Get my own profile
Public access
View all37 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Andrzej DudaProfessor of Computer Science, Grenoble Institute of Technology, EnsimagVerified email at imag.fr
- Samaneh TajalizadehkhoobICANN Director of Security, Stability & Resiliency Research | TU-Delft Guest ResearcherVerified email at icann.org
- Michel van EetenProfessor, Governance of Cybersecurity, TU DelftVerified email at tudelft.nl
- Tom Van GoethemKU Leuven & GoogleVerified email at cs.kuleuven.be
- Victor Le PochatVerified email at cs.kuleuven.be
- Arman NoroozianEuropean Center for Algorithmic Transparency (ECAT)Verified email at ec.europa.eu
- Carlos GañánAssociate Professor, Delft University of TechnologyVerified email at tudelft.nl
- Giovane C. M. MouraData Scientist at SIDN Labs/ Assistant Prof. at TU DelftVerified email at sidn.nl
- Oliver GasserIPinfoVerified email at ipinfo.io
- Pawel Foremski, PhDIITiS PANVerified email at iitis.pl
- Matthew LuckieVerified email at luckie.org.nz
- Nina H. FeffermanProfessor of Ecology and Evolutionary Biology & MathematicsVerified email at utk.edu
- Michał KrólCity, University of LondonVerified email at city.ac.uk
- Jun Ho HuhSamsung Research, Samsung ElectronicsVerified email at samsung.com
- Hadi AsghariTU BerlinVerified email at tu-berlin.de
- Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
- Maarten WullinkResearch Engineer SIDNVerified email at sidn.nl
- Lazaros GallosRutgers UniversityVerified email at rutgers.edu