V. Herrera Semenets, Raudel Hernández-León, Lázaro Bustio-Martínez, J. van den Berg (2022), Red Light/Green Light: A Lightweight Algorithm for, Possibly, Fraudulent Online Behavior Change Detection, Obdulia Pichardo Laguna, Juan Martínez-Miranda, Bella Martínez Seis (Eds.), In Advances in Computational Intelligence 21st Mexican International Conference on Artificial Intelligence, MICAI 2022, Monterrey, Mexico, October 24–29, 2022, Proceedings, Part II p.316-327, Springer.

Abhairaj Singh, Rajendra Bishnoi, Rajiv V. Joshi, Said Hamdioui (2022), Referencing-in-Array Scheme for RRAM-based CIM Architecture, Cristiana Bolchini, Ingrid Verbauwhede, Ioana Vatajelu (Eds.), In Proceedings of the 2022 Design, Automation and Test in Europe Conference and Exhibition, DATE 2022 p.1413-1418, IEEE.

Jorai Rijsdijk, Lichao Wu, Guilherme Perin (2022), Reinforcement Learning-Based Design of Side-Channel Countermeasures, Lejla Batina, Stjepan Picek, Stjepan Picek, Mainack Mondal (Eds.), In Security, Privacy, and Applied Cryptography Engineering p.168-187, Springer.

Shayesteh Masoumian, Georgios Selimis, Rui Wang, Geert-Jan Schrijen, Said Hamdioui, Mottaqiallah Taouil (2022), Reliability Analysis of FinFET-Based SRAM PUFs for 16nm, 14nm, and 7nm Technology Nodes, In Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE) p.1189-1192, IEEE.

Ching-Chi Chuang, Luis Cruz, Robbert van Dalen, Vladimir Mikovski, Arie van Deursen (2022), Removing dependencies from large software projects: Are you really sure?, C. Ceballos (Eds.), In Proceedings of the 2022 IEEE 22nd International Working Conference on Source Code Analysis and Manipulation (SCAM) p.105-115, IEEE.

Meng Li, Mingwei Zhang, Jianbo Gao, Chhagan Lal, Mauro Conti, Mamoun Alazab (2022), Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud, Cristina Alcaraz, Liqun Chen, Shujun Li, Pierangela Samarati (Eds.), In Information and Communications Security - 24th International Conference, ICICS 2022, Proceedings p.261-280, Springer.

Quinten Stokkink, Can Umut Ileri, Johan Pouwelse (2022), Reputation-Based Data Carrying for Web3 Networks, Sharief Oteafy, Eyuphan Bulut, Florian Tschorsch (Eds.), In Proceedings of the 47th IEEE Conference on Local Computer Networks, LCN 2022 p.283-286, IEEE.

Fran Casino, Thomas K. Dasaklis, George Spathoulas, Marios Anagnostopoulos, Amrita Ghosal, Istvan Borocz, Agusti Solanas, Mauro Conti, Constantinos Patsakis (2022), Research trends, challenges, and emerging topics in digital forensics: A review of reviews, In IEEE Access Volume 10 p.25464 - 25493.

Morteza Zare Oskouei, Hasan Mehrjerdi, Davood Babazadeh, Payam Teimourzadeh Baboli, Christian Becker, Peter Palensky (2022), Resilience-oriented operation of power systems: Hierarchical partitioning-based approach, In Applied Energy Volume 312 p.1-11.

Q.B. Lone (2022), SAVing the Internet: Measuring the adoption of Source Address Validation (SAV) by network providers, PhD Thesis Delft University of Technology.