2019

Rob Kooij (2019). On generalized windmill graphs. Linear Algebra and Its Applications 565 25-46.

Xiangrong Wang, Rob Kooij, Yamir Moreno, Piet Van Mieghem (2019). Structural transition in interdependent networks with regular interconnections. Physical Review E 99.

Vittorio Cozzolino, Aaron Ding, Jörg Ott (2019). Edge chaining framework for black ice road fingerprinting. In Aaron Yi Ding and Richard Mortier (Eds.) Proceedings of the 2nd ACM International Workshop on Edge Systems, Analytics and Networking, Part of EuroSys 2019, 42-47, Association for Computing Machinery (ACM).

Rob Kooij, André Zegeling (2019). Predator-prey models with non-analytical functional response. Chaos, Solitons & Fractals 123 163-172.

Finn de Ridder, Niels Neumann, Thijs Veugen, Rob Kooij (2019). A Quantum Algorithm for Minimising the Effective Graph Resistance upon Edge Addition. In Sebastian Feld and Claudia Linnhoff-Popien (Eds.) Quantum Technology and Optimization Problems - 1st International Workshop, QTOP 2019, Proceedings, 63-73, Springer Verlag.

Casper de Winter, Venkata Reddy Palleti, Daniel Worm, Rob Kooij (2019). Optimal placement of imperfect water quality sensors in water distribution networks. Computers & Chemical Engineering 121 200-211.

2018

Aaron Ding, Marijn Janssen (2018). Opportunities for Applications Using 5G Networks: Requirements, Challenges, and Outlook. In Proceedings of the Seventh International Conference on Telecommunications and Remote Sensing (ICTRS 2018), 27-34, Association for Computing Machinery (ACM).

Constanze Dietrich, Katharina Krombholz, Kevin Borgolte, Tobias Fiebig (2018). Investigating System Operators’ Perspective on Security Misconfigurations. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS ’18), Association for Computing Machinery (ACM).

Tobias Fiebig, Franziska Lichtblau, Florian Streibelt, Thorben Krüger, Pieter Lexis, Randy Bush, Anja Feldmann (2018). Learning from the Past: Designing Secure Network Protocols. In Cybersecurity Best Practices, 585-613, Springer.

Stijn Pletinckx, Cyril Trap, Christian Doerr (2018). Malware Coordination using the Blockchain. In 2018 IEEE Conference on Communications and Network Security (CNS), 1-9, IEEE.