Programme and proceedings
The conference will start with a plenary session in the morning, February 1, 2019. In the afternoon there were parallel sessions with the various tracks. The slots allocated for the presentations at the conference will be 15 minutes per paper. This includes the presentation itself (12 minutes), and 3 minutes questioning. The preferred language is English.
The papers scheduled in the morning session are best paper nominations. Out of these papers the best papers will be selected, and awarded with the TSCiT best paper award.
The proceedings will be published on-line with open access policies.
Conference programme
Morning session (Ravelijn 2504): best paper nominees
9:30: Welcome coffee
10:15: Opening
10:30 Best paper nominees
Heleen Visserman, "Group Activity Recognition Using Channel State Information"
Thomas Meijerman, "Manipulating A Dissociative Bond With Out-Of-Body Experience Avatar In Virtual Reality"
Dirk Koelewijn, "Using Fingerprints for Automated Rule Generation for DDoS Mitigation using the Berkely Packet Filter"
Thomas Teunissen, "Success factors for RPA application in small and medium sized enterprises"
Ties Bolding, "Applying Peak-Shaving to Household Devices using an Event-Driven Algorithm"
11:45 Best paper award ceremony
12:15 - 13:15 Lunch - Waaier Foyer
Afternoon sessions
13:30 Dependable networks (HB 2F)
Wouter Kobes, "Efficient and accurate classification of cyber security related documents"
Diederik Bakker, "Impact-based optimisation of BGP Flowspec rules in DDoS attack mitigation"
Julik Keijer, "Automated DDoS mitigation based on known attacks using a Web Application Firewall"
Niek Khasuntsev, "Accurate and Efficient Classification of Cyber Security Documents"
13:30 Internet of Things (HB 2B)
Lucas de Vries, "IOTA Vulnerability: Large Weight Attack Performed in a Network"
Gijs Bolhaar, "Guided composing in music education"
Martijn Renssen, "Classification of types of road damage using machine learning and a smartwatch"
Dennis Cai, "A parasite chain attack in IOTA"
14:30 – 14:45 Coffee/Tea Break (Entrance of the Waaier building, close to the Reception)
14:45 Information management (HB 2F)
Eric van Schaik, "Conceptualization of Recognition Techniques for the Automation of Manipulation Detection in Advertisement Videos"
Gereon Mendler, "Designing a Meta Report for Hotel Customer Reviews"
15:15 Formal methods and software engineering (HB 2F)
DISCLAIMER
Permission to make digital or hard copies of all or part of the on this website presented work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission.
Copyright University of Twente, Twente Student Conference on IT, Enschede, the Netherlands.