Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Michel van EetenProfessor, Governance of Cybersecurity, TU DelftVerified email at tudelft.nl
- Maciej KorczyńskiProfessor, Grenoble Alpes University - Grenoble INP EnsimagVerified email at univ-grenoble-alpes.fr
- Samaneh TajalizadehkhoobICANN Director of Security, Stability & Resiliency Research | TU-Delft Guest ResearcherVerified email at icann.org
- Carlos GañánAssociate Professor, Delft University of TechnologyVerified email at tudelft.nl
- Elsa Turcios RodríguezTU DelftVerified email at tudelft.nl
- Katsunari YoshiokaYokohama National UniversityVerified email at ynu.ac.jp
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
- Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
- Tom Van GoethemKU Leuven & GoogleVerified email at cs.kuleuven.be
- Damon McCoyProfessor of Computer Science and Engineering, New York UniversityVerified email at nyu.edu
- Tom DobberAssistant Professor, University of Amsterdam, ASCoRVerified email at uva.nl
- Claes H de VreeseProfessor of Political Communication, ASCoR, University of AmsterdamVerified email at uva.nl
- Fabio VottaUniversity of AmsterdamVerified email at uva.nl
- Natali HelbergerInstitute for Information LawVerified email at uva.nl
- Bram KlievinkProfessor of Public Administration & Digitalisation, Leiden UniversityVerified email at fgga.leidenuniv.nl
- Ugur AkyaziCybersecurity ResearcherVerified email at tudelft.nl
- Rolf van WegbergAssociate Professor, Delft University of TechnologyVerified email at tudelft.nl
- Elmer LastdragerResearch Engineer, SIDN LabsVerified email at sidn.nl
- Paddy LeerssenUniversity of AmsterdamVerified email at uva.nl
- Swaathi VetrivelDelft University of TechnologyVerified email at tudelft.nl