Mohammad Hanif Jhaveri, Feyzullah Cetin, Carlos Gañán, Tyler Moore, Michel Van Eeten (2017), Abuse reporting and the fight against cybercrime, In ACM Computing Surveys (CSUR) Volume 49 p.1-27.

Rick Wieman, Mauricio Finavaro Aniche, Willem Lobbezoo, Sicco Verwer, Arie van Deursen (2017), An Experience Report on Applying Passive Learning in a Large-Scale Payment Company, In Proceedings - 2017 IEEE International Conference on Software Maintenance and Evolution, ICSME 2017 p.564-573.

Lazaros K. Gallos, M.T. Korczynski, Nina H. Fefferman (2017), Anomaly detection through information sharing under different topologies, In Eurasip Journal on Information Security Volume 2017.

Peter Palensky, Arjen A. Van Der Meer, Claudio David López, Arun Joseph, Kaikai Pan (2017), Applied Cosimulation of Intelligent Power Systems: Implementing Hybrid Simulators for Complex Power Systems, In IEEE Industrial Electronics Magazine Volume 11 p.6-21.

Yingqian Zhang, Sicco Verwer, Qing Chuan Ye (2017), Auction optimization using regression trees and linear models as integer programs, In Artificial Intelligence Volume 244 p.368-395.

Binh Tran, Stjepan Picek, Bing Xue (2017), Automatic Feature Construction for Network Intrusion Detection, Y. Shi, K.C. Tan, M. Zhang, K. Tang, X. Li, Q. Zhang, Y. Tan, M. Middendorf, Y. Jin (Eds.), In Simulated Evolution and Learning p.569-580.

Dennis Appelt, Annibale Panichella, Lionel Briand (2017), Automatically Repairing Web Application Firewalls Based on Successful SQL Injection Attacks.

Saba Chockalingam, Wolter Pieters, André Herdeiro Teixeira, Pieter van Gelder (2017), Bayesian Network Models in Cyber Security: A Systematic Review, Helger Lipmaa, Aikaterini Mitrokotsa, Raimundas Matulevicius (Eds.), In Proceedings of the Nordic Conference on Secure IT Systems (Nordic 2017) Volume 10674 p.105-122.

Hans de Bruijn, Marijn Janssen (2017), Building Cybersecurity Awareness: The need for evidence-based framing strategies, In Government Information Quarterly: an international journal of information technology management, policies, and practices Volume 34 p.1-7.

Yihuan Zhang, Qin Lin, Jun Wang, Sicco Verwer (2017), Car-following Behavior Model Learning Using Timed Automata, D. Dochain, D. Henrion, D. Peaucelle (Eds.), In IFAC-PapersOnLine p.2353-2358, Elsevier.