Yakup KoƧ, Abhishek Raman, Martijn Warnier, Tarun Kumar (2016), Structural vulnerability analysis of electric power distribution grids, In International Journal of Critical Infrastructures Volume 12 p.311-330.

Anneke Zuiderwijk-van Eijk, Keith Jeffery, Daniele Bailo, Yi Yin (2016), Using Open Research Data for Public Policy Making: Opportunities of Virtual Research Environments, In Proceedings of CeDEM16: International Conference for e-Democracy and Open Government 2016.

Dua Elnakhala (2016), When Fencing is not Protecting: The Case of Israel-Gaza, Martin van der Velde, Ton van Naerssen (Eds.), In Mobility and Migration Choices, Routledge - Taylor & Francis Group.

JCA van der Lubbe, MJ de Boer, Z Erkin (2015), A signature scheme for a dynamic coalition defence environment without trusted third parties, B Ors, B Preneel (Eds.), In Cryptography and Information Security in the Balkans: First International Conferende p.237-249, Springer.

SRM Miller (2015), Collective Responsibility for the Robopocalypse, J Galliott, M Lotz (Eds.), In Super Soldiers p.153-166, Routledge - Taylor & Francis Group.

PJM Veugen, Z Erkin (2015), Content-based recommendations with approximate integer division, V Clarkson, J Manton (Eds.), In Proceedings - 2015 IEEE International Conference on Acoustics, Speech and Signal Processing p.1802-1806, IEEE.

H Asghari, MJG van Eeten, JM Bauer (2015), Economics of fighting botnets: Lessons from a decade of mitigation, In IEEE Security & Privacy Magazine: building confidence in a networked world Volume 13 p.16-23.

H Asghari, M Ciere, MJG van Eeten (2015), Post-mortem of a Zombie: Conficker cleanup after six years, J Jung (Eds.), In Proceedings of the 24th USENIX Security Symposium p.1-16, USENIX Association.

Z Erkin (2015), Private data aggregation with groups for smart grids in a dynamic setting using CRT, s.n. (Eds.), In Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, WIFS p.1-6, IEEE.

PJM Veugen, F Blom, SJA de Hoogh, Z Erkin (2015), Secure comparison protocols in the semi-honest model, In IEEE Journal of Selected Topics in Signal Processing Volume 9 p.1217-1228.