Research Group: Services, Cybersecurity & Safety (SCS)

These publication lists might not be complete. Publications are added regularly.

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Date | Item Type
Jump to: 2017 | 2016 | 2015 | 2014 | 2013
Number of items: 256.

2017

Zoppi, Tomasso and Bessler, Sanford and Ceccarelli, Andrea and Lambert, Edward and Tseng Lau, Eng and Vasenev, Alexandr (2017) A modeling framework to support resilient evolution planning of smart grids. In: 2nd EAI International Conference on Smart Grid Inspired Future 2017, 27-28 March 2017, London, UK.

Pieters, Wolter and Dechesne, Francien (2017) Adversarial risks in social experiments with new technologies. In: Ibo van de Poel & Lotte Asveld & Donna C. Mehos (Eds.), Experimentation beyond the laboratory: new perspectives on technology. Routledge, Oxford, UK. ISBN 9781138204010

Dam, Christiaan van (2017) From image sequence to frontal image: reconstruction of the unknown face: a forensic case. thesis.

Lammers, Imke and Vasenev, Alexandr (2017) Grid resilience governance of the future: analyzing the role of associations in experimental smart grid projects in the Netherlands. In: 2nd EAI International Conference on Smart Grid Inspired Future 2017, 27-28 March 2017, London, UK.

Mendez-Fernandez, D. and Wagner, S. and Kalinowski, N. and Felderer, M. and Mafra, P. and Vetro, A. and Conte, T. and Christianson, M.-T. and Greer, D. and Lassenius, C. and Mannisto, T. and Nayabi, M. and Oivo, M. and Penzenstadler, B. and Pfahl, D. and Prikladnicki, R. and Ruhe, G. and Schekelmann, A. and Sen, S. and Spinola, R. and Tuzcu, A. and De la Vara, J.J. and Wieringa, R.J. (2017) Naming the pain in requirements engineering: Contemporary problems, causes, and effects in practice. Empirical software engineering journal . ISSN 1382-3256

Kuhrmann, Marco and Méndez Fernández, Daniel and Daneva, Maya (2017) On the pragmatic design of literature studies in software engineering: An experience-based guideline. Journal of empirical software engineering, 22 (1). pp. 1-40. ISSN 1382-3256

Vasenev, Alexandr and Montoya, Lorena and Ionita, Dan (2017) Outlining an ‘Evaluation continuum’: Structuring evaluation methodologies for infrastructure-related decision making tools. In: 2nd EAI International Conference on Smart Grid Inspired Future 2017, 27-28 March 2017, London, UK (pp. pp. 1-6).

Junger, M. and Montoya, L. and Overink, F.J. (2017) Priming and warnings are not effective to prevent social engineering attacks. Computers in human behavior, 66 . pp. 75-87. ISSN 0747-5632

Guardia, Gabriela D.A. and Ferreira Pires, Luis and Goncalves da Silva, Eduardo and Guareis de Farias, Cléver R. (2017) SemanticSCo: a platform to support the semantic composition of services for gene expression analysis. Journal of biomedical informatics, 66 . pp. 116-128. ISSN 1532-0464

Tseng Lau, Eng and Keong Chai, Kok and Chen, Yue and Vasenev, Alexandr (2017) Towards improving resilience of smart urban electricity networks by interactively assessing potential microgrids. In: 6th International Conference on Smart Cities and Green ICT Systems, SMARTGREENS 2017, 22-24 April 2017, Porto, Portugal.

Vasenev, Alexandr and Ionita, Dan and Zoppi, Tomasso and Ceccarelli, Andrea and Wieringa, Roel (2017) Towards security requirements: Iconicity as a feature of an informal modeling language. In: 22nd International Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2017, 27 February 2017, Essen, Germany (pp. pp. 1-15).

2016

Vasenev, Alexandr and Montoya, Lorena and Ceccarelli, Andrea (2016) A Hazus-Based Method for Assessing Robustness of Electricity Supply to Critical Smart Grid Consumers during Flood Events. In: 11th International Conference on Availability, Reliability and Security, ARES 2016, 31 August - 2 September 2016, Salzburg, Austria (pp. pp. 223-228).

Meuwly, Didier and Ramos, Daniel and Haraksim, Rudolf (2016) A guideline for the validation of likelihood ratio methods used for forensic evidence evaluation. Forensic Science International . pp. 1-12. ISSN 0379-0738

Belov, Alexander and Kartak, Vadim and Vasenev, Alexandr and Meratnia, Nirvana and Havinga, Paul J.M. (2016) A hierarchical scheme for balancing user comfort and electricity consumption of tank water heaters. In: IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, ISGT 2016, 6-9 September 2016, Minneapolis, MN, USA.

Ionita, Dan and Kaidalova, Julia and Vasenev, Alexandr and Wieringa, Roel (2016) A study on tangible participative enterprise modelling. In: ER 2016 Workshop Conceptual Modeling in Requirements and Business Analysis, MReBA, 14-17 November 2016, Gifu, Japan (pp. pp. 139-148).

Parthasarathy, Sudhaman and Daneva, Maya (2016) An approach to estimation of degree of customization for ERP projects using prioritized requirements. Journal of systems and software, 117 . pp. 471-487. ISSN 0164-1212

Bol Raap, Wouter and Iacob, Maria-Eugenia and Sinderen, Marten van and Piest, Sebastian (2016) An architecture and common data model for open data-based cargo-tracking in synchromodal logistics. In: On the Move to Meaningful Internet Systems: OTM 2016 Conferences, 24-28 October 2016, Rhodos, Greece (pp. pp. 327-343).

Erasmus, Pierre and Daneva, Maya (2016) An empirical study on memory bias situations and correction strategies in ERP effort estimation. In: 16th International Conference on Product-Focused Software Process Improvement, PROFES 2015, 2-4 December 2015, Bolzano, Italy (pp. pp. 227-242).

Chomsiri, Thawatchai and He, Xiangjian and Nanda, Priyadarsi and Tan, Zhiyuan (2016) An improvement of tree-Rule firewall for a large network: supporting large rule size and low delay. In: 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2016, 23-26 August 2016, Tianjin, China.

Vasenev, Alexandr and Montoya, Lorena (2016) Analysing non-malicious threats to urban smart grids by interrelating threats and threat taxonomies. In: IEEE International Smart Cities Conference, ISC2 2016, 12-15 September 2016, Trento, Italy (pp. pp. 1-4).

Vissers, Chris A. and Ferreira Pires, Luis and Quartel, Dick A.C. and Sinderen, Marten van (2016) Architectural design - Conception and specification of interactive systems. Springer International Publishing, Switzerland. ISBN 9783319432977

Ionita, Dan and Kegel, Roeland and Wieringa, Roel and Baltuta, Andrei (2016) ArgueSecure: Out-of-the-box Risk Assessment. In: IEEE 2nd Workshop on Evolving Security and Privacy Requirements Engineering, ESPRE 2015, 12 September 2016, Beijing, China.

Le, Anhtuan and Chen, Yue and Chai, Kok Keong and Vasenev, Alexandr and Montoya, Lorena (2016) Assessing loss event frequencies of smart grid cyber threats: Encoding flexibility into FAIR using Bayesian network approach. In: 1st EAI International Conference on Smart Grid Inspired Future, 19-20 May 2016, Liverpool, United Kingdom (pp. pp. 1-8).

Ionita, Dan and Wieringa, Roel J. and Gordijn, Jaap (2016) Automated Identification and Prioritization of Business Risks in e-service Networks. In: 7th International Conference on Exploring Service Science, IESS 2016, 25-27 May 2016, Bucharest, Romania (pp. pp. 547-560).

Singh, Prince M. and Sinderen, Marten van (2016) Big data interoperability challenges for logistics. In: 8th International Conference on Enterprise Interoperability, I-ESA 2016, 29-30 March 2016, Guimaraes, Portugal (pp. pp. 325-335).

Kotzerke, Johannes (2016) BioTwist: overcoming severe distortions in ridge-based biometrics for successful identification. thesis.

Hartel, P.H. and Junger, M. (2016) Book review: Crime and Everyday Life by Marcus Felson and Mary Eckert, 5th edition. [Review of the book Crime and Everyday Life (2015), Felson, Marcus and Eckert, Mary, eds.] Crime Science, 5 , Springer, New York, NY, USA, 10:1-10:3. ISSN 2193-7680

Ambusaidi, Mohammed A. and He, Xiangjian and Nanda, Priyadarsi and Tan, Zhiyuan (2016) Building an intrusion detection system using a filter-based feature selection algorithm. IEEE transactions on computers, 65 (10). pp. 2986-2998. ISSN 0018-9340

Medeiros, Robson W.A. de and Rosa, Nelson S. and Ferreira Pires, Luis (2016) Cost management of service compositions. International journal of services computing, 4 (4). pp. 35-50. ISSN 2330-4464

Peng, Yuxi and Spreeuwers, Luuk and Veldhuis, Raymond (2016) Designing a Low-Resolution Face Recognition System for Long-Range Surveillance. In: International Conference of the Biometrics Special Interest Group, BIOSIG 2016, 21-23 September 2016, Darmstadt, Germany.

Susyanto, N. and Veldhuis, R.N.J. and Spreeuwers, L.J. and Klaassen, C.A.J. (2016) Fixed FAR correction factor of score level fusion. In: IEEE 8th International Conference on Biometrics Theory, Applications and Systems, BTAS 2016, 6-9 September 2016, Washington, DC, USA (pp. p. 16555751).

Abbasi, Ali and Hashemi, Majid (2016) Ghost in the PLC: Designing an Undetectable Programmable Logic Controller Rootkit via Pin Control Attack. In: Black Hat Europe 2016, 3-4 November 2016, London, UK (pp. pp. 1-35).

Abbasi, Ali (2016) Ghost in the PLC: stealth on-the-fly manipulation of programmable logic controllers’ I/O. [Report]

Chomsiri, Thawatchai and He, Xiangjian and Nanda, Priyadarsi and Tan, Zhiyuan (2016) Hybrid tree-rule firewall for high speed data transmission. IEEE transactions on cloud computing . pp. 1-13. ISSN 2168-7161

Kotzerke, Johannes and Hao, Hao and Davis, Stephen A. and Hayes, Robert and Spreeuwers, L.J. and Veldhuis, R.N.J. and Horadam, K.J. (2016) Identification performance of evidential value estimation for ridge-based biometrics. EURASIP journal on information security, 2016 (24). pp. 1-10. ISSN 1687-417X

Schramm, Milan and Daneva, Maya (2016) Implementations of service oriented architecture and agile software development: What works and what are the challenges? In: Tenth IEEE International Conference on Research Challenges in Information Science, RCIS 2016, 1-3 June 2016, Grenoble, France (pp. pp. 1-12).

Moreira, João L.R. and Sinderen, Marten van and Ferreira Pires, Luis and Dockhorn Costa, Patrícia (2016) Improving semantic interoperability of big data for epidemiological surveillance. In: 8th International Conference on Enterprise Interoperability, I-ESA 2016, 29-30 March 2016, Guimaraes, Portugal (pp. pp. 314-324).

Caselli, Marco (2016) Intrusion Detection in Networked Control Systems: From System Knowledge to Network Security. thesis.

Belov, Alexander and Kartak, Vadim and Vasenev, Alexandr and Meratnia, Nirvana and Havinga, Paul J.M. (2016) Load shifting of domestic water heaters under double price tariffs: Bringing together money savings and comfort. In: IEEE PES Innovative Smart Grid Technologies Conference Europe, ISGT-Europe 2016, 9-12 October 2016, Ljubljana, Slovenia.

Kegel, Roeland H.P. and Wieringa, Roel J. (2016) Measuring Computer Literacy Without Questionnaires. In: Fourth International Workshop on Behavior Change Support Systems, BCSS 2016, 5 April 2016, Salzburg, Austria (pp. pp. 61-65).

Belov, Alexander and Vasenev, Alexandr and Kartak, Vadim and Meratnia, Nirvana and Havinga, Paul J.M. (2016) Peak load reduction of multiple water heaters: Respecting consumer comfort and money savings. In: IEEE Online Conference on Green Communications, OnlineGreenComm 2016, 14-17 November2016.

Kamp, Tim van de and Peter, Andreas and Everts, Maarten H. and Jonker, Willem (2016) Private Sharing of IOCs and Sightings. In: 3rd ACM Workshop on Information Sharing and Collaborative Security, WISCS 2016 (pp. pp. 35-38).

Larburu, N. and Bults, R.G.A. and Sinderen, M. van and Widya, I. and Hermens, H.J. (2016) Quality-of-data broker for quality-of-data-aware telemedicine systems. Ingenierie et Recherche Bio-Medicale (IRBM), 37 (4). pp. 210-218. ISSN 1959-0318

Yüksel, Ömer and Hartog, Jerry den and Etalle, Sandro (2016) Reading between the fields: practical, effective intrusion detection for industrial control systems. In: 31st Annual ACM Symposium on Applied Computing, SAC 2016, April 4-8, 2016, Pisa, Italy (pp. pp. 2063-2070).

Veneberg, R.K.M. and Iacob, M.E. and Sinderen, M.J. van and Bodenstaff, L. (2016) Relating business intelligence and enterprise architecture - A method for combining operational data with architectural metadata. International journal of cooperative information systems, 25 (2). p. 1650007. ISSN 0218-8430

Daneva, Maya and Pastor, Oscar , eds. (2016) Requirements engineering: foundation for software quality. Lecture notes in computer science ; 9619, 9619 . Springer, London, UK. ISBN 9783319302812

Dockhorn Costa, Patrícia and Almeida, João Paolo A. and Pereira, Isaac S.A. and Sinderen, Marten van and Ferreira Pires, Luis (2016) Rule-based support for situation management. In: G. Rogova & P. Scott (Eds.), Fusion Methodologies in Crisis Management. Springer, Bern, Switzerland, pp. 341-364. ISBN 9783319225265

Feiri, Michael Peter (2016) Scalable Broadcast Authentication for V2V Communication. thesis.

Susyanto, Nanang (2016) Semiparametric Copula Models for Biometric Score Level. thesis.

Nardi, Julio Cesar and Almeida, João Paolo A. and Pereira, Maiara Candido and Almeida Falco, Ricardo de and Iacob, Maria-Eugenia and Sinderen, Marten van and Ferreira Pires, Luis (2016) Service commitments and capabilities across ArchiMate architectural layers. In: IEEE 20th International Enterprise Distributed Object Computing Workshop, EDOCW 2016, 5-6 September 2016, Vienna, Austria (pp. pp. 139-148).

Caselli, Marco and Zambon, Emmanuele and Amann, Johanna and Sommer, Robin and Kargl, Frank (2016) Specification Mining for Intrusion Detection in Networked Control Systems. In: 25th USENIX Security Symposium, 10-12 August 2016, Austin, TX, USA (pp. pp. 791-806).

Vriezekolk, Eelco (2016) Technical Report on Raster field test at a Water Board. [Report]

Bullee, Jan-Willem and Montoya, Lorena and Junger, Marianne and Hartel, Pieter (2016) Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention. In: Singapore Cyber Security R&D Conference, SG-CRC 2015, 14-15 January 2016, Singapore, Singapore (pp. pp. 1-6).

Stoker, Janka I. and Garretsen, Harry and Spreeuwers, Luuk J. (2016) The Facial Appearance of CEOs: Faces Signal Selection but Not Performance. PLos ONE, 11 (7). e0159950. ISSN 1932-6203

Pieters, Wolter and Barendse, Jeroen and Ford, Margaret and Heath, Claude P.R. and Probst, Christian W. and Verbij, Ruud (2016) The navigation metaphor in security economics. IEEE Security & Privacy, 14 (3). pp. 14-21. ISSN 1540-7993

Montoya, Lorena and Junger, Marianne and Ongena, Yfke (2016) The relation between residential property and its surroundings and day- and night-time residential burglary. Environment and behavior, 48 (4). pp. 515-549. ISSN 0013-9165

Vasenev, Alexandr and Montoya, Lorena and Ceccarelli, Andrea and Le, Anhtuan and Ionita, Dan (2016) Threat navigator: grouping and ranking malicious external threats to current and future urban smart grids. In: 1st EAI International Conference on Smart Grid Inspired Future, 19-20 May 2016, Liverpool, United Kingdom (pp. pp. 1-8).

Jung, Oliver and Besser, Sandford and Ceccarelli, Andrea and Zoppi, Tomasso and Vasenev, Alexandr and Montoya, Lorena and Clarke, Tony and Chappell, Keith (2016) Towards a collaborative framework to improve urban grid resilience. In: IEEE International Energy Conference, ENERGYCON 2016, 4-8 April 2016, Leuven, Belgium (pp. pp. 1-6).

Susyanto, N. and Veldhuis, R.N.J. and Spreeuwers, L.J. and Klaassen, C.A.J. (2016) Two-step calibration method for multi-algorithm score-based face recognition systems by minimizing discrimination loss. In: International Conference on Biometrics, ICB 2016, 13-16 June 2016, Halmstad, Sweden (pp. p. 16252593).

Ionita, Dan and Gordijn, Jaap and Yesuf, Ahmed Seid and Wieringa, Roel (2016) Value-driven risk analysis of coordination models. In: 9th IFIP WG 8.1. Working Conference on the Practice of Enterprise Modeling, PoEM 2015, 8-10 November 2016, Skovde, Sweden (pp. pp. 102-116).

Vasenev, A. and Hartmann, T. and Miller, S.R. and Dorée, A.G. (2016) Visualization environment for reviewing and experimenting with compaction equipment trajectories in context. Advanced engineering informatics, 30 (2). pp. 95-108. ISSN 1474-0346

Sinderen, Marten van and Iacob, Maria-Eugenia (2016) Workshop C2 Report - Big Data Interoperability for Enterprises. In: Martin Zelm & Guy Doumeingts & Joao Pedro Mendonca (Eds.), Enterprise Interoperability in the Digitized and Networked Factory of the Future. ISTE, UK, pp. 268-269. ISBN 9781847040442

2015

Nardi, Julio Cesar and Almeida Falbo, Ricardo de and Almeida, João Paulo A. and Guizzardi, Giancarlo and Ferreira Pires, Luis and Sinderen, Marten J. van and Guarino, Nicola and Fonseca, Claudenir Morais (2015) A commitment-based reference ontology for services. Information systems, 54 . pp. 263-288. ISSN 0306-4379

Guardia, Gabriela D.A. and Ferreira Pires, Luis and Vêncio, Ricardo Z.N. and Malmegrim, Kelen C.R. and Farias, Cléver R.G. de (2015) A methodology for the development of RESTful semantic web services for gene expression analysis. PLoS ONE, 10 (7). pp. 1-28. ISSN 1932-6203

Larburu, Nekane and Schooten, Boris van and Shalom, Erez and Fung, Nick and Sinderen, Marten van and Hermens, Hermie and Jones, Val (2015) A quality-of-data aware mobile decision support system for patients with chronic illnesses. In: David Riano & Richard Lenz & Silvia Miksch & Mor Peleg & Manfred Reichert & Annette ten Teije (Eds.), Knowledge representation for health care. Lecture notes in artificial intelligence, 9485 . Springer, Bern, Switzerland, pp. 126-139. ISBN 9783319265841

Inayat, Irum and Moraes, Lauriane and Daneva, Maya and Salim, Siti Salwah (2015) A reflection on agile requirements engineering: solutions brought and challenges posed. In: 1st International Workshop on Requirements Engineering in Agile Development (READ 2015), 25 May 2015, Helsinki, Finnland (pp. pp. 61-67).

Ali, Tauseef and Tome, Pedro and Fierrez, Julian and Vera-Rodriguez, Ruben and Spreeuwers, Luuk J. and Veldhuis, Raymond N.J. (2015) A study of identification performance of facial regions from CCTV images. In: Utpal Garain & Faisal Shafait (Eds.), Computational forensics. Lecture notes in computer science, 8915 . Springer International Publishing, Cham, Switzerland, pp. 83-91. ISBN 9783319201245

Azevedo, Carlos L.B. and Sinderen, Marten van and Ferreira Pires, Luis and Almeida, João Paolo A. (2015) Aligning enterprise architecture with strategic planning. In: CAiSE International Workshops 2015, 8-9 June 2015, Stockholm, Sweden (pp. pp. 426-437).

Pacini, Luiz A. and Prado, Antonio F. do and Lopes de Souza, Wanderley and Ferreira Pires, Luis (2015) An approach to business process recovery from source code. In: 12th International Conference on Information Technology: New Generations, ITNG 2015, 13-15 April 2015, Las Vegas, NV, USA (pp. pp. 361-366).

Erasmus, Pierre and Daneva, Maya (2015) An experience report on ERP effort estimation driven by quality requirements. In: 6th Workshop on Requirements Prioritization and Communication, RePriCo at REFSQ 2015, 23 March 2015, Essen, Germany (pp. pp. 126-139).

Larburu, Nekane and Bults, Richard G.A. and Sinderen, Marten van and Widya, Ing and Hermens, Hermie J. (2015) An ontology for telemedicine systems resiliency to technological context variations in pervasive healthcare. IEEE journal of translational engineering in health and medicine, 3 . ISSN 2168-2372

Lastdrager, Elmer and Hartel, Pieter and Junger, Marianne (2015) Apate: anti-phishing analysing and triaging environment (Poster). In: 36th IEEE Symposium on Security and Privacy 2015, 18-21 May 2015, San Jose, Ca, USA.

Mian, Umbreen Sabir and Hartog, Jerry den and Etalle, Sandro and Zannone, Nicola (2015) Auditing with incomplete logs. In: 3rd Workshop on Hot Issues in Security Principles and Trust 2015, 18 April 2015, London, UK (pp. pp. 1-23).

Yu, Yijun and Franqueira, Virginia N.L. and Tun, Thein Tan and Wieringa, Roel J. and Nuseibeh, Bashar (2015) Automated analysis of security requirements through risk-based argumentation. Journal of systems and software, 106 . pp. 102-116. ISSN 0164-1212

Batubara, F. Rizal (2015) Balancing functionality, risk, and cost in smart service networks. In: ICSOFT 2015 Doctoral Consortium, 20 -23 July 2015, Colmar, Alsace, France (pp. pp. 7-14).

Kegel, Roeland H.P. and Wieringa, Roel J. (2015) Behavior Change Support Systems for Privacy and Security. In: Third International Workshop on Behavior Change Support Systems, BCSS 2015, 03-06-2015, Chicago, IL, USA (pp. pp. 51-55).

Zeinstra, C.G. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2015) Beyond the eye of the beholder: on a forensic descriptor of the eye region. In: 23rd European Signal Processing Conference, EUSIPCO 2015, 31 August - 4 September 2015, Nice, France (pp. pp. 779-783).

Spreeuwers, Luuk (2015) Breaking the 99% barrier: optimisation of 3D face recognition. IET biometrics, 4 (3). pp. 169-178. ISSN 2047-4938

Pieters, Wolter and Davarynejad, Mohsen (2015) Calculating adversarial risk from attack trees: control strength and probabilistic attackers. In: 9th International Workshop on Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, DPM 2014, 10-11 September 2014, Wroclaw, Poland (pp. pp. 201-215).

Wang, Lei and Ferreira Pires, Luis and Sinderen, Marten J. van and Wombacher, Andreas and Chi, Chi-Hung (2015) Deriving robust distributed business processes with automated transformations of fallible component processes. International journal on advances in networks and services, 8 (3-4). pp. 192-202. ISSN 1942-2644

Moreira, Joao and Ferreira Pires, Luis and Sinderen, Marten van and Dockhorn Costa, Patrícia (2015) Developing situation-aware applications for disaster management with a distributed rule-based platform. In: RuleML 2015 Challenge, Special Track on Rule-based Recommender Systems for the Web of Data, Special Industry Track, and RuleML 2015 Doctoral Consortium, 2-5 August 2015, Berlin, Germany.

Kotzerke, J. and Davis, S.A. and Hayes, R. and Spreeuwers, L.J. and Veldhuis, R.N.J. and Horadam, K.J. (2015) Discriminating fingermarks with evidential value for forensic comparison. In: 3rd International Workshop on Biometrics and Forensics, IWBF 2015, 3-4 March, 2015, Gjovik, Norway.

Erasmus, Pierre and Daneva, Maya (2015) ERP services effort estimation strategies based on early requirements. In: 2nd International Workshop on Requirements Engineering for the Precontract Phase, RE4P2 at REFSQ 2015, 23 March 2015, Essen, Germany (pp. pp. 83-99).

Pieters, W. and Padget, J. and Dechesne, F. and Dignum, V. and Aldewereld, H. (2015) Effectiveness of qualitative and quantitative security obligations. Journal of information security and applications, 22 . pp. 3-16. ISSN 2214-2126

Mahmood, Zahid and Ali, Tauseef and Khan, Samee U. (2015) Effects of pose and image resolution on automatic face recognition. IET biometrics, 5 (2). pp. 111-119. ISSN 2047-4938

Zeinstra, C.G. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2015) Examining the examiners: an online eyebrow verification experiment inspired by FISWG. In: International Workshop on Biometrics and Forensics, IWBF 2015, 3-4 March 2015, Gløvik, Norway (pp. pp. 1-6).

Vriezekolk, Eelco and Etalle, Sandro and Wieringa, Roel (2015) Experimental validation of a risk assessment method. In: 21st International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2015, March 23-26, 2015, Essen, Germany (pp. pp. 1-16).

Wide, Lisa de and Spreeuwers, Luuk and Veldhuis, Raymond (2015) Exploring how user routine affects the recognition performance of a lock pattern. In: International Conference of the Biometrics Special Interest Group, BIOSIG 2015, 9-11 September 2015, Darmstadt, Germany (pp. pp. 1-8).

Dam, Chris van and Veldhuis, Raymond and Spreeuwers, Luuk (2015) Face reconstruction from image sequences for forensic face comparison. IET biometrics, 5 (2). pp. 140-146. ISSN 2047-4938

Akoushideh, Alireza and Veldhuis, R.N.J. and Spreeuwers, L.J. and Maybodi, Babak M.-N. (2015) Facial recognition using new LBP representations. In: 36th WIC Symposium on Information Theory in the Benelux, 6-7 May 2015, Brussels, Belgium (pp. pp. 34-41).

Daneva, Maya (2015) Focus group: cost-effective and methodologically sound ways to get practitioners involved in your empirical RE research. In: Research Methodology Track of the REFSQ 2015 Conference, March 23, 2015, Essen, Germany (pp. pp. 211-216).

Wagen, Wytske van der and Pieters, Wolter (2015) From cybercrime to cyborg crime: botnets as hybrid criminal actor-networks. British journal of criminology, 55 (2). pp. 1-18. ISSN 0007-0955

Moreira, João Luiz Rebelo (2015) From situation modelling to a distributed rule-based platform for situation awareness: an ontological framework for disaster management applications. In: 34th International Conference on Conceptual Modeling, ER 2015 - PhD Symposium, 19-22 October 2015, Stockholm, Sweden (pp. pp. 1-13).

Ameller, David and Franch, Xavier and Gómez, Cristina and Araújo, João and Berntsson Svensson, Richard and Biffle, Stefan and Cabot, Jordi and Cortelessa, Vittorio and Daneva, Maya and Méndez Fernández, Daniel and Moreira, Ana and Muccini, Henry and Vallecillo, Antonio and Wimmer, Manuel and Amaral, Vasco and Brunelière, Hugo and Burgueño, Loli and Goulão, Miguel and Schätz, Bernard and Teufl, Sabine (2015) Handling non-functional requirements in model-driven development: an ongoing industrial survey. In: 23rd International Conference on Requirements Engineering, RE 2015, 24-29 August 2015, Ottawa, Canada (pp. pp. 208-213).

Moreira, João and Cordeiro, Kelli and Campos, Maria Luiza M. and Borges, Marcos (2015) Hybrid multidimensional design for heterogeneous data supported by ontological analysis: an application case in the Brazilian electric system operation. In: 4th Workshop on Energy Data Management (EnDM) in the 18th International Conference on Extending Database Technology, EDBT 2015, 27 March 2015, Brussels, Belgium (pp. pp. 72-77).

Kotzerke, J. and Davis, S. and Hayes, R. and Spreeuwers, L.J. and Veldhuis, R.N.J. and Horadam, K.J. (2015) Identification performance of evidential value estimation for fingermarks. In: International Conference of the Biometrics Special Interest Group, BIOSIG 2015, 9-11 September 2015, Darmstadt, Germany (pp. pp. 1-6).

Dutta, Abhishek and Günther, Manuel and El Shafey, Laurent and Veldhuis, Raymond and Spreeuwers, Luuk (2015) Impact of eye detection error on face recognition performance. IET biometrics, 4 (3). pp. 137-150. ISSN 2047-4938

Bortolameotti, Riccardo and Peter, Andreas and Everts, Maarten H. and Bolzoni, Damiano (2015) Indicators of malicious SSL connections. In: 9th International Conference on Network and System Security, NSS 2015, 3-5 November 2015, New York, NY, USA.

Brand, Allard and Iacob, Maria-Eugenia and Sinderen, Marten van (2015) Interoperability architecture for electric mobility. In: 6th International IFIP Working Conference on Enterprise Interoperability, IWEI 2015, 28-29 May 2015, Nimes, France (pp. pp. 126-140).

Singh, Prince M. and Sinderen, Marten van (2015) Interoperability challenges for context aware logistics services - the case of synchromodal logistics. In: Workshops of the 6th International IFIP Working Conference on Enterprise Interoperability, IWEI-WS 2015, 27 May 2015, Nîmes, France.

Ionita, Dan and Wieringa, Roel and Bullee, Jan-Willem and Vasenev, Alexandr (2015) Investigating the usability and utility of tangible modelling of socio-technical architectures. [Report]

Singh, Prince M. and Sinderen, Marten J. van (2015) Lightweight metrics for enterprise architecture analysis. In: International Workshops on Business Information Systems, BIS 2015, 24-26 June 2015, Poznan, Poland (pp. pp. 113-125).

Peng, Y. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2015) Likelihood ratio based mixed resolution facial comparison. In: 3rd International Workshop on Biometrics and Forensics, IWBF 2015, 3-4 March, 2015, Gjøvic, Norway (pp. pp. 1-5).

Bosems, Steven and Sinderen, Marten van (2015) Model-driven development for user-centric well-being support: from dynamic well-being domain models to context-aware applications. In: 3rd International Conference on Model-Driven Engineering and Software Development, MODELSWARD 2015, 9-11 February 2015, Angers, France (pp. pp. 425-432).

Kammüller, Florian and Probst, Christian W. (2015) Modeling and verification of insider threats using logical analysis. IEEE Systems journal . ISSN 1932-8184

Caselli, Marco and Zambon, Emmanuele and Petit, Jonathan and Kargl, Frank (2015) Modeling message sequences for intrusion detection in industrial control systems. In: 9th IFIP 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2015, 16-18 March 2015, Arlington, VA, USA (pp. pp. 49-71).

Azevedo, Carlos L.B. and Iacob, Maria-Eugenia and Almeida, João Paolo A. and Sinderen, Marten van and Ferreira Pires, Luis and Guizzardi, Giancarlo (2015) Modeling resources and capabilities in enterprise architecture: A well-founded ontology-based proposal for ArchiMate. Information Systems, 54 . pp. 235-262. ISSN 0306-4379

Montoya, Lorena (2015) Modelling urban crime through workforce size: a test of the activity support concept. Environment and planning B: Planning and design, 42 (3). pp. 399-414. ISSN 0265-8135

Ferreira, Maria I.G.B and Moreira, João L.R. and Campos, Maria Luiza M. and Braga, Bernardo F.B and Sales, Tiago P. and Cordeiro, Kelli F. de and Borges, Marcos R.S. (2015) OntoEmergePlan: variability of emergency plans supported by a domain ontology. In: 12th International Conference on Information Systems for Crisis Response and Management, ISCRAM 2015, 24-27 May 2015, Kristiansand, Norway (pp. pp. 1-9).

Daneva, Maya (2015) Play-testing and requirements engineering: implications for research and teaching. In: 2nd IEEE/ACM International Workshop on Requirements Engineering and Testing, RET@ICSE 2015, 18 May 2015, Florence, Italy (pp. pp. 9-12).

Dutta, Abhishek (2015) Predicting performance of a face recognition system based on image quality. thesis.

Medeiros, Robson W.A. de and Ferreira Pires, Luis and Rosa, Nelson S. (2015) Predicting service composition costs with complex cost behavior. In: 12th IEEE International Conference on Service Computing, SCC 2015, 27 June - 02 Juyl 2015, New York, NY, USA (pp. pp. 419-426).

Bosems, Steven and Sinderen, Marten van (2015) Prediction of domain behaviour through dynamic well-being domain model analysis. The scientific world journal, 2015 . ISSN 1537-744X

Bakondi, Bence and Peter, Andreas and Everts, Maarten and Hartel, Pieter and Jonker, Willem (2015) Publicly verifiable private aggregation of time-series data. In: 10th International Conference on Availability, Reliability and Security, ARES 2015, 24-27 August 2015, Toulouse, France (pp. pp. 50-59).

Larburu, Nekane and Bults, Richard and Sinderen, Marten van and Hermens, Hermie (2015) Quality-of-data management for telemedicine systems. In: 5th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare, ICTH 2015, 27-30 September 2015, Berlin, Germany (pp. pp. 451-458).

Belov, Alexander and Vasenev, Alexandr and Havinga, Paul J.M. and Meratnia, Nirvana and Zwaag, Berend Jan van der (2015) Reducing user discomfort in direct load control of domestic water heaters. In: IEEE Innovative Smart Grid Technologies - Asia, ISGT ASIA 2015, 3-6 November 2015, Bangkok, Thailand (pp. pp. 1-6).

Bullee, Jan-Willem H. and Montoya, Lorena and Pieters, Wolter and Junger, Marianne and Hartel, Pieter H. (2015) Regression nodes: extending attack trees with data from social sciences. In: Workshop on Socio-Technical Aspects in Security and Trust, STAST 2015, 13 July 2015, Verona, Italy.

Dietzel, Stefan (2015) Resilient in-network aggregation for vehicular networks. thesis.

Wang, Lei and Ferreira Pires, Luis and Sinderen, Marten J. van and Wombacher, Andreas and Chi, Chi-Hung (2015) Robust interactions under system crashes and network failures of collaborative processes with arbitrary control flows. In: Seventh International Conference on Advanced Service Computing, Service Computation 2015, 22-27 March 2015, Nice, France (pp. pp. 27-34).

Bukhsh, Zaharah Allah and Sinderen, Marten van and Singh, P.M. (2015) SOA and EDA: a comparative study - similarities, difference and conceptual guidelines on their usage. In: Twelfth International Conference on e-Business, ICE-B 2015, 20-22 July 2015, Colmar, France (pp. pp. 213-220).

Ali, Tauseef and Spreeuwers, Luuk and Veldhuis, Raymond and Meuwly, Didier (2015) Sampling variability in forensic likelihood-ratio computation: A simulation study. Science & justice, 55 (6). pp. 499-508. ISSN 1355-0306

Dietzel, Stefan and Peter, Andreas and Kargl, Frank (2015) Secure cluster-based in-network information aggregation for vehicular networks. In: IEEE 81st Vehicular Technology Conference, VTC Spring 2015, 11-14 May 2015, Glasgow, UK (pp. pp. 1-5).

Susyanyo, N. and Klaassen, C.A.J. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2015) Semiparametric score sevel susion: Gaussian sopula approach. In: 36th WIC Symposium on Information Theory in the Benelux, 6-7 May 2015, Brussels, Belgium (pp. pp. 26-33).

Caselli, Marco and Zambon, Emmanuele and Kargl, Frank (2015) Sequence-aware intrusion detection in industrial control systems. In: 1st ACM Workshop on Cyber-Physical System Security, CPSS 2015, 14-17 April 2015, Singapore (pp. pp. 13-24).

Spreeuwers, Luuk (2015) Setting a world record in 3D face recognition. De Vonk, 33 (4). pp. 11-21. ISSN 0925-5427

Wieringa, Roel and Daneva, Maya (2015) Six strategies for generalizing software engineering theories. Science of computer programming, 101 . pp. 136-152. ISSN 0167-6423

Gollmann, Dieter and Herley, Cormac and Koenig, Vincent and Pieters, Wolter and Sasse, Martina Angela (2015) Socio-Technical Security Metrics (Dagstuhl Seminar 14491). Dagstuhl Reports, 4 (12). pp. 1-28. ISSN 2192-5283

Ionita, Dan and Wieringa, Roel and Bullee, Jan-Willem and Vasenev, Alexandr (2015) Tangible modelling to elicit domain knowledge: an experiment and focus group. In: 34th International Conference on Conceptual Modeling, ER 2015, 19-22 October 2015, Stockholm, Sweden (pp. pp. 558-565).

Kleber, Stephan and Heijden, Rens W. van der and Kopp, Henning and Kargl, Frank (2015) Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions. In: International Conference and Workshops on Networked Systems, NetSys 2015, 9-12 March 2015, Cottbus, Germany (pp. pp. 1-8).

Kegel, Roeland H.P. (2015) The Personal Information Security Assistant. In: IEEE 23rd International Requirements Engineering Conference, RE 2015, 24-28 August 2015, Ottawa, Canada (pp. pp. 393-397).

Bullee, Jan-Willem H. and Montoya, Lorena and Pieters, Wolter and Junger, Marianne and Hartel, Pieter (2015) The persuasion and security awareness experiment: reducing the success of social engineering attacks. Journal of experimental criminology, 11 (1). pp. 97-115. ISSN 1573-3750

Veldhuis, Raymond N.J. (2015) The relation between the secrecy rate of biometric template protection and biometric recognition performance. In: International Conference on Biometrics, ICB 2015, 19-22 May 2015, Phuket, Thailand (pp. pp. 311-318).

Azevedo, Carlos L.B. and Almeida, Joao P.A. and Sinderen, Marten van and Ferreira Pires, Luis (2015) Towards capturing strategic planning in EA. In: 19th IEEE International Enterprise Object Computing Conference, EDOC 2015, 21-25 September 2015, Adelaide, Australia (pp. pp. 159-168).

Moreira, João L.R. and Ferreira Pires, Luis and Sinderen, Marten van and Dockhorn Costa, Patrícia (2015) Towards ontology-driven situation-aware disaster management. Journal of applied ontology, 10 (3-4). pp. 339-353. ISSN 1570-5838

Ivanova, Marieta Georgieva and Probst, Christian W. and Hansen, René Rydhof and Kammüller, Florian (2015) Transforming graphical system models to graphical attack models. In: Second International Workshop on Graphical Models for Security, GraMSec 2015, 13 July 2015, Verona, Italy (pp. pp. 82-96).

Ionita, Dan and Wieringa, Roel J. and Wolos, Lars and Gordijn, Jaap and Pieters, Wolter (2015) Using value models for business risk analysis in e-service networks. In: 8th IFIP WG 8.1. Working Conference on the Practice of Enterprise Modelling, PoEM 2015, November 10-12, 2015, Valencia, Spain (pp. pp. 239-253).

Vriezekolk, Eelco and Etalle, Sandro and Wieringa, Roel (2015) Validating the raster risk assessment method in practice. In: ISCRAM 2015 Conference, 24-27 May 2015, Kristiansand, Norway.

Berntsson Svensson, Richard and Daneva, Maya and Marczak, Sabrina and Ernst, Neil and Madhavji, Nazim (2015) Welcome from the Workshop Chairs. In: Fifth International Workshop on Empirical Requirements Engineering, EmpiRE 2015 at RE'15, 24 August 2015, Ottawa, ON, Canada (pp. pp. 3-5).

Anish, Preethu Rose and Daneva, Maya and Cleland-Huang, Jane and Wieringa, Roel J. and Ghaisas, Smita (2015) What you ask is what you get: Understanding architecturally significant functional requirements. In: 23rd IEEE Internatioanl Conference on Requirements Engineering, RE 2015, 24-28 August 2015, Ottawa, Canada (pp. pp. 86-95).

Xia, Chao and Chi, Chi Hung and Wong, Raymond and Wombacher, Andreas and Pires, Luis F. and Sinderen, Marten van and Ding, Chen (2015) Workflow-based service selection under multi-constraints. In: IEEE International Conference on Services Computing, SCC 2015, 27 June - 2 July 2015, New York, NY, USA (pp. pp. 332-339).

Razo-Zapata, Ivan S. and Gordijn, Jaap and Leenheer, Pieter de and Wieringa, Roel (2015) e3service: a critical reflection and future research. Business & information systems engineering, 57 (1). pp. 51-59. ISSN 0937-6429

Herley, Cormac and Pieters, Wolter (2015) “If you were attacked, you’d be sorry”: Counterfactuals as security arguments. In: New Security Paradigm Workshop, NSPW 2015, 8-11 September 2015, Twente, Netherlands.

2014

Dutta, Abhishek and Veldhuis, Raymond and Spreeuwers, Luuk (2014) A Bayesian model for predicting face recognition performance using image quality. In: IEEE International Joint Conference on Biometrics, IJCB 2014, September 29 - October 2, 2014, Clearwater, FL, USA (pp. pp. 1-8).

Campos, Glaucia M.M. and Rosa, Nelson S. and Ferreira Pires, Luis (2014) A Survey of formalization approaches to service composition. In: 11th IEEE International Conference on Services Computing, SCC 2014, June 27 - July 2, 2014, Anchorage, Alaska, USA (pp. pp. 179-186).

Wang, Lei and Wombacher, Andreas and Ferreira Pires, Luis and Sinderen, Marten J. van and Chi, Chi-Hung (2014) A collaborative processes synchronization method with regard to system crashes and network failures. In: 29th Symposium on Applied Computing, SAV 2014, 24-28 March 2014, Gyeongju, Korea (pp. pp. 1393-1398).

Mehmood, Zahid and Ali, Tauseef and Khattak, Shahid and Khan, Samee U. (2014) A comparative study of baseline algorithms of face recognition. In: 12th International Conference on Frontiers of Information Technology, FIT 2014, 17-19 December 2014, Islamabad, Pakistan (pp. pp. 263-268).

Dietzel, Stefan and Heijden, Rens van der and Decke, Hendrik and Kargl, Frank (2014) A flexible, subjective logic-based framework for misbehavior detection in V2V networks. In: IEEE 15th International Symposium on A World of Wireless, Mobile and Multimedia Networks, WoWMoM 2014, 16-19 June 2014, Sydney, Australia (pp. pp. 513-516).

Erich, Floris and Amrit, Chintan and Daneva, Maya (2014) A mapping study on cooperation between information system development and operations. In: 15th International Conference on Product-Focused Software Process Improvement, PROFES 2014, 10-12 December 2014, Helsinki, Finland (pp. pp. 277-280).

Medeiros, Robson W.A. de and Rosa, Nelson S. and Ferreira Pires, Luis (2014) A metamodel for modeling cost behavior in service composition. In: 11th ACS/IEEE International Conference on Computer Systems and Applications, AICSSA 2014, 10-13 November 2014, Doha, Qatar (pp. pp. 84-91).

Bilgin, Begül and Gierlichs, Benekikt and Nikova, Svetla and Nikov, Ventzislav and Rijmen, Vincent (2014) A more efficient AES threshold implementation. In: 7th International Conference on Cryptology in Africa, AfricaCrypt 29014, 28-30 May 2014, Marrakesh, Morocco (pp. pp. 267-284).

Ambusaidi, Mohammed A. and He, Xiangjian and Tan, Zhiyuan and Nanda, Priyadarsi and Lu, Liang Fu and Nagar, Upasana T. (2014) A novel feature selection approach for intrusion detection data classification. In: 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, 24-26 September 2014, Beijing, China (pp. p. 246).

Jan, Mian Ahmad and Nanda, Priyadarsi and He, Xiangjian and Tan, Zhiyuan and Liu, Ren Ping (2014) A robust authentication scheme for observing resources in the internet of things environment. In: 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, 24-26 September 2014, Beijing, China (pp. p. 370).

Caselli, Marco and Kargl, Frank (2014) A security assessment methodology for critical infrastructures. In: Ninth International Conference on Critical Information Infrastructures Security, CRITIS 2014, 13-15 October 2014, Limassol, Cyprus (pp. pp. 332-343).

Chomsiri, Thawatchai and He, Xiangjian and Nanda, Priyadarsi and Tan, Zhiyuan (2014) A stateful mechanism for the tree-rule firewall. In: 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, 24-26 September 2014, Beijing, China (pp. pp. 256-263).

Medeiros, Robson W.A. de and Rosa, Nelson S. and Campos, Glaucia M.M. and Ferreira Pires, Luis (2014) A survey of cost accounting in service-oriented computing. In: IEEE 10th World Congress on Services, SERVICES 2014, June 27 - July 2, 2014, Anchorage, Alaska, USA (pp. pp. 77-84).

Bösch, Christoph and Hartel, Pieter and Jonker, Willem and Peter, Andreas (2014) A survey of provably secure searchable encryption. ACM Computing Surveys, 47 (2). p. 18. ISSN 0360-0300

Tan, Zhiyuan and Jamdagni, Aruna and He, Xiangjian and Nanda, Priyadarsi and Liu, Ren Ping (2014) A system for denial-of-service attack detection based on multivariate correlation analysis. IEEE transactions on parallel and distributed systems, 25 (2). pp. 447-456. ISSN 1045-9219

Inayat, Irum and Salim, Siti Salwah and Marczak, Sabrina and Daneva, Maya and Shamshirband, Shahaboddin (2014) A systematic literature review on agile requirements engineering practices and challenges. Computers in human behavior, 51 (Part B). pp. 915-929. ISSN 0747-5632

Duipmans, Evert Ferdinand and Ferreira Pires, Luis and Bonino da Silva Santos, Luiz Olavo (2014) A transformation-based approach to business process management in the cloud. Journal of grid computing, 12 (2). pp. 191-219. ISSN 1570-7873

Andreeva, Elena and Bilgin, Begül and Bogdanov, Andrey and Luykx, Atul and Mennink, Bart and Mouha, Nicky and Yasuda, Kan (2014) APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography. In: 21st International Workshop on Fast Software Encryption, FSE 2014, 3-5 March 2014, London, UK.

Abbasi, Ali and Wetzel, Jos (2014) APTs way: evading Your EBNIDS. In: Black Hat Europe, 16-19 October 2014, Amsterdam, The Netherlands.

Lastdrager, Elmer E.H. (2014) Achieving a consensual definition of phishing based on a systematic review of the literature. Crime Science, 3 . p. 9. ISSN 2193-7680

Cardoso de Moraes, João Luís and Lopes de Souza, Wanderley and Ferreira Pires, Luis and Francisco do Prado, Antonio (2014) An Architecture for Health Information Exchange in Pervasive Healthcare Environment. In: S. Hammoudi & J. Cordeiro & L.A. Maciaszek & J. Filipe (Eds.), Enterprise Information Systems. Lecture Notes in Business Information Processing, 190 . Springer International Publishing Switzerland, Switzerland, pp. 384-401. ISBN 9783319094915

Venezian Povoa, Lucas and Lopes de Souza, Wanderley and Ferreira Pires, Luis and Prado, Antonio Francisco do (2014) An approach to the decomposition of business processes for execution in the cloud. In: 11th ACS/IEEE International Conference on Computer Systems and Applications, AICSSA 2014, 10-13 November 2014, Doha, Qatar (pp. pp. 470-477).

Feiri, Michael and Petit, Jonathan and Kargl, Frank (2014) An evaluation framework for pre-distribution strategies of certificates in VANETs. In: 2nd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication, FG-IVC 2014, 20-21 February 2014, Luxembourg City, Luxembourg (pp. pp. 22-23).

Vasenev, A. and Pradhananga, N. and Bijleveld, F.R. and Ionita, D. and Hartmann, T. and Teizer, J. and Doree, A.G. (2014) An information fusion approach for filtering GNSS data sets collected during construction operations. Advanced engineering informatics, 28 (4). pp. 297-310. ISSN 1474-0346

Condori-Fernández, Nelly and España, Sergio and Sikkel, Klaas and Daneva, Maya and Gonzlez, Arturo (2014) Analyzing the effect of the collaborative interactions on performance of requirements validation. In: 20th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2014, 7-10 April 2014, Essen, Germany (pp. pp. 216-231).

Ionita, Dan and Bullee, Jan-Willem and Wieringa, Roel (2014) Argumentation-based security requirements elicitation: the next round. In: 2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering, ESPRE 2014, 25 August 2014, Karlskrona, Sweden (pp. pp. 7-12).

Dutta, Abhishek and Veldhuis, Raymond and Spreeuwers, Luuk (2014) Automatic Eye Detection Error as a Predictor of Face Recognition Performance. In: 35rd WIC Symposium on Information Theory in the Benelux, 12-13 May 2014, Eindhoven, Netherlands (pp. pp. 89-96).

Mahmood, Zahid and Ali, Tauseef and Khattak, Shadid and Hasan, Laiq and Khan, Samee U. (2014) Automatic player detection and identification for sports entertainment applications. Pattern analysis and applications, 18 (4). pp. 971-982. ISSN 1433-7541

Ali, Tauseef and Spreeuwers, Luuk J. and Veldhuis, Raymond and Meuwly, Didier (2014) Biometric evidence evaluation: an empirical assessment of the effect of different training data. IET Biometrics, 3 (4). pp. 335-346. ISSN 2047-4938

Tistarelli, Massimo and Grosso, Enrico and Meuwly, Didier (2014) Biometrics in forensic science: challenges, lessons and new technologies. In: Biometric authentication. Lecture notes in computer science, 8897 . Springer, Switzerland, pp. 153-164. ISBN 9783319133867

Meuwly, Didier and Veldhuis, Raymond (2014) Biometrics — Developments and Potential. In: Wiley Encyclopedia of Forensic Science. John Wiley & Sons Ltd, Chichester, UK, pp. 1-8. ISBN 9780470061589

Daneva, Maya and Herrmann, Andrea and Buglione, Luigi (2014) Chapter 13 – Understanding Quality Requirements Engineering in Contract-Based Projects from the Perspective of Software Architects: An Exploratory Study. In: Ivan Mistrik & Rami Bahsoon & Peter Eeles & Roshanak Roshandel & Michael Stal (Eds.), Relating system quality and software architecture. Morgan Kaufmann, pp. 325-357. ISBN 9780124170094

Ionita, Dan (2014) Context-sensitiveiInformation security risk identification and evaluation techniques. In: IEEE 22nd International Requirements Engineering Conference, RE 2014, 25-29 August 2014, Karlskrona, Sweden (pp. pp. 485-488).

Erich, Floris and Amrit, Chintan and Daneva, Maya (2014) Cooperation between information system development and operations: a literature review. In: 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2014, 18-21 September 2014, Torino, Italy (pp. p. 69).

Knapik, Peter and Petit, Jonathan and Kargl, Frank and Schoch, Elmar (2014) Cooperative home light: assessment of a security function for the automotive field. International journal on advances in security, 7 (1&2). pp. 1-14. ISSN 1942-2636

Parthasarathy, S. and Daneva, Maya (2014) Customer requirements based ERP customization using AHP technique. Business process management journal, 20 (5). pp. 730-751. ISSN 1463-7154

Pieters, Wolter and Hadziosmanovic, Dina and Dechesne, Francien (2014) Cyber security as social experiment. In: 2014 New Security Paradigms Workshop, NSPW 2014, 15-18 September 2014, Victoria, BC, Canada (pp. pp. 15-24).

Spreeuwers, Luuk (2014) Derivation of LDA log likelihood ratio one-to-one classifier. University of Twente students journal of biometrics and computer vision, 2014 (1). pp. 1-5. ISSN 2451-9642

Wieringa, Roel J. (2014) Design science methodology for information systems and software engineering. Springer, London, UK. ISBN 9783662438381

Tan, Zhiyuan and Jamdagni, Aruna and He, Xiangjian and Nanda, Priyadarsi and Liu, Ren Ping and Hu, Jiankun (2014) Detection of denial-of-service attacks based on computer vision techniques. IEEE transactions on computers, 64 (9). pp. 2519-2533. ISSN 0018-9340

Singh, Prince Mayarank (2014) Developing a service oriented IT platform for synchromodal transportation. In: On the Move to Meaningful Internet Systems, OTM 2014 Workshops, 27-31 October 2014, Calabria, Rome (pp. pp. 30-36).

Bösch, Christoph and Peter, Andreas and Leenders, Bram and Lim, Hoon Wei and Tang, Qiang and Wang, Huaxiong and Hartel, Pieter and Jonker, Willem (2014) Distributed Searchable Symmetric Encryption. In: Twelfth Annual International Conference on Privacy, Security and Trust, PST 2014, 23-24 July 2014, Toronto, Canada.

Sinderen, Marten J. van and Ivanov, Ivan I. (2014) Editorial for special section of grid computing journal on "Cloud Computing and Services Science". Cluster Computing, 18 (1). pp. 453-455. ISSN 1386-7857

Daneva, Maya and Damian, Daniela and Marchetto, Alessandro and Pastor, Oscar (2014) Empirical research methodologies and studies in requirements engineering: how far did we come? Journal of systems and software, 95 (12). pp. 1-9. ISSN 0164-1212

Wieringa, Roel (2014) Empirical research methods for technology validation: Scaling up to practice. Journal of systems and software . ISSN 0164-1212

Daneva, Maya and Marczak, Sabrina and Herrmann, Andrea (2014) Engineering of quality requirements as perceived by near-shore development centers' architects in eastern Europe: the hole in the whole. In: 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2014, 18-21 September 2014, Torino, Italy (pp. pp. 191-200).

Tan, Zhiyuan and Nagar, Upasana T. and He, Xiangjian and Nanda, Priyadarsi and Liu, Ren Ping and Wang, Song and Hu, Jiankun (2014) Enhancing big data security with collaborative intrusion detection. IEEE cloud computing, 2014 (Sept.). pp. 27-33. ISSN 2325-6095

Veneberg, R.K.M. and Iacob, M.E. and Sinderen, M.J. van and Bodenstaff, L. (2014) Enterprise architecture intelligence. In: Eighteenth IEEE International Enterprise Distributed Object Computing Conference, EDOC 2014, 3-5 September 2014, Ulm, Germany (pp. pp. 22-31).

Folmer, Erwin and Sinderen, Marten van and Oude Luttighuis, Paul (2014) Enterprise interoperability: information, services and processes for the interoperable economy and society. Information systems and e-business management, 12 (4). pp. 491-494. ISSN 1617-9846

Dechesne, Francien and Hadziosmanovic, Dina and Pieters, Wolter (2014) Experimenting with incentives: security in pilots for future grids. IEEE security & privacy, 12 (6). pp. 59-66. ISSN 1540-7993

Mu, Meiru and Spreeuwers, Luuk and Veldhuis, Raymond (2014) Face identification in videos from mobile cameras. In: Netherlands Conference on Computer Vision, NCCV 2014, 24-25 April 2014, Ermelo, The Netherlands (pp. pp. 1-4).

Spreeuwers, L.J. and Veldhuis, R.N.J. and Sultanali, S. and Diephuis, J. (2014) Fixed FAR Vote Fusion of regional Facial Classifiers. In: 13th International Conference of the Biometrics Special Interest Group, BIOSIG 2013, 11-13 September 2014, Darmstadt, Germany.

Meuwly, Didier (2014) Forensic use of fingermarks and fingerprints. In: Stan Z. Li & Anil K. Jain (Eds.), Encyclopedia of biometrics. Springer, London, UK, pp. 1-15. ISBN 9783642277337

Feiri, Michael and Petit, Jonathan and Kargl, Frank (2014) Formal model of certificate omission schemes in VANET. In: IEEE Vehicular Networking Conference, VNC 2014, 3-5 December 2014, Paderborn, Germany (pp. pp. 41-44).

Trivellato, Daniel and Zannone, Nicola and Etalle, Sandro (2014) GEM: A distributed goal evaluation algorithm for trust management. Theory and Practice of Logic Programming, 14 (3). pp. 293-337. ISSN 1471-0684

Armknecht, Frederik and Gagliardoni, Tommaso and Katzenbeisser, Stefan and Peter, Andreas (2014) General Impossibility of Group Homomorphic Encryption in the Quantum World. In: 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, March 26-28, 2014, Buenos Aires, Argentina (pp. pp. 556-573).

Hillerström, Fieke and Kumar, Ajay and Veldhuis, Raymond (2014) Generating and analyzing synthetic finger vein images. In: 13th International Conference of the Biometrics Special Interest Group, BIOSIG 2014, 10-12 September 2014, Darmstadt, Germany (pp. pp. 121-132).

Bilgin, Begül and Gierlichs, Benedikt and Nikova, Svetla and Nikov, Ventzislav and Rijmen, Vincent (2014) Higher-order threshold implementations. In: Advances in Cryptology – ASIACRYPT 2014. Lecture notes in computer science, 8874 . Springer, Berlin, Germany, pp. 326-343. ISBN 9783662456071

Daneva, Maya (2014) How practitioners approach gameplay requirements? An exploration into the context of massive multiplayer online role-playing games. In: 2014 IEEE 22nd International Requirements Engineering Conference, RE 2014, 23-26 August 2014, Karlskrona, Sweden (pp. pp. 3-12).

Constante, Elisa and Hartog, Jerry den and Petkovic, Milan and Etalle, Sandro and Pechenizkiy, Mykola (2014) Hunting the Unknown. In: 28th Annual IFIP WG 11.3 Working Conference Data and Applications Security and Privacy, DBSec 2014, July 14-16, 2014, Vienna, Austria (pp. pp. 243-259).

He, Xiangjian and Chomsiri, Thawatchai and Nanda, Priyadarsi and Tan, Zhiyuan (2014) Improving cloud network security using tree-rule firewall. Future generation computer systems, 30 . pp. 116-126. ISSN 0167-739X

Bosems, Steven and Sinderen, Marten van (2014) Improving context-aware applications for the well-being domain: Model-driven design guided by medical knowledge. In: Third International Conference on Sensor Networks, SENSORNETS 2014, 7-9 January 2014, Lisbon, Portugal (pp. pp. 397-403).

Dietzel, Stefan and Petit, Jonathan and Kargl, Frank and Scheuermann, Björn (2014) In-network aggregation for vehicular ad hoc networks. IEEE communications surveys & tutorials, 16 (4). pp. 1909-1932. ISSN 1553-877X

Kargl, Frank and Heijden, Rens W. van der and König, Hartmut and Valdes, Alfonso and Dacier, Marc C. (2014) Insights on the security and dependability of industrial control systems. IEEE security & privacy, 12 (6). pp. 75-78. ISSN 1540-7993

Ambusaidi, Mohammed A. and Tan, Zhiyuan and He, Xiangjian and Nanda, Priyadarsi and Lu, Liang Fu and Jamdagni, Aruna (2014) Intrusion detection method based on nonlinear correlation measure. International journal of internet protocol technology, 8 (2/3). pp. 77-86. ISSN 1743-8209

Sinderen, Marten van and Ferreira Pires, Luis and Iacob, Maria-Eugenia (2014) Message from the 3M4SE 2014 Workshop Chairs. In: 18th IEEE International Enterprise Distributed Object Computing Conference Workshops and Demonstrations, EDOCW 2014, 1-2 September 2014, Ulm, Germany (pp. pp. 333-334).

Singh, P.M. and Jonkers, H. and Iacob, M.E. and Sinderen, M.J. van (2014) Modeling value creation with enterprise architecture. In: Sixteenth International Conference on Enterprise Information Systems, ICEIS 2014, 27-30 April 2014, Lisbon, Portugal (pp. pp. 343-351).

Ionita, Dan and Koenen, Sebastiaan and Wieringa, Roel (2014) Modelling telecom fraud with e3value. [Report]

Bosems, Steven and Sinderen, Marten van (2014) Models in the design of context-aware well-being applications. In: On the Move to Meaningful Internet Systems, OnTheMove 2014, 27-31 October 2014, Amantea, Italy (pp. pp. 37-42).

Dacier, Marc C. and Kargl, Frank and Heijden, Rens van der and König, Hartmut and Valdes, Alfonso (2014) Network attack detection and defense: securing industrial control systems for critical infrastructures. Informatik Spektrum, 37 (6). pp. 605-607. ISSN 0170-6012

Dacer, Marc and Kargl, Frank and König, Hartmut and Valdes, Alfonso (2014) Network attack detection and defense: securing industrial control systems for critical infrastructures (Dagstuhl Seminar 14292). Dagstuhl Reports, 4 (7). pp. 62-79. ISSN 2192-5283

Abbasi, Ali and Wetzel, Jos and Bokslag, Wouter and Zambon, Emmanuele and Etalle, Sandro (2014) On Emulation-Based Network Intrusion Detection Systems. In: 17th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2014, 17-19 September 2014, Gothenburg, Sweden (pp. pp. 384-404).

Stottelaar, Bas and Senden, Jeroen and Montoya, Lorena (2014) Online social sports networks as crime facilitators. Crime science, 3 (8). ISSN 2193-7680

Heijden, Rens W. van der and Kargl, Frank (2014) Open issues in differentiating misbehavior and anomalies for VANETs. In: 2nd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication, FG-IVC 2014, 20-21 February 2014, Luxembourg City, Luxembourg (pp. pp. 24-26).

Förster, David and Kargl, Frank and Löhr, Hans (2014) PUCA: a pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET). In: IEEE Vehicular Networking Conference, VNC 2014, 3-5 December 2014, Paderborn, Germany (pp. pp. 25-32).

Kegel, Roeland H.P. and Wieringa, Roel J. (2014) Persuasive technologies: a systematic literature review and application to PISA. [Report]

Buchenscheit, Andreas and Könings, Bastian and Neubert, Andreas and Schaub, Florian and Schneider, Matthias and Kargl, Frank (2014) Privacy implications of presence sharing in mobile messaging applications. In: 13th International Conference on Mobile and Ubiquitous Multimedia, IEEE MUM 2014, November 25-28, 2014, Melbourne, Victoria, Australia (pp. pp. 20-29).

Baartmans, Chloë and Meuwly, Didier and Kosta, Eline (2014) Privacy of fingermarks data in forensic science: forensic evaluation and individual data protection. In: 9th International Conference on Forensic Inference and Statistics, ICFIS 2014, 19-22 August 2014, Leiden, the Netharlands.

Karvelas, Nikolaos P. and Peter, Andreas and Katzenbeisser, Stefan and Tews, Erik and Hamacher, Kay (2014) Privacy preserving whole genome sequence processing through proxy-aided ORAM. In: 13th Annual ACM Workshop on Privacy in the Electronic Society, WPES 2014, 3-7 November 2014, Scottsdale, AZ, USA.

Makri, Eleftheria and Everts, Maarten H. and Hoogh, Sebastiaan de and Peter, Andreas and Akker, Harm op den and Hartel, Pieter and Jonker, Willem (2014) Privacy-Preserving Verification of Clinical Research. In: Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19-21 März 2014, Wien, Österreich (pp. pp. 481-500).

Günther, Felix and Manulis, Mark and Peter, Andreas (2014) Privacy-enhanced participatory sensing with collusion resistance and data aggregation. In: 13th International Conference on Cryptology and Network Security, CANS 2014, 22-24 October 2014, Heraklion, Crete, Greece (pp. pp. 321-336).

Kordy, Barbara and Mauw, Sjouke and Pieters, Wolter (2014) Proceedings First International Workshop on Graphical Models for Security, Grenoble, France, April 12, 2014. EPTCS 148 . arXiv.org.

Biedermann, Sebastian and Karvelas, Nikolaos P. and Katzenbeisser, Stefan and Strufe, Thorsten and Peter, Andreas (2014) ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation. In: 40th International Conference on Current Trends in Theory and Practice of Computer Science, SOFSEM 2014, January 26-29, 2014, Nový Smokovec, Slovakia (pp. pp. 114-125).

Petit, Jonathan and Schaub, Florian and Feiri, Michael and Kargl, Frank (2014) Pseudonym schemes in vehicular networks: a survey. IEEE communications surveys & tutorials, 17 (1). pp. 228-255. ISSN 1553-877X

Arnold, Florian and Pieters, Wolter and Stoelinga, Mariëlle (2014) Quantitative penetration testing with item response theory. Journal of information assurance and security, 9 (3). pp. 118-127. ISSN 1554-1010

Feiri, Michael and Petit, Jonathan and Kargl, Frank (2014) Real world privacy expectations in VANETs real world privacy expectations in VANETs. In: 2nd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication, FG-IVC 2014, 20-21 February 2014, Luxembourg City, Luxembourg (pp. pp. 30-32).

Pieters, Wolter and Lukszo, Zofia and Hadžiosmanović, Dina and Berg, Jan van den (2014) Reconciling malicious and accidental risk in cyber security. Journal of Internet Services and Information Security, 4 (2). pp. 4-26. ISSN 2182-2077

Dietzel, Stefan and Gürtler, Julian and Heijden, Rens van der and Kargl, Frank (2014) Redundancy-based statistical analysis for insider attack detection in VANET aggregation schemes. In: IEEE Vehicular Networking Conference, VNC 2014, 3-5 December 2014, Paderborn, Germany (pp. pp. 135-142).

Wang, R. and Ramos, D. and Veldhuis, R.N.J. and Fierrez, J. and Spreeuwers, L.J. and Xu, Haiyun (2014) Regional fusion for high-resolution palmprint recognition using spectral minutiae representation. IET Biometrics, 3 (2). pp. 94-100. ISSN 2047-4938

Petit, Jonathan and Feiri, Michael and Kargl, Frank (2014) Revisiting attacker model for smart vehicles. In: IEEE 6th International Symposium on Wireless Vehicular Communications, WiVeC 2014, 14-15 September 2014, Vancouver, Canada (pp. pp. 1-5).

Bösch, Christoph and Peter, Andreas and Hartel, Pieter and Jonker, Willem (2014) SOFIR: Securely Outsourced Forensic Image Recognition. In: 39th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2014, May 4-9, 2014, Florence, Italy.

Cordeiro, José and Sinderen, Marten van, eds. (2014) Software Technologies - 8th International Joint Conference, ICSOFT 2013 : revised selected papers. Communications in computer and information science, 457 . Springer, Heidelberg, Germany. ISBN 9783662449196

Pieters, Wolter and Hadžiosmanović, Dina and Lenin, Aleksandr and Montoya, Lorena and Willemson, Jan (2014) TREsPASS: Plug-and-Play Attacker Profiles for Security Risk Analysis (Poster). In: 35th IEEE Symposium on Security and Privacy, May 17-18, 2014, San Jose, CA, USA.

Vriezekolk, Eelco (2014) Testing reliability of raster - report of experiment with Kerckhoffs students. [Report]

Hadžiosmanović, Dina (2014) The process matters: cyber security in industrial control systems. thesis.

Bilgin, Begül and Nikova, Svetla and Nikov, Ventzislav and Rijmen, Vincent and Tokareva, Natalia and Vitkup, Valeriya (2014) Threshold implementations of Small S-boxes. Cryptography and communications . ISSN 1936-2447

Hadziosmanovic, Dina and Sommer, Robin and Zambon, Emmanuele and Hartel, Pieter H. (2014) Through the eye of the PLC: semantic security monitoring for industrial processes. In: 30th Annual Computer Security Applications Conference, ACSAC 2014, 8-12 December 2014, New Orleans, LA, USA (pp. pp. 126-135).

Li, Wenjuan and Meng, Weizhi and Tan, Zhiyuan and Xiang, Yang (2014) Towards designing an email classification system using multi-view based semi-supervised learning. In: 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, 24-26 September 2014, Beijing, China (pp. p. 266).

Wieringa, Roel J. (2014) Towards middle-range usable design theories for software engineering. In: 3rd SEMAT Workshop on General Theories of Software Engineering, GTSE 2014, 31 may - 7 june 2014, Hyderabad, India (pp. pp. 1-4).

Zeinstra, Chris and Veldhuis, Raymond and Spreeuwers, Luuk (2014) Towards the automation of forensic facial individualisation: Comparing forensic to non forensic eyebrow features. In: 35th WIC Symposium on Information Theory in the Benelux, 12-13 May 2014, Eindhoven, Netherlands (pp. pp. 73-80).

Neisse, Ricardo and Wegdam, Maarten and Sinderen, Marten van (2014) Trust management support for context-aware service platforms. In: A. Aldini & A. Bogliolo (Eds.), User-Centric Networking - Future Perspectives. Lecture Notes in Social Networks . Springer International Publishing, Switzerland, pp. 75-106. ISBN 9783319052175

Gong, Zheng and Hartel, Pieter and Nikova, Svetla and Tang, Shao-Hua and Zhu, Bo (2014) TuLP:A family of lightweight message authentication codes for body sensor networks. Journal of computer science and technology, 29 (1). pp. 53-68. ISSN 1000-9000

Engelsman, Wilco and Wieringa, Roel (2014) Understandability of goal concepts by requirements engineering experts. In: 1st International Workshop on Conceptual Modeling in Requirements and Business Analysis, MReBA 2014 of the 33rd International Conference on Conceptual Modeling, ER 2014, 27-29 October 2014, Atlanta, GA, USA (pp. pp. 97-106).

Engelsman, Wilco and Wieringa, Roel (2014) Understandability of goal-oriented requirements engineering concepts for enterprise architects. In: 26th International Conference on Advanced Information Systems Engineering, CAiSE 2014, 16-20 June 2014, Thessaloniki, Greece (pp. pp. 105-119).

Daneva, Maya (2014) Understanding functional reuse of ERP requirements in the telecommunication sector: an empirical study. In: 2014 Joint Conference of the International Workshop on Software Measurement and the International Conference on Software Process and Product Measurement, IWSM-Mensura 2014, 6-8 October 2014, Rotterdam, The Netherlands (pp. pp. 216-221).

Haraksim, Rudolf (2014) Validation of likelihood ratio methods used for forensic evidence evaluation: application in forensic fingerprints. thesis.

Daneva, Maya and Berntsson Svensson, Richard and Marczak, Sabrina and Franch, Xavier and Madhavji, Nazim (2014) Welcome from the Workshop Chairs. In: Fourth International Workshop on Empirical Requirements Engineering, EmpiRE 2014, 25 August 2014, Karlskrona, Sweden (pp. pp. 1-3).

Méndez Fernández, Daniel and Ognawala, Saahil and Wagner, Stefan and Daneva, Maya (2014) Where do we stand in requirements engineering improvement today? First results from a mapping study. In: 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2014, 18-21 September 2014, Torino, Italy (pp. pp. 1-4).

2013

Vogelezang, Frank and Symons, Charles and Lesterhuis, Arlan and Meli, Roberto and Daneva, Maya (2013) Approximate COSMIC functional size - guideline for approximate COSMIC functional size measurement. In: 2013 Joint Conference of the 23rd International Workshop on Software Measurement and the 2013 Eighth International Conference on Software Process and Product Measurement, IWSM-Mensura 2013, 23-26 October 2013, Ankara, Turkey (pp. pp. 27-32).

Ionita, Dan and Hartel, Pieter and Pieters, Wolter and Wieringa, Roel (2013) Current established risk assessment methodologies and tools. [Report]

Erasmus, Izak Pierre and Daneva, Maya (2013) ERP effort estimation based on expert judgments. In: 2013 Joint Conference of the 23rd International Workshop on Software Measurement (IWSM) and the 8th International Conference on Software Process and Product Measurement (Mensura), 23-25 October 2013, Ankara, Turkey (pp. pp. 104-109).

Martakis, Aias and Daneva, Maya (2013) Handling requirements dependencies in agile projects: a focus group with agile software development practitioners. In: IEEE 7th International Conference on Research Challenges in Information Science, RCIS 2013, 29-31 May 2013, Paris, France (pp. pp. 1-11).

Vasenev, A. and Ionita, D. and Bijleveld, F. and Hartmann, T. and Doree, A. (2013) Information fusion of GNSS sensor readings, field notes, and expert's a priori knowledge. In: eg-ice 2013 20th international workshop: intelligent computing in engineering, July 1 - 3, 2013, Vienna, Austria, July 1-3, 2013, Vienna, Austria (pp. pp. 1-10).

Povoa, Lucas Venezian and Lopes de Souza, Wanderley and Ferreira Pires, Luis and Duipmans, Evert F. and Prado, Antonio Francisco do (2013) Uma Abordagem para a Decomposição de Processos de Negócio para Execução em Nuvens Computacionais (in Portugese; An approach to business processes decomposition for cloud deployment). In: XXVII Brazilian Symposium on Software Engineering, SBES 2013, 29 September - 4 October 2013, Brasília, Brazil (pp. pp. 124-133).

This list was generated on Sun May 28 06:58:44 2017 CEST.