Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Willem JonkerProfessor Database Technology, University of Twente, the NetherlandsVerified email at utwente.nl
Jeroen DoumenSandGrain B.V.Verified email at doumen.nl
Sandro EtalleTU Eindhoven and University of TwenteVerified email at tue.nl
Marianne JungerChair of Cyber Security and Business ContinuityVerified email at utwente.nl
Yee Wei LawSenior Lecturer, University of South AustraliaVerified email at unisa.edu.au
Tang QiangLuxembourg institute of Science and TechnologyVerified email at list.lu
Lorena MontoyaUniversity of TwenteVerified email at utwente.nl
Svetla Petkova-NikovaKU LeuvenVerified email at esat.kuleuven.be
Andreas PeterProfessor, Safety-Security-Interaction Group, University of Oldenburg, GermanyVerified email at uol.de
Luan IbraimiRoyal Dutch ShellVerified email at shell.com
R.N.J. VeldhuisFull professor, University of TwenteVerified email at utwente.nl
Paul Havingaprofessor of Computer Science, University of Twente / Director Science TNO ICTVerified email at utwente.nl
ileana buhanRadboud UniversityVerified email at ru.nl
Wolter PietersProfessor of Work, Organisations and Digital Technology, Radboud University NijmegenVerified email at ru.nl
Hugh GlaserSeme4 Ltd.Verified email at seme4.com
Ricardo CorinFaMAFVerified email at famaf.unc.edu.ar
Christoph BöschIndependent ResearcherVerified email at alumni.uni-ulm.de
Damiano BolzoniUniversity of TwenteVerified email at utwente.nl
Willem (Wim) G. VreeProfessor of Information and Communication Technology, Delft University of TechnologyVerified email at tudelft.nl
Arjan JeckmansPhD Student, University of TwenteVerified email at utwente.nl