Get my own profile
Public access
View all9 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Maciej KorczyńskiProfessor, Grenoble Alpes University - Grenoble INP EnsimagVerified email at univ-grenoble-alpes.fr
- Michel van EetenProfessor, Governance of Cybersecurity, TU DelftVerified email at tudelft.nl
- Carlos GañánAssociate Professor, Delft University of TechnologyVerified email at tudelft.nl
- Tom Van GoethemKU Leuven & GoogleVerified email at cs.kuleuven.be
- Victor Le PochatVerified email at cs.kuleuven.be
- Arman NoroozianEuropean Center for Algorithmic Transparency (ECAT)Verified email at ec.europa.eu
- Giovane C. M. MouraData Scientist at SIDN Labs/ Assistant Prof. at TU DelftVerified email at sidn.nl
- Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
- Jan van den BergDelft University of Technology, Leiden UniversityVerified email at tudelft.nl
- Nicolas ChristinCarnegie Mellon UniversityVerified email at andrew.cmu.edu
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
- Maarten WullinkResearch Engineer SIDNVerified email at sidn.nl
- Hadi AsghariTU BerlinVerified email at tu-berlin.de