Arman Noroozian, Michael Ciere, Maciej Korczynski, Samaneh Tajalizadehkhoob, Michel van Eeten (2017), Inferring the Security Performance of Providers from Noisy and Heterogenous Abuse Datasets, In Workshop on the Economics of Information Security.

Robbert Krebbers, Amin Timany, Lars Birkedal (2017), Interactive proofs in higher-order concurrent separation logic, In POPL 2017 Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages p.205-217, ACM.

Mark Luchs, Christian Doerr (2017), Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems, M. Polychronakis, M. Meier (Eds.), In Detection of Intrusions and Malware, and Vulnerability Assessment DIMVA 2017 p.141-160, Springer.

Sicco Verwer, Yingqian Zhang (2017), Learning Decision Trees with Flexible Constraints and Objectives Using Integer Optimization, D. Salvagnin, M. Lombardi (Eds.), In Integration of AI and OR Techniques in Constraint Programming p.94-103, Springer.

Nino Pellegrino, Qin Lin, Christian Hammerschmidt, Sicco Verwer (2017), Learning behavioral fingerprints from Netflows using Timed Automata, P. Chemouil, E. Monteiro, M. Charalambides, E. Madeira, P. Simoes, S. Secci, L.P. Gaspary, C.R.P. dos Santos (Eds.), In 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) p.308-316, IEEE.

Bas Jonkman, Nikki Brand (2017), Lessen uit Houston over waterveiligheid, In Magazine Nationale Veiligheid en Crisisbeheersing Volume 15 p.21-23.

Bastiaan van Loenen, Jolien Ubacht, Wouter Labots, Anneke Zuiderwijk-van Eijk (2017), Log File Analytics for Gaining Insight into Actual Use of Open Data, Vieira Borges, José Carlos Dias Rouco (Eds.), In Proceedings of the 17th European Conference on Digital Government p.238-246, Academic Conferences.

F.O. Cetin, Carlos Ganán, Maciej Korczynski, Michel van Eeten (2017), Make notifications great again: learning how to notify in the age of large-scale vulnerability scanning, In 16th Workshop on the Economics of Information Security (WEIS 2017) p.1-23.

Peter Palensky, Anurag Srivastava, Edmund Widl (2017), Message from the chairs, In 2017 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, MSCPES 2017 p.1-1, IEEE.

Gamze Tillem, Zekeriya Erkin, Inald Lagendijk (2017), Mining encrypted software logs using alpha algorithm, M.S. Obaidat , P. Samarati, E. Cabello (Eds.), In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications Volume 4 p.267-274, SciTePress.