Get my own profile
Public access
View all30 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- John HeidemannUniversity of Southern California / Information Sciences InstituteVerified email at isi.edu
- Moritz C. MüllerResearch Engineer SIDN Labs and guest researcher at the University of TwenteVerified email at sidn.nl
- Aiko PrasProfessor of Computer Science, University of TwenteVerified email at utwente.nl
- Ricardo de Oliveira SchmidtUniversity of Passo Fundo, BrazilVerified email at upf.br
- Marco DavidsResearch Engineer SIDN LabsVerified email at sidn.nl
- Wes HardakerSenior Computer Scientist, USC/ISIVerified email at isi.edu
- Ramin SadreUniversité catholique de LouvainVerified email at uclouvain.be
- Maciej KorczyńskiProfessor, Grenoble Alpes University - Grenoble INP EnsimagVerified email at univ-grenoble-alpes.fr
- Michel van EetenProfessor, Governance of Cybersecurity, TU DelftVerified email at tudelft.nl
- Samaneh TajalizadehkhoobICANN Director of Security, Stability & Resiliency Research | TU-Delft Guest ResearcherVerified email at icann.org
- Anna SperottoProfessor, University of TwenteVerified email at utwente.nl
- Mattijs JonkerUniversity of TwenteVerified email at utwente.nl
- Maarten WullinkResearch Engineer SIDNVerified email at sidn.nl
- Raffaele SommeseUniversity of TwenteVerified email at utwente.nl
- Carlos GañánAssociate Professor, Delft University of TechnologyVerified email at tudelft.nl
- Roland van Rijswijk-DeijProfessor of Network Security, University of TwenteVerified email at utwente.nl
- Lisandro Zambenedetti GranvilleFull Professor of Computer Science, Federal University of Rio Grande do SulVerified email at inf.ufrgs.br
- Wouter de VriesSystems Engineer, CloudflareVerified email at wbdv.nl
- Lan WeiUniversity of Southern CaliforniaVerified email at usc.edu
- Pawel Foremski, PhDIITiS PANVerified email at iitis.pl