboud University, Nijmegen, pp. 125-138. ISBN 978-90-9022446-6
Havinga, P.J.M. and Kauw-A-Tjoe, R.G. and Marin-Perianu, M. and Thalen, J.P. (2007) SensorShoe: Mobile Gait Analysis for Parkinson's Disease Patients. Technical Report TR-CTIT-07-63, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Havinga, W.K. and Bergmans, L.M.J. and Akşit, M. (2007) Prototyping and Composing Aspect Languages: using an Aspect Interpreter Framework. Technical Report TR-CTIT-07-74, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Havinga, W.K. and Nagy, I. and Bergmans, L.M.J. and Akşit, M. (2007) A Graph-based Approach to Modeling and Detecting Composition Conflicts Related to Introductions. In: Proceedings of International Conference on Aspect Oriented Software Development, AOSD 2007, March 2007, Vancouver, Canada. pp. 85-95. ACM International Conference Proceedings Series. ACM Press. ISBN 1-59593-615-7
de Jong, E.K. and Hartel, P.H. (2007) Method and apparatus for deployment of high integrity software using static procedure return addresses. Patent US 7,181,737 (Assigned).
Jonker, W. and Brinkman, R. and Maubach, S. (2007) Secure storage system and method for secure storing. Patent WO2007125454 (Application).
Kardas, G. and Göknil, A. and Dikenelli, O. and Topaloglu, N.Y. (2007) Model Transformation for Model Driven Development of Semantic Web Enabled Multi-Agent Systems. In: Fifth German Conference on Multiagent System Technologies, MATES 2007, 24-26 Sep 2007, Leipzig, Germany. pp. 13-24. Lecture Notes in Computer Science 4687/2007. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-74948-6
Kardas, G. and Göknil, A. and Dikenelli, O. and Topaloglu, N.Y. (2007) Modeling the Interaction Between Semantic Agents and Semantic Web Services Using MDA Approach. In: Seventh Annual International Workshop on Engineering Societies in the Agents World, ESAW 2006, 06-08 Sep 2006, Dublin, Ireland. pp. 209-228. Lecture Notes in Computer Science 4457. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-75522-7
Katoen, J.P. and Kemna, T. and Zapreev, I.S. and Jansen, D.N. (2007) Bisimulation minimisation mostly speeds up probabilistic model checking. In: Tools and algorithms for the construction and analysis of systems, 24 Mar-1 Apr 2007, Braga, Portugal. pp. 87-101. Lecture notes in computer science 4424. Springer. ISBN 978-3-540-71208-4
Kattenbelt, M. and Ruys, T.C. and Rensink, A. (2007) An Object-Oriented Framework for Explicit-State Model Checking. In: Proceedings of the 3rd European Symposium on Verification and Validation of Software Systems (VVSS 2007), 23 March 2007, Eindhoven, The Netherlands. pp. 84-92. TUE Computer Science Reports (07-04). Computer Science Department, Eindhoven University of Technology (TUE). ISSN 0926-4515
Kauw-A-Tjoe, R.G. and Thalen, J.P. and Marin-Perianu, M. and Havinga, P.J.M. (2007) SensorShoe: Mobile Gait Analysis for Parkinson's Disease Patients. In: UbiComp 2007 Workshop Proceedings, 16 Sept 2007, Innsbruck, Austria. pp. 187-191. University of Innsbruck. ISBN 978-3-00-022599-4
Kavaldjiev, N.K. (2007) A run-time reconfigurable Network-on-Chip for streaming DSP applications. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 06-91 ISBN 90-365-2410-5
Khatib, M.G. and van der Zwaag, B.J. and Hartel, P.H. and Smit, G.J.M. (2007) Interposing Flash between Disk and DRAM to Save Energy for Streaming Workloads. Technical Report TR-CTIT-07-43, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Khatib, M.G. and van der Zwaag, B.J. and Hartel, P.H. and Smit, G.J.M. (2007) Interposing Flash between Disk and DRAM to Save Energy for Streaming Workloads. In: Proceedings of the 2007 IEE/ACM/IFIP Workshop on Embedded Systems for Real-Time Multimedia (ESTImedia), 4-5 Oct 2007, Salzburg, Austria. pp. 7-12. IEEE. ISBN 978-1-4244-1654-7
Khusainov, D. and Langerak, R. and Kuzmych, O. (2007) Estimations of solutions convergence of hybrid systems consisting of linear equations with delay. Nonlinear dynamics and systems theory, 7 (2). pp. 169-186. ISSN 1562-8353
Kleppe, A.G. (2007) A Language Description is More than a Metamodel. In: Fourth International Workshop on Software Language Engineering, 1 Oct 2007, Nashville, USA. megaplanet.org. ISBN not assigned
Kleppe, A.G. (2007) Towards the Generation of a Text-Based IDE from a Language Metamodel. In: Model Driven Architecture - Foundations and Applications, 11-15 June 2007, Haifa, Israel. pp. 114-129. Lecture Notes in Computer Science 4350. Springer Verlag. ISSN 1611-3349 ISBN 978-3-540-72900-6
Koopman, P. and Hubbers, E.M.G.M. and Pieters, W. and Poll, E. and de Vries, R. (2007) Testing the eSTV program for the Scottish Local Government Elections. LaQuSo report not assigned, Radboud University Nijmegen, Nijmegen. ISSN not assigned
Krilavičius, T. (2007) Study of Tools Interoperability. Technical Report TR-CTIT-07-01, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Kuijper, M. and Polderman, J.W. (2007) Systems theoretic methods in decoding. In: Proceedings of the 28th Symposium on Information Theory in the Benelux, 24-25 May 2007, Enschede, The Netherlands. pp. 19-26. Werkgemeenschap voor Informatie- en Communicatietheorie. ISBN 978-90-365-2509-1
Kurtev, I. (2007) Metamodels: definitions of structures or ontological commitments? In: Workshop on Towers of Models, 25 Jun 2007, Zurich, Switzerland. pp. 53-63. University of York. ISSN not assigned
Kurtev, I. and van den Berg, K.G. and Jouault, F. (2007) Rule-based modularization in model transformation languages illustrated with ATL. Science of computer programming, 68 (3). pp. 111-127. ISSN 0167-6423 *** ISI Impact 0,828 ***
Kurtev, I. and Dee, M. and Göknil, A. and van den Berg, K.G. (2007) Traceability-based change management in operational mappings. In: ECMDA Traceability Workshop 2007, June 12 2007, Haifa, Israel. pp. 57-67. SINTEF. ISBN 978-82-14-04056-2
Law, Yee Wei and Doumen, J.M. and Palaniswami, M. (2007) Key Management Building Blocks for Wireless Sensor Networks. Technical Report TR-CTIT-07-48, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Lombriser, C. and Marin-Perianu, M. and Marin-Perianu, R.S. and Roggen, D. and Havinga, P.J.M. and Tröster, G. (2007) Organizing Context Information Processing in Dynamic Wireless Sensor Networks. In: Proceedings of the 2007 International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 3-6 Dec 2007, Melbourne, Australia. pp. 67-72. IEEE Computer Society. ISBN 1-4244-1502-0
Mader, A.H. and Wupper, H. and Boon, M. (2007) The Construction of Verification Models for Embedded Systems. Technical Report TR-CTIT-07-02, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marin-Perianu, M. and Havinga, P.J.M. (2007) D-FLER: A Distributed Fuzzy Logic Engine for Rule-based Wireless Sensor Networks. Technical Report TR-CTIT-07-54, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marin-Perianu, M. and Havinga, P.J.M. (2007) D-FLER - A Distributed Fuzzy Logic Engine for Rule-Based Wireless Sensor Networks. In: Ubiquitous Computing Systems. Springer Verlag, Germany, pp. 86-101. ISSN 0302-9743 ISBN 978-3-540-76771-8
Marin-Perianu, M. and Marin-Perianu, R.S. and Havinga, P.J.M. and Scholten, J. (2007) Online Movement Correlation of Wireless Sensor Nodes. In: Advances in Pervasive Computing - Adjunct Proceedings of Pervasive 2007, 13-16 May 2007, Toronto, Canada. pp. 79-82. Austrian Computer Society. ISBN 978-3-85403-219-9
Marin-Perianu, M. and Meratnia, N. and Havinga, P.J.M. and Moreira Sá de Souza, L. and Müller, J. and Spiess, P. and Haller, S. and Riedel, T. and Decker, C. and Stromberg, G. (2007) Decentralized Enterprise Systems: A Multi-platform Wireless Sensor Networks Approach. IEEE Wireless Communications, 14 (6). pp. 57-66. ISSN 1536-1284 *** ISI Impact 4,148 ***
Marin-Perianu, M. and Meratnia, N. and Havinga, P.J.M. and Moreira Sá de Souza, L. and Müller, J. and Spiess, P. and Haller, S. and Riedel, T. and Decker, C. and Stromberg, G. (2007) Decentralized Enterprise Systems: A Multi-platform Wireless Sensor Networks Approach. Technical Report TR-CTIT-07-31, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marin-Perianu, R.S. and Lombriser, C. and Havinga, P.J.M. and Scholten, J. and Tröster, G. (2007) Tandem: A Context-Aware Method for Spontaneous Clustering of Dynamic Wireless Sensor Nodes. Technical Report TR-CTIT-07-66, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marin-Perianu, R.S. and Marin-Perianu, M. and Havinga, P.J.M. and Scholten, J. (2007) Movement-based Group Awareness with Wireless Sensor Networks. In: 5th International Conference on Pervasive Computing (Pervasive), 13-16 May 2007, Toronto, Canada. pp. 298-315. Lecture Notes in Computer Science 4480. Springer Verlag. ISBN 978-3-540-72036-2
Marin-Perianu, R.S. and Marin-Perianu, M. and Havinga, P.J.M. and Scholten, J. (2007) Movement-based Group Awareness with Wireless Sensor Networks. Technical Report TR-CTIT-07-06, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. (2007) Demo Abstract: Service Oriented Wireless Sensor Networks - A Cluster-based Approach. In: 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON '07, 18-21 June 2007, San Diego, California. pp. 698-699. IEEE Computer Society. ISBN 1-4244-1268-4
Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. (2007) Prototyping Service Discovery and Usage in Wireless Sensor Networks. In: 32nd IEEE Conference on Local Computer Networks (LCN 2007), 15-18 Oct 2007, Dublin, Ireland. pp. 841-850. IEEE Computer Society. ISBN 0-7695-3000-1
Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. and Hartel, P.H. (2007) Cluster-based service discovery for heterogeneous wireless sensor networks. Technical Report TR-CTIT-07-05, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marincic, J. and Mader, A.H. and Wieringa, R.J. (2007) Capturing Assumptions while Designing a Verification Model for Embedded Systems. Technical Report TR-CTIT-07-03, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marincic, J. and Wupper, H. and Mader, A.H. and Wieringa, R.J. (2007) Obtaining Formal Models through Non-Monotonic Refinement. Technical Report TR-CTIT-07-33, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Nagy, I. and van Engelen, R. and van der Ploeg, D. (2007) An overview of Mirjam and WeaveC. In: Ideals: evolvability of software-intensive high-tech systems. Embedded Systems Institute ESI, Eindhoven, pp. 69-86. ISBN 978-90-78679-03-5
Neuhausser, M. and Katoen, J.P. (2007) Bisimulation and Logical Preservation for Continuous-Time Markov Decision Processes. In: 18th International Conference on Concurrency Theory (CONCUR), 03-08 Sep 2007, Lisbon, Portugal. pp. 412-427. Lecture Notes in Computer Science 4703. Springer Verlag. ISBN 978-3-540-74406-1
Noppen, J.A.R. (2007) Imperfect Information in Software Design Processes. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 07-99 ISBN 978-90-365-2511-4
Noppen, J.A.R. and van den Broek, P.M. and Akşit, M. (2007) Imperfect Requirements in Software Development. In: Requirements Engineering: Foundation for Software Quality, 11-12 Jun 2007, Trondheim, Norway. pp. 247-261. Lecture Notes in computer Science (4542). Springer Verlag. ISBN 978-3-540-73030-9
Pieters, W. and van Haren, R. (2007) Temptations of turnout and modernisation: e-voting discourses in the UK and the Netherlands. Journal of Information, Communication and Ethics in Society, 5 (4). pp. 276-292. ISSN 1477-996X
Pieters, W. and van Haren, R. (2007) E-voting discourses in the UK and the Netherlands. Technical Report ICIS-R07020, Radboud University Nijmegen, Nijmegen. ISSN 1571-5221
Pieters, W. and Jonker, H.L. (2007) Vote buying revisited: implications for receipt-freeness. In: Proceedings of the 2nd Benelux Workshop on Information and System Security (WISSec 2007), 20-21 Sep 2007, Luxembourg city, Luxembourg. University of Luxembourg. ISSN not assigned
Rensink, A. (2007) Isomorphism Checking in GROOVE. In: Graph-Based Tools (GraBaTs), 21-22 Sep 2006, Natal, Brazil. Electronic Communications of the EASST 1. European Association of Software Science and Technology. ISSN 1863-2122
Rensink, A. and Heckel, R. and König, B. (2007) Graph Transformation for Concurrency and Verification - Preface. In: Proceedings of the Workshop on Graph Transformation for Concurrency and Verification (GT-VC), 31 Aug 2006, Bonn, Germany. pp. 1-2. Electronic Notes in Theoretical Computer Science 175. Elsevier. ISSN 1571-0661
Rensink, A. and Vogler, W. (2007) Fair Testing. Information and computation, 205 (2). pp. 125-198. ISSN 0890-5401 *** ISI Impact 0,873 ***
Romijn, J.M.T. and Smith, G. and van de Pol, J.C. (2007) Preface. In: Proceedings of the Doctoral Symposium affiliated with the Fifth Integrated Formal Methods Conference, 29 Nov 2005, Eindhoven, The Netherlands. pp. 1-2. Electronic Notes in Theoretical Computer Science 191. Elsevier. ISSN 1571-0661
Ruys, T.C. and Aan de Brugh, N.H.M. (2007) MMC: the Mono Model Checker. In: Proceedings of the Second Workshop on Bytecode Semantics, Verification, Analysis and Transformation (Bytecode 2007), 31 March 2007, Braga, Portugal. pp. 149-160. Electronic Notes in Theoretical Computer Science 190 (1). Elsevier. ISSN 1571-0661
Sözer, H. and Hofmann, C. and Tekinerdogan, B. and Akşit, M. (2007) Detecting Mode Inconsistencies in Component-Based Embedded Software. In: DSN Workshop on Architecting Dependable Systems, 27 June 2007, Edinburgh, United Kingdom. pp. 154-160. University of Kent, Canterbury, United Kingdom. ISBN not assigned
Sözer, H. and Tekinerdogan, B. and Akşit, M. (2007) Extending Failure Modes and Effects Analysis Approach for Reliability Analysis at the Software Architecture Design Level. In: Architecting Dependable Systems IV. Lecture Notes in Computer Science 4615. Springer Verlag, Berlin, pp. 409-433. ISBN 978-3-540-74033-9
Su, X. and Bolzoni, D. and van Eck, P.A.T. (2007) Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services. In: Proceedings of the The International Conference on Emerging Security Information, Systems, and Technologies (SECURWARE '07), October 14-20, 2007, Valencia, Spain. pp. 107-114. IEEE Computer Society. ISBN 0-7695-2989-5
Su, X. and Bolzoni, D. and van Eck, P.A.T. (2007) Specifying Information Security Needs for the Delivery of High Quality Security Services. In: 2nd IEEE/IFIP International Workshop on Business-Driven IT Management, BDIM '07, 21-23 May 2007, Munich, Germany. pp. 112-113. IEEE Computer Society. ISBN 1-4244-1295-1
Sundramoorthy, V. and Hartel, P.H. and Scholten, J. (2007) A Taxonomy of Self-configuring Service Discovery Systems. Technical Report TR-CTIT-07-88, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tekinerdogan, B. and Akşit, M. and Henninger, F. (2007) Impact of Evolution of Concerns in the Model-Driven Architecture Design Approach. In: Proceedings of the Aspect-Based and Model-Based Separation of Concerns in Software Systems, 10 Jul 2006, Bilbao, Spain. pp. 45-64. Electronic Notes in Theoretical Computer Science 163 (2). Elsevier. ISSN 1571-0661
Tekinerdogan, B. and Hofmann, C. and Akşit, M. (2007) Modeling traceability of concerns in architectural views. In: Proceedings of the 10th international workshop on Aspect-oriented modeling, 13 March 2007, Vancouver. pp. 49-56. ACM Press. ISBN 978-1-59593-658-5
Tekinerdogan, B. and Hofmann, C. and Akşit, M. (2007) Modeling Traceability of Concerns for Synchronizing Architectural Views. Journal of Object Technology, 6 (7). pp. 7-25. ISSN 1660-1769
Tekinerdogan, B. and Hofmann, C. and Akşit, M. and Bakker, J. (2007) Metamodel for Tracing Concerns across the Life Cycle. In: Early Aspects: Current Challenges and Future Directions: 10th international workshop, March 2007, Vancouver, Canada. pp. 175-194. Lecture Notes in Computer Science 4765. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-76810-4
Valero Espada, M. and van de Pol, J.C. (2007) An abstract interpretation toolkit for μCRL. Formal methods in system design, 30 (3). pp. 249-273. ISSN 0925-9856 *** ISI Impact 1,132 ***
Weber, Michael (2007) An Embeddable Virtual Machine for State Space Generation. In: Proceedings of the 14th International SPIN Workshop, 1-3 Jul 2007, Berlin, Germany. pp. 168-186. Lecture Notes in Computer Science 2595. Springer Verlag. ISBN 978-3-540-73369-0
Zambon, Emmanuele and Bolzoni, D. and Etalle, S. and Salvato, M. (2007) A model supporting Business Continuity auditing & planning in Information Systems. In: Second International Conference on Internet Monitoring and Protection (ICIMP), 1-5 Jul 2007, San Jose, CA, USA. pp. 33-33. IEEE Computer Society. ISBN 0-7695-2911-9
Zambon, Emmanuele and Bolzoni, D. and Etalle, S. and Salvato, M. (2007) Model-Based Mitigation of Availability Risks. Technical Report TR-CTIT-07-04, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Zambon, Emmanuele and Bolzoni, D. and Etalle, S. and Salvato, M. (2007) Model-Based Mitigation of Availability Risks. In: Second IEEE/IFIP International Workshop on Business-Driven IT Management, 21 May 2007, Munich, Germany. pp. 75-83. IEEE Computer Society. ISBN 1-4244-1295-1
Zhang, Lijun and Hermanns, H. and Eisenbrand, F. and Jansen, D.N. (2007) Flow faster: efficient decision algorithms for probabilistic simulations. In: Tools and algorithms for the construction and analysis of systems, 24 Mar-1 Apr 2007, Braga, Portugal. pp. 155-169. Lecture notes in computer science 4424. Springer. ISBN 978-3-540-71208-4
van der Zwaag, B.J. and Khatib, M.G. and Hartel, P.H. (2007) How migrating 0.0001% of address space saves 12% of energy in hybrid storage. Technical Report A4TR-2007.1, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Zych, A.K. and Petkovic, M. and Jonker, W. (2007) The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers. In: 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, July 8-11, 2007, Redondo Beach, CA, USA. pp. 95-97. Springer. ISBN 978-3-540-73533-5
Zych, A.K. and Petkovic, M. and Jonker, W. (2007) A Key Management Method for Cryptographically Enforced Access Control. In: 5th International Workshop on Security in Information Systems (WoSIS), Funchal, Madeira. pp. 9-22. INSTICC Press. ISBN 978-972-8865-96-2

2006

Baier, C. and Hermanns, H., ed. (2006) CONCUR 2006 [Concurrency Theory, 16th International Conference]. Lecture Notes in Computer Science 4137. Springer Verlag, Berlin. ISBN 3-540-37376-4
Etalle, S. and Truszczynski, M., ed. (2006) Logic Programming, 22nd International Conference, ICLP 2006, Seattle, WA, USA, August 17-20, 2006. Proceedings. Lecture Notes in Computer Science 4079. Springer-Verlag, New York. ISBN 3-540-36635-0
Havinga, P.J.M. and Lijding, M.E.M. and Meratnia, N. and Wegdam, M., ed. (2006) Smart Sensing and Contex, First European Conference, EuroSSC 2006. Lecture Notes in Computer Science 4272. Springer Verlag, Heidelberg. ISBN 978-3-540-47842-3
Hermanns, H. and Palsberg, J., ed. (2006) Tools and Algorithms for the Construction and Analysis of Systems. Lecture Notes in Computer Science 3920. Springer Verlag. ISSN 0302-9743 ISBN 3-540-33056-9
Rashid, A. and Akşit, M., ed. (2006) Transactions on Aspect-Oriented Software Development I. Lecture Notes in Computer Science 3880. Springer Verlag, Berlin, pp. 5-6. ISSN 0302-9743 ISBN 3-540-32972-2
Rashid, A. and Akşit, M., ed. (2006) Transactions on Aspect-Oriented Software Development II. Lecture Notes in Computer Science 4242. Springer Verlag, Berlin, pp. 5-6. ISSN 0302-9743
Rensink, A. and Warmer, J., ed. (2006) Model Driven Architecture - Foundations and Applications. Lecture Notes in Computer Science 4066. Springer-Verlag, Berlin. ISBN 3-540-35909-5
Tekinerdogan, B. and Kalipsiz, O. and Cetin, S. and Dogru, A., ed. (2006) Conference Proceedings of the First Turkish Software Architecture Conference. Yildiz Teknik University Press, Istanbul. ISBN 975-461-418-0
Abadi, M. and Corin, R.J. and Fournet, C. (2006) Computational Secrecy by Typing for the Pi Calculus. In: The Fourth ASIAN Symposium on Programming Languages and Systems (APLAS 2006), 8 Nov - 10 Nov 2006, Sydney, Australia. pp. 253-269. Lecture Notes in Computer Science 4279. Springer Verlag. ISBN 3-540-48937-1
Akşit, M. and Elrad, T. (2006) Editorial: Experiences with Auto-adaptive and Reconfigurable Systems (Application Level Adaptation). Software: Practice and Experience, 36 (12). pp. 1227-1229. ISSN 0038-0644 *** ISI Impact 0,652 ***
Akşit, M. and Elrad, T. (2006) Experiences with Auto-adaptive and Reconfigurable Systems (System Level Adaptation). Software: Practice and Experience, 36 (11). pp. 1113-1114. ISSN 0038-0644 *** ISI Impact 0,652 ***
Asveld, P.R.J. (2006) Generating All Circular Shifts by Context-Free Grammars in Chomsky Normal Form. Journal of Automata, Languages and Combinatorics, 11 (2). pp. 147-159. ISSN 1430-189X
Asveld, P.R.J. (2006) Generating all permutations by context-free grammars in Chomsky normal form. Theoretical computer science, 354 (1). pp. 118-130. ISSN 0304-3975 *** ISI Impact 0,643 ***
Asveld, P.R.J. (2006) Review of "A. Meduna & M. Svec, Grammars with Context Conditions and Their Applications (2005), J. Wiley, Hoboken, NJ". Mathematical reviews, MR2138790 / 2006a:68001. pp. 557-558. ISSN 0025-5629
Asveld, P.R.J. (2006) Review of "K. Ellul, B. Krawetz, J. Shallit & M.-w. Wang, Regular expressions -- new results and open problems, J. Autom. Lang. Combin 9 (2004) 233-256". Mathematical reviews, MR2167781 / 2006e:68082. pp. 3990-3990. ISSN 0025-5629
Asveld, P.R.J. (2006) Review of "T. Ceccherini-Silberstein; On the growth of linear languages, Adv. in Appl. Math. 35 (2005) 243-253". Mathematical reviews, MR2164918 / 2006e:68080. pp. 3990-3990. ISSN 0025-5629
Asveld, P.R.J. (2006) Review of "G. Lischke, Restorations of punctured languages and similarity of Languages, MLQ Math. Log. Q. 52 (2006) 20-28". Mathematical reviews, MR2194998 / 2006j:68065. pp. 8308-8308. ISSN 0025-5629
Asveld, P.R.J. (2006) Review of "J. Czyzowicz; W. Fraczak; A. Pelc; Transducers with set output. J. Autom. Lang. Comb. 10 (2005), no. 1, 37–49". Mathematical reviews, MR2192583 / 2006i:68062. pp. 7439-7439. ISSN 0025-5629
Baier, C. and Hermanns, H. and Katoen, J.P. and Wolf, V. (2006) Bisimulation and Simulation Relations for Markov Chains. In: Essays on Algebraic Process Calculi, August 2005, Bertinoro, Italy. pp. 73-78. Electronic Notes in Theoretical Computer Science 162. Elsevier. ISSN 1571-0661
Baniassad, E. and Clements, P. and Araujo, J. and Moreira, A.M. and Rashid, A. and Tekinerdogan, B. (2006) Discovering Early Aspects. IEEE Software, 23 (1). pp. 61-70. ISSN 0740-7459 *** ISI Impact 0,820 ***
Böde, E. and Herbstritt, M. and Hermanns, H. and Johr, S. and Peikenkamp, T. and Pulungan, R. and Wimmer, R. and Becker, B. (2006) Compositional Performability Evaluation for STATEMATE. In: 3rd International Conference on Quantitative Evaluation of Systems, QEST 2006, 11-14 Sep 2006, Riverside, USA. pp. 167-176. IEEE Computer Society. ISBN 0-7695-2665-9
Belinfante, A.F.E. (2006) Experiments towards model-based testing using Plan 9: Labelled transition file systems, stacking file systems, on-the-fly coverage measuring. In: Proceedings of the First International Workshop on Plan 9, 4-5 Dec 2006, Madrid, Spain. pp. 53-64. Universidad Rey Juan Carlos. ISBN 84-690-2787-5
Berendsen, J. and Jansen, D.N. and Katoen, J.P. (2006) Probably on time and within budget: on reachability in priced probabilistic timed automata. Technical Report TR-CTIT-06-26, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Berendsen, J. and Jansen, D.N. and Katoen, J.P. (2006) Probably on time and within budget - On reachability in priced probabilistic timed automata. In: Quantitative Evaluation of Systems (QEST), Riverside, US. pp. 311-322. IEEE Computer Society. ISBN 0-7695-2665-9
Bijlsma, T. and Jansen, P.G. (2006) Energy Conservation with EDFI scheduling. In: First European Conference, EuroSSC 2006, 25-27 Oct 2006, Enschede. pp. 259-261. Lecture Notes in Computer Science 4274. Springer Verlag. ISBN 3-540-47842-6
Bockisch, C.M. and Arnold, M. and Dinkelaker, T. and Mezini, M. (2006) Adapting Virtual Machine Techniques for Seamless Aspect Support. In: Proceedings of the 21st Annual ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA 2006), 22-26 Oct 2006, Portland, Oregon, USA. pp. 109-124. ACM. ISBN 1-59593-348-4
Bockisch, C.M. and Haupt, M. and Mezini, M. (2006) Dynamic Virtual Join Point Dispatch. In: Proceedings of the Workshop on Software Engineering Properties of Languages and Aspect Technologies (SPLAT 2006), 21 Mar 2006, Bonn, Germany. 4. Darmstadt University of Technology. ISBN not assigned
Bockisch, C.M. and Kanthak, S. and Haupt, M. and Arnold, M. and Mezini, M. (2006) Efficient Control Flow Quantification. In: Proceedings of the 21st Annual ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA 2006), 22-26 Oct 2006, Portland, Oregon, USA. pp. 125-138. ACM. ISBN 1-59593-348-4
Bohnenkamp, H.C. and D'Argenio, P.R. and Hermanns, H. and Katoen, J.P. (2006) MoDeST: A compositional modeling formalism for real-time and stochastic systems. IEEE Transactions on Software Engineering, 32 (10). pp. 812-830. ISSN 0098-5589 *** ISI Impact 1,516 ***
Bolzoni, D. and Etalle, S. (2006) APHRODITE: an Anomaly-based Architecture for False Positive Reduction. Technical Report TR-CTIT-06-13, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolzoni, D. and Zambon, Emmanuele and Etalle, S. and Hartel, P.H. (2006) Poseidon: a 2-tier Anomaly-based Network Intrusion Detection System. In: 4th IEEE Int. Information Assurance Workshop (IWIA2006), 13-14 Apr 2006, London, UK. pp. 144-156. IEEE Computer Society. ISBN 0 7695 2564 4
Bosch, H.G.P. and Mullender, S.J. (2006) Band switching for coherent beam forming in full-duplex wireless communication. Patent US20050243748 (Application).
Bosch, H.G.P. and Mullender, S.J. and Narlikar, G.J. (2006) Method of performing a layer operation in a communications network. Patent EP1864474 (Application).
Bosch, H.G.P. and Mullender, S.J. and Narlikar, G.J. (2006) Method of transferring data packets in a communications network. Patent EP1864421 (Application).
Bosch, H.G.P. and Mullender, S.J. and Narlikar, G.J. and Samuel, L.G. and Yagati, L.N. (2006) Integrated base stations and a method of transmitting data units in a communications system for mobile devices. Patent US20060171364 (Application).
Brandán Briones, L. and Brinksma, H. and Stoelinga, M.I.A. (2006) A Semantic Framework for Test Coverage. In: Automated Technology for Verification and Analysis, 23-26 Oct 2006. pp. 399-414. Lecture Notes in Computer Science 4218. Springer Verlag. ISBN 978-3-540-47237-7
Brandán Briones, L. and Brinksma, H. and Stoelinga, M.I.A. (2006) A Semantic Framework for Test Coverage. Technical Report TR-CTIT-06-24, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bravetti, M. and Hermanns, H. and Katoen, J.P. (2006) YMCA: Why Markov Chain Algebra? In: Essays on Algebraic Process Calculi, August 2005, Bertinoro, Italy. pp. 107-112. Electronic Notes in Theoretical Computer Science 162. Elsevier. ISSN 1571-0661
van den Broek, P.M. and Noppen, J.A.R. (2006) Fuzzy Weighted Average: Alternative Approach. In: NAFIPS06 2006 Conference of the North American Fuzzy Information Processing Society, 3-6 Jun 2006, Montreal, Canada. pp. 126-130. IEEE Computer Society. ISBN 0-7803-9188-8
van den Broek, P.M. and Noppen, J.A.R. (2006) Rankings from Fuzzy Pairwise Comparisons. In: CIMCA05, the 2005 International Conference on Computational Intelligence for Modelling, Control & Automation, 28-30 Nov 2005, Vienna, Austria. pp. 188-190. IEEE Computer Society. ISBN 978-0-7695-2504-4
Buhan, I.R. and Bazen, A.M. and Hartel, P.H. and Veldhuis, R.N.J. (2006) A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems (Poster Paper). In: 2nd Int. Conf. on Biometrics (ICB), Hong Kong, China. pp. 728-736. Lecture Notes in Computer Science 3832. Springer-Verlag. ISBN 3-540-31111-4
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2006) Feeling is Believing: a location limited channel based on grip pattern biometrics and cryptanalysis. Technical Report TR-CTIT-06-29, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2006) Fuzzy extractors for continuous distributions. Technical Report TR-CTIT-06-72, University of Twente, Enschede. ISSN 1381-3625
Bujorianu, L.M. and Blom, H.A.P. and Hermanns, H. (2006) Functional Abstraction of Stochastic Hybrid Systems. In: 2nd IFAC Conf. on Analysis and Design of Hybrid Systems, ADHS 2006, 7-9 June 2006, Alghero, Italy. pp. 160-165. Elsevier. ISBN 978-0-08-044613-4
Bujorianu, L.M. and Bujorianu, M.C. (2006) Model Checking for a Class of Performance Properties of Fluid Stochastic Models. In: Third European Performance Engineering Workshop (EPEW), June 21-22, 2006, Budapest, Hungary. pp. 93-107. Lecture Notes in Computer Science 4054. Springer Verlag. ISBN 3-540-35362-3
Bujorianu, L.M. and Lygeros, J. (2006) Toward a General Theory of Stochastic Hybrid Systems. In: Stochastic Hybrid Systems: Theory and Safety Critical Applications. Lecture Notes in Control and Information Sciences 337. Springer Verlag, Berlin, pp. 3-30. ISBN 978-3-540-33466-8
Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. and Lenzini, G. (2006) The Audit Logic: Policy Compliance in Distributed Systems. Technical Report TR-CTIT-06-33, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Cederquist, J.G. and Torabi Dashti, M. (2006) An intruder model for verifying liveness in security protocols. In: FMSE '06: Proceedings of the fourth ACM workshop on Formal methods in security, Alexandria, Virginia, USA. pp. 23-32. ACM. ISBN 1-59593-550-9
Chatterjea, S. and van Hoesel, L.F.W. and Havinga, P.J.M. (2006) A Framework for a Distributed and Adaptive Query Processing Engine for Wireless Sensor Networks. Transactions of the Society of Instrument and Control Engineers, E-S-1 (1). pp. 58-67. ISSN 0453-4654
Chatterjea, S. and di Luigi, S. and Havinga, P.J.M. (2006) DirQ: A Directed Query Dissemination Scheme for Wireless Sensor Networks. In: IASTED International Conference on Wireless Sensor Networks 2006, WSN 2006, 3-4 July 2006, Banff, Canada. Wireless and Optical Communication. ACTA Press. ISBN 0-88986-563-9
Chatterjea, S. and Luigi, S.d. and Havinga, P.J.M. (2006) An Adaptive Directed Query Dissemination Scheme for Wireless Sensor Networks. In: 9th IEEE International Conference on Parallel Processing Workshops 2006, ICPPW 2006, 14 Aug 2006, Columbus, USA. pp. 181-188. International Conference on Parallel Processing Workshop. IEEE Computer Society. ISBN 0-7695-2637-3
Chatterjee, K. and de Alfaro, L. and Faella, M. and Henzinger, T.A. and Majumdar, R. and Stoelinga, M.I.A. (2006) Quantitative Compositional Reasoning. In: Third International Conference on the Quantitative Evaluation of Systems (QEST'06), 11-14 Sep 2006, Riverside, California. pp. 179-189. IEEE Computer Society. ISBN 0769526659
Cheung, L. and Stoelinga, M.I.A. and Vaandrager, F.W. (2006) A Testing Scenario for Probabilistic Processes. Technical Report ICIS-R06002, Radboud University Nijmegen, Nijmegen.
Chong, Chuen Ngen and Corin, R.J. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Law, Yee Wei and Tokmakoff, A. (2006) LicenseScript: A Logical Language for Digital Rights Management. Annals of telecommunications special issue on Network and Information systems security, 61 (3-4). pp. 284-331. ISSN 0003-4347 *** ISI Impact 0,722 ***
Conejero, J.M. and van den Berg, K.G. and Hernández, J. (2006) Disentangling Crosscutting in AOSD: Formalization based on a Crosscutting Pattern. In: XI Jornados de Ingeniería del Software y Bases de Datos, 3-6 Octobre 2006, Barcelona, Spain. pp. 325-334. Centro Internacional de Métodos Numéricos en Ingeniería. ISBN 84-95999-99-4
Corin, R.J. (2006) Analysis Models for Security Protocols. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 05-76 ISBN 90-365-2279-X
Corin, R.J. and Galindo, D. and Hoepman, J.H. (2006) Securing data accountability in decentralized systems. In: Proceedings of 1st International Workshop on Information Security, IS'06, 30 Oct - 3 Nov 2006, Montpellier, France. pp. 626-635. Lecture Notes in Computer Science 4277. Springer. ISBN 978-3-540-48269-7
Corin, R.J. and den Hartog, J.I. (2006) A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs. In: ICALP 2006 track C, 9-13 Jul 2006, Venice, Italy. pp. 252-263. Lecture Notes in Computer Science 4052. Springer-Verlag. ISBN 3-540-35907-9
Corin, R.J. and Saptawijaya, A. and Etalle, S. (2006) A Logic for Constraint-based Security Protocol Analysis. In: IEEE Symposium on Security and Privacy, 21-25 May 2006, Oakland, US. pp. 155-168. IEEE Computer Society. ISBN 0-7695-2574-1
Daws, C.F. and Kordy, P.T. (2006) Symbolic Robustness Analysis of Timed Automata. In: Formal Modeling and Analysis of Timed Systems, 25-27 September 2006, Paris,France. pp. 143-155. Lecture Notes in Computer Science 4202. Springer Verlag. ISBN 978-3-540-45026-9
De Nicola, R. and Katoen, J.P. and Latella, D. and Massink, M. (2006) Towards a logic for performance and mobility. In: 3rd Workshop on Quantitative Aspects of Programming Languages, 2-3 Apr 2005, Edinburgh, Scotland. pp. 161-175. Electronic Notes in Theoretical Computer Science 153 (2). Elsevier. ISSN 1571-0661
Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2006) Extended Privilege Inheritance in RBAC. Technical Report TR-CTIT-06-62, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2006) Extended Privilege Inheritance in RBAC. Technical Report TR-CTIT-07-36, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Etalle, S. (2006) Audit-Based Access Control for Electronic Health Records. Technical Report TR-CTIT-06-49, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Etalle, S. (2006) Audit-Based Access Control for Electronic Health Records. In: Proceedings of the Second International Workshop on Views on Designing Complex Architectures (VODCA), 16-17 Sept 2006, Bertinoro, Italy. pp. 221-236. Elsevier Electronic Notes in Theoretical Computer Science 168. Elsevier. ISSN 1571-0661
Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. (2006) Privacy in an Ambient World. Technical Report TR-CTIT-06-16, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Veugen, P.J.M. and Etalle, S. (2006) Audit-based Access Control in de Zorg. Informatiebeveiliging, 8. pp. 19-23. ISSN 1569-1063
Delzanno, G. and Etalle, S. and Gabbrielli, M. (2006) Introduction to the Special Issue on Specification Analysis and Verification of Reactive Systems. Theory and Practice of Logic Programming, 6 (3). pp. 225-226. ISSN 1471-0684 *** ISI Impact 0,952 ***
van Dijk, H.W. and Scholten, J. and Tobalina, A. and García Muñoz, V. and Milanini, S. and Kung, A. (2006) Open home networks: the TEAHA approach. Technical Report TR-CTIT-06-67, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Distefano, D.S. and Katoen, J.P. and Rensink, A. (2006) Safety and Liveness in Concurrent Pointer Programs. (Invited) In: Proceedings of the 4th Internatinal Symposium on Formal Methods for Components and Objects, November 1-4, 2005, Amsterdam, The Netherlands. pp. 280-312. Lecture Notes in Computer Science 4111. Springer Verlag. ISBN 978-3-540-36749-9
Durmaz Incel, O. and Dulman, S.O. and Jansen, P.G. (2006) Multi-channel Support for Dense Wireless Sensor Networking. In: Proceedings of the First European Conference on Smart Sensing and Context, EuroSSC 2006, 25-27 Oct 2006, Enschede, the Netherlands. pp. 1-14. Lecture Notes in Computer Science 4272. Springer. ISBN 978-3-540-47842-3
Durmaz Incel, O. and Dulman, S.O. and Jansen, P.G. and Mullender, S.J. (2006) Multi-Channel Interference Measurements for Wireless Sensor Networks. Technical Report TR-CTIT-06-53, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Durr, P.E.A. and Bergmans, L.M.J. and Akşit, M. (2006) Reasoning about Semantic Conflicts between Aspects. In: Proceedings of the First Aspect, Dependencies, and Interactions Workshop, 3 Jul 2006. pp. 10-18. Lancaster University. ISBN not assigned
Fokkinga, M.M. (2006) Z-style notation for Probabilities. In: Proceedings of the 2nd Twente Data Management Workshop (TDM'06) on Uncertainty in Databases, 6 June 2006, Enschede. pp. 19-24. CTIT Workshop Proceedings Series (WP-CTIT-06-01). Centre for Telematics and Information Technology University of Twente. ISSN 1574-0846
Fokkinga, M.M. (2006) Ignorance in the Relational Model. In: Proceedings of the 2nd Twente Data Management Workshop (TDM'06) on Uncertainty in Databases, 06 June 2006, Enschede. pp. 33-40. CTIT Workshop Proceedings Series (WP-CTIT-06-01). Centre for Telematics and Information Technology University of Twente. ISSN 1381-3625
Göknil, A. and Topaloglu, N.Y. (2006) Composing Transformation Operations Based on Complex Source Pattern Definitions. Technical Report TR-CTIT-06-80, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Güleşir, G. and Bergmans, L.M.J. and Akşit, M. (2006) Evolvable Integration of Activities with Statecharts. In: 3rd European Workshop on Aspects in Software, 31 Aug 2006, Enschede, the Netherlands. University of Bonn. ISBN not assigned
van de Griendt, W.E. and Ruys, T.C. (2006) New Approach and Tools for Comparative Institutional Analysis of Legal Regimes Used for Integrated Resources Management. In: Survival of the Commons: Mounting Challenges and New Realities, the 11th Conference of the IASCP, 19-23 June 2006, Bali, Indonesia. International Association for the Study of Common Property (IASCP). ISBN not assigned
Habel, A. and Pennemann, K.-H. and Rensink, A. (2006) Weakest Preconditions for High-Level Programs. Berichte aus dem Department für Informatik 8/06, University of Oldenburg, Oldenburg. ISSN 0946-2910
Habel, A. and Pennemann, K.-H. and Rensink, A. (2006) Weakest Preconditions for High-Level Programs. In: Graph Transformations (ICGT), 19-21 Sep 2006, Natal, Brazil. pp. 445-460. Lecture Notes in Computer Science 4178. Springer Verlag. ISBN 3-540-38870-2
Hafkamp, W.H.M. (2006) IT Security Vulnerability and Incident Response Management. In: Int. Conf. on Securing Electronic Business Processes -- ISSE 2006, 10-12 Oct. 2006, Rome, Italy. pp. 387-395. Vieweg. ISBN 978-3-8348-0213-2
Hanssen, F.T.Y. and Mader, A.H. and Jansen, P.G. (2006) Verifying the distributed real-time network protocol RTnet using Uppaal. Technical Report TR-CTIT-06-19, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hanssen, F.T.Y. and Mader, A.H. and Jansen, P.G. (2006) Verifying the distributed real-time network protocol RTnet using Uppaal. In: Proceedings of the 14th IEEE/ACN International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), 11-13 Sept 2006, Monterey, USA. pp. 239-246. IEEE Computer Society. ISSN 1526-7539 ISBN 0 7695 2573 3
Havinga, W.K. and Nagy, I. and Bergmans, L.M.J. (2006) An Analysis of Aspect Composition Problems. In: Proceedings of the Third European Workshop on Aspects in Software, 2006, August, 2006, Enschede, Netherlands. pp. 1-8. University of Bonn. ISSN 0944-8535
Havinga, W.K. and Nagy, I. and Bergmans, L.M.J. and Akşit, M. (2006) Detecting and resolving ambiguities caused by inter-dependent introductions. In: AOSD '06: Proceedings of the 5th international conference on Aspect-oriented software development, March 2006, Bonn, Germany. pp. 214-225. ACM Press. ISBN 1-59593-300-X
Havinga, W.K. and Staijen, T. and Rensink, A. and Bergmans, L.M.J. and van den Berg, K.G. (2006) An Abstract Metamodel for Aspect Languages. Technical Report TR-CTIT-06-22, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Havinga, W.K. and Staijen, T. and Rensink, A. and Bergmans, L.M.J. and van den Berg, K.G. (2006) An Abstract Metamodel for Aspect Languages. In: Open and Dynamic Aspect Languages, 20 Mar 2006, Bonn, Germany. 9. Aspect-Oriented Software Association. ISBN not assigned
Hermann, F. and Kastenberg, H. and Modica, T. (2006) Towards Translating Graph Transformation Approaches by Model Transformations. In: Proceedings of the Second International Workshop on Graph and Model Transformation, 8 September 2006, Brighton, United Kingdom. Electronic Communications of the EASST 4. European Association of Software Science and Technology. ISSN 1863-2122
Jones, V.M. and van Halteren, A.T. and Dokovski, N.T. and Koprinkov, G.T. and Peuscher, J. and Bults, R.G.A. and Konstantas, D. and Widya, I.A. and Herzog, R. (2006) Mobihealth: mobile services for health professionals. In: M-Health Emerging Mobile Health Systems. Springer-Verlag, Berlin, pp. 237-246. ISBN 0-387-26558-9
Jones, V.M. and van Halteren, A.T. and Widya, I.A. and Dokovski, N.T. and Koprinkov, G.T. and Bults, R.G.A. and Konstantas, D. and Herzog, R. (2006) MobiHealth: Mobile Health Services based on Body Area Networks. In: M-Health Emerging Mobile Health Systems. Springer-Verlag, Berlin, pp. 219-236. ISBN 0-387-26558-9
Jonker, H.L. and Pieters, W. (2006) Receipt-freeness as a special case of anonymity in epistemic logic. In: Proceedings of the IAVoSS Workshop On Trustworthy Elections (WOTE 2006), 29-30 Jun 2006, Cambridge, UK. Robinson College. ISBN not assigned
Kardas, G. and Göknil, A. and Dikenelli, O. and Topaloglu, N.Y. (2006) Metamodeling of Semantic Web Enabled Multiagent Systems. In: Multiagent Systems and Software Architecture, the Special Track at Net.ObjectDays, 18-21 Sep 2006, Erfurt, Germany. pp. 79-86. Katholieke Universiteit Leuven. ISBN 90-5682-737-5
Kastenberg, H. (2006) Towards Attributed Graphs in Groove. In: Proceedings of the Workshop on Graph Transformation for Verification and Concurrency (GT-VC 2005), 22 Aug 2005, San Francisco, California, USA. pp. 47-54. Electronic Notes in Theoretical Computer Science 154. Elsevier. ISSN 1571-0661
Kastenberg, H. and Kleppe, A.G. and Rensink, A. (2006) Engineering Object-Oriented Semantics Using Graph Transformations. Technical Report TR-CTIT-06-12, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Kastenberg, H. and Kleppe, A.G. and Rensink, A. (2006) Defining Object-Oriented Execution Semantics Using Graph Transformations. In: Proceedings of the 8th IFIP International Conference on Formal Methods for Open-Object Based Distributed Systems, 14-16 June 2006, Bologna, Italy. pp. 186-201. Lecture Notes in Computer Science 4037. Springer Verlag. ISBN 978-3-540-34893-1
Kastenberg, H. and Rensink, A. (2006) Model Checking Dynamic States in GROOVE. In: Model Checking Software (SPIN), 30 Mar - 1 Apr 2006, Vienna, Austria. pp. 299-305. Lecture Notes in Computer Science 3925. Springer-Verlag. ISBN 3-540-33102-6
Katoen, J.P. (2006) Stochastic model checking. In: Stochastic Hybrid Systems. Automation and Control Engineering Series 24. CRC Press, pp. 77-104. ISBN 0-849-39083-4
Katoen, J.P. (2006) Constraint-oriented specification of performance aspects. In: Architectural Design of Open Distributed Systems: From Interface to Telematics (Liber Amicorum dedicated to Chris Vissers). Telematica Instituut, Enschede, pp. 47-54. ISBN 90-75176-41-4
Katoen, J.P. and Zapreev, I.S. (2006) Safe on-the-fly steady-state detection for time-bounded reachability. In: Quantitative Evaluation of Systems (QEST), Riverside, US. pp. 301-310. IEEE Computer Society. ISBN 0-7695-2665-9
Kavaldjiev, N.K. and Smit, G.J.M. and Jansen, P.G. and Wolkotte, P.T. (2006) A Virtual Channel Network-on-Chip for GT and BE traffic. In: IEEE Computer Society Annual Symposium on Emerging VLSI Technologies and Architectures (ISVLSI'06), 2-3 March 2006, Karlsruhe, Germany. pp. 211-216. IEEE Computer Society. ISBN 0769525334
Kavaldjiev, N.K. and Smit, G.J.M. and Wolkotte, P.T. and Jansen, P.G. (2006) Providing QoS Guarantees in a NoC by Virtual Channel Reservation. In: International Workshop on Applied Reconfigurable Computing (ARC 2006), 1-3 March 2006, Delft, the Netherlands. pp. 299-310. Lecture Notes in Computer Science 3985. Springer-Verlag. ISBN 354036708X
Khatib, M.G. and van der Zwaag, B.J. and van Viegen, F.C. and Smit, G.J.M. (2006) Striping Policy as a Design Parameter for MEMS-based Storage Systems. In: The 2nd International Workshop on Software Support for Portable Storage, 26 Oct 2006, Seoul, Korea. Informal proceedings. ISBN not assigned
Kleppe, A.G. (2006) MCC: A Model Transformation Environment. In: Model Driven Architecture - Foundations and Applications: Second European Conference, ECMDA-FA 2006, Proceedings, 10 Jul - 13 Jul 2006, Bilboa, Spain. pp. 173-187. Lecture Notes in Computer Science 4066. Springer Verlag. ISBN 978-3-540-35909-8
Krilavičius, T. (2006) Hybrid Techniques for Hybrid Systems. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 06-90 ISBN 90-365-2397-4
Kurban, M.E. and Niebert, P. and Qu, H. and Vogler, W. (2006) Stronger reduction criteria for Local First Search. In: Proceedings of the Third International Colloquium on Theoretical Aspects of Computing, 20-24 Nov 2006, Tunis, Tunisia. pp. 108-122. Lecture Notes in Computer Science 4281/2006. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-48815-6
Kurtev, I. and van den Berg, K.G. and Jouault, F. (2006) Evaluation of Rule-based Modularization in Model Transformation Languages illustrated with ATL. In: 21st Annual ACM Symposium on Applied Computing (SAC2006), 23-27 Apr 2006, Bourgogne University, Dijon, France. pp. 1202-1209. ACM. ISBN 1-59593-108-2
Laarman, A.W. (2006) Improving a Modular Verification Technique for Aspect Oriented Programming. In: 5th Twente Student Conference on Information Technology, 26 Jun 2006, Enschede, The Netherlands. pp. 37-40. Twente Student Conference on IT 5. Twente University Press. ISSN 1574-0293
Langerak, R. and Kuzmych, O. (2006) Estimations of solutions convergence of hybrid systems with delay. In: Conference on Differential and Difference Equations and Applications CDDEA 2006, June 26–30, 2006, Zilina, Slovensko. pp. 30-31. Faculty of Science, University of Zilina. ISBN 80-8070-563-1
Law, Yee Wei and Doumen, J.M. and Hartel, P.H. (2006) Survey and Benchmark of Block Ciphers for Wireless Sensor Networks. ACM Transactions on Sensor Networks, 2 (1). pp. 65-93. ISSN 1550-4859 *** ISI Impact 1,448 ***
Law, Yee Wei and Havinga, P.J.M. (2006) How to Secure a Wireless Sensor Network. Technical Report TR-CTIT-06-06, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Mader, A.H. and Bohnenkamp, H.C. and Usenko, Y.S. and Jansen, D.N. and Hurink, J.L. and Hermanns, H. (2006) Synthesis and Stochastic Assessment of Cost-Optimal Schedules. Technical Report TR-CTIT-06-14, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marin-Perianu, M. and Havinga, P.J.M. (2006) RMD: Reliable Multicast Data Dissemination within Groups of Collaborating Objects. In: First IEEE International Workshop on Practical Issues in Building Sensor Network Applications, SenseApp 2006, 14-16 Nov 2006, Tampa, Florida, USA. pp. 656-663. IEEE Computer Society. ISSN 0742-1303 ISBN 1-4244-0418-5
Marin-Perianu, M. and Hofmeijer, T.J. and Havinga, P.J.M. (2006) Implementing Business Logic on Sensor Nodes. Technical Report TR-CTIT-06-15, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marin-Perianu, M. and Hofmeijer, T.J. and Havinga, P.J.M. (2006) Assisting Business Processes through Wireless Sensor Networks. (Invited) In: 13th International Conference on Telecommunications (ICT 2006), 9-12 May 2006, Funchal, Madeira Island, Portugal. IEEE Portugal Section. ISBN 972-98368-4-1
Marin-Perianu, M. and Hofmeijer, T.J. and Havinga, P.J.M. (2006) Implementing Business Rules on Sensor Nodes. In: 11th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2006), 20-22 Sept 2006, Prague, Czech Republic. pp. 292-299. IEEE Computer Society. ISBN 1-4244-0681-1
Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. (2006) Distributed Service Discovery for Heterogeneous Wireless Sensor Networks. Technical Report TR-CTIT-06-42, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. and Hartel, P.H. (2006) Energy-Efficient Cluster-Based Service Discovery in Wireless Sensor Networks. Technical Report TR-CTIT-06-43, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. and Hartel, P.H. (2006) Performance Evaluation of a Cluster-Based Service Discovery Protocol for Heterogeneous Wireless Sensor Networks. Technical Report TR-CTIT-06-61, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. and Hartel, P.H. (2006) Energy-Efficient Cluster-Based Service Discovery in Wireless Sensor Networks. In: Sixth International Workshop on Wireless Local Networks, 14-16 Nov 2006, Tampa, Florida. pp. 931-938. IEEE Computer Society. ISBN 1-4244-0418-5
Muthukrishnan, K. and Koprinkov, G.T. and Meratnia, N. and Lijding, M.E.M. (2006) Using time-of-flight for WLAN localization: feasibility study. Technical Report TR-CTIT-06-28, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Muthukrishnan, K. and Meratnia, N. and Lijding, M.E.M. and Koprinkov, G.T. and Havinga, P.J.M. (2006) WLAN location sharing through a privacy observant architecture. In: 1st Int. Conf. on Communication System Software and Middleware (COMSWARE), Jan 8-12, 2006, New Delhi, India. pp. 1-10. IEEE Computer Society. ISBN 0-7803-9575-1