N Blenn, C Doerr, S van Kester, PFA Van Mieghem (2012), Crawling and detecting community structure in online social networks using local information, R Bestak, L Kencl, LE Li, J Widmer, H Yin (Eds.), In NETWORKING 2012 - Proceedings 11th International IFIP TC 6 Networking Conference, Part 1 p.56-67.
ML Mueller, H. Asghari (2012), Deep packet inspection and bandwidth management: Battles over BitTorrent in Canada and the United States, In Telecommunications Policy Volume 36 p.462-475.
M Mueller, B Kuerbis, H Asghari (2012), Dimensioning the elephant: An empirical analysis of the Ipv4 transfer market Volume Working papers series.
W Puech, Z Erkin, M Barni, S Rane, RL Lagendijk (2012), Emerging cryptographic challenges in image and video processing, E Saber, S Hemami, G Sharma (Eds.), In Proceedings of the 2012 IEEE International Conference on Image Processing p.2629-2632.
Z Erkin, PJM Veugen, T Toft, RL Lagendijk (2012), Generating private recommendations efficiently using homomorphic encryption and data packing, In IEEE Transactions on Information Forensics and Security Volume 7 p.1053-1066.
N Blenn, C Doerr, N Shadravan, PFA Van Mieghem (2012), How much do your friends tell about you? Reconstructing private information from the friendship graph, F Bellosa, H Bos et al (Eds.), In Proceedings of the Fifth Workshop on Social Network Systems p.1-6, Association for Computing Machinery (ACM).
A Mesbah, A. van Deursen, D Roest (2012), Invariant-based automated testing of modern web applications, In IEEE Transactions on Software Engineering Volume 38 p.35-53.
AM Monteiro OliveiraCortez, A Dargar, GJ Schrijen, S Hamdioui (2012), Modeling SRAM Start-Up Behavior for Physical Unclonable Functions, s.n. (Eds.), In IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems p.1-6.
MRT Beye, AJP Jeckmans, Z Erkin, PH Hartel, RL Lagendijk, Q Tang (2012), Privacy in online social networks, A Abraham (Eds.), In Computational social networks p.87-113.
Z Erkin, M Beye, PJM Veugen, RL Lagendijk (2012), Privacy-preserving content-based recommendations through homomorphic encryption, RNJ Veldhuis, LJ Spreeuwers, J Goseling, X Shao (Eds.), In Proceedings 33rd WIC Symposium on Information Theory in the Benelux & the 2nd Joint WIC/IEEE Symposium on Information Theory and Signal processing in the Benelux p.71-77.