Jan Willem Bullee, Lorena Montoya, Marianne Junger, Pieter Hartel (2017), Spear Phishing in Organisations Explained, In Information and Computer Security Volume 25 p.593-613.
Fritz Allhoff, Shannon Ford, Adam Henschke (2017), The Asia-Pacific Chapter of the International Society for Military Ethics, In Journal of Military Ethics p.1-3.
Robbert Krebbers, Ralf Jung, Aleš Bizjak, Jacques-Henri Jourdan, Derek Dreyer, Lars Birkedal (2017), The Essence of Higher-Order Concurrent Separation Logic, Hongseok Yang (Eds.), In Programming Languages and Systems p.696-723, Springer.
Willem Pino, Daniël Worm, Ruud van der Linden, Robert Kooij (2017), The Reliability of a Gas Distribution Network: A Case Study, In 2016 International Conference on System Reliability and Science (ICSRS 2016) Proceedings p.122-129, IEEE.
Hadi Asghari, René Mahieu, Prateek Mittal, Rachel Greenstadt (2017), The Right of Access as a Tool for Privacy Governance: Findings from Individual Requests & Proposal for a Crowd-sourced Dataset of Privacy Practices, In Proceedings of 17th Privacy Enhancing Technologies Symposium p.1-2.
Samaneh Tajalizadehkhoob, C. Hernandez Ganan, Arman Noroozian, Michel Van Eeten (2017), The role of hosting providers in fighting command and control infrastructure of financial malware, In Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security -ASIA CCS 2017 p.575-586, ACM.
Boris Shishkov, Marijn Janssen, Yi Yin (2017), Towards context-aware and privacy-sensitive systems, In BMSD 2017 - Proceedings of the 7th International Symposium on Business Modeling and Software Design p.46-60, SciTePress.
Claude Carlet, Annelie Heuser, Stjepan Picek (2017), Trade-Offs for S-boxes: Cryptographic Properties and Side-Channel Resilience, D. Gollmann, A. Miyaji, H. Kikuchi (Eds.), In Applied Cryptography and Network Security p.393-414, Springer.
Fieke Beemster, Henk Taale, Isabel Wilmink (2017), Verkeer in Nederland 2017, TrafficQuest.
Mingxiao Ma, André Herdeiro Teixeira, Jan van den Berg, Peter Palensky (2017), Voltage Control in Distributed Generation under Measurement Falsification Attacks, In IFAC-PapersOnLine p.8379-8384.