Get my own profile
Public access
View all24 articles
1 article
available
not available
Based on funding mandates
Co-authors
Andrzej DudaProfessor of Computer Science, Grenoble Institute of Technology, EnsimagVerified email at imag.fr
Michel van EetenProfessor, Governance of Cybersecurity, TU DelftVerified email at tudelft.nl
Samaneh TajalizadehkhoobICANN Principal Security Stability & Resiliency Specialist | TU-Delft Guest ResearcherVerified email at icann.org
Arman NoroozianPost-Doctoral Researcher, University of AmsterdamVerified email at uva.nl
Tom Van GoethemKU LeuvenVerified email at cs.kuleuven.be
Carlos GañánAssociate Professor, Delft University of TechnologyVerified email at tudelft.nl
Victor Le Pochatimec-DistriNet, KU LeuvenVerified email at cs.kuleuven.be
Giovane C. M. MouraData Scientist at SIDN LabsVerified email at sidn.nl
Nina H. FeffermanProfessor of Ecology and Evolutionary Biology & MathematicsVerified email at utk.edu
Matthew LuckieUniversity of WaikatoVerified email at luckie.org.nz
Jun Ho HuhSamsung Research, Samsung ElectronicsVerified email at samsung.com
Oliver GasserMax Planck Institute for InformaticsVerified email at mpi-inf.mpg.de
Hadi AsghariHumboldt Institute for Internet and SocietyVerified email at hiig.de
Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
Pawel Foremski, PhDIITiS PANVerified email at iitis.pl
Maarten WullinkResearch Engineer SIDNVerified email at sidn.nl
Lazaros GallosRutgers UniversityVerified email at rutgers.edu