The conference will be held live on campus on January 30th 2026.
The event is divided into sessions. There will be a plenary session in the morning where everyone should be present; afterwards the different track sessions will happen in parallel. The plenary session contains the presentations of the best papers nominated from all the submissions, followed by an award ceremony where the best paper will be awarded.
Notes on the presentations:
The slots allocated for the presentations at the conference will be 15 minutes per paper. This includes the presentation itself (min. 10 and max. 12 minutes), and 3 minutes for questions. There will be not format for the slides. Students are free to select their preferred format, as long as it is clean and professional. All presentations will be live on campus (apart from exceptional cases).
The proceedings will be published online with open access policies. The proceedings of the Past editions are still available for your reference.
There will be two main sessions:
The plenary session (8:45 - 10:35) in Waaier 3
Parallel track sessions (11:00 – 14:45) in Ravelijn
Drinks in SmartXP (14:30)
Note: The presentation order within the track sessions is organized by the track chair and mainly depending on the availability of the supervisors. If you have special requests, please contact your track chair.
8:45 Opening
8:55 Presentations of Best Paper nominations
10:25 Award ceremony Best Paper
10:35 - 11:00 Break (coffee/tea in Ravelijn)
11:00 Parallel track sessions (Ravelijn)
14:30 Drinks in Smart XP
Nominations for Best Paper
8:55 - Ammar Sodikov - Intraday Volatility Spillovers and Machine Learning Predictability in E-mini NASDAQ-100 Futures: A 16-Year Study
9:10 - Thimo Mons – Hungry Neighbours: Greedy Algorithms for creating Routing Trees
9:25 - Adela Simion - Hedgehog Activity Tracking with Low-Resolution Embedded Thermal Vision
9:40 - Edwin Martens - RAMTo: A Real-time Anycast Measurement Tool
9:55 - Kazi Rifat Hasan - Measuring and Reducing Knowledge-Driven Hallucination in LLM-Based Healthcare Process Modeling
10:10 - Tim Angevare - Named Entity Recognition in Cybercrime Intelligence Analysis: A Hybrid LLM Approach to Reduce Manual ETL Workload
Track 1. Intelligent Interaction
Track chair: Mariët Theune
RA 3237
11:15 – 11:30 Amina Chairulina – Knowledge-Aware Conversational Agent: Adapting to Users’ Prior Familiarity with Artworks
11:30 – 11:45 Cenk Doğruer – Evaluating Decentralized Q-Learning in Multi-Agent Overcooked Environments
11:45 – 12:00 Awan Cahya Aditya - Active or Reactive: Comparing Feedback Timing Strategies for Squat Exercises Coached by a Socially Assistive Robot
12:00 Poll for Best Presentation
Track 2. Information Management
Track chair: Marcos Machado
RA 2234
11:15 – 11:30 Yousef Kaid - Designing an Adjustable Intelligent Agent Using a Process Mining Based Feedback Loop
11:30 – 11:45 Gela Tsuladze - Stability-Validated Unsupervised Anomaly Detection for Pre-Listing Trading Behavior in Cryptocurrency Markets
11:45 – 12:00 Zsombor Pap - DDoS attack modeling with attack trees based on interviews
12:15 – 13:15 Lunch Break
13:15 – 13:30 Shyam Naguine - Financial viability analysis of industrial symbiosis networks: a scenario-based simulation model
13:30 – 13:45 Muhammad Reynard Enriza - Assessing the Proactivity Required to Integrate AI-Based Conversational Agents Into Education
13:45 – 14:00 Kamran Babayev - Investment Patterns and Impact of Industrial Symbiosis in the Basque Hub for Circularity
14:00 Poll for Best Presentation
Track 3. Software Technology and Formal Methods
Track chair: Peter Lammich
RA 2502
11:15 – 11:30 Born Veen - Automated Verification of Interactive Fiction
11:30 – 11:45 Dirk Weersink - Automatic evaluation of regular-expression-based student exercises
11:45 – 12:00 Mathijs Polman - Exploiting Fault Tree Modules in Binary Decision Diagram Conversion
12:00 – 12:15 Wouter van Gent - Evaluating and optimizing CPU/GPU performance in Rust
12:15 – 13:15 Lunch Break
13:15 – 13:30 Simon van Zeijts - Creating an Optimizing Compiler using the Sea of Nodes IR
13:30 – 13:45 Mireia Lopez Bruch - Implementing Lyra and its compiler with ANTLR and LLVM in C++
13:45 – 14:00 Carim Popa - Comparing Spoofax and Eclipse Xtext Language Workbenches for Editor Support in DOT DSL
14:00 – 14:15 Daan Wensink - Determining modernity metrics for Java codebases
14:15 Poll for Best Presentation
Tracks 4. Pervasive Computing and Internet of Things
Track chair: Duc Le
RA 2337
11:15 – 11:30 Daniël van Andel - Reliability of indoor Meshtastic LoRa networks for firefighters
11:30 – 11:45 Lars Gortemaker - Comparing LLM-generated HDL between tasks with and without public implementations
11:45 – 12:00 Luca Vlăsceanu - Cycle-Aware Statistical Surrogates for Electrical Current Traces in Industrial CPS
12:00 Poll for Best Presentation
Track 5. Network Systems and network security
Track chair: Mahboobeh Zangiabady
RA 2504
11:15 – 11:30 Raphael Ritz - Privacy-Preserving Crowd Flow Estimation: Fuzzy PSI for Facial Embeddings
11:30 – 11:45 Hayo van de Werfhorst - Optimizing probe selection for accurate anycast geolocation using iGreedy
11:45 – 12:00 Jelmer Otten - Investigating CZDS zones update time
12:00 – 12:15 Bram Ouwekerk - Noisy Routers: Investigating the Make-up of Large MRT Files in RIPE RIS
12:15 – 13:15 Lunch Break
13:15 – 13:30 Twan Weerdenburg - Using a Cryptographic Bill of Materials to compare Encryption Assets within different Layers of an Industrial Control System
13:30 – 13:45 Maria Ioana Ruginosu - Measuring the Overhead of Cryptographic Components in a Post-Quantum Certificate Authority
13:45 – 14:00 Bram Stoffelsen - An inquiry on the primary hosting platforms of malicious domains
14:00 – 14:15 Andrei Niculi – Beyond the Guest List: Investigating SPF Configurations of Malicious Domains
14:15 – 14:30 Naut de Vroome - Measuring best common practice in DNS resolver configuration
14:30 Poll for Best Presentation
Track 6. Data Science
Track chair: Nacir Bouali
RA 3231
11:15 – 11:30 Nico Li - Estimation of the methods teens would use to detect hallucinations from Large Language Models
11:30 – 11:45 Hugo Blokland - Guidelines for model-agnostic Explainable AI software validated with C-SHAP
11:45 – 12:00 Le Hoang Pham - Decoding Segmentation Decisions: An XAI Method for 3D Point Cloud Understanding
12:00 – 12:15 Alex Daniel Thomas Duncan - The Measured Variability of Foot Temperature in Healthy Subjects
12:15 – 12:30 Gustavo Silva Prado - Computational Modelling of Aesthetic Judgement in Paintings
12:30 - 13:15 Lunch Break
13:15 – 13:30 Joris Faas - Process mining in study orientation and registration: A case group review
13:30 – 13:45 Jort Bork - Analyzing Student Enrollment Journeys Using Process Mining and Event Log Analysis
13:45 – 14:00 Daeun Kang - Impact of event log data quality on the conformance checking accuracy and operational decision-making in logistics processes
14:00 – 14:15 Mohamed Soliman - Evaluating Categorical Encoding Strategies for Disposition Prediction in Healthcare Process Monitoring
14:15 Poll for Best Presentation
RA 3237
13:30 – 13:45 Jonathan Michalewitz - Exploring data augmentation in computer vision for missing-object detection with GNN
13:45 – 14:00 Lisa te Braak - Redesign and Improvement of a Side Illumination Finger Vein Scanner
14:00 – 14:15 Brian van Oers - The Effect of Tabular Data Augmentation with Statistical Feature Addition in Classification Tasks using Generative Imputation Ensembles within a Healthcare Context: A Preliminary Methodological Study
14:15 Poll for Best Presentation
Track 8. Semantics, Cybersecurity & Services
Track chair: Tiago Prince Sales
RA 2231
11:15 – 11:30 Jules Stolk - A Flexible Data Architecture for Cryptocurrency Data Using Relational and Graph Databases
11:30 – 11:45 Sam Mulder - Building RDF Knowledge Graphs from Cryptocurrency Exchange Data Using an ETL Pipeline
11:45 – 12:00 Farida Elsadany - A Comparative Analysis of FaaS-Based vs. Monolithic Architectures in Multi-Tenant SaaS Systems
12:00 – 12:15 Thomas Brants - User Friendly Form Editor To Create SHACL-based Metadata Schemas
12:15 – 13:15 Lunch Break
13:15 – 13:30 Justas Gvažiauskas - AI-based Image Steganalysis and Threat Analysis
13:30 – 13:45 Ion Donos - Building a Machine-Readable SKOS Taxonomy of ISO/IEC 27001:2022
13:45 Poll for Best Presentation
Permission to make digital or hard copies of all or part of the on this website presented work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission.
Copyright University of Twente, Twente Student Conference on IT, Enschede, the Netherlands.