Crea il mio profilo
Accesso pubblico
Visualizza tutto5 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Willem JonkerProfessor Database Technology, University of Twente, the NetherlandsEmail verificata su utwente.nl
- Jeroen DoumenSandGrain B.V.Email verificata su doumen.nl
- Sandro EtalleTU Eindhoven and University of TwenteEmail verificata su tue.nl
- Marianne JungerChair of Cyber Security and Business ContinuityEmail verificata su utwente.nl
- Yee Wei LawSenior Lecturer, University of South AustraliaEmail verificata su unisa.edu.au
- Tang QiangLuxembourg institute of Science and TechnologyEmail verificata su list.lu
- Lorena MontoyaUniversity of TwenteEmail verificata su utwente.nl
- Andreas PeterProfessor, Safety-Security-Interaction Group, Carl von Ossietzky Universität Oldenburg, GermanyEmail verificata su uol.de
- Svetla Petkova-NikovaKU LeuvenEmail verificata su esat.kuleuven.be
- Luan IbraimiRoyal Dutch ShellEmail verificata su shell.com
- R.N.J. VeldhuisFull professor, University of TwenteEmail verificata su utwente.nl
- ileana buhanRadboud UniversityEmail verificata su ru.nl
- Paul Havingaprofessor of Computer Science, University of Twente / TNOEmail verificata su utwente.nl
- Wolter PietersProfessor of Work, Organisations and Digital Technology, Radboud University NijmegenEmail verificata su ru.nl
- Ricardo CorinFaMAFEmail verificata su famaf.unc.edu.ar
- Hugh GlaserSeme4 Ltd.Email verificata su seme4.com
- Christoph BöschBosch ResearchEmail verificata su alumni.uni-ulm.de
- Damiano BolzoniUniversity of TwenteEmail verificata su utwente.nl
- Arjan JeckmansPhD Student, University of TwenteEmail verificata su utwente.nl
- Jan-Willem H. BulleePhDEmail verificata su utwente.nl