Fabio Bisogni, Hadi Asghari, Michel van Eeten (2017), Estimating the size of the iceberg from its tip: An investigation into unreported data breach notifications, In Proceedings of 16th Annual Workshop on the Economics of Information Security 2017.

Stjepan Picek (2017), Evolutionary Computation and Cryptology, In GECCO 2017 - Proceedings of the Genetic and Evolutionary Computation Conference Companion p.1066-1093, Association for Computing Machinery (ACM).

Luca Mariot, Stjepan Picek, Domagoj Jakobovic, Alberto Leporati (2017), Evolutionary algorithms for the design of orthogonal Latin squares based on cellular automata, In GECCO'17 Proceedings of the Genetic and Evolutionary Computation Conference p.306-313, Association for Computing Machinery (ACM).

N. Khakzad, Pieter van Gelder (2017), Fragility assessment of chemical storage tanks subject to floods, In Process Safety and Environmental Protection Volume 111 p.75-84.

Katsiaryna Labunets, Fabio Massacci, Alessandra Tedeschi (2017), Graphical vs. Tabular Notations for Risk Models: On the Role of Textual Labels, In Proceedings of the 11th ACM / IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2017 p.267-276.

Samaneh Tajalizadehkhoob, Tom Van Goethem, Maciej Korczynski, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten (2017), Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting, In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security p.553-567, Association for Computing Machinery (ACM).

Henk Wesseling, Jeroen Boot, Wouter Kisteman, Haiko van der Voort (2017), Het stelsel van informatieveiligheid: een essay over hoe we moeten leren er klaar voor te zijn, In Bestuurskunde Volume 26.

Elmer Lastdrager, Inés Carvajal Gallardo, Pieter Hartel, Marianne Junger (2017), How Effective is Anti-Phishing Training for Children?, In Proceedings of the thirteenth Symposium on Usable Privacy and Security, SOUPS 2017 p.229-239.

Deesh Dileep, Jose Rueda Torres, Sander Franke, Peter Palensky (2017), Hybrid intervention scheme-based optimization algorithm for real-time management of reactive power resources, In Automatisierungstechnik Volume 65 p.737-748.

Daco Harkes, Eelco Visser (2017), IceDust 2: Derived Bidirectional Relations and Calculation Strategy Composition, Peter Müller (Eds.), In 31st European Conference on Object-Oecoopriented Programming, ECOOP 2017 p.1-29.