Get my own profile
Public access
View all26 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Moritz C. MüllerResearch Engineer SIDN Labs and PhD Student University of TwenteVerified email at sidn.nl
John HeidemannUniversity of Southern California / Information Sciences InstituteVerified email at isi.edu
Aiko PrasProfessor of Computer Science, University of TwenteVerified email at utwente.nl
Ricardo de Oliveira SchmidtUniversity of Passo Fundo, BrazilVerified email at upf.br
Marco DavidsResearch Engineer SIDN LabsVerified email at sidn.nl
Ramin SadreUniversité catholique de LouvainVerified email at uclouvain.be
Wes HardakerSenior Computer Scientist, USC/ISIVerified email at isi.edu
Anna SperottoAssociate Professor, University of TwenteVerified email at utwente.nl
Maciej KorczyńskiAssociate Professor, Grenoble Alpes University - Grenoble INP EnsimagVerified email at univ-grenoble-alpes.fr
Michel van EetenProfessor, Governance of Cybersecurity, TU DelftVerified email at tudelft.nl
Samaneh TajalizadehkhoobICANN Director Security Stability & Resiliency Research | TU-Delft Guest ResearcherVerified email at icann.org
Maarten WullinkResearch Engineer SIDNVerified email at sidn.nl
Mattijs JonkerUniversity of TwenteVerified email at utwente.nl
Raffaele SommeseUniversity of TwenteVerified email at utwente.nl
Wouter de VriesSystems Engineer, CloudflareVerified email at wbdv.nl
Lan WeiUniversity of Southern CaliforniaVerified email at usc.edu
Carlos GañánAssociate Professor, Delft University of TechnologyVerified email at tudelft.nl
Roland van Rijswijk-DeijProfessor of Network Security, University of TwenteVerified email at utwente.nl
Lisandro Zambenedetti GranvilleFederal University of Rio Grande do SulVerified email at inf.ufrgs.br
Rick HofstedeUniversity of TwenteVerified email at utwente.nl