W Pieters, D Hadziosmanovic, F Dechesne (2015), Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace, In Science and Engineering Ethics Volume 22 p.1-20.

Nitin Chiluka, Nazareno Andrade, Johan Pouwelse, Henk Sips (2015), Social Networks Meet Distributed Systems: Towards a Robust Sybil Defense under Churn, In ASIA CCS'15 p.507-518, Association for Computing Machinery (ACM).

J.W.H. Bullee, L. Montoya, W Pieters, M. Junger, P.H. Hartel (2015), The persuasion and security awareness experiment: reducing the success of social engineering attacks, In Journal of Experimental Criminology Volume 11 p.97-115.

M Cadariu, EM.. Bouwers, J. Visser, A. van Deursen (2015), Tracking known security vulnerabilities in proprietary software systems, YG Guéhéneuc, B Adams, A Serebrenik (Eds.), In Proceedings - 22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering p.516-519.

Eelco Visser (2015), Understanding software through linguistic abstraction, In Science of Computer Programming Volume 97 p.11-16.

Roberta Coelho, Lucas Almeida, Georgios Gousios, Arie Van Deursen (2015), Unveiling exception handling bug hazards in Android based on GitHub and Google code issues, In Proceedings - 12th Working Conference on Mining Software Repositories, MSR 2015 Volume 2015-August p.134-145.

Christoph Bösch, Pieter Hartel, Willem Jonker, Andreas Peter (2014), A Survey of Provably Secure Searchable Encryption, In ACM Computing Surveys: the survey and tutorial journal of the ACM Volume 47 p.1-51.

C Doerr, FA Kuipers (2014), All quiet on the Internet front?, In IEEE Communications Magazine Volume 52 p.46-51.

MR Cayford, C van Gulijk, PHAJM van Gelder (2014), All swept up: an initial classification of NSA surveillance technology, Marek Mlynczak, Tomasz Nowakowski, Anna Jodejko-Petruczuk, Sylwia Werbinska-Wojciechowska (Eds.), In Safety and reliability: Methodology and applications, Proceedings of the European Safety and Reliability Conference p.643-650, Taylor & Francis.

A Arnbak, H Asghari, MJG van Eeten (2014), Assessing legal and technical solutions to secure HTTPS, In ACM Queue: tomorrow's computing today Volume 12 p.1-15.