Get my own profile
Public access
View all8 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Maciej KorczyńskiAssociate Professor, Grenoble Alpes University - Grenoble INP EnsimagVerified email at univ-grenoble-alpes.fr
- Michel van EetenProfessor, Governance of Cybersecurity, TU DelftVerified email at tudelft.nl
- Carlos GañánAssociate Professor, Delft University of TechnologyVerified email at tudelft.nl
- Tom Van GoethemKU Leuven & GoogleVerified email at cs.kuleuven.be
- Arman NoroozianEuropean Center for Algorithmic Transparency (ECAT)Verified email at ec.europa.eu
- Victor Le PochatDistriNet, KU LeuvenVerified email at cs.kuleuven.be
- Giovane C. M. MouraData Scientist at SIDN Labs/ Assistant Prof. at TU DelftVerified email at sidn.nl
- Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
- Jan van den BergDelft University of Technology, Leiden UniversityVerified email at tudelft.nl
- Nicolas ChristinProfessor, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
- Hadi AsghariHumboldt Institute for Internet and SocietyVerified email at hiig.de
- Maarten WullinkResearch Engineer SIDNVerified email at sidn.nl