Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Willem JonkerProfessor Database Technology, University of Twente, the NetherlandsVerified email at utwente.nl
Jeroen DoumenSandGrain B.V.Verified email at doumen.nl
Sandro EtalleTU Eindhoven and University of TwenteVerified email at tue.nl
Marianne JungerChair of Cyber Security and Business ContinuityVerified email at utwente.nl
Yee Wei LawSenior Lecturer, University of South AustraliaVerified email at unisa.edu.au
Tang QiangLuxembourg institute of Science and TechnologyVerified email at list.lu
Lorena MontoyaUniversity of TwenteVerified email at utwente.nl
Andreas PeterProfessor, Safety-Security-Interaction Group, Carl von Ossietzky Universität Oldenburg, GermanyVerified email at uol.de
Svetla Petkova-NikovaKU LeuvenVerified email at esat.kuleuven.be
Luan IbraimiRoyal Dutch ShellVerified email at shell.com
R.N.J. VeldhuisFull professor, University of TwenteVerified email at utwente.nl
ileana buhanRadboud UniversityVerified email at ru.nl
Paul Havingaprofessor of Computer Science, University of Twente / TNOVerified email at utwente.nl
Ricardo CorinFaMAFVerified email at famaf.unc.edu.ar
Wolter PietersProfessor of Work, Organisations and Digital Technology, Radboud University NijmegenVerified email at ru.nl
Christoph BöschBosch ResearchVerified email at alumni.uni-ulm.de
Hugh GlaserSeme4 Ltd.Verified email at seme4.com
Damiano BolzoniUniversity of TwenteVerified email at utwente.nl
Arjan JeckmansPhD Student, University of TwenteVerified email at utwente.nl
Jan-Willem H. BulleePhDVerified email at utwente.nl