Riccardo Bortolameotti, Thijs van Ede, Marco Caselli, Maarten Everts, Pieter Hartel, Rick Hofstede, Willem Jonker, Andreas Peter (2017), DECANTeR: DEteCtion of Anomalous outbouNd HTTP Traffic by Passive Application Fingerprinting, In Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017 Volume Part F132521 p.373-386, ACM.

Kaikai Pan, André Teixeira, Milos Cvetkovic, Peter Palensky (2017), Data Attacks on Power System State Estimation: Limited Adversarial Knowledge vs. Limited Attack Resources, In Proceedings - IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society p.4313-4318, IEEE.

Haiko van der Voort, Wouter Kisteman, Henk Wesseling (2017), De prijs van openheid: een inleiding tot het themanummer, In Bestuurskunde Volume 26.

Hidde Lycklama à Nijeholt, Zekeriya Erkin, Joris Oudejans (2017), DecReg: A Framework for Preventing Double-Financing using Blockchain Technology, In BCC'17 Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts p.29-34, ACM.

H. R.Noel van Erp, Ronald O. Linger, Pieter H.A.J.M. van Gelder (2017), Deriving proper uniform priors for regression coefficients, Parts I, II, and III, In Entropy: international and interdisciplinary journal of entropy and information studies Volume 19 p.1-56.

Sélinde van Engelenburg, Marijn Janssen, Bram Klievink (2017), Design of a software architecture supporting business-to-government information sharing to improve public safety and security: Combining business rules, Events and blockchain technology, In Journal of Intelligent Information Systems Volume 52 p.595-618.

Scott Robbins, Adam Henschke (2017), Designing for democracy: Bulk data and authoritarianism, In Surveillance and Society Volume 15 p.582-589.

Riccardo M.G. Ferrari, A.M. Herdeiro Teixeira (2017), Detection and isolation of replay attacks through sensor watermarking, D Dochian, D Henrion, D Peaucelle (Eds.), In IFAC-PapersOnLine Volume 50-1 p.7363-7368, Elsevier.

Riccardo M.G. Ferrari, A.M. Herdeiro Teixeira (2017), Detection and isolation of routing attacks through sensor watermarking, J Sun, Z-P Jiang (Eds.), In Proceedings of the 2017 American Control Conference (ACC 2017) p.5436-5442, IEEE.

R. S. van Wegberg, A. J. Klievink, M. J G van Eeten (2017), Discerning Novel Value Chains in Financial Malware: On the Economic Incentives and Criminal Business Models in Financial Malware Schemes, In European Journal on Criminal Policy and Research p.1-20.