Maarten van Wieren, Christian Doerr, Vivian Jacobs, Wolter Pieters (2016), Understanding bifurcation of slow versus fast cyber-attackers, G Livraga , V. Torra, A. Aldini, F. Martinelli, N. Suri (Eds.), In Data Privacy Management and Security Assurance p.19-33, Springer.

Arman Noroozian, Maciej Korczynski, Carlos Hernandez Ganan, Daisuke Makita, Katsunari Yoshioka, Michel van Eeten (2016), Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service, In Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2016, Springer.

NLM van Adrichem, N Blenn, A Reyes Lua, X. Wang, M Wasif, Ficky Fatturrahman, F.A. Kuipers (2015), A measurement study of DNSSEC misconfigurations, In Security Informatics Volume 4 p.1-6.

A Noroozian, MT Korczynski, ST Tajalizadehkhoob, MJG van Eeten (2015), Developing Security Reputation Metrics for Hosting Providers, In Proceedings of the 8th Usenix Workshop on Cyber Security Experimentation and Test (CSET 15) p.-, USENIX Association.

C Doerr, FA Kuipers (2014), All quiet on the Internet front?, In IEEE Communications Magazine Volume 52 p.46-51.

N Blenn (2014), Content propagation in online social networks, PhD Thesis Delft University of Technology.

NLM van Adrichem, C Doerr, FA Kuipers (2014), OpenNetMon: network monitoring in openflow software-defined networks, J Janusz Filipiak (Eds.), In Proceedings NOMS p.1-8, IEEE.

Y Koc, ME Warnier, R.E. Kooij, FM Brazier (2014), Structural vulnerability assessment of electric power grids, In Proceedings of the 11th IEEE International Conference on Networking, Sensing and Control, ICNSC 2014 p.386-391, IEEE.

Y Koc, ME Warnier, PFA Van Mieghem, RE Kooij, FM Brazier (2014), The impact of the topology on cascading failures in a power grid model, In Physica A: Statistical Mechanics and its Applications Volume 402 p.169-179.

ST Tajalizadehkhoob, H Asghari, C Ganan, MJG van Eeten (2014), Why them? Extracting intelligence about target selection from zeus financial malware, s.n. (Eds.), In proceedings of the 13th annual workshop on the economics of information security, WEIS 2014 p.1-26, WEIS.