ST Tajalizadehkhoob, H Asghari, C Ganan, MJG van Eeten (2014), Why them? Extracting intelligence about target selection from zeus financial malware, s.n. (Eds.), In proceedings of the 13th annual workshop on the economics of information security, WEIS 2014 p.1-26, WEIS.

Z Erkin, C Doerr, H Dantas, R Hallie, G van der Bij (2014), eFuzz: a fuzzer for DLMS/COSEM electricity meters, K Kursawe, B Defend (Eds.), In Proceedings 2nd Workshop on Smart Energy Grid Security p.31-38, ACM.

J Li, Z Erkin, H de Ridder, APOS Vermeeren (2013), A field study on real-time self-reported emotions in crowds, A Smeulders, D Stroobandt et al (Eds.), In Proceedings ICI.OPEN 2013 p.80-84, STW - IPN.

P Giselsson, MD Doan, T Keviczky, B De Schutter, A Rantzer (2013), Accelerated gradient methods and dual decomposition in distributed model predictive control, In Automatica Volume 49 p.829-833.

AM Monteiro OliveiraCortez, V van der Leest, R Maes, GJ Schrijen, S Hamdioui (2013), Adapting voltage ramp-up time for temperature noise reduction on memory-based PUFs, s.n. (Eds.), In IEEE International symposium on hardware-oriented security and trust p.35-40, IEEE.

Y Koc, ME Warnier, RE Kooij, FM Brazier (2013), An entropy-based metric to quantify the robustness of power grids against cascading failures, In Safety Science Volume 59 p.126-134.

NSM Zeilemaker, Z Erkin, P Palmieri, J. Pouwelse (2013), Building a Privacy-Preserving Semantic Overlay for Peer-to-Peer Networks, In Proceedings of the 2013 IEEE international workshop on information forensics and security (WIFS2013) p.79-84, IEEE.

D Kononchuk, Z Erkin, JCA van der Lubbe, RL Lagendijk (2013), Building blocks for privacy-preserving recommender systems in a dynamic setting, S Pollin, L van der Perre (Eds.), In Proceedings of the 34th WIC Symposium on Information Theory in the Benelux, 3rd Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux p.37-44, WIC.

H Asghari, MJG van Eeten, JM Bauer, M Mueller (2013), Deep packet inspection: Effects of regulation on its deployment by internet providers, Social sience research network Volume Working papers series.

H Asghari, B Kuerbis, ML Mueller (2013), Dimensioning the elephant: an empirical analysis of the IPv4 number market, In Info: The journal of policy, regulation and strategy for telecommunications, information and media Volume 15 p.6-18.