Get my own profile
Public access
View all34 articles
1 article
available
not available
Based on funding mandates
Co-authors
Andrzej DudaProfessor of Computer Science, Grenoble Institute of Technology, EnsimagVerified email at imag.fr
Samaneh TajalizadehkhoobICANN Director Security Stability & Resiliency Research | TU-Delft Guest ResearcherVerified email at icann.org
Michel van EetenProfessor, Governance of Cybersecurity, TU DelftVerified email at tudelft.nl
Tom Van GoethemKU Leuven & GoogleVerified email at cs.kuleuven.be
Victor Le PochatDistriNet, KU LeuvenVerified email at cs.kuleuven.be
Arman NoroozianEuropean Center for Algorithmic Transparency (ECAT)Verified email at ec.europa.eu
Carlos GañánAssociate Professor, Delft University of TechnologyVerified email at tudelft.nl
Giovane C. M. MouraData Scientist at SIDN Labs/ Assistant Prof. at TU DelftVerified email at sidn.nl
Oliver GasserIPinfoVerified email at ipinfo.io
Pawel Foremski, PhDIITiS PANVerified email at iitis.pl
Matthew LuckieVerified email at luckie.org.nz
Nina H. FeffermanProfessor of Ecology and Evolutionary Biology & MathematicsVerified email at utk.edu
Jun Ho HuhSamsung Research, Samsung ElectronicsVerified email at samsung.com
Hadi AsghariHumboldt Institute for Internet and SocietyVerified email at hiig.de
Michał KrólCity, University of LondonVerified email at city.ac.uk
Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
Maarten WullinkResearch Engineer SIDNVerified email at sidn.nl
Lazaros GallosRutgers UniversityVerified email at rutgers.edu