Crea il mio profilo
Accesso pubblico
Visualizza tutto13 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Trajce DimkovPhD Researcher, University of TwenteEmail verificata su utwente.nl
- Pieter HartelProfessor Emeritus Cyber securityEmail verificata su tudelft.nl
- Roel WieringaUniversity of TwenteEmail verificata su utwente.nl
- Lorena MontoyaUniversity of TwenteEmail verificata su utwente.nl
- Jan van den BergDelft University of Technology, Leiden UniversityEmail verificata su tudelft.nl
- André TeixeiraAssociate Professor at Division of Systems and Control, Uppsala UniversityEmail verificata su it.uu.se
- Christian W ProbstUnitec Institute of TechnologyEmail verificata su unitec.ac.nz
- Sabarathinam ChockalingamResearch Scientist I, Institute for Energy TechnologyEmail verificata su ife.no
- Marianne JungerChair of Cyber Security and Business ContinuityEmail verificata su utwente.nl
- Jan-Willem H. BulleePhDEmail verificata su utwente.nl
- F DechesneTU Delft NLEmail verificata su tudelft.nl
- Clara MaathuisAssistant Professor in AI & Cyber Security, Open University, Delft University of TechnologyEmail verificata su tudelft.nl
- Katsiaryna (Kate) LabunetsUtrecht UniversityEmail verificata su uu.nl
- Hugo JonkerOpen UniversiteitEmail verificata su ou.nl
- Bart JacobsProfessor of Software Security and Correctness, Radboud University NijmegenEmail verificata su cs.ru.nl
- Martijn WarnierProfessor of Complex Systems Design, Delft University of TechnologyEmail verificata su tudelft.nl
- Nima KhakzadToronto Metropolitan University (Ryerson University)Email verificata su ryerson.ca
- Michel van EetenProfessor, Governance of Cybersecurity, TU DelftEmail verificata su tudelft.nl
- Cormac HerleyMicrosoft ResearchEmail verificata su microsoft.com
- David R InsuaICMAT-CSICEmail verificata su icmat.es
Segui
Wolter Pieters
Professor of Work, Organisations and Digital Technology, Radboud University Nijmegen
Email verificata su ru.nl - Home page