Crea il mio profilo
Accesso pubblico
Visualizza tutto28 articoli
3 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Andrzej DudaProfessor of Computer Science, Grenoble Institute of Technology, EnsimagEmail verificata su imag.fr
- Samaneh TajalizadehkhoobICANN Director Security Stability & Resiliency Research | TU-Delft Guest ResearcherEmail verificata su icann.org
- Michel van EetenProfessor, Governance of Cybersecurity, TU DelftEmail verificata su tudelft.nl
- Arman NoroozianEuropean Center for Algorithmic Transparency (ECAT)Email verificata su ec.europa.eu
- Tom Van GoethemKU Leuven & GoogleEmail verificata su cs.kuleuven.be
- Carlos GañánAssociate Professor, Delft University of TechnologyEmail verificata su tudelft.nl
- Giovane C. M. MouraData Scientist at SIDN Labs/ Assistant Prof. at TU DelftEmail verificata su sidn.nl
- Victor Le PochatDistriNet, KU LeuvenEmail verificata su cs.kuleuven.be
- Oliver GasserIPinfoEmail verificata su ipinfo.io
- Pawel Foremski, PhDIITiS PANEmail verificata su iitis.pl
- Nina H. FeffermanProfessor of Ecology and Evolutionary Biology & MathematicsEmail verificata su utk.edu
- Matthew LuckieEmail verificata su luckie.org.nz
- Jun Ho HuhSamsung Research, Samsung ElectronicsEmail verificata su samsung.com
- Hadi AsghariHumboldt Institute for Internet and SocietyEmail verificata su hiig.de
- Michał KrólCity, University of LondonEmail verificata su city.ac.uk
- Rainer BöhmeUniversität Innsbruck, AustriaEmail verificata su uibk.ac.at
- Maarten WullinkResearch Engineer SIDNEmail verificata su sidn.nl
- Lazaros GallosRutgers UniversityEmail verificata su rutgers.edu