Ameller, D., Franch, X., Gómez, C., Araújo, J., Berntsson Svensson, R., Biffle, S., Cabot, J., Cortelessa, V.
, Daneva, M., Méndez Fernández, D., Moreira, A., Muccini, H., Vallecillo, A., Wimmer, M., Amaral, V., Brunelière, H., Burgueño, L., Goulão, M., Schätz, B., & Teufl, S. (2015).
Handling non-functional requirements in model-driven development: an ongoing industrial survey. In
23rd International Conference on Requirements Engineering (RE) (pp. 208-213). IEEE Computer Society.
https://doi.org/10.1109/RE.2015.7320424
Anish, P. R.
, Daneva, M., Cleland-Huang, J.
, Wieringa, R. J., & Ghaisas, S. (2015).
What you ask is what you get: Understanding architecturally significant functional requirements. In D. Zowghi, V. Gervasi, & D. Amyot (Eds.),
23rd IEEE Internatioanl Conference on Requirements Engineering (RE) (pp. 86-95). IEEE Computer Society.
https://doi.org/10.1109/RE.2015.7320411
Athanasiou, G., Amditis, A., Riviere, N.
, Makri, E., Makri, E., Bartzas, A., Anyfantis, A., Werner, R., Alexsson, D., di Girolamo, E., Etienne, N., Schaap, M.
, Kerle, N., Bozabalian, N., Marafioti, G., Berzosa, J., & Gustafsson, A. (2015).
INACHUS : Integrated wide area situation awarenesss and survivor localization in search and rescue operations. In
Book of abstracts of the 5th International Conference on Earth Observation for Global Changes (EOGC) and the 7th Geo-information Technologies for Natural Disaster Management (GiT4NDM) (pp. 1-1). United Nations Office for Outer Space Affairs.
Bakondi, B. G.
, Peter, A.
, Everts, M. H.
, Hartel, P. H.
, & Jonker, W. (2015).
Publicly Verifiable Private Aggregation of Time-Series Data. In
10th International Conference on Availability, Reliability and Security, ARES 2015 (pp. 50-59). IEEE.
https://doi.org/10.1109/ARES.2015.82
Caselli, M.
, Zambon, E.
, Petit, J.
, & Kargl, F. (2015).
Modeling message sequences for intrusion detection in industrial control systems. In M. Rice, & S. Shenoi (Eds.),
Critical Infrastructure Protection IX: 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers (pp. 49-71). (Critical Infrastructure Protection IX; Vol. 466). Springer.
https://doi.org/10.1007/978-3-319-26567-4
Ferreira, M. I. G. B.
, Moreira, J., Campos, M. L. M., Braga, B. F. B., Sales, T. P., de Cordeiro, K. F., & Borges, M. R. S. (2015).
OntoEmergePlan: variability of emergency plans supported by a domain ontology. In
12th International Conference on Information Systems for Crisis Response and Management (ISCRAM) (pp. 1-9). University of Agder.
http://eprints.eemcs.utwente.nl/secure2/26498/01/2-13.pdf
Förster, D., Löhr, H., Zibuschka, J.
, & Kargl, F. (2015).
REWIRE – Revocation without resolution: A privacy-friendly revocation mechanism for vehicular ad-hoc networks. In M. Conti, M. Schunter, & I. Askoxylakis (Eds.),
Trust and Trustworthy Computing: 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings (pp. 193-208). (Lecture Notes in Computer Science; Vol. 9229). Springer.
https://doi.org/10.1007/978-3-319-22846-4_12
Ionita, D.
, Wieringa, R. J.
, Bullee, J-W.
, & Vasenev, A. (2015).
Tangible Modelling to Elicit Domain Knowledge: An Experiment and Focus Group. In P. Johannesson, M. Li Lee, S. W. Liddle, A. L. Opdahl, & Ó. P. López (Eds.),
34th International Conference on Conceptual Modeling, ER 2015 (pp. 558-565). (Lecture Notes in Computer Science; Vol. 9381). Springer.
https://doi.org/10.1007/978-3-319-25264-3_42
Ionita, D.
, Wieringa, R. J., Wolos, L.
, Gordijn, J.
, & Pieters, W. (2015).
Using Value Models for Business Risk Analysis in e-Service Networks. In J. Ralyté, S. España, & O. Pastor (Eds.),
8th IFIP WG 8.1. Working Conference on the Practice of Enterprise Modelling, PoEM 2015 (pp. 239-253). (Lecture Notes in Business Information Processing; Vol. 235). Springer.
https://doi.org/10.1007/978-3-319-25897-3_16
Ivanova, M. G., Probst, C. W., Hansen, R. R., & Kammüller, F. (2015).
Transforming Graphical System Models To Graphical Attack Models. In S. Mauw, B. Kordy, & S. Jajodia (Eds.),
Graphical Models for Security: Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers (pp. 82-96). (Lecture notes in computer science; Vol. 9390). Springer.
https://doi.org/10.1007/978-3-319-29968-6_6
Kotzerke, J., Kotzerke, J., Davis, S. A., Hayes, R.
, Spreeuwers, L. J.
, Veldhuis, R. N. J., & Horadam, K. J. (2015).
Discriminating fingermarks with evidential value for forensic comparison. In
Proceedings of the 3rd International Workshop on Biometrics and Forensics, IWBF 2015 (pp. 1-6). IEEE.
https://doi.org/10.1109/IWBF.2015.7110220
Kotzerke, J.
, Kotzerke, J., Davis, S., Hayes, R.
, Spreeuwers, L. J.
, Veldhuis, R. N. J., & Horadam, K. J. (2015).
Identification Performance of Evidential Value Estimation for Fingermarks. In
Proceedings of the 2015 International Conference of the Biometrics Special Interest Group (BIOSIG) (pp. 1-6). (Lecture Notes in Informatics (LNI) - Proceedings; Vol. P-245). Gesellschaft für Informatik.
https://doi.org/10.1109/BIOSIG.2015.7314607
Moreira, J., Moreira, J.
, Ferreira Pires, L.
, van Sinderen, M. J.
, & Dockhorn Costa, P. (2015).
Developing situation-aware applications for disaster management with a distributed rule-based platform. In
Proceedings of the RuleML 2015 Challenge, Special Track on Rule-based Recommender Systems for the Web of Data, Special Industry Track, and RuleML 2015 Doctoral Consortium (pp. -). (CEUR Workshop Proceedings; Vol. 1417). CEUR.
http://ceur-ws.org/Vol-1417/paper15.pdf
Pieters, W., & Davarynejad, M. (2015).
Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers. In J. Garcia-Alfaro, J. Herrera-Joancomartí, E. Lupu, & J. Posegga (Eds.),
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers (pp. 201-215). (Lecture Notes in Computer Science; Vol. 8872). Springer.
https://doi.org/10.1007/978-3-319-17016-9_13
Wang, L.
, Ferreira Pires, L.
, Wombacher, A.
, van Sinderen, M. J., & Chi, C. (2015).
Robust interactions under system crashes and network failures of collaborative processes with arbitrary control flows. In
Seventh International Conference on Advanced Service Computing, Service Computation 2015 (pp. 27-34). IARIA.
http://eprints.eemcs.utwente.nl/secure2/26237/01/service_computation_2015_2_10_10023.pdf
Xia, C., Chi, C., Wong, R.
, Wombacher, A.
, Ferreira Pires, L.
, van Sinderen, M. J., & Ding, C. (2015).
Workflow-based service selection under multi-constraints. In
Twelfth IEEE International Conference on Services Computing, SCC 2015 (pp. 332-339). IEEE.
https://doi.org/10.1109/SCC.2015.53