Review Research 2021

Computer Science

SCS



Jump to: 2020 | 2019 | 2018 | 2017 | 2016 | 2015

2020

Article (contribution to journal)


Celebi, R., Moreira, J. R., Hassan, A. A., Ayyar, S., Ridder, L., Kuhn, T., & Dumontier, M. (2020). Towards FAIR protocols and workflows: the OpenPREDICT use case. PeerJ computer science, 6, [281]. https://doi.org/10.7717/peerj-cs.281

Chomsiri, T., He, X., Nanda, P. , & Tan, Z. (2020). Hybrid tree-rule firewall for high speed data transmission. IEEE transactions on cloud computing, 8(4), 1237-1249. https://doi.org/10.1109/TCC.2016.2554548

Kraaij, W., Verberne, S., Koldijk, S., de Korte, E., van Dantzig, S., Sappelli, M. , Shoaib, M. , Bosems, S. , Achterkamp, R., Bonomi, A., Schavemaker, J., Hulsebosch, B., Wabeke, T. , Vollenbroek-Hutten, M., Neerincx, M. , & Sinderen, M. V. (2020). Personalized support for well-being at work: an overview of the SWELL project. User modeling and user-adapted interaction, 30(3), 413–446. https://doi.org/10.1007/s11257-019-09238-3


Sales, L., Henning, P., Veiga, V., Murrieta Costa, M., Sayao, L. F. , Bonino da Silva Santos, L. O. , & Ferreira Pires, L. (2020). GO FAIR Brazil: A Challenge for Brazilian Data Science. Data Intelligence, 2(1-2), 238-245. https://doi.org/10.1162/dint_a_00046

Zahid, M., Inayat, I. , Daneva, M., & Mehmood, Z. (2020). A security risk mitigation framework for cyber physical systems. Journal of software: Evolution and Process, 32(2), [e2219]. https://doi.org/10.1002/smr.2219


Chapter


Henning, P. , & Moreira, J. L. R. (2020). Ciência aberta, dados abertos e princípios FAIR: uma contribuição dos Países Baixos. In M. Shintaku, L. Farias Sales, & M. Costa (Eds.), Tópicos sobre dados abertos para editores científicos (pp. 145-158). ABEC Brasil. https://doi.org/10.21452/978-85-93910-04-3.cap12

Conference contribution


Aldea, A. I., Vaicekauskaitė, E. , Daneva, M. , & Piest, J. P. S. (2020). Assessing Resilience in Enterprise Architecture: A Systematic Review. In 2020 IEEE 24th International Enterprise Distributed Object Computing Conference (EDOC) [9233153] IEEE. https://doi.org/10.1109/edoc49727.2020.00011

Ayub, M. A. , Continella, A., & Siraj, A. (2020). An I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme using Artificial Neural Network. In Proceedings - 2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science, IRI 2020 (pp. 319-324). [9191509] IEEE. https://doi.org/10.1109/IRI49571.2020.00053

Bortolameotti, R. , van Ede, T. S. , Continella, A. , Hupperich, T. M. , Everts, M. H., Rafati, R. , Jonker, W. , Hartel, P. , & Peter, A. (2020). HeadPrint: Detecting Anomalous Communications through Header-based APplication Fingerprinting. In 35th Annual ACM Symposium on Applied Computing, SAC 2020 (pp. 1696-1705). Association for Computing Machinery (ACM). https://doi.org/10.1145/3341105.3373862

Daneva, M., & Bolscher, R. (2020). What we know about software architecture styles in continuous delivery and devops? In M. van Sinderen, & L. A. Maciaszek (Eds.), Software Technologies: 14th International Conference, ICSOFT 2019, Prague, Czech Republic, July 26–28, 2019, Revised Selected Papers (pp. 26-39). (Communications in Computer and Information Science; Vol. 1250). Springer Singapore. https://doi.org/10.1007/978-3-030-52991-8_2

Esquivel Vargas, H. T., Caselli, M. , Laanstra, G. J. , & Peter, A. (2020). Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim’s Perspective. In Detection of Intrusions and Malware, and Vulnerability Assessmen: 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings (pp. 44-64). (Lecture Notes in Computer Science; Vol. 12223). https://doi.org/10.1007/978-3-030-52683-2_3

Fung, N. L. S. , van Sinderen, M. J. , Jones, V. M. , & Hermens, H. J. (2020). A Verified, Executable Formalism for Resilient and Pervasive Guideline-Based Decision Support for Patients. In M. Michalowski, & R. Moskovitch (Eds.), Artificial Intelligence in Medicine: 18th International Conference on Artificial Intelligence in Medicine, AIME 2020, Proceedings (pp. 427-439). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 12299 LNAI). Springer. https://doi.org/10.1007/978-3-030-59137-3_38

Gritti, F., Fontana, L., Gustafson, E., Pagani, F. , Continella, A., Kruegel, C., & Vigna, G. (2020). SYMBION: Interleaving Symbolic with Concrete Execution. In Proceedings of the 8th IEEE Conference on Communications and Network Security (CNS '20) [9162164] (2020 IEEE Conference on Communications and Network Security, CNS 2020). IEEE. https://doi.org/10.1109/CNS48642.2020.9162164

Hackenjos, T. , Hahn, F., & Kerschbaum, F. (2020). SAGMA: Secure Aggregation Grouped by Multiple Attributes. In D. Maier, R. Pottinger, A. Doan, W-C. Tan, A. Alawini, & H. Q. Ngo (Eds.), SIGMOD'20: Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data, June 2020 (pp. 587–601). ACM Publishing. https://doi.org/10.1145/3318464.3380569

Holz, R., Perino, D., Varvello, M., Amann, J. , Continella, A., Evans, N., Leontiadis, I., Natoli, C., & Scheitle, Q. (2020). A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web. In Proceedings of the Network Traffic Measurement and Analysis Conference (TMA) IEEE.

Jakubeit, P., Dercksen, A. , & Peter, A. (2020). SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing by Remote Entities. In M. Laurent, & T. Giannetsos (Eds.), Information Security Theory and Practice: 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings (pp. 202-219). (Lecture notes in computer science; Vol. 12024). Springer International Publishing AG. https://doi.org/10.1007/978-3-030-41702-4_13

Kaya, F., Berg, M. V. D. , Wieringa, R., & Makkes, M. (2020). The Banking Industry Underestimates Costs of Cloud Migrations. In S. Aier, J. Gordijn, H. A. Proper, & J. Verelst (Eds.), Proceedings - 2020 IEEE 22nd Conference on Business Informatics, CBI 2020 (pp. 300-309). [9140248] IEEE. https://doi.org/10.1109/CBI49978.2020.00039

Lathouwers, S. , Everts, M. , & Huisman, M. (2020). Verifying Sanitizer Correctness through Black-Box Learning: A Symbolic Finite Transducer Approach. In S. Furnell, P. Mori, E. Weippl, & O. Camp (Eds.), Proceedings of the 6th International Conference on Information Systems Security and Privacy: Volume 1: ForSE (pp. 784-795). SCITEPRESS Digital Library. https://doi.org/10.5220/0009371207840795

Schultes, E. , Magagna, B., Hettne, K. M., Pergl, R., Suchánek, M., & Kuhn, T. (2020). Reusable FAIR Implementation Profiles as Accelerators of FAIR Convergence. In G. Grossmann, & S. Ram (Eds.), Advances in Conceptual Modeling - ER 2020 Workshops CMAI, CMLS, CMOMM4FAIR, CoMoNoS, EmpER, 2020, Proceedings (pp. 138-147). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 12584 LNCS). Springer. https://doi.org/10.1007/978-3-030-65847-2_13

Wang, C., Tang, Y., Liang, P. , Daneva, M. , & van Sinderen, M. (2020). What industry wants from requirements engineers in China? An exploratory and comparative study on RE job ads. In ESEM '20: Proceedings of the 14th ACM / IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) [3410672] (International Symposium on Empirical Software Engineering and Measurement). ACM Press. https://doi.org/10.1145/3382494.3410672

Weller, M., Classen, J., Ullrich, F., Waßmann, D. , & Tews, E. (2020). Lost and found: Stopping bluetooth finders from leaking private information. In WiSec 2020 - Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (pp. 184-194). Association for Computing Machinery (ACM). https://doi.org/10.1145/3395351.3399422

van Ede, T. S. , Bortolameotti, R. , Continella, A., Ren, J., Dubois, D. J., Lindorfer, M., Choffnes, D. , van Steen, M. , & Peter, A. (2020). FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic. In Network and Distributed System Security Symposium (NDSS) (27 ed.). Internet Society. https://doi.org/10.14722/ndss.2020.24412

van Sinderen, M. J. , Engelsman, W. , Wieringa, R. J., Gordijn, J., & Haaker, T. (2020). Transforming e3value models into ArchiMate diagrams. In 2020 IEEE 24th International Enterprise Distributed Object Computing Conference (EDOC) (pp. 11-20). IEEE. https://doi.org/10.1109/EDOC49727.2020.00012

Paper


Legoy, V., Caselli, M. , Seifert, C. , & Peter, A. (2020). Automated Retrieval of ATT&CK Tactics and Techniques for Cyber Threat Reports. Paper presented at 1st Cyber Threat Intelligence Symposium, CTI 2020, . https://arxiv.org/abs/2004.14322

Redini, N., Machiry, A., Wang, R., Spensky, C. , Continella, A., Shoshitaishvili, Y., Kruegel, C., & Vigna, G. (2020). Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale. Paper presented at Black Hat Asia, Singapore.

Stanciu, V-D. , van Steen, M., Dobre, C. , & Peter, A. (Accepted/In press). k-Anonymous Crowd Flow Analytics. Paper presented at 17th EAI International Conference on Mobile and Ubiquitous Systems:
Computing, Networking and Services, . https://doi.org/10.1145/3448891.3448903

Working paper


Bastiaansen, H. J. M., Nieuwenhuis, C. H. M., Zomer, G. , Piest, J. P. S. , van Sinderen, M., Dalmolen, S., & Hofman, W. J. (2020). The logistics data sharing infrastructure: whitepaper August 2020. TKI Dinalog.

2019

Article (contribution to journal)





Ionita, D. , Wieringa, R., Gordijn, J., & Yesuf, A. S. (2019). Quantitative, Value-driven Risk Analysis of e-Services. Journal of Information Systems, 33(3), 45–60. https://doi.org/10.2308/isys-52150




Wagner, S., Mendez Fernandez, D., Felderer, M., Vetro, A., Kalinowski, M. , Wieringa, R. J., Pfahl, D., Conte, T., Christiansson, M-T., Greer, D., Lassenius, C., Mannisto, T., Nayebi, M., Oivo, M., Penzenstadler, B., Prikladnicki, R., Ruhe, G., Schekelmann, A., Sen, S., ... Winkler, D. (2019). Status Quo in Requirements Engineering: A Theory and a Global Family of Surveys. ACM Transactions on Software Engineering and Methodology, 28(2), [9]. https://doi.org/10.1145/3306607

Conference article


Bogachev, M. I., Pyko, N. S., Pyko, S. A. , Vasenev, A. N. , & Vasenev, A. N. (2019). Service delays in strongly linked network communities. Journal of physics: Conference series, 1352(1), [012006]. https://doi.org/10.1088/1742-6596/1352/1/012006

Conference contribution


Aldea, A. , Iacob, M-E. , Daneva, M., & Masyhur, L. H. (2019). Multi-criteria and model-based analysis for project selection: An integration of capability-based planning, project portfolio management and enterprise architecture. In 2019 IEEE 23rd International Enterprise Distributed Object Computing Workshop (EDOCW) (pp. 128-135). [8907326] (Proceedings IEEE International Enterprise Distributed Object Computing Workshop (EDOCW); Vol. 23). IEEE. https://doi.org/10.1109/EDOCW.2019.00032

Allah Bukhsh, Z. , van Sinderen, M. , Sikkel, K. , & Quartel, D. (2019). How to manage and model unstructured business processes: A proposed list of representational requirements. In M. S. Obaidat, & E. Cabello (Eds.), E-Business and Telecommunications: 14th International Joint Conference, ICETE 2017, Revised Selected Paper (pp. 81-103). (Communications in Computer and Information Science; Vol. 990). Springer. https://doi.org/10.1007/978-3-030-11039-0_5

Bode, M. (2019). Towards a formal description language for digital IT consulting products in decentralized IT consulting firms. In Proceedings 2019 IEEE 23rd International Enterprise Distributed Object Computing Workshop, EDOCW 2019 (pp. 168-173). [8907321] (IEEE International Enterprise Distributed Object Computing Conference workshops). IEEE. https://doi.org/10.1109/EDOCW.2019.00037

Bolscher, R. , & Daneva, M. (2019). Designing software architecture to support continuous delivery and DevOps: A systematic literature review. In M. van Sinderen, L. Maciaszek, & L. Maciaszek (Eds.), ICSOFT 2019 - Proceedings of the 14th International Conference on Software Technologies (pp. 27-39). SCITEPRESS.

Bortolameotti, R. , van Ede, T. S. , Everts, M. H. , Jonker, W. , Hartel, P. H. , Peter, A. , & Continella, A. (2019). Victim-Aware Adaptive Covert Channels. In S. Chen, K-K. R. Choo, X. Fu, W. Lou, & A. Mohaisen (Eds.), Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings: 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I (pp. 450-471). (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; Vol. 304 LNICST). https://doi.org/10.1007/978-3-030-37228-6_22

Chia, V. , Hartel, P. H., Hum, Q., Ma, S., Piliouras, G., Reijsbergen, D., Van Staalduinen, M., & Szalachowski, P. (2019). Rethinking Blockchain Security: Position Paper. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (pp. 1273-1280). IEEE. https://doi.org/10.1109/Cybermatics_2018.2018.00222

Daneva, M., Berry, D. , Condori-Fernandez, N., Dalpiaz, F., Herrmann, A., Horkoff, J., & Madhavji, N. (2019). Live studies at REFSQ 2019. In P. Spoletini, P. Mäder, D. M. Berry, F. Dalpiaz, & M. Daneva (Eds.), REFSQ-2019 Workshops, Doctoral Symposium, Live Studies Track, and Poster Track: Essen, Germany, March 18th, 2019 (CEUR Workshop Proceedings; Vol. 2376). CEUR. https://dblp1.uni-trier.de/pers/hd/d/Daneva:Maya

Daneva, M., Herrmann, A. , Condori-Fernandez, N. , & Wang, C. (2019). Understanding the most in-demand soft skills in requirements engineering practice: Insights from two focus groups. In Proceedings of EASE 2019 - Evaluation and Assessment in Software Engineering (pp. 284-290). Association for Computing Machinery (ACM). https://doi.org/10.1145/3319008.3319352

Engelsman, W. , Wieringa, R. J. , van Sinderen, M. J., Gordijn, J., & Haaker, T. (2019). Realizing Traceability from the Business Model to Enterprise Architecture. In G. Guizzardi, F. Gailly, & R. S. Pitangueira Maciel (Eds.), Advances in Conceptual Modeling - ER 2019 Workshops FAIR, MREBA, EmpER, MoBiD, OntoCom, and ER Doctoral Symposium Papers, Salvador, Brazil, November 4–7, 2019, Proceedings: ER 2019 Workshops FAIR, MREBA, EmpER, MoBiD, OntoCom, and ER Doctoral Symposium Papers, Salvador, Brazil, November 4–7, 2019, Proceedings (pp. 37-46). (Lecture Notes in Computer Science; Vol. 11787). Springer. https://doi.org/10.1007/978-3-030-34146-6_4

Esquivel-Vargas, H., Caselli, M. , Tews, E. , Bucur, D. , & Peter, A. (2019). BACRank: Ranking building automation and control system components by business continuity impact. In A. Romanovsky, E. Troubitsyna, & F. Bitsch (Eds.), Computer Safety, Reliability, and Security: 38th International Conference, SAFECOMP 2019, Proceedings (pp. 183-199). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11698 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-030-26601-1_13

Herrmann, A., Berry, D. M. , Daneva, M., & Groen, E. C. (2019). Eighth International Workshop on Creativity in Requirements Engineering (CreaRE 2019). In 2019 Joint of International Conference on Requirements Engineering: Foundation for Software Quality Workshops, Doctoral Symposium, Live Studies Track, and Poster Track, REFSQ-JP 2019 (CEUR workshop proceedings; Vol. 2376). CEUR. http://ceur-ws.org/Vol-2376/

Honig, J. J. , Everts, M. H. , & Huisman, M. (2019). Practical Mutation Testing for Smart Contracts. In C. Pérez-Solà, G. Navarro-Arribas, A. Biryukov, & J. García-Alfaro (Eds.), Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26-27, 2019, Proceedings (pp. 289-303). (Lecture Notes in Computer Science; Vol. 11737). Springer. https://doi.org/10.1007/978-3-030-31500-9_19

Ionita, D., van der Velden, C., Ikkink, H. J. K., Neven, E. , Daneva, M., & Kuipers, M. (2019). Towards risk-driven security requirements management in agile software development. In C. Cappiello, & M. Ruiz (Eds.), Information Systems Engineering in Responsible Information Systems: CAiSE Forum 2019, Rome, Italy, June 3–7, 2019, Proceedings (pp. 133-144). (Lecture Notes in Business Information Processing; Vol. 350). Springer. https://doi.org/10.1007/978-3-030-21297-1_12

Kegel, R. H. P. , van Sinderen, M. , & Wieringa, R. J. (2019). Towards More Individualized Interfaces: Automating the assessment of computer literacy. In S. Iyengar, P. Tikka, L. van Gemert-Pijnen, & H. Oinas-Kukkonen (Eds.), Behavior Change Support Systems, BCSS 2019: Proceedings of the Seventh International Workshop on Behavior Change Support Systems (CEUR Workshop proceedings; Vol. 2340). CEUR. http://ceur-ws.org/Vol-2340/06-BCSS2019_paper.pdf

Lau, E. T., Chai, K. K., Chen, Y. , & Vasenev, A. (2019). A Strategic Urban Grid Planning Tool to Improve the Resilience of Smart Grid Networks. In C. Klein, A. Pascoal, B. Donnellan, O. Gusikhin, & M. Helfert (Eds.), Smart Cities, Green Technologies, and Intelligent Transport Systems - 6th International Conference, SMARTGREENS 2017, and 3rd International Conference, VEHITS 2017, Revised Selected Papers (pp. 150-167). (Communications in Computer and Information Science; Vol. 921). Springer Verlag. https://doi.org/10.1007/978-3-030-02907-4_8

Moreira, J. , Ferreira Pires, L. , van Sinderen, M. , Wieringa, R. , Singh, P. , Dockhorn Costa, P., & Llop, M. (2019). Improving the Semantic Interoperability of IoT Early Warning Systems: The Port of Valencia Use Case. In K. Popplewell, K-D. Thoben, T. Knothe, & R. Poler (Eds.), Enterprise Interoperability VIII: Smart Services and Business Impact of Enterprise Interoperability (pp. 17-29). (Proceedings of the I-ESA Conferences; Vol. 9). Springer International Publishing AG. https://doi.org/10.1007/978-3-030-13693-2_2

Wang, C., Liang, P. , Daneva, M. , & van Sinderen, M. (2019). Augmenting app reviews with app changelogs: An approach for app reviews classification. In Proceedings - SEKE 2019: 31st International Conference on Software Engineering and Knowledge Engineering (pp. 398-403). (Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE; Vol. 2019, No. 31). Knowledge Systems Institute Graduate School. https://doi.org/10.18293/SEKE2019-176

Wieringa, R. J. , Engelsman, W., Gordijn, J. , & Ionita, D. (2019). A Business Ecosystem Architecture Modeling Framework. In 2019 IEEE 21st Conference on Business Informatics (CBI) IEEE. https://doi.org/10.1109/CBI.2019.00024

Wijnhoven, F., Kluitenberg, F. , & Daneva, M. (2019). Open Source Software Information Triangulation: A design science study. In 28th International Conference on Information Systems Development, ISD 2019

van de Kamp, T. R., Stritzl, D. , Jonker, W. , & Peter, A. (2019). Two-Client and Multi-client Functional Encryption for Set Intersection. In J. Jang-Jaccard, & F. Guo (Eds.), Information security and privacy: 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings (pp. 97-115). (Lecture Notes in Computer Science; Vol. 11547). Springer International Publishing AG. https://doi.org/10.1007/978-3-030-21548-4_6

Paper


Iacob, M. E., Charismadiptya, G. , van Sinderen, M. J. , & Piest, J. P. S. (2019). An architecture for Situation-aware Smart Logistics. Paper presented at 10th SOEA4EE Workshop, Paris, France.

Review article


Seckiner, D., Mallett, X., Maynard, P. , Meuwly, D., & Roux, C. (2019). Forensic gait analysis — Morphometric assessment from surveillance footage. Forensic science international, 296, 57-66. https://doi.org/10.1016/j.forsciint.2019.01.007


2018

Article (contribution to journal)



Bullee, J-W. , Montoya, L. , Junger, M. , & Hartel, P. H. (2018). Physical location of smart key activators: A building security penetration test. Journal of corporate real estate, 20(2), 138-151. https://doi.org/10.1108/JCRE-05-2017-0014


Ceccarelli, A., Zoppi, T. , Vasenev, A., Mori, M. , Ionita, D. , Montoya, L., & Bondavalli, A. (2018). Threat Analysis in Systems-of-Systems: An Emergence-Oriented Approach. ACM Transactions on Cyber-Physical Systems, 3(2), [18]. https://doi.org/10.1145/3234513

Rajbdad, F., Aslam, M., Azmat, S. , Ali, T., & Khattak, S. (2018). Automated Fiducial Points Detection Using Human Body Segmentation. Arabian Journal for Science and Engineering, 43(2), 509-524. https://doi.org/10.1007/s13369-017-2646-4

de Jong, M. D. T., Harkink, K. M. , & Barth, S. (2018). Making Green Stuff? Effects of Corporate Greenwashing on Consumers. Journal of business and technical communication, 32(1), 77-112. https://doi.org/10.1177/1050651917729863

Chapter


Barbosa, C. M., Lima Gomes, R., Goncalves Pereira Filho, J. , & Moreira, J. L. (2018). RS4IoT: a Recommender System for IoT. In Enterprise Interoperability: Smart Services and Business Impact of Enterprise Interoperability (pp. 225 - 231). Wiley.

Bosdriesz, Y. , van Sinderen, M. , Iacob, M., & Verkroost, P. (2018). A Building Information Model-centered Big Data Platform to Support Digital Transformation in the Construction Industry. In M. Zelm, F-W. Jaekel, G. Doumeingts, & M. Wollschlaeger (Eds.), Enterprise Interoperability: Smart Services and Business Impact of Enterprise Interoperability (pp. 209-215). Wiley. https://doi.org/10.1002/9781119564034.ch26

Daneva, M., Marczak, S., Knauss, E., & Madhavji, N. (2018). Welcome from the Workshop Chairs. In 2018 IEEE 7th International Workshop on Empirical Requirements Engineering (EmpiRE) (7 ed., pp. VI-VII). IEEE. https://doi.org/10.1109/EmpiRE.2018.00005

Hartel, P. H. , & Junger, M. (2018). Computer Science. In R. Wortley, A. Sidebottom, N. Tilley, & G. Laycock (Eds.), Routledge Handbook of Crime Science: Every new technology brings new opportunity for crime, and information and communication technology (ICT) is no exception. This short article offers students of crime insights in the two main connections between ICT and criminology. On the one hand we show how ICT can be used as a tool, target, or location of crime. On the other hand we show how ICT can be used as a tool to study crime. (1 ed., pp. 179-189). Routledge. https://doi.org/10.4324/9780203431405

Moreira, J. L. , Ferreira Pires, L. , & van Sinderen, M. J. (2018). Semantic Interoperability for the IoT: Analysis of JSON for Linked Data. In M. Zelm, F-W. Jaekel, G. Doumeingts, & M. Wollschlaeger (Eds.), Enterprise Interoperability: Smart Services and Business Impact of Enterprise Interoperability (pp. 163-169). (Systems and Industrial Engineering Series). Wiley.

Moreira, J. L. , Ferreira Pires, L., Dockhorn Costa, P. , & van Sinderen, M. J. (2018). Semantic Interoperability of Early Warning Systems: a Systematic Literature Review. In Enterprise Interoperability: Smart Services and Business Impact of Enterprise Interoperability (pp. 407 - 413). Wiley.

Singh, P. M. , van Sinderen, M. , & Wieringa, R. (2018). SmTIP: A Big Data Intergration Platform for Synchromodal Transport. In M. Zelm, F-W. Jaekel, G. Doumeingts, & M. Wollschlaeger (Eds.), Enterprise Interoperability: Smart Services and Business Impact of Enterprise Interoperability (pp. 187-192). Wiley.

van Sinderen, M., & Gusmeroli, S. (2018). Summary: Industrial Big Data Platforms Enabling Enterprise Interoperability for Smart Services. In M. Zelm, F-W. Jaekel, G. Doumeingts, & M. Wollschlaeger (Eds.), Enterprise Interoperability: Smart Services and Business Impact of Enterprise Interoperability (pp. 159-161). (Systems and Industrial Engineering Series). Wiley.

Conference article


De Laat, M. , & Daneva, M. (2018). Empirical validation of a software requirements specification checklist. CEUR workshop proceedings, 2075.

Conference contribution


Aldea, A., Kusumaningrum, M. C. , Iacob, M. , & Daneva, M. (2018). Modeling and Analyzing Digital Business Ecosystems: An Approach and Evaluation. In M. Brichni, C. Huemer, H. A. Proper, D. Rozier, S. Guerreiro, W. Guedria, I. Razo-Zapata, M. M. Komarov, S. Strecker, C. Feltus, & S. V. Maltseva (Eds.), 2018 IEEE 20th Conference on Business Informatics (CBI) (pp. 156-163). (IEEE Conference on Business Informatics (CBI); Vol. 2018). IEEE. https://doi.org/10.1109/CBI.2018.10064

Alsaqaf, W. , Daneva, M. , & Wieringa, R. (2018). Understanding challenging situations in agile quality requirements engineering and their solution strategies: Insights from a case study. In G. Ruhe, W. Maalej, & D. Amyot (Eds.), Proceedings - 2018 IEEE 26th International Requirements Engineering Conference, RE 2018 (pp. 274-285). [8491142] IEEE. https://doi.org/10.1109/RE.2018.00035

Alsaqaf, W. , Daneva, M. , & Wieringa, R. J. (2018). Quality requirements challenges in the context of large-scale distributed agile: An empirical study. In E. Kamsties, J. Horkoff, & F. Dalpiaz (Eds.), Requirements Engineering: Foundation for Software Quality - 24th International Working Conference, REFSQ 2018, Utrecht, The Netherlands, March 19-22, 2018. Proceedings (pp. 139-154). (Lecture Notes in Computer Science; Vol. 10753). Springer. https://doi.org/10.1007/978-3-319-77243-1_9

Berkel, A. R. R. , Singh, P. M. , & van Sinderen, M. J. (2018). An information security architecture for smart cities. In B. Shishkov (Ed.), Business Modeling and Software Design: 8th International Symposium, BMSD 2018, Vienna, Austria, July 2-4, 2018, Proceedings (pp. 167 - 184). (Lecture Notes in Business Information Processing; Vol. 319). Springer. https://doi.org/10.1007/978-3-319-94214-8_11

Bukhsh, F. A., De Alencar Silva, P. , & Wienen, H. (2018). Data pre-processing: Case of sensor data consistency based on Bi-temporal concepts. In 2017 13th International Conference on Emerging Technologies (ICET) (pp. 1-6). IEEE. https://doi.org/10.1109/ICET.2017.8281746

Daneva, M. (2018). Using crowdsourced data for empirical research in information systems: What it is and how to do it safe? In 2018 12th International Conference on Research Challenges in Information Science, RCIS 2018 (Proceedings International Conference on Research Challenges in Information Science (RCIS); Vol. 2018). IEEE Computer Society. https://doi.org/10.1109/RCIS.2018.8406646

Daneva, M., & Lazarov, B. (2018). Requirements for smart cities: Results from a systematic review of literature. In 2018 12th International Conference on Research Challenges in Information Science, RCIS 2018 (Proceedings International Conference on Research Challenges in Information Science (RCIS); Vol. 2018). IEEE Computer Society. https://doi.org/10.1109/RCIS.2018.8406655

Daneva, M. , & Wang, C. (2018). Security requirements engineering in the agile era: How does it work in practice? In X. Franch, A. Jedlitschka, D. M. Fernandez, & M. Oivo (Eds.), 2018 IEEE 1st International Workshop on Quality Requirements in Agile Projects (QuaRAP) (pp. 10-13). [8501269] IEEE. https://doi.org/10.1109/QuaRAP.2018.00008

Daneva, M. , Sikkel, K. , Condori-Fernandez, N., & Herrmann, A. (2018). Experiences in using practitioner's checklists to evaluate the industrial relevance of requirements engineering experiments. In Proceedings 2018 ACM/IEEE 6th International Workshop on Conducting Empirical Studies in Industry, CESI 2018 (pp. 5-12). IEEE. https://doi.org/10.1145/3193965.3193966

Daneva, M. , Wang, C., Herrmann, A. , & Condori-Fernandez, N. (2018). Understanding the soft skills that industry wants from requirements engineers: A focus group study. In K. Schmid (Ed.), REFSQ-JP 2018: REFSQ 2018 Joint Proceedings of the Co-Located Events (CEUR workshop proceedings; Vol. 2075). CEUR. http://ceur-ws.org/Vol-2075/LS_paper1.pdf

Franck, T. , Iacob, M. E. , van Sinderen, M. , & Wombacher, A. (2018). Towards an integrated architecture model of smart manufacturing enterprises. In B. Shishkov (Ed.), Business Modeling and Software Design: 7th International Symposium, BMSD 2017, Revised Selected Papers (pp. 112-133). (Lecture Notes in Business Information Processing; Vol. 309). Springer Verlag. https://doi.org/10.1007/978-3-319-78428-1_6

Iacob, M. E., Monteban, J. , Van Sinderen, M., Hegeman, E., & Bitaraf, K. (2018). Measuring Enterprise Architecture Complexity. In 2018 IEEE 22nd International Enterprise Distributed Object Computing Conference Workshops, EDOCW 2018 (pp. 115-124). [8536112] IEEE. https://doi.org/10.1109/EDOCW.2018.00026

Ionita, D., Ford, M. , Vasenev, A. , & Wieringa, R. J. (2018). Graphical Modeling of Security Arguments: Current State and Future Directions. In P. Liu, S. Mauw, & K. Stolen (Eds.), Graphical Models for Security: 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers (pp. 1 - 16). (Lecture Notes in Computer Science; Vol. 10744). Springer. https://doi.org/10.1007/978-3-319-74860-3_1

Kopp, H. , Kargl, F., Bösch, C. , & Peter, A. (2018). uMine: A Blockchain Based on Human Miners. In Information and Communications Security: 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings (pp. 20-38). Springer. https://doi.org/10.1007/978-3-030-01950-1_2

Moreira, J. , Ferreira Pires, L. , van Sinderen, M., & Daniele, L. (2018). SAREF4health: IoT Standard-Based Ontology-Driven Healthcare Systems. In S. Borgo, P. Hitzler, & O. Kutz (Eds.), Formal Ontology in Information Systems: Proceedings of the 10th International Conference (FOIS 2018) (Vol. 309, pp. 239-252). (Frontiers in Artificial Intelligence and Applications; Vol. 306). IOS Press. https://doi.org/10.3233/978-1-61499-910-2-239

Wieringa, R. J., Gordijn, J. , & Ionita, D. (2018). Tool Support for Value Modeling and Risk Analysis of e-Services. In 24th Joint International Conference on Requirements Engineering

van de Kamp, T. , Peter, A. , Everts, M. H. , & Jonker, W. (2018). Multi-client predicate-only encryption for conjunctive equality tests. In S. Capkun, & S. S. M. Chow (Eds.), Cryptology and Network Security - 16th International Conference, CANS 2017, Revised Selected Papers (pp. 135-157). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11261 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-030-02641-7_7

Paper


Mayoral Vilches, V., Alzola Kirschgens, L., Bilbao Calvo, A., Hernández Cordero, A., Izquierdo Pisón, R., Mayoral Vilches, D., Muñiz Rosas, A., Olalde Mendia, G., Usategi San Juan, L., Zamalloa Ugarte, I., Gil-Uriarte, E. , Tews, E. , & Peter, A. (2018). Introducing the Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics. Paper presented at Symposium on Blockchain for Robotic Systems 2018, Cambridge, United States. https://arxiv.org/abs/1806.04042

van Sinderen, M. J. , Moreira, J. L. , Ferreira Pires, L., & Daniele, L. (2018). SAREF4health: IoT Standard-Based Ontology-Driven Healthcare Systems. 239 - 252. Paper presented at Formal Ontology in Information Systems, FOIS 2018, Cape Town, South Africa.

Review article

2017

Article (contribution to journal)






Erich, F. M. A. , Amrit, C. , & Daneva, M. (2017). A qualitative study of DevOps usage in practice. Journal of software: Evolution and Process, 29(6), [e1885]. https://doi.org/10.1002/smr.1885





Méndez Fernández, D., Wagner, S., Kalinowski, N., Felderer, M., Mafra, P., Vetrò, A., Conte, T., Christianson, M-T., Greer, D., Lassenius, C., Männistö, T., Nayabi, M., Oivo, M., Penzenstadler, B., Pfahl, D., Prikladnicki, R., Ruhe, G., Schekelmann, A., Sen, S. , ... Wieringa, R. (2017). Naming the pain in requirements engineering: Contemporary problems, causes, and effects in practice. Empirical software engineering. https://doi.org/10.1007/s10664-016-9451-7

Nautsch, A. , Meuwly, D., Ramos, D., Lindh, J., & Busch, C. (2017). Making Likelihood Ratios Digestible for Cross-Application Performance Assessment. IEEE signal processing letters, 24(10), 1552-1556. [17176768]. https://doi.org/10.1109/LSP.2017.2748899





Chapter


Ionita, D. , Nazareth, D. S. , Vasenev, A. , van der Velde, F. , & Wieringa, R. (2017). The role of tangibility and iconicity in collaborative modelling tasks. In C. Cabanillas, S. España, & S. Farshidi (Eds.), Proceedings of the ER Forum 2017 and the ER 2017 Demo track (pp. 1-14). CEUR. http://ceur-ws.org/Vol-1979/paper-13.pdf

Maltoni, D., Cappelli, R. , & Meuwly, D. (2017). Automated Fingerprint Identification Systems: From Fingerprints to Fingermarks. In M. Tistarelli, & C. Champod (Eds.), Handbook of Biometrics for Forensic Science (pp. 37-61). (Advances in Computer Vision and Pattern Recognition). Springer. https://doi.org/10.1007/978-3-319-50673-9_3

Pieters, W., & Dechesne, F. (2017). Adversarial risks in social experiments with new technologies. In I. van der Poel, L. Asveld, & D. C. Mehos (Eds.), Experimentation beyond the laboratory: new perspectives on technology Routledge.

Conference contribution


Abbasi, A., Holz, T. , Zambon, E. , & Etalle, S. (2017). ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers. In ACSAC 2017: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017 (pp. 437-448). Association for Computing Machinery (ACM). https://doi.org/10.1145/3134600.3134618

Abbasi, A., Wetzels, J., Bokslag, W. , Zambon, E. , & Etalle, S. (2017). μShield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems. In Z. Yan, R. Molva, W. Mazurczyk, & R. Kantola (Eds.), Network and System Security: 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings (pp. 694-709). ( Lecture Notes in Computer Science; Vol. 10394). Springer. https://doi.org/10.1007/978-3-319-64701-2_55

Aldea, A. I., Febriani, T. R. , Daneva, M. , & Iacob, M. E. (2017). The Strategy Blueprint: A Strategy Process Computer-Aided Design Tool. In VMSD 2017: Proceedings of the Seventh International Symposium on Business Modeling and Software Design (pp. 125-135). SCITEPRESS.

Allah Bukhsh, Z. , van Sinderen, M. J. , Sikkel, N., & Quartel, D. (2017). Understanding Modeling Requirements of Unstructured Business Processes. In M. van Sinderen, M. S. Obaidat, & E. Cabello (Eds.), ICETE 2017: Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (Vol. 4, pp. 17-27) https://doi.org/10.5220/0006398400170027

Alsaqaf, W. H. A. , Daneva, M. , & Wieringa, R. J. (2017). Agile quality requirements engineering challenges: first results from a case study. In 2017 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) IEEE. https://doi.org/10.1109/ESEM.2017.61

Alsaqaf, W. , Daneva, M. , & Wieringa, R. (2017). Quality requirements in large-scale distributed agile projects - A systematic literature review. In P. Grünbacher, & A. Perini (Eds.), Requirements Engineering: Foundation for Software Quality: 23rd International Working Conference, REFSQ 2017, Essen, Germany, February 27 – March 2, 2017, Proceedings (pp. 219-234 ). (Lecture Notes in Computer Science; Vol. 10153). Springer. https://doi.org/10.1007/978-3-319-54045-0_17

Bortolameotti, R. , van Ede, T. S., Caselli, M. , Everts, M. H. , Hartel, P. H., Hofstede, R. , Jonker, W. , & Peter, A. (2017). DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting. In ACSAC 2017, Proceedings of the 33rd Annual Computer Security Applications Conference (pp. 373-386) https://doi.org/10.1145/3134600.3134605

Continella, A., Fratantonio, Y., Lindorfer, M., Puccetti, A., Zand, A., Kruegel, C., & Vigna, G. (2017). Obfuscation-resilient privacy leak detection for mobile apps through differential analysis. In Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS) https://doi.org/10.14722/ndss.2017.23465

Daneva, M. , Wang, C., Hoener, P., & Hoener, P. (2017). What the Job Market Wants from Requirements Engineers? An Empirical Analysis of Online Job Ads from the Netherlands. In Proceedings - 11th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2017 (pp. 448-453). (International Symposium on Empirical Software Engineering and Measurement; Vol. 2017). IEEE Computer Society. https://doi.org/10.1109/ESEM.2017.60

Esquivel Vargas, H. T., Caselli, M. , & Peter, A. (2017). Automatic Deployment of Specification-based Intrusion Detection in the BACnet Protocol. In CPS'17, Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy (pp. 25-36). ACM Publishing. https://doi.org/10.1145/3140241.3140244

Franck, T. , Iacob, M-E. , van Sinderen, M. J. , & Wombacher, A. (2017). Towards an Integrated Architecture Model of Smart Manufacturing Enterprises. In VMSD 2017: Proceedings of the Seventh International Symposium on Business Modeling and Software Design (pp. 61-71). SCITEPRESS.

Green, B., Krotofil, M. , & Abbasi, A. (2017). On the Significance of Process Comprehension for Conducting Targeted ICS Attacks. In CPS '17: Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy (pp. 57-67). Association for Computing Machinery (ACM). https://doi.org/10.1145/3140241.3140254

Haasnoot, E. , Barnhoorn, J. S. , Spreeuwers, L. J. , Veldhuis, R. N. J. , & Verwey, W. B. (2017). Towards understanding behavioural biometric classifier performance over time and practice. In R. Heusdens, & J. H. Weber (Eds.), Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux: May 11-12, 2017, Delft University of Technology, Delft, the Netherlands (pp. 79-88). Delft University of Technology.

Herrmann, A., Berry, D. M. , Daneva, M., & Groen, E. C. (2017). CreaRE 2017: Sixth International Workshop on Creativity in Requirements Engineering. In REFSQ-JP 2017: REFSQ 2017 Joint Proceedings of the Co-Located Events (CEUR workshop proceedings; Vol. 1796). CEUR. http://ceur-ws.org/Vol-1796/

Hillerström, F. , Veldhuis, R. , & Spreeuwers, L. (2017). Deep Verification Learning. In R. Heusden, & J. H. Weber (Eds.), Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux: May 11-12, 2017, Delft University of Technology, Delft, the Netherlands (pp. 97-104). Delft University of Technology.

Junger, M. , Montoya, L. , Hartel, P. H., & Heydari, M. (2017). Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe. In 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA) IEEE. https://doi.org/10.1109/CyberSA.2017.8073391

Karvelas, N. P. , Peter, A., & Katzenbeisser, S. (2017). Using Oblivious RAM in Genomic Studies. In J. Garcia-Alfaro, G. Navarro-Aribas, H. Hartenstein, & J. Herrera-Joancomarti (Eds.), Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings (pp. 35-52). (Lecture notes in computer science; Vol. 10436). Springer. https://doi.org/10.1007/978-3-319-67816-0_3


Lopes de Souza, P., Francisco do Prado, A. , Lopes de Souza, W., Pereira, S. , & Ferreira Pires, L. (2017). Combining Behaviour-Driven Development with Scrum for Software Development in the Education Domain. In S. Hammoudi, M. Smialek, O. Camp, & J. Filipe (Eds.), Proceedings of the 19th International Conference on Enterprise Information Systems (ICEIS 2017) (Vol. 2, pp. 449-458). SCITEPRESS. https://doi.org/10.5220/0006336804490458

Moreira, J. L. , Ferreira Pires, L. , van Sinderen, M. J. , & Dockhorn Costa, P. (2017). Ontology-Driven Conceptual Modeling for Early Warning Systems: Redesigning the Situation Modeling Language. In L. F. Pires, S. Hammoudi, & B. Selic (Eds.), MODELSWARD 2017: proceedings of the 5th intrnational conference on Model-Driven Engineering and Software Development: Porto, Portugal, February 19-21, 2017 (pp. 467-477). SCITEPRESS. https://doi.org/10.5220/0006208904670477

Raaijen, T. , & Daneva, M. (2017). Depicting the smarter cities of the future: A systematic literature review & field study. In J. Ruzicka (Ed.), 2017 Smart Cities Symposium Prague (SCSP): Prague, May 25-26, 2017 IEEE. https://doi.org/10.1109/SCSP.2017.7973352

Singh, P. M. , van Sinderen, M. J. , & Wieringa, R. J. (2017). Reference architecture for integration platforms. In 2017 IEEE 21st International Enterprise Distributed Object Computing Conference (EDOC) (pp. 113-122). (IEEE International Enterprise Distributed Object Computing Conference (EDOC); Vol. 2017). IEEE. https://doi.org/10.1109/EDOC.2017.24

Tseng Lau, E., Keong Chai, K., Chen, Y. , & Vasenev, A. (2017). Towards Improving Resilience of Smart Urban Electricity Networks by Interactively Assessing Potential Microgrids. In Proceedings of the 6th International Conference on Smart Cities and Green ICT Systems (Vol. 1, pp. 352-359). SciTecPress.

Vasenev, A. , Ionita, D., Zoppi, T., Ceccarelli, A. , & Wieringa, R. J. (2017). Towards security requirements: Iconicity as a feature of an informal modeling language. In CEUR Workshop Proceedings (Vol. 1796, pp. 1-15). (CEUR Workshop Proceedings; Vol. 1796). CEUR. http://www.ceur-ws.org/Vol-1796/resacs-paper-2.pdf

Vasenev, A. , Montoya, L. , & Ionita, D. (2017). Outlining an ‘Evaluation continuum’: Structuring evaluation methodologies for infrastructure-related decision making tools. In E. T. Lau, M. K. K. chai, Y. Chen, O. Jung, V. C. M. Leung, K. Yang, S. Bessler, J. Loo, & T. Nakayama (Eds.), Smart Grid Inspired Future Technologies: Second EAI International Conference, SmartGIFT 2017, London, UK, March 27–28, 2017, Proceedings (pp. 243-249). ( Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; Vol. 203). Springer. https://doi.org/10.1007/978-3-319-61813-5_24

Wang, C., Luo, Z., Lin, L. , & Daneva, M. (2017). How to Reduce Software Development Cost with Personnel Assignment Optimization. In EASE'17: Proceedings of the 21st International Conference on Evaluation and Assessment in Software Engineering (pp. 270-279). ACM Press. https://doi.org/10.1145/3084226.3084245

Zeinstra, C. , Veldhuis, R. , & Spreeuwers, L. (2017). How Random Is a Classifier Given Its Area under Curve? In A. Brömme, C. Busch, A. Dantcheva, C. Rathgeb, & A. Uhl (Eds.), 2017 International Conference of the Biometrics Special Interest Group (BIOSIG): BIOSIG 2017 [8053509] Gesellschaft für Informatik. https://doi.org/10.23919/BIOSIG.2017.8053509

Zeinstra, C. , Veldhuis, R. , Spreeuwers, L., & Ruifrok, A. (2017). Manually annotated characteristic descriptors: Measurability and variability. In 2017 5th International Workshop on Biometrics and Forensics (IWBF 2017) [7935095] IEEE. https://doi.org/10.1109/IWBF.2017.7935095

Zoppi, T., Bessler, S., Ceccarelli, A., Lambert, E., Tseng Lau, E. , & Vasenev, A. (2017). A Modeling Framework to Support Resilient Evolution Planning of Smart Grids. In E. T. Lau, M. K. K. Chai, Y. Chen, O. Jung, V. C. M. Leung, K. Yang, S. Bessler, J. Loo, & T. Nakayama (Eds.), Smart Grid Inspired Future Technologies: Second EAI International Conference, SmartGIFT 2017, London, UK, March 27–28, 2017, Proceedings (pp. 233-242). Springer. https://doi.org/10.1007/978-3-319-61813-5_23

van den Berg, B. , & Wanders, I. (2017). Windowed Factorization and Merging. In R. Heusdens, & J. H. Weber (Eds.), Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux: May 11-12, 2017, Delft University of Technology, Delft, the Netherlands (pp. 15-22). Delft University of Technology.

Paper


Haasnoot, E. , Barnhoorn, J. , Spreeuwers, L. , Veldhuis, R. , & Verwey, W. (2017). Understanding. Paper presented at 14th IAPR/IEEE International Summer School on Biometrics 2017, Alghero, Italy.


Moreira, J. L. , Daniele, L. M. , Ferreira Pires, L. , van Sinderen, M. J., Wasielewska, K., Szmeja, P., Pawlowski, W., Ganzha, M., & Paprzycki, M. (2017). Towards IoT platforms’ integration: Semantic Translations between W3C SSN and ETSI SAREF. Paper presented at SEMANTiCS conference 2017, Amsterdam, Netherlands. http://ceur-ws.org/Vol-2063/sisiot-paper3.pdf

Wieringa, R. J. (2017). Requirements Engineering Since the Year One Thousand. 480 - 481. Paper presented at 25th IEEE International Requirements Engineering Conference 2017, Lisbon, Portugal.

van Sinderen, M. J. , Singh, P. M. , & Wieringa, R. J. (2017). Smart logistics: an enterprise architecture perspective. 9-16. Paper presented at 29th International Conference on Advanced Information Systems Engineering, Essen, Germany. http://ceur-ws.org/Vol-1848/CAiSE2017_Forum_Paper2.pdf

van de Kamp, T. R. , Peter, A. , Everts, M. H. , & Jonker, W. (2017). Multi-client Predicate-only Encryption for Conjunctive Equality Tests. Paper presented at 16th International Conference on Cryptology And Network Security 2017, Hong Kong, China.

Report


Kegel, R. H. P. , Barth, S. , Klaassen, R. , & Wieringa, R. J. (2017). Computer literacy systematic literature review method. (CTIT Technical Report Series; No. TR-CTIT-17-05). Centre for Telematics and Information Technology (CTIT).

Wienen, H. C. A. , Bukhsh, F. A. , Vriezekolk, E. , & Wieringa, R. J. (2017). Accident Analysis Methods and Models — a Systematic Literature Review. (CTIT Technical Report; No. TR-CTIT-17-04). Centre for Telematics and Information Technology (CTIT).

2016

Article (contribution to journal)



Ambusaidi, M. A., He, X., Nanda, P. , & Tan, Z. (2016). Building an intrusion detection system using a filter-based feature selection algorithm. IEEE transactions on computers, 65(10), 2986-2998. https://doi.org/10.1109/TC.2016.2519914


Kammüller, F., & Probst, C. W. (2016). Modeling and verification of insider threats using logical analysis. IEEE systems journal, 11(2), 534-545. https://doi.org/10.1109/JSYST.2015.2453215

Kotzerke, J., Hao, H., Davis, S. A., Hayes, R. , Spreeuwers, L. J. , Veldhuis, R. N. J., & Horadam, K. J. (2016). Identification performance of evidential value estimation for ridge-based biometrics. EURASIP journal on information security, 2016(24), 1-10. https://doi.org/10.1186/s13635-016-0050-3






Pieters, W., Barendse, J., Ford, M., Heath, C. P. R., Probst, C. W., & Verbij, R. (2016). The navigation metaphor in security economics. IEEE security & privacy, 14(3), 14-21. https://doi.org/10.1109/MSP.2016.47







Book editing


Daneva, M., & Pastor, O. (Eds.) (2016). Requirements engineering: foundation for software quality. (Lecture Notes in Computer Science; Vol. 9619, No. 6919). Springer. https://doi.org/10.1007/978-3-319-30282-9

Chapter


Dockhorn Costa, P. , Andrade Almeida, J., Pereira, I. S. A. , van Sinderen, M. J. , & Ferreira Pires, L. (2016). Rule-based support for situation management. In G. Rogova, & P. Scott (Eds.), Fusion Methodologies in Crisis Management (pp. 341-364). Springer. https://doi.org/10.1007/978-3-319-22527-2_16

Probst, C. W., Willemson, J. , & Pieters, W. (2016). The Attack Navigator (Invited). In S. Mauw, B. Kordy, & S. Jajodia (Eds.), Graphical Models for Security: Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers (pp. 1-17). (Lecture Notes in Computer Science; Vol. 9390). Springer. https://doi.org/10.1007/978-3-319-29968-6_1

van Sinderen, M. J. , & Iacob, M. E. (2016). Workshop C2 Report - Big Data Interoperability for Enterprises. In M. Zelm, G. Doumeingts, & J. P. Mendonca (Eds.), Enterprise Interoperability in the Digitized and Networked Factory of the Future (pp. 268-269). International Society for Technology in Education. http://www.iste.co.uk/index.php?p=a&ACTION=View&id=1073

Conference contribution



Belov, A. , Vasenev, A. , Havinga, P. J. M. , & Meratnia, N. (2016). Enhancing user comfort models for Demand Response solutions for domestic water heating systems. In Proceedings of the 5th International Conference on Smart Cities and Green ICT Systems (pp. 201-212). SCITEPRESS. https://doi.org/10.5220/0005809702010212

Bol Raap, W. , Iacob, M. E. , van Sinderen, M. J. , & Piest, S. (2016). An architecture and common data model for open data-based cargo-tracking in synchromodal logistics. In C. Debruyne, H. Panetto, R. Meersman, T. Dillon, E. Kuehn, D. O'Sullivan, & C. Agostino Ardagna (Eds.), On the Move to Meaningful Internet Systems: OTM 2016 Conferences (pp. 327-343). (Lecture notes in computer science; Vol. 10033). Springer. https://doi.org/10.1007/978-3-319-48472-3_19

Bortolameotti, R. , Peter, A. , Everts, M. H. , Jonker, W. , & Hartel, P. H. (2016). Reliably determining data leakage in the presence of strong attackers. In Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016 (pp. 484-495). Association for Computing Machinery (ACM). https://doi.org/10.1145/2991079.2991095

Bullee, J-W. , Montoya, L. , Junger, M. , & Hartel, P. H. (2016). Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention. In A. Mathur, & A. Roychoudhury (Eds.), Proceedings of the inaugural Singapore Cyber Security R&D Conference (SG-CRC 2016) (pp. 107-114). (Cryptology and Information Security Series; Vol. 14). IOS Press. https://doi.org/10.3233/978-1-61499-617-0-107


Chockalingam, S. , Hadziosmanovic, D. , Pieters, W., Texeira, A., & van Gelder, P. (2016). Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications. In G. Havarneanu, R. Setola, H. Nassopoulos, & S. Wolthusen (Eds.), Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers (pp. -). (Lecture Notes in Computer Science; Vol. 10242), (Security and Cryptology). Springer.

Chomsiri, T., He, X., Nanda, P. , & Tan, Z. (2016). An improvement of tree-Rule firewall for a large network: supporting large rule size and low delay. In 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 178-184). IEEE Computer Society. https://doi.org/10.1109/TrustCom.2016.0061

Erasmus, I. P. , & Daneva, M. (2016). An empirical study on memory bias situations and correction strategies in ERP effort estimation. In P. Amrahamsson, L. Corral, M. Olivo, & B. Russo (Eds.), 16th International Conference on Product-Focused Software Process Improvement, PROFES 2015 (pp. 227-242). (Lecture Notes in Computer Science; Vol. 9459). Springer. https://doi.org/10.1007/978-3-319-26844-6_17

Fichtner, L. , Pieters, W., & Texeira, A. (2016). Cybersecurity as a Politikum: Implications of Security Discourses for Infrastructures. In NSPW '16: Proceedings of the 2016 New Security Paradigms Workshop (pp. 36-48). Association for Computing Machinery (ACM). https://doi.org/10.1145/3011883.3011887

Förster, D., Löhr, H. , & Kargl, F. (2016). Decentralized enforcement of k-anonymity for location privacy using secret sharing. In O. Altintas, F. Kargl, E. Ekici, C. Sommer, & M. Segata (Eds.), 2015 IEEE Vehicular Networking Conference, VNC 2015 (pp. 279-286). [7385589] (IEEE Vehicular Networking Conference, VNC; Vol. 2016). IEEE Computer Society. https://doi.org/10.1109/VNC.2015.7385589

Ionita, D. , Gordijn, J., Yesuf, A. S. , & Wieringa, R. J. (2016). Value-Driven Risk Analysis of Coordination Models. In The Practice of Enterprise Modeling : 9th IFIP WG 8.1. Working Conference, PoEM 2016, Proceedings (pp. 102-116). (Lecture Notes in Business Information Processing; Vol. 267). Springer. https://doi.org/10.1007/978-3-319-48393-1_8

Ionita, D., Kaidalova, J. , Vasenev, A. , & Wieringa, R. (2016). A study on tangible participative enterprise modelling. In S. Link, & J. C. Trujillo (Eds.), Advances in Conceptual Modeling: ER 2016 Workshops, AHA, MoBiD, MORE-BI, MReBA, QMMQ, SCME, and WM2SP, Gifu, Japan, November 14–17, 2016, Proceedings (pp. 139-148). (Lecture Notes in Computer Science; Vol. 9975). Springer. https://doi.org/10.1007/978-3-319-47717-6_12

Ionita, D. , Kegel, R., Baltuta, A. , & Wieringa, R. (2016). ArgueSecure: Out-of-the-box Risk Assessment. In Proceedings of the 2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE) (pp. 74-79). IEEE Computer Society. https://doi.org/10.1109/REW.2016.027

Ionita, D. , Wieringa, R. J. , & Gordijn, J. (2016). Automated Identification and Prioritization of Business Risks in e-service Networks. In T. Borangiu, M. Dragoicea, & H. Novoa (Eds.), Proceedings of the 7th International Conference on Exploring Service Science, IESS 2016 (pp. 547-560). (Lecture Notes in Business Information Processing; Vol. 247). Springer. https://doi.org/10.1007/978-3-319-32689-4_42

Jung, O., Besser, S., Ceccarelli, A., Zoppi, T. , Vasenev, A. , Montoya, L., Clarke, T., & Chappell, K. (2016). Towards a Collaborative Framework to Improve Urban Grid Resilience. In Proceedings of the IEEE International Energy Conference, ENERGYCON 2016 (pp. 1-6). IEEE. https://doi.org/10.1109/ENERGYCON.2016.7513887

Kegel, R. H. P. , & Wieringa, R. J. (2016). Measuring Computer Literacy Without Questionnaires. In O. A. Kulyk, L. Simons, H. Oinas-Kukkonen, & J. E. W. C. van Gemert-Pijnen (Eds.), Fourth International Workshop on Behavior Change Support Systems (BCSS 2016) (pp. 61-65). (CEUR Workshop Proceedings; Vol. 1573). CEUR. http://ceur-ws.org/Vol-1573/Paper_5_BCSS2016.pdf

Le, A., Chen, Y., Chai, K. K. , Vasenev, A. , & Montoya, L. (2016). Assessing loss event frequencies of smart grid cyber threats: Encoding flexibility into FAIR using Bayesian network approach. In 1st EAI International Conference on Smart Grid Inspired Future (pp. 43-51). Springer. https://doi.org/10.1007/978-3-319-47729-9_5

Moreira, J. , van Sinderen, M. J. , Ferreira Pires, L. , & Dockhorn Costa, P. (2016). Improving semantic interoperability of big data for epidemiological surveillance. In M. Zelm, G. Doumeingts, & J. P. Mendonca (Eds.), Enterprise Interoperability in the Digitized and Networked Factory of the Future, I-ESA 2016 (pp. 314-324). International Society for Technology in Education. http://www.iste.co.uk/index.php?p=a&ACTION=View&id=1073

Nardi, J. C. , A. Almeida, J. P., Pereira, M. C., de Almeida Falbo, R. , Iacob, M. E. , van Sinderen, M. J. , & Ferreira Pires, L. (2016). Service commitments and capabilities across ArchiMate architectural layers. In 2016 IEEE 20th International Enterprise Distributed Object Computing Workshop (EDOCW) (pp. 139-148). (IEEE International Enterprise Distributed Object Computing Workshop). IEEE. https://doi.org/10.1109/EDOCW.2016.7584386

Singh, P. M. , & van Sinderen, M. J. (2016). Big data interoperability challenges for logistics. In M. Zelm, G. Doumeingts, & J. P. Mendonca (Eds.), Enterprise Interoperability in the Digitized and Networked Factory of the Future (pp. 325-335). International Society for Technology in Education. http://www.iste.co.uk/index.php?p=a&ACTION=View&id=1073

Staring, A. J. , Meertens, L. O. , & Sikkel, N. (2016). Business models & business cases for point-of-care testing. In BMSD 2016 - Proceedings of the 6th International Symposium on Business Modeling and Software Design (pp. 54-63). SCITEPRESS. https://doi.org/10.5220/0006222200540063


Vasenev, A. , Montoya, L., & Ceccarelli, A. (2016). A Hazus-Based Method for Assessing Robustness of Electricity Supply to Critical Smart Grid Consumers during Flood Events. In 11th International Conference on Availability, Reliability and Security, ARES 2016 (pp. 223-228). IEEE. https://doi.org/10.1109/ARES.2016.12

Vasenev, A. , Montoya, L., Ceccarelli, A., Le, A. , & Ionita, D. (2016). Threat navigator: grouping and ranking malicious external threats to current and future urban smart grids. In 1st EAI International Conference on Smart Grid Inspired Future (pp. 184-192). Springer. https://doi.org/10.1007/978-3-319-47729-9_19


Yüksel, Ö. , den Hartog, J. , & Etalle, S. (2016). Reading between the fields: practical, effective intrusion detection for industrial control systems. In SAC '16 Proceedings of the 31st Annual ACM Symposium on Applied Computing (pp. 2063-2070). Association for Computing Machinery (ACM). https://doi.org/10.1145/2851613.2851799

van Wieren, M., Doerr, C., Jacobs, V. , & Pieters, W. (2016). Understanding Bifurcation of Slow Versus Fast Cyber-Attackers. In G. Livraga, V. Torra, A. Aldini, F. Martinelli, & N. Suri (Eds.), Data Privacy Management and Security Assurance: 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings (pp. 19-33). (Lecture notes in computer science; Vol. 9963). Springer. https://doi.org/10.1007/978-3-319-47072-6_2

van de Kamp, T. R. , Peter, A. , Everts, M. H. , & Jonker, W. (2016). Private Sharing of IOCs and Sightings. In 3rd ACM Workshop on Information Sharing and Collaborative Security, WISCS 2016 (pp. 35-38). Association for Computing Machinery (ACM). https://doi.org/10.1145/2994539.2994544

Paper


Belov, A., Kartak, V. , Vasenev, A. , Meratnia, N. , & Havinga, P. J. M. (2016). A hierarchical scheme for balancing user comfort and electricity consumption of tank water heaters. Paper presented at 2016 IEEE PES Innovative Smart Grid Technologies, ISGT 2016, Minneapolis, United States. https://doi.org/10.1109/ISGT.2016.7781268



Peng, Y. , Spreeuwers, L. J. , & Veldhuis, R. N. J. (2016). Designing a Low-Resolution Face Recognition System for Long-Range Surveillance. 16429137. Paper presented at 15th International Conference of the Biometrics Special Interest Group, BIOSIG 2016, Darmstadt, Germany. https://doi.org/10.1109/BIOSIG.2016.7736917

Schramm, M. , & Daneva, M. (2016). Implementations of service oriented architecture and agile software development: What works and what are the challenges?. 1-12. Paper presented at Tenth IEEE International Conference on Research Challenges in Information Science, RCIS 2016, . https://doi.org/10.1109/RCIS.2016.7549345

Susyanto, N. , Veldhuis, R. N. J. , Spreeuwers, L. J., & Klaassen, C. A. J. (2016). Fixed FAR correction factor of score level fusion. 16555751. Paper presented at 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems, BTAS 2016, Washington, United States. https://doi.org/10.1109/BTAS.2016.7791173

Susyanto, N. , Veldhuis, R. N. J. , Spreeuwers, L. J., & Klaassen, C. A. J. (2016). Two-step calibration method for multi-algorithm score-based face recognition systems by minimizing discrimination loss. 16252593. Paper presented at 9th IAPR International Conference on Biometrics, ICB 2016, Halmstad, Sweden. https://doi.org/10.1109/ICB.2016.7550094

Zeinstra, C. G. , Veldhuis, R. N. J. , & Spreeuwers, L. J. (2016). Discriminating Power of FISWG Characteristic Descriptors Under Different Forensic Use Cases. 16429109. Paper presented at 15th International Conference of the Biometrics Special Interest Group, BIOSIG 2016, Darmstadt, Germany. https://doi.org/10.1109/BIOSIG.2016.7736919

PhD Thesis - Research external, graduation UT

Report


Abbasi, A. (2016). Ghost in the PLC: stealth on-the-fly manipulation of programmable logic controllers’ I/O. (CTIT Technical Report Series; No. TR-CTIT-16-02). Centre for Telematics and Information Technology (CTIT).

Vriezekolk, E. (2016). Technical Report on Raster field test at a Water Board. (CTIT Technical Report Series; No. TR-CTIT-16-06). Centre for Telematics and Information Technology (CTIT).

Working paper


Moreira, J. L., Sales, T. P., Guerson, J., Braga, B. F. B., Brasileiro, F., & Sobral, V. (2016). Menthor Editor. http://ceur-ws.org/Vol-1660/demo-paper1.pdf

2015

Article (contribution to journal)




Bilgin, B. , Nikova, S. I., Nikov, V., Rijmen, V., Tokareva, N., & Vitkup, V. (2015). Threshold implementations of Small S-boxes. Cryptography and communications, 7(1), 3-33. https://doi.org/10.1007/s12095-014-0104-7




Gollmann, D., Herley, C., Koenig, V. , Pieters, W., & Sasse, M. A. (2015). Socio-Technical Security Metrics (Dagstuhl Seminar 14491). Dagstuhl reports, 4(12), 1-28. https://doi.org/10.4230/DagRep.4.12.1

Guardia, G. D. A. , Ferreira Pires, L., Vêncio, R. Z. N., Malmegrim, K. C. R. , & Guareis de farias, C. (2015). A methodology for the development of RESTful semantic web services for gene expression analysis. PLoS ONE, 10(7), e0134011:1-e0134011:28. [e0134011]. https://doi.org/10.1371/journal.pone.0134011

Inayat, I., Salim, S. S., Marczak, S. , Daneva, M., & Shamshirband, S. (2015). A systematic literature review on agile requirements engineering practices and challenges. Computers in human behavior, 51(Part B), 915-929. https://doi.org/10.1016/j.chb.2014.10.046




Nardi, J. C., de Almeida Falbo, R. , Andrade Almeida, J. , Guizzardi, G. , Ferreira Pires, L. , van Sinderen, M. J., Guarino, N., & Fonseca, C. M. (2015). A commitment-based reference ontology for services. Information systems, 54, 263-288. https://doi.org/10.1016/j.is.2015.01.012

Petit, J., Schaub, F. , Feiri, M. , & Kargl, F. (2015). Pseudonym schemes in vehicular networks: a survey. IEEE communications surveys & tutorials, 17(1), 228-255. https://doi.org/10.1109/COMST.2014.2345420

Pieters, W., Padget, J., Dechesne, F., Dignum, V., & Aldewereld, H. (2015). Effectiveness of qualitative and quantitative security obligations. Journal of information security and applications, 22, 3-16. https://doi.org/10.1016/j.jisa.2014.07.003

Razo-Zapata, I. S. , Gordijn, J., de Leenheer, P. , & Wieringa, R. J. (2015). e3service: a critical reflection and future research. Business & information systems engineering, 57(1), 51-59. https://doi.org/10.1007/s12599-014-0360-2



Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., & Hu, J. (2015). Detection of denial-of-service attacks based on computer vision techniques. IEEE transactions on computers, 64(9), 2519-2533. https://doi.org/10.1109/TC.2014.2375218






Chapter


Ali, G., Bilotta, E., Gabriele, L., Pantano, P., Sepulveda, J., Servidio, R. , & Vasenev, A. (2015). eLearning in industrial mathematics with applications to nanoelectronics. In Coupled multiscale simulation and optimization in nanoelectronics (pp. 503-559). (The European Consortium for Mathematics in Industry; Vol. 21, No. 21). Springer. https://doi.org/10.1007/978-3-662-46672-8_9

Ali, T., Tome, P., Fierrez, J., Vera-Rodriguez, R. , Spreeuwers, L. J. , & Veldhuis, R. N. J. (2015). A Study of Identification Performance of Facial Regions from CCTV Images. In U. Garain, & F. Shafait (Eds.), Computational Forensics (pp. 83-91). (Lecture Notes in Computer Science; Vol. 8915). Springer. https://doi.org/10.1007/978-3-319-20125-2_8

Larburu Rubio, N. , van Schooten, B. W., Shalom, E. , Fung, L. S. N. , van Sinderen, M. J. , Hermens, H. J. , & Jones, V. M. (2015). A quality-of-data aware mobile decision support system for patients with chronic illnesses. In D. Riano, R. Lenz, S. Miksch, M. Peleg, M. U. Reichert, & A. ten Teije (Eds.), Knowledge representation for health care (pp. 126-139). (Lecture Notes in Artificial Intelligence; Vol. 9485, No. 1). Springer. https://doi.org/10.1007/978-3-319-26585-8_9

Conference contribution


Akoushideh, A. , Veldhuis, R. N. J. , Spreeuwers, L. J., & Maybodi, B. M-N. (2015). Facial recognition using new LBP representations. In Proceedings of the 36th WIC Symposium on Information Theory in the Benelux (pp. 34-41). Université Libre de Bruxelles. http://w-i-c.org/proceedings/proceedings_SITB2015.pdf

Albuquerque de Medeiros, R. W. , Ferreira Pires, L., & Rosa, N. S. (2015). Predicting service composition costs with complex cost behavior. In 12th IEEE International Conference on Service Computing, SCC 2015 (pp. 419-426). IEEE Computer Society. https://doi.org/10.1109/SCC.2015.64


Ameller, D., Franch, X., Gómez, C., Araújo, J., Berntsson Svensson, R., Biffle, S., Cabot, J., Cortelessa, V. , Daneva, M., Méndez Fernández, D., Moreira, A., Muccini, H., Vallecillo, A., Wimmer, M., Amaral, V., Brunelière, H., Burgueño, L., Goulão, M., Schätz, B., & Teufl, S. (2015). Handling non-functional requirements in model-driven development: an ongoing industrial survey. In 23rd International Conference on Requirements Engineering (RE) (pp. 208-213). IEEE Computer Society. https://doi.org/10.1109/RE.2015.7320424

Anish, P. R. , Daneva, M., Cleland-Huang, J. , Wieringa, R. J., & Ghaisas, S. (2015). What you ask is what you get: Understanding architecturally significant functional requirements. In D. Zowghi, V. Gervasi, & D. Amyot (Eds.), 23rd IEEE Internatioanl Conference on Requirements Engineering (RE) (pp. 86-95). IEEE Computer Society. https://doi.org/10.1109/RE.2015.7320411

Athanasiou, G., Amditis, A., Riviere, N. , Makri, E., Makri, E., Bartzas, A., Anyfantis, A., Werner, R., Alexsson, D., di Girolamo, E., Etienne, N., Schaap, M. , Kerle, N., Bozabalian, N., Marafioti, G., Berzosa, J., & Gustafsson, A. (2015). INACHUS : Integrated wide area situation awarenesss and survivor localization in search and rescue operations. In Book of abstracts of the 5th International Conference on Earth Observation for Global Changes (EOGC) and the 7th Geo-information Technologies for Natural Disaster Management (GiT4NDM) (pp. 1-1). United Nations Office for Outer Space Affairs.

Azevedo, C. L. B. , A. Almeida, J. P. , van Sinderen, M. J. , & Ferreira Pires, L. (2015). Towards capturing strategic planning in EA. In 19th IEEE International Enterprise Object Computing Conference, EDOC 2015 (pp. 159-168). IEEE. https://doi.org/10.1109/EDOC.2015.31

Azevedo, C. L. B. , van Sinderen, M. J. , Ferreira Pires, L. , & Andrade Almeida, J. (2015). Aligning enterprise architecture with strategic planning. In CAiSE International Workshops 2015 (pp. 426-437). (Lecture Notes in Business Information Processing; Vol. 215). Springer. https://doi.org/10.1007/978-3-319-19243-7_39

Bakondi, B. G. , Peter, A. , Everts, M. H. , Hartel, P. H. , & Jonker, W. (2015). Publicly Verifiable Private Aggregation of Time-Series Data. In 10th International Conference on Availability, Reliability and Security, ARES 2015 (pp. 50-59). IEEE. https://doi.org/10.1109/ARES.2015.82


Belov, A. , Vasenev, A. , Havinga, P. J. M. , Meratnia, N. , & van der Zwaag, B. J. (2015). Reducing user discomfort in direct load control of domestic water heaters. In Proceedings of the IEEE Innovative Smart Grid Technologies - Asia (ISGT ASIA 2015) (pp. 1-6). (IEEE Transactions on Smart Grid). IEEE Computer Society. https://doi.org/10.1109/ISGT-Asia.2015.7387131

Bortolameotti, R. , Peter, A. , Everts, M. H. , & Bolzoni, D. (2015). Indicators of Malicious SSL Connections. In 9th International Conference on Network and System Security, NSS 2015 (pp. 162-175). (Lecture Notes in Computer Science; Vol. 9408). Springer. https://doi.org/10.1007/978-3-319-25645-0_11


Brand, A. , & Iacob, M. E. (2015). Interoperability architecture for electric mobility. In M. J. van Sinderen, & V. Chapurlat (Eds.), Enterprise Interoperability - Proceedings of the 6th International IFIP Working Conference, IWEI 2015 (pp. 126-140). (Lecture Notes in Business Information Processing; Vol. 213). Springer. https://doi.org/10.1007/978-3-662-47157-9_12

Bullee, J-W. , Montoya, L. , Pieters, W. , Junger, M. , & Hartel, P. H. (2015). Regression Nodes: Extending attack trees with data from social sciences. In Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015) (pp. 17-23). IEEE Computer Society. https://doi.org/10.1109/STAST.2015.11

Caselli, M. , Zambon, E. , & Kargl, F. (2015). Sequence-aware intrusion detection in industrial control systems. In J. Zhou, & D. Jones (Eds.), Proceedings of the 1st ACM Workshop on Cyber-Physical System Security (pp. 13-24). (CPSS Workshop - AsiaCCS'15). Association for Computing Machinery (ACM). https://doi.org/10.1145/2732198.2732200

Caselli, M. , Zambon, E. , Petit, J. , & Kargl, F. (2015). Modeling message sequences for intrusion detection in industrial control systems. In M. Rice, & S. Shenoi (Eds.), Critical Infrastructure Protection IX: 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers (pp. 49-71). (Critical Infrastructure Protection IX; Vol. 466). Springer. https://doi.org/10.1007/978-3-319-26567-4

Daneva, M. (2015). Focus group: cost-effective and methodologically sound ways to get practitioners involved in your empirical RE research. In REFSQ-JP 2015: REFSQ Workshops, Research Method Track, and Poster Track (pp. 211-216). (CEUR Workshop Proceedings; Vol. 1342). CEUR. http://ceur-ws.org/Vol-1342/

Daneva, M. (2015). Play-testing and requirements engineering: implications for research and teaching. In E. Bjarnason, M. Borg, & M. Morandino (Eds.), 2nd IEEE/ACM International Workshop on Requirements Engineering and Testing, RET@ICSE 2015 (pp. 9-12). Association for Computing Machinery (ACM). https://doi.org/10.1109/RET.2015.10


Erasmus, I. P. , & Daneva, M. (2015). ERP services effort estimation strategies based on early requirements. In A. Kalenborg, & M. Trapp (Eds.), 2nd International Workshop on Requirements Engineering for the Precontract Phase (RE4P2) at REFSQ 2015 (pp. 83-99). (CEUR Workshop Proceedings; Vol. 1342). CEUR. http://ceur-ws.org/Vol-1342/

Erasmus, P. , & Daneva, M. (2015). An experience report on ERP effort estimation driven by quality requirements. In S. Schockert (Ed.), 6th Workshop on Requirements Prioritization and Communication (RePriCo) at REFSQ 2015 (pp. 126-139). (CEUR Workshop Proceedings; Vol. 1342). CEUR. http://ceur-ws.org/Vol-1342/

Ferreira, M. I. G. B. , Moreira, J., Campos, M. L. M., Braga, B. F. B., Sales, T. P., de Cordeiro, K. F., & Borges, M. R. S. (2015). OntoEmergePlan: variability of emergency plans supported by a domain ontology. In 12th International Conference on Information Systems for Crisis Response and Management (ISCRAM) (pp. 1-9). University of Agder. http://eprints.eemcs.utwente.nl/secure2/26498/01/2-13.pdf

Förster, D. , Kargl, F., & Löhr, H. (2015). Short: A framework for evaluating pseudonym strategies in vehicular ad-hoc networks. In WiSec '15: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (pp. 1–6). [a19] Association for Computing Machinery (ACM). https://doi.org/10.1145/2766498.2766520

Förster, D., Löhr, H., Zibuschka, J. , & Kargl, F. (2015). REWIRE – Revocation without resolution: A privacy-friendly revocation mechanism for vehicular ad-hoc networks. In M. Conti, M. Schunter, & I. Askoxylakis (Eds.), Trust and Trustworthy Computing: 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings (pp. 193-208). (Lecture Notes in Computer Science; Vol. 9229). Springer. https://doi.org/10.1007/978-3-319-22846-4_12

Herley, C. , & Pieters, W. (2015). “If you were attacked, you’d be sorry‿: Counterfactuals as security arguments. In New Security Paradigm Workshop (NSPW) (pp. 112-123). Association for Computing Machinery (ACM). https://doi.org/10.1145/2841113.2841122

Inayat, I., Moraes, L. , Daneva, M., & Salim, S. S. (2015). A reflection on agile requirements engineering: solutions brought and challenges posed. In M. Paasivaara (Ed.), 1st International Workshop on Requirements Engineering in Agile Development (READ) (pp. 61-67). Association for Computing Machinery (ACM). https://doi.org/10.1145/2764979.2764985

Ionita, D. , Wieringa, R. J. , Bullee, J-W. , & Vasenev, A. (2015). Tangible Modelling to Elicit Domain Knowledge: An Experiment and Focus Group. In P. Johannesson, M. Li Lee, S. W. Liddle, A. L. Opdahl, & Ó. P. López (Eds.), 34th International Conference on Conceptual Modeling, ER 2015 (pp. 558-565). (Lecture Notes in Computer Science; Vol. 9381). Springer. https://doi.org/10.1007/978-3-319-25264-3_42

Ionita, D. , Wieringa, R. J., Wolos, L. , Gordijn, J. , & Pieters, W. (2015). Using Value Models for Business Risk Analysis in e-Service Networks. In J. Ralyté, S. España, & O. Pastor (Eds.), 8th IFIP WG 8.1. Working Conference on the Practice of Enterprise Modelling, PoEM 2015 (pp. 239-253). (Lecture Notes in Business Information Processing; Vol. 235). Springer. https://doi.org/10.1007/978-3-319-25897-3_16

Ivanova, M. G., Probst, C. W., Hansen, R. R., & Kammüller, F. (2015). Transforming Graphical System Models To Graphical Attack Models. In S. Mauw, B. Kordy, & S. Jajodia (Eds.), Graphical Models for Security: Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers (pp. 82-96). (Lecture notes in computer science; Vol. 9390). Springer. https://doi.org/10.1007/978-3-319-29968-6_6

Kegel, R. H. P. (2015). The Personal Information Security Assistant. In 2015 IEEE 23rd International Requirements Engineering Conference (RE) (pp. 393-397). (IEEE International Requirements Engineering Conference (RE); Vol. 2015). IEEE. https://doi.org/10.1109/RE.2015.7320457

Kegel, R. H. P. , & Wieringa, R. J. (2015). Behavior Change Support Systems for Privacy and Security. In O. A. Kulyk, S. Kelders, L. van Gemert-Pijnen, & H. Oinas-Kukkonen (Eds.), Proceedings of the Third International Workshop on Behavior Change Support Systems (pp. 51-55). (CEUR Workshop Proceedings; Vol. Vol-1369). CEUR. http://ceur-ws.org/Vol-1369/Paper_5.pdf

Kleber, S., van der Heijden, R. W., Kopp, H. , & Kargl, F. (2015). Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions. In 2015 International Conference and Workshops on Networked Systems (NetSys) (pp. 1-8). IEEE Computer Society. https://doi.org/10.1109/NetSys.2015.7089068

Kotzerke, J., Kotzerke, J., Davis, S. A., Hayes, R. , Spreeuwers, L. J. , Veldhuis, R. N. J., & Horadam, K. J. (2015). Discriminating fingermarks with evidential value for forensic comparison. In Proceedings of the 3rd International Workshop on Biometrics and Forensics, IWBF 2015 (pp. 1-6). IEEE. https://doi.org/10.1109/IWBF.2015.7110220

Kotzerke, J. , Kotzerke, J., Davis, S., Hayes, R. , Spreeuwers, L. J. , Veldhuis, R. N. J., & Horadam, K. J. (2015). Identification Performance of Evidential Value Estimation for Fingermarks. In Proceedings of the 2015 International Conference of the Biometrics Special Interest Group (BIOSIG) (pp. 1-6). (Lecture Notes in Informatics (LNI) - Proceedings; Vol. P-245). Gesellschaft für Informatik. https://doi.org/10.1109/BIOSIG.2015.7314607

Larburu Rubio, N. , Bults, R. G. A. , van Sinderen, M. J. , & Hermens, H. J. (2015). Quality-of-Data Management for Telemedicine Systems. In 5th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2015) (pp. 451-458). (Procedia Computer Science (2015); Vol. 63). Elsevier. https://doi.org/10.1016/j.procs.2015.08.367


Mian, U. S. , den Hartog, J. , Etalle, S., & Zannone, N. (2015). Auditing with incomplete logs. In Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust 2015 (pp. 1-23). Technische Universiteit Eindhoven.

Moreira, J., Cordeiro, K., Campos, M. L. M., & Borges, M. (2015). Hybrid multidimensional design for heterogeneous data supported by ontological analysis: an application case in the Brazilian electric system operation. In 4th Workshop on Energy Data Management (EnDM) in the 18th International Conference on Extending Database Technology (EDBT) (pp. 72-77). (CEUR workshop proceedings; Vol. 1330). CEUR. http://eprints.eemcs.utwente.nl/secure2/26497/01/paper-13.pdf

Moreira, J., Moreira, J. , Ferreira Pires, L. , van Sinderen, M. J. , & Dockhorn Costa, P. (2015). Developing situation-aware applications for disaster management with a distributed rule-based platform. In Proceedings of the RuleML 2015 Challenge, Special Track on Rule-based Recommender Systems for the Web of Data, Special Industry Track, and RuleML 2015 Doctoral Consortium (pp. -). (CEUR Workshop Proceedings; Vol. 1417). CEUR. http://ceur-ws.org/Vol-1417/paper15.pdf

Pacini, L. A., do Prado, A. F. , Lopes de Souza, W. , & Ferreira Pires, L. (2015). An approach to business process recovery from source code. In S. Latifi (Ed.), 12th International Conference on Information Technology: New Generations, ITNG 2015 (pp. 361-366). IEEE Computer Society. https://doi.org/10.1109/ITNG.2015.64

Peng, Y. , Spreeuwers, L. J. , & Veldhuis, R. N. J. (2015). Likelihood Ratio Based Mixed Resolution Facial Comparison. In Proceedings of the 3rd International Workshop on Biometrics and Forensics, IWBF 2015 (pp. 1-5). IEEE Computer Society. https://doi.org/10.1109/IWBF.2015.7110231

Pieters, W., & Davarynejad, M. (2015). Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers. In J. Garcia-Alfaro, J. Herrera-Joancomartí, E. Lupu, & J. Posegga (Eds.), Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers (pp. 201-215). (Lecture Notes in Computer Science; Vol. 8872). Springer. https://doi.org/10.1007/978-3-319-17016-9_13

Singh, P. M. , & van Sinderen, M. J. (2015). Interoperability challenges for context aware logistics services - the case of synchromodal logistics. In M. Zelm (Ed.), Proceedings of the Workshops of the 6th International IFIP Working Conference on Enterprise Interoperability, IWEI-WS 2015 (pp. 9). (CEUR Workshop Proceedings; Vol. 1414). CEUR. http://ceur-ws.org/Vol-1414/paper4.pdf

Singh, P. M. , & van Sinderen, M. J. (2015). Lightweight metrics for enterprise architecture analysis. In W. Abramowicz (Ed.), Business Information Workshops - Revised Papers of BIS 2015 International Workshops (pp. 113-125). (Lecture Notes in Business Information Processing; Vol. 228). Springer. https://doi.org/10.1007/978-3-319-26762-3_11

Susyanyo, N., Klaassen, C. A. J. , Veldhuis, R. N. J. , & Spreeuwers, L. J. (2015). Semiparametric score level fusion: Gaussian copula approach. In Proceedings of the 36th WIC Symposium on Information Theory in the Benelux (pp. 26-33). Université Libre de Bruxelles. http://w-i-c.org/proceedings/proceedings_SITB2015.pdf

Veldhuis, R. N. J. (2015). The relation between the secrecy rate of biometric template protection and biometric recognition performance. In 2015 International Conference on Biometrics (ICB 2015): Phuket, Thailand, 19-22 May 2015 (pp. 311-318). IEEE. https://doi.org/10.1109/ICB.2015.7139055

Vriezekolk, E. , Etalle, S. , & Wieringa, R. J. (2015). Experimental Validation of a Risk Assessment Method. In 21st International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2015 (pp. 1-16). (Lecture Notes in Computer Science; Vol. 9013). Springer. https://doi.org/10.1007/978-3-319-16101-3_1

Vriezekolk, E. , Etalle, S. , & Wieringa, R. J. (2015). Validating the raster risk assessment method in practice. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), Proceedings of the ISCRAM 2015 Conference (pp. -). International Association for Information Systems for Crisis Response and Management (ISCRAM). http://idl.iscram.org/files/eelcovriezekolk/2015/1316_EelcoVriezekolk_etal2015.pdf


Xia, C., Chi, C., Wong, R. , Wombacher, A. , Ferreira Pires, L. , van Sinderen, M. J., & Ding, C. (2015). Workflow-based service selection under multi-constraints. In Twelfth IEEE International Conference on Services Computing, SCC 2015 (pp. 332-339). IEEE. https://doi.org/10.1109/SCC.2015.53



de Wide, L. , Spreeuwers, L. J. , & Veldhuis, R. N. J. (2015). Exploring How User Routine Affects the Recognition Performance of a Lock Pattern. In Proceedings of the 2015 International Conference of the Biometrics Special Interest Group (BIOSIG) (pp. 1-8). (Lecture Notes in Informatics (LNI) - Proceedings; Vol. P-245). Gesellschaft für Informatik. https://doi.org/10.1109/BIOSIG.2015.7314603

Foreword/postscript


Berntsson Svensson, R. , Daneva, M., Marczak, S., Ernst, N. , & Madhavji, N. (2015). Welcome from the Workshop Chairs. In Fifth International Workshop on Empirical Requirements Engineering, EmpiRE 2015 at RE'15 (pp. 3-5). IEEE Computer Society. http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7430398

Paper


Moreira, J. (2015). From situation modelling to a distributed rule-based platform for situation awareness: an ontological framework for disaster management applications. 1-13. Paper presented at 34th International Conference on Conceptual Modeling, ER 2015, Stockholm, Sweden.

This publication list has been generated from UT Research Information.