AMMO Cortez, S Hamdioui, R Ishihara (2015), Design dependent SRAM PUF robustness analysis, V Champac, Y Zorian (Eds.), In Proceedings - 16th IEEE Latin-American Test Symposium p.1-6.

A Noroozian, MT Korczynski, ST Tajalizadehkhoob, MJG van Eeten (2015), Developing Security Reputation Metrics for Hosting Providers, In Proceedings of the 8th Usenix Workshop on Cyber Security Experimentation and Test (CSET 15) p.-.

H Asghari, MJG van Eeten, JM Bauer (2015), Economics of fighting botnets: Lessons from a decade of mitigation, In IEEE Security & Privacy Magazine: building confidence in a networked world Volume 13 p.16-23.

GCM Moura, C Ganan, QB Lone, P Poursaied Esfahani, H Asghari, MJG van Eeten (2015), How dynamic is the ISPs address space? Towards internet-wide DHCP churn estimation, R Kacimi, Z Mammeri (Eds.), In Proceedings of the 14th IFIP Networking Conference p.1-9.

AMMO Cortez, S Hamdioui, A Kaichouhi, V van der Leest, R Maes, GJ Schrijen (2015), Intelligent voltage ramp-up time adaptation for temperature noise reduction on memory-based PUF systems, In IEEE Transactions on Computer - Aided Design of Integrated Circuits and Systems Volume 34 p.1162-1175.

J van den Berg, J van Zoggel, M Snels, M van Leeuwen, S Boekee, L Koppen, B van den Berg, A de Bos, JCA van der Lubbe (2015), On (the emergence of) cyber security science and its challenges for cyber security education, E Luijff (Eds.), In Proceedings of the NATO IST-122 Cyber Security Science and Engineering Symposium, Tallinn, Estonia, October 13¿14 2014. Winner of the BEST PAPER AWARD p.-.

P. Mohajerin Esfahani, Tobias Sutter, John Lygeros (2015), Performance Bounds for the Scenario Approach and an Extension to a Class of Non-Convex Programs, In IEEE Transactions on Automatic Control Volume 60 p.46-58.

H Asghari, M Ciere, MJG van Eeten (2015), Post-mortem of a Zombie: Conficker cleanup after six years, J Jung (Eds.), In Proceedings of the 24th USENIX Security Symposium p.1-16.

Z Erkin (2015), Private data aggregation with groups for smart grids in a dynamic setting using CRT, s.n. (Eds.), In Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, WIFS p.1-6.

PJM Veugen, F Blom, SJA de Hoogh, Z Erkin (2015), Secure comparison protocols in the semi-honest model, In IEEE Journal of Selected Topics in Signal Processing Volume 9 p.1217-1228.