Program and proceedings
The conference started with a plenary session in the morning, July, 6, 2018 in building the Waaier, room WA2. In the afternoon there were 4 parallel sessions with the various tracks, they are all scheduled in building Ravelijn. The slots allocated for the presentations at the conference will be 15 minutes per paper. This includes the presentation itself (12 minutes), and 3 minutes questioning. The preferred language is English.
The papers scheduled in the morning session are best paper nominations. Out of these papers the best papers will be selected, and awarded with the TSCiT best paper award.
The proceedings will be published on-line with open access policies.
Conference programme
Morning session (Waaier 2): best paper nominees
8:45: Welcome coffee
9:00: Opening
9:15 Best paper nominees
Thijs van Essen: Finger Vein Recognition Using Distance Transform
Lieke Hamelers: Investigating Generic Online Animal Activity Recognition Across Different Species - best paper
Bart Verkuil: Extracting Passwords From Movement: Side-channel Attack On Smartphones Using Motion Sensors - best paper
Han Hollander: Using Software Metrics as Indicators for Agility of Object-Oriented Projects
Stijn Overduin: The Visualization of the Strength of Android Unlock Patterns - best paper
10:30 – 11:00 Coffee/Tea Break
11:00 Session: Best paper nominees
Gijsbert Ter Horst: LoRa Passive Positioning: Analysis of the effects of various parameters on performance
Vincent Dunning: Testing the Robustness of Convolutional Neural Networks to Structured Noise
Jerre Starink: Recovery of Control Flow Graphs of Native Binaries using Register Value Inference - best paper
Wim Kamerman: Classification of Event-Related Google Alerts Using Machine Learning - best paper
Jan-Jaap Korpershoek: Filtering DDoS traffic using the P4 programming language - best paper
12:15 Best paper award ceremony
12:30 - 13:30 Lunch - Waaier Foyer
Afternoon sessions - Ravelijn
13:30 Embedded Systems and IoT (RA 2503)
Steven Hendriksen: Approximate computing for the 2D Fast Fourier Transform in astronomy
Reinard Beekman: Converting Haskell code to dataflow graphs
Louis Hu: Analysis of Blockchain-based Distributed Ledger Technologies for the Supply Chain
Wouter van Veelen: Improving detection of color-based fiducial markers in specialized real-time tracking software
13:30 Formal methods and software engineering (RA 2501)
Wijtse Rekker: Combining multiple similar grammars into a single modular grammar
Tom Leemreize: Tracking Code Elements Through Program Updates in Java Applications
Pieter Jan Roelofs: Determining Long Run Properties of Complex Models using Statistical Model Checking
Tim Kerkhoven: Extending the Functionality of Sequences in VerCors
13:30 Biometrics and security (RA 2502)
Wouter Timmermans: The Limits of Dynamic Stored Cross-Site Scripting Detection
Sander Meinderts: Measuring the difference in classifier accuracy between high and low quality images when detecting a certain attribute
Martijn de Vries: A Practical Protocol for Biometric Recognition under Encryption
Joost Prins: Facial mark detection: a deep learning approach
Davey Hu: Malware network analysis categorisation
13:30 Information management (RA 2504)
David Haemers: Corporate and traditional startups in a platform society
Herjan Nijzink: A Homemade Air Quality Sensor: is it viable?
Alexander Menne: Blockchain in the sharing economy : Will blockchain disrupt today's winning business models?
Arend Pool: An Information Systems model for tackling fake news
Sander Ter Stege: Blockchain in Logistics, hype or game changer?
14:45 – 15:00 Coffee/Tea Break - Ravelijn Atrium
15:00 Data and network science (RA 2501)
Yoep Kortekaas: Investigating potential biases in micro-loans
Jordy van der Zwan: Mining Processes in Execution Logs
Marco Dijkslag: RedCat game player generation using a genetic algorithm
Danique Sessink: Using Machine Learning to Detect ICT in Criminal Court Cases
Jeroen Bos: Schema matching and automated analysis for visualization of relational data of SMEs
Mark 't Hart: Reinforcement learning from self-play in imperfect information zero-sum games applied to Stratego variants
15:00 Information management, session A (RA 2504)
Sander Bloemen: Designing an application for focussed surveys
Wouter Bolhuis: The Application of Scalable Agile in Dutch Government
Mike Hulshof: The downfall of traditional radio: Will personalized radio surpass preprogrammed radio?
Nick Kerckhoffs: Is the “Netflix's exclusive content model” favorable for the audio streaming industry
Mark de La Court: Will computers determine what music we listen? Exploring user acceptance of music recommenders
15:00 Dependable networks; and Information management session B (Room RA 2503)
Mathay Kahraman: Learning vehicles to safely cross a junction
Noël Keijzer: Using attack fingerprints to detect and inhibit DDoS attacks using an IPS
Sergey Dragomiretskiy: The influence of DDoS attacks on cryptocurrency exchanges
Tibor Casteleijn: Startup knowledge brought to large organisations: Innovation management software based on blockchain technology
Maarten Looijenga: The Detection of Fake Messages using Machine Learning
15:00 Biometrics and security (RA 2502)
Joël van der Kaaij: Detection of Co-browsing
Janko Chavannes: Analysing HTTP header security of REST APIs in a continuous integration pipeline
Dylan de Bie: Misuse of data found on lost USB sticks
Sam Witt: Misuse of improperly deleted data on USB storage devices
16:30 Reception - Educafe
The programme at a glance gives an overview of the whole programme and its tracks. The proceedings of the past conferences are still available.
DISCLAIMER
Permission to make digital or hard copies of all or part of the on this website presented work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission.
Copyright University of Twente, Twente Student Conference on IT, Enschede, the Netherlands.