Lejla Batina, Dirmanto Jap, Shivam Bhasin, Stjepan Picek (2019), CSI NN: Reverse engineering of neural network architectures through electromagnetic side channel, In Proceedings of the 28th USENIX Security Symposium p.515-532.

Nikos Vassileiadis, Aitor Couce Vieira, David Ríos Insua, Vassilis Chatzigiannakis, Sofia Tsekeridou, Yolanda Gómez, José Vila, Katsiaryna Labunets, Wolter Pieters, Pamela Briggs, Dawn Branley-Bell (2019), CYBECO: Supporting cyber-insurance from a behavioural choice perspective, In Challenges in Cybersecurity and Privacy p.103-115.

Luca Mariot, Stjepan Picek, Alberto Leporati, Domagoj Jakobovic (2019), Cellular automata based S-boxes, In Cryptography and Communications Volume 11 p.41-62.

E.I. Vatajelu, Paolo Prinetto, Mottaqiallah Taouil, Said Hamdioui (2019), Challenges and Solutions in Emerging Memory Testing, In IEEE Transactions on Emerging Topics in Computing Volume 7 p.493-506.

Stjepan Picek (2019), Challenges in deep learning-based profiled side-channel analysis, Shivam Bhasin, Avi Mendelson, Mridul Nandi (Eds.), In Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, SPACE 2019, Proceedings Volume 11947 p.9-12.

Alaaeddin Swidan (2019), Challenges of end-user programmers: Reflections from two groups of end-users , PhD Thesis Delft University of Technology.

P. Burnap, D. Branson, D. Murray-Rust, J. Preston, D. Richards, D. Burnett, N. Edwards, R. Firth, K. Gorkovenko, M. A. Khanesar, M. Lakoju, T. Smith, J. Thorp (2019), Chatty factories: A vision for the future of product design and manufacture with IoT, In IET Conference Publications, Institution of Engineering and Technology.

Orcun Cetin, Carlos Hernandez Ganan, Lisette Altena, Takahiro Kasama, Daisuke Inoue, Kazuki Tamiya, Ying Tie, Katsunari Yoshioka, Michel van Eeten (2019), Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai, In Network and Distributed System Security Symposium (NDSS) 2019.

Claudio López Torres, Milos Cvetkovic, Arjen van der Meer, Peter Palensky (2019), Co-simulation of Intelligent Power Systems, Peter Palensky, Miloš Cvetković, Tamás Keviczky (Eds.), In Intelligent Integrated Energy Systems p.99-122.

Saba Chockalingam, Wolter Pieters, Andre M. H. Teixeira, N. Khakzad, Pieter van Gelder (2019), Combining Bayesian Networks and Fishbone Diagrams to Distinguish between Intentional Attacks and Accidental Technical Failures, David Pym, Barbara Fila, George Cybenko (Eds.), In Graphical Models for Security - 5th International Workshop, GraMSec 2018, Revised Selected Papers p.31-50.