Ying Huang, Alan L. Porter, Scott W. Cunningham, Douglas K R Robinson, Jianhua Liu, Donghua Zhu (2017), A technology delivery system for characterizing the supply side of technology emergence: Illustrated for Big Data & Analytics, In Technological Forecasting and Social Change.

Raphael Bossong, Ben Wagner (2017), A typology of cybersecurity and public-private partnerships in the context of the EU, In Crime, Law and Social Change Volume 67 p.265-288.

Mohammad Hanif Jhaveri, Feyzullah Cetin, Carlos Gañán, Tyler Moore, Michel Van Eeten (2017), Abuse reporting and the fight against cybercrime, In ACM Computing Surveys (CSUR) Volume 49 p.1-27.

Rick Wieman, Mauricio Finavaro Aniche, Willem Lobbezoo, Sicco Verwer, Arie van Deursen (2017), An Experience Report on Applying Passive Learning in a Large-Scale Payment Company, In Proceedings - 2017 IEEE International Conference on Software Maintenance and Evolution, ICSME 2017 p.564-573, IEEE.

Lazaros K. Gallos, M.T. Korczynski, Nina H. Fefferman (2017), Anomaly detection through information sharing under different topologies, In Eurasip Journal on Information Security Volume 2017.

Peter Palensky, Arjen A. Van Der Meer, Claudio David López, Arun Joseph, Kaikai Pan (2017), Applied Cosimulation of Intelligent Power Systems: Implementing Hybrid Simulators for Complex Power Systems, In IEEE Industrial Electronics Magazine Volume 11 p.6-21.

Pieter Van Der Veeken, Stijn Van Schooten, Rhythima Shinde, Mirko Dunnewind, Jan Van Den Berg (2017), Applying Bayesian game theory to analyse cyber risks of bank transaction systems, In Proceedings of International Conference on Computing, Analytics and Security Trends, CAST 2016 p.84-89, IEEE.

Yingqian Zhang, Sicco Verwer, Qing Chuan Ye (2017), Auction optimization using regression trees and linear models as integer programs, In Artificial Intelligence Volume 244 p.368-395.

Binh Tran, Stjepan Picek, Bing Xue (2017), Automatic Feature Construction for Network Intrusion Detection, Y. Shi, K.C. Tan, M. Zhang, K. Tang, X. Li, Q. Zhang, Y. Tan, M. Middendorf, Y. Jin (Eds.), In Simulated Evolution and Learning p.569-580, Springer.

Dennis Appelt, Annibale Panichella, Lionel Briand (2017), Automatically Repairing Web Application Firewalls Based on Successful SQL Injection Attacks.