Get my own profile
Public access
View all20 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Aiko PrasProfessor of Computer Science, University of TwenteVerified email at utwente.nl
Ramin SadreUniversité catholique de LouvainVerified email at uclouvain.be
Roland van Rijswijk-DeijProfessor of Network Security, University of TwenteVerified email at utwente.nl
Rick HofstedeUniversity of TwenteVerified email at utwente.nl
Mattijs JonkerUniversity of TwenteVerified email at utwente.nl
Jair SantannaAssistant professor, University of TwenteVerified email at utwente.nl
Jessica SteinbergerCentral Office for Information Technology in the Security Sector (ZITiS)Verified email at crisp-da.de
Alberto DainottiGeorgia TechVerified email at gatech.edu
Pavel ČeledaFaculty of Informatics and Institute of Computer Science, Masaryk UniversityVerified email at fi.muni.cz
Ricardo de Oliveira SchmidtUniversity of Passo Fundo, BrazilVerified email at upf.br
Giovane C. M. MouraData Scientist at SIDN Labs/Research Guest at TU DelftVerified email at sidn.nl
Luuk HendriksPhD student, University of TwenteVerified email at utwente.nl
Olivier van der ToornUniversity of TwenteVerified email at utwente.nl
Christian DietzUniversität der Bundeswehr MünchenVerified email at unibw.de
Marco MelliaPolitecnico di Torino, italyVerified email at polito.it
Brian TrammellSenior Researcher, ETH ZürichVerified email at tik.ee.ethz.ch
Lisandro Zambenedetti GranvilleFederal University of Rio Grande do SulVerified email at inf.ufrgs.br
Maurizio M. Munafo'Assistant Professor, Department of Electronics and Communications, Politecnico di TorinoVerified email at polito.it
Raffaele SommeseUniversity of TwenteVerified email at utwente.nl
Pieter-Tjerk de BoerAssociate professor, University of TwenteVerified email at utwente.nl