Daco C. Harkes, Eelco Visser (2017), IceDust 2: Derived Bidirectional Relations and Calculation Strategy Composition (Artifact), In Dagstuhl Artifacts Series Volume 3 p.1:1-1:2.
Stjepan Picek, Erik Hemberg, Una-May O'Reilly (2017), If You Can't Measure It, You Can't Improve It: Moving Target Defense Metrics, In MTD'17 Proceedings of the 2017 Workshop on Moving Target Defense p.115-118, Association for Computing Machinery (ACM).
Thijs Veugen, Jeroen Doumen, Zekeriya Erkin, Nino Pellegrino, Sicco Verwer, Jos Weber (2017), Improved privacy of dynamic group services, In Eurasip Journal on Information Security Volume 2017 p.1-9.
Arman Noroozian, Michael Ciere, Maciej Korczynski, Samaneh Tajalizadehkhoob, Michel van Eeten (2017), Inferring the Security Performance of Providers from Noisy and Heterogenous Abuse Datasets, In Workshop on the Economics of Information Security.
Robbert Krebbers, Amin Timany, Lars Birkedal (2017), Interactive proofs in higher-order concurrent separation logic, In POPL 2017 Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages p.205-217, Association for Computing Machinery (ACM).
Mark Luchs, Christian Doerr (2017), Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems, M. Polychronakis, M. Meier (Eds.), In Detection of Intrusions and Malware, and Vulnerability Assessment DIMVA 2017 p.141-160.
Sicco Verwer, Yingqian Zhang (2017), Learning Decision Trees with Flexible Constraints and Objectives Using Integer Optimization, D. Salvagnin, M. Lombardi (Eds.), In Integration of AI and OR Techniques in Constraint Programming p.94-103.
Nino Pellegrino, Qin Lin, Christian Hammerschmidt, Sicco Verwer (2017), Learning behavioral fingerprints from Netflows using Timed Automata, P. Chemouil, E. Monteiro, M. Charalambides, E. Madeira, P. Simoes, S. Secci, L.P. Gaspary, C.R.P. dos Santos (Eds.), In 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) p.308-316.
F.O. Cetin, Carlos GanĂ¡n, Maciej Korczynski, Michel van Eeten (2017), Make notifications great again: learning how to notify in the age of large-scale vulnerability scanning, In 16th Workshop on the Economics of Information Security (WEIS 2017) p.1-23.
Peter Palensky, Anurag Srivastava, Edmund Widl (2017), Message from the chairs, In 2017 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, MSCPES 2017 p.1-1.