Get my own profile
Public access
View all29 articles
0 articles
available
not available
Based on funding mandates
Co-authors
John HeidemannUniversity of Southern California / Information Sciences InstituteVerified email at isi.edu
Moritz C. MüllerResearch Engineer SIDN Labs and guest researcher at the University of TwenteVerified email at sidn.nl
Aiko PrasProfessor of Computer Science, University of TwenteVerified email at utwente.nl
Ricardo de Oliveira SchmidtUniversity of Passo Fundo, BrazilVerified email at upf.br
Marco DavidsResearch Engineer SIDN LabsVerified email at sidn.nl
Wes HardakerSenior Computer Scientist, USC/ISIVerified email at isi.edu
Ramin SadreUniversité catholique de LouvainVerified email at uclouvain.be
Maciej KorczyńskiAssociate Professor, Grenoble Alpes University - Grenoble INP EnsimagVerified email at univ-grenoble-alpes.fr
Michel van EetenProfessor, Governance of Cybersecurity, TU DelftVerified email at tudelft.nl
Anna SperottoProfessor, University of TwenteVerified email at utwente.nl
Samaneh TajalizadehkhoobICANN Director Security Stability & Resiliency Research | TU-Delft Guest ResearcherVerified email at icann.org
Mattijs JonkerUniversity of TwenteVerified email at utwente.nl
Maarten WullinkResearch Engineer SIDNVerified email at sidn.nl
Raffaele SommeseUniversity of TwenteVerified email at utwente.nl
Roland van Rijswijk-DeijProfessor of Network Security, University of TwenteVerified email at utwente.nl
Carlos GañánAssociate Professor, Delft University of TechnologyVerified email at tudelft.nl
Lisandro Zambenedetti GranvilleFull Professor of Computer Science, Federal University of Rio Grande do SulVerified email at inf.ufrgs.br
Wouter de VriesSystems Engineer, CloudflareVerified email at wbdv.nl
Lan WeiUniversity of Southern CaliforniaVerified email at usc.edu
Rick HofstedeUniversity of TwenteVerified email at utwente.nl