P. Mohajerin Esfahani, Tobias Sutter, John Lygeros (2015), Performance Bounds for the Scenario Approach and an Extension to a Class of Non-Convex Programs, In IEEE Transactions on Automatic Control Volume 60 p.46-58.
H Asghari, M Ciere, MJG van Eeten (2015), Post-mortem of a Zombie: Conficker cleanup after six years, J Jung (Eds.), In Proceedings of the 24th USENIX Security Symposium p.1-16, USENIX Association.
Z Erkin (2015), Private data aggregation with groups for smart grids in a dynamic setting using CRT, s.n. (Eds.), In Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, WIFS p.1-6, IEEE.
PJM Veugen, F Blom, SJA de Hoogh, Z Erkin (2015), Secure comparison protocols in the semi-honest model, In IEEE Journal of Selected Topics in Signal Processing Volume 9 p.1217-1228.
W Pieters, D Hadziosmanovic, F Dechesne (2015), Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace, In Science and Engineering Ethics Volume 22 p.1-20.
Nitin Chiluka, Nazareno Andrade, Johan Pouwelse, Henk Sips (2015), Social Networks Meet Distributed Systems: Towards a Robust Sybil Defense under Churn, In ASIA CCS'15 p.507-518, ACM.
J.W.H. Bullee, L. Montoya, W Pieters, M. Junger, P.H. Hartel (2015), The persuasion and security awareness experiment: reducing the success of social engineering attacks, In Journal of Experimental Criminology Volume 11 p.97-115.
M Cadariu, EM.. Bouwers, J. Visser, A. van Deursen (2015), Tracking known security vulnerabilities in proprietary software systems, YG Guéhéneuc, B Adams, A Serebrenik (Eds.), In Proceedings - 22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering p.516-519, IEEE.
Eelco Visser (2015), Understanding software through linguistic abstraction, In Science of Computer Programming Volume 97 p.11-16.
Roberta Coelho, Lucas Almeida, Georgios Gousios, Arie Van Deursen (2015), Unveiling exception handling bug hazards in Android based on GitHub and Google code issues, In Proceedings - 12th Working Conference on Mining Software Repositories, MSR 2015 Volume 2015-August p.134-145, IEEE.