Get my own profile
Public access
View all38 articles
1 article
available
not available
Based on funding mandates
Co-authors
Andrzej DudaProfessor of Computer Science, Grenoble Institute of Technology, EnsimagVerified email at imag.fr
Samaneh TajalizadehkhoobICANN Director of Security, Stability & Resiliency | TU-Delft ScientistVerified email at icann.org
Michel van EetenProfessor, Governance of Cybersecurity, TU DelftVerified email at tudelft.nl
Tom Van GoethemKU Leuven & GoogleVerified email at cs.kuleuven.be
Arman NoroozianEuropean Center for Algorithmic Transparency (ECAT)Verified email at ec.europa.eu
Victor Le PochatVerified email at cs.kuleuven.be
Carlos GañánAssociate Professor, Delft University of TechnologyVerified email at tudelft.nl
Giovane C. M. MouraData Scientist at SIDN Labs/ Assistant Prof. at TU DelftVerified email at sidn.nl
Oliver GasserIPinfoVerified email at ipinfo.io
Pawel Foremski, PhDIITiS PANVerified email at iitis.pl
Matthew LuckieVerified email at luckie.org.nz
Michał KrólCity, University of LondonVerified email at city.ac.uk
Nina H. FeffermanProfessor of Ecology and Evolutionary Biology & MathematicsVerified email at utk.edu
Jun Ho HuhSamsung Research, Samsung ElectronicsVerified email at samsung.com
Hadi AsghariTU BerlinVerified email at tu-berlin.de
Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
Maarten WullinkResearch Engineer SIDNVerified email at sidn.nl
Lazaros GallosRutgers UniversityVerified email at rutgers.edu