Vincent J. Koeman, H.J. Griffioen, Danny C. Plenge, Koen V. Hindriks (2018), StarCraft as a Testbed for Engineering Complex Distributed Systems Using Cognitive Agent Technology, International Conference on Autonomous Agents and Multiagent Systems p.1983-1985.

Kashyap Thimmaraju, Bhargava Shastry, Tobias Fiebig, Felicitas Hetzelt, Jean-Pierre Seifert, Anja Feldmann, Stefan Schmid (2018), Taking Control of SDN-based Cloud Systems via the Data Plane, In Proceedings of ACM Symposium on SDN Research (SOSR) p.1-15, Association for Computing Machinery (ACM).

Vittorio Cozzolino, Oleksii Moroz, Aaron Yi Ding (2018), The Virtual Factory: Hologram-Enabled Control and Monitoring of Industrial IoT Devices, In Proceedings of 2018 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR 2018) p.120-123, IEEE.

Christian Doerr (2018), Welcome Message from the WCTI Workshop Organizers, In ARES 2018 p.129mDUMMY, Association for Computing Machinery (ACM).

Lazaros K. Gallos, M.T. Korczynski, Nina H. Fefferman (2017), Anomaly detection through information sharing under different topologies, In Eurasip Journal on Information Security Volume 2017.

Binh Tran, Stjepan Picek, Bing Xue (2017), Automatic Feature Construction for Network Intrusion Detection, Y. Shi, K.C. Tan, M. Zhang, K. Tang, X. Li, Q. Zhang, Y. Tan, M. Middendorf, Y. Jin (Eds.), In Simulated Evolution and Learning p.569-580, Springer.

Samaneh Tajalizadehkhoob, Tom Van Goethem, Maciej Korczynski, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten (2017), Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting, In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security p.553-567, Association for Computing Machinery (ACM).

Stjepan Picek, Erik Hemberg, Una-May O'Reilly (2017), If You Can't Measure It, You Can't Improve It: Moving Target Defense Metrics, In MTD'17 Proceedings of the 2017 Workshop on Moving Target Defense p.115-118, Association for Computing Machinery (ACM).

Arman Noroozian, Michael Ciere, Maciej Korczynski, Samaneh Tajalizadehkhoob, Michel van Eeten (2017), Inferring the Security Performance of Providers from Noisy and Heterogenous Abuse Datasets, In Workshop on the Economics of Information Security.

Mark Luchs, Christian Doerr (2017), Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems, M. Polychronakis, M. Meier (Eds.), In Detection of Intrusions and Malware, and Vulnerability Assessment DIMVA 2017 p.141-160, Springer.