Yihuan Zhang, Qin Lin, Jun Wang, Sicco Verwer (2017), Car-following Behavior Model Learning Using Timed Automata, D. Dochain, D. Henrion, D. Peaucelle (Eds.), In IFAC-PapersOnLine p.2353-2358, Elsevier.

Hennie Huijgens, Arie van Deursen, Leandro L. Minku, Chris Lokan (2017), Effort and Cost in Software Engineering: A Comparison of Two Industrial Data Sets, Emilia Mendes, Steve Counsell, Kai Petersen (Eds.), In Proceedings of the 21st International Conference on Evaluation and Assessment in Software Engineering, EASE 2017 p.51-60, Association for Computing Machinery (ACM).

Stjepan Picek (2017), Evolutionary Computation and Cryptology, In GECCO 2017 - Proceedings of the Genetic and Evolutionary Computation Conference Companion p.1066-1093, Association for Computing Machinery (ACM).

Daco Harkes, Eelco Visser (2017), IceDust 2: Derived Bidirectional Relations and Calculation Strategy Composition, Peter Müller (Eds.), In 31st European Conference on Object-Oecoopriented Programming, ECOOP 2017 p.1-29, Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany.

Daco C. Harkes, Eelco Visser (2017), IceDust 2: Derived Bidirectional Relations and Calculation Strategy Composition (Artifact), In Dagstuhl Artifacts Series Volume 3 p.1:1-1:2.

Thijs Veugen, Jeroen Doumen, Zekeriya Erkin, Nino Pellegrino, Sicco Verwer, Jos Weber (2017), Improved privacy of dynamic group services, In Eurasip Journal on Information Security Volume 2017 p.1-9.

Robbert Krebbers, Amin Timany, Lars Birkedal (2017), Interactive proofs in higher-order concurrent separation logic, In POPL 2017 Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages p.205-217, Association for Computing Machinery (ACM).

Mark Luchs, Christian Doerr (2017), Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems, M. Polychronakis, M. Meier (Eds.), In Detection of Intrusions and Malware, and Vulnerability Assessment DIMVA 2017 p.141-160, Springer.

Sicco Verwer, Yingqian Zhang (2017), Learning Decision Trees with Flexible Constraints and Objectives Using Integer Optimization, D. Salvagnin, M. Lombardi (Eds.), In Integration of AI and OR Techniques in Constraint Programming p.94-103, Springer.

Nino Pellegrino, Qin Lin, Christian Hammerschmidt, Sicco Verwer (2017), Learning behavioral fingerprints from Netflows using Timed Automata, P. Chemouil, E. Monteiro, M. Charalambides, E. Madeira, P. Simoes, S. Secci, L.P. Gaspary, C.R.P. dos Santos (Eds.), In 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) p.308-316, IEEE.