Sebastian Erdweg, LCL Kats, T Rendel, C Kastner, K Ostermann, Eelco Visser (2011), Library-based model-driven software development with SugarJ, K Fisher (Eds.), In 26th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2011, part of SPLASH 2011 p.17-18, Association for Computing Machinery (ACM).
PFA van Mieghem, N Blenn, C Doerr (2011), Lognormal distribution in the digg online social network, In European Physical Journal B. Condensed Matter and Complex Systems Volume 83 p.251-261.
M.L.C. de Bruijne (2011), Nieuwsbrief Infratrends, Workshop Cybersecurity and Privacy.
JMP Trijp, M Ulieru, PHAJM van Gelder (2011), Quantitative approach of organizational resilience for a Dutch emergency response safety region, C Berenguer, A Grall, C Guedes Soares (Eds.), In Advances in Safety, Reliability and Risk Management p.173-180, Taylor & Francis.
John Kleinig, Peter Mameli, Seumas Miller, Douglas Salane, Adina Schwartz (2011), Security and Privacy: Global Standards for Ethical Identity Management in Contemporary Liberal Democratic States.
M Merhi, JC Hernandez-Castro, P Peris Lopez (2011), Studying the pseudo random number generator of a low-cost RFID tag, A Georgiadis, MM Tentzeris (Eds.), In Proceedings of the IEEE International Conference on RFID-Technologies and Applications 2011 p.381-385.
Sebastian Erdweg, Lennart C.L. Kats, T Rendel, C Kastner, K Ostermann, Eelco Visser (2011), SugarJ: Library-based language extensibility, K Fisher (Eds.), In Companion to the 26th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2011, part of SPLASH 2011 p.187-188, Association for Computing Machinery (ACM).
MJG van Eeten (2011), The economics of Cybersecurity, In Communications et Strategies Volume 81 p.13-21.
C Doerr, J Martin Hernandez (2010), A computational approach to multi-level analysis of network resilience, s.n. (Eds.), In The third conference on dependability p.125-132.
A Mitrokotsa, M Rieback, AS Tanebaum (2010), Classifying RFID attacks and defenses, In Information Systems Frontiers: a journal of research and innovation Volume 12 p.491-505.