Marijn Janssen, George Kuk (2016), The challenges and limits of big data algorithms in technocratic governance, In Government Information Quarterly: an international journal of information technology management, policies, and practices Volume 33 p.371–377.
Maarten van Wieren, Christian Doerr, Vivian Jacobs, Wolter Pieters (2016), Understanding bifurcation of slow versus fast cyber-attackers, G Livraga , V. Torra, A. Aldini, F. Martinelli, N. Suri (Eds.), In Data Privacy Management and Security Assurance p.19-33, Springer.
F.O. Cetin, Mohammad Hanif Jhaveri, Carlos Gañán, Michel van Eeten, Tyler Moore (2016), Understanding the role of sender reputation in abuse reporting and cleanup, In Journal of Cybersecurity Volume 2 p.83-98.
Anneke Zuiderwijk-van Eijk, Keith Jeffery, Daniele Bailo, Yi Yin (2016), Using Open Research Data for Public Policy Making: Opportunities of Virtual Research Environments, In Proceedings of CeDEM16: International Conference for e-Democracy and Open Government 2016.
Floris Goerlandt, Nima Khakzad Rostami, Genserik Reniers (2016), Validity and validation of safety-related quantitative risk analysis: A review, In Safety Science.
Louise Klingen, Olivier Hoes (2016), Wat als de dijken nu echt breken?, In Magazine Nationale Veiligheid en Crisisbeheersing Volume 14 p.48-49.
Dua Elnakhala (2016), When Fencing is not Protecting: The Case of Israel-Gaza, Martin van der Velde, Ton van Naerssen (Eds.), In Mobility and Migration Choices, Routledge - Taylor & Francis Group.
Arman Noroozian, Maciej Korczynski, Carlos Hernandez Ganan, Daisuke Makita, Katsunari Yoshioka, Michel van Eeten (2016), Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service, In Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2016, Springer.
NLM van Adrichem, N Blenn, A Reyes Lua, X. Wang, M Wasif, Ficky Fatturrahman, F.A. Kuipers (2015), A measurement study of DNSSEC misconfigurations, In Security Informatics Volume 4 p.1-6.
JCA van der Lubbe, MJ de Boer, Z Erkin (2015), A signature scheme for a dynamic coalition defence environment without trusted third parties, B Ors, B Preneel (Eds.), In Cryptography and Information Security in the Balkans: First International Conferende p.237-249, Springer.