Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Willem JonkerProfessor Database Technology, University of Twente, the NetherlandsVerified email at utwente.nl
- Jeroen DoumenSandGrain B.V.Verified email at doumen.nl
- Sandro EtalleTU Eindhoven and University of TwenteVerified email at tue.nl
- Marianne JungerChair of Cyber Security and Business ContinuityVerified email at utwente.nl
- Yee Wei LawSenior Lecturer, University of South AustraliaVerified email at unisa.edu.au
- Tang QiangLuxembourg institute of Science and TechnologyVerified email at list.lu
- Lorena MontoyaUniversity of TwenteVerified email at utwente.nl
- Andreas PeterProfessor, Safety-Security-Interaction Group, Carl von Ossietzky Universität Oldenburg, GermanyVerified email at uol.de
- Svetla Petkova-NikovaKU LeuvenVerified email at esat.kuleuven.be
- Luan IbraimiRoyal Dutch ShellVerified email at shell.com
- R.N.J. VeldhuisFull professor, University of TwenteVerified email at utwente.nl
- ileana buhanRadboud UniversityVerified email at ru.nl
- Paul Havingaprofessor of Computer Science, University of Twente / TNOVerified email at utwente.nl
- Wolter PietersProfessor of Work, Organisations and Digital Technology, Radboud University NijmegenVerified email at ru.nl
- Ricardo CorinFaMAFVerified email at famaf.unc.edu.ar
- Hugh GlaserSeme4 Ltd.Verified email at seme4.com
- Christoph BöschBosch ResearchVerified email at alumni.uni-ulm.de
- Damiano BolzoniUniversity of TwenteVerified email at utwente.nl
- Arjan JeckmansPhD Student, University of TwenteVerified email at utwente.nl
- Jan-Willem H. BulleePhDVerified email at utwente.nl