Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Willem JonkerProfessor Database Technology, University of Twente, the NetherlandsVerified email at utwente.nlJeroen DoumenSandGrain B.V.Verified email at doumen.nl
Sandro EtalleTU Eindhoven and University of TwenteVerified email at tue.nlMarianne JungerChair of Cyber Security and Business ContinuityVerified email at utwente.nl
Yee Wei LawSenior Lecturer, Adelaide UniversityVerified email at adelaide.edu.au
Tang QiangLuxembourg institute of Science and TechnologyVerified email at list.lu
Lorena MontoyaUniversity of TwenteVerified email at utwente.nl
Andreas PeterProfessor, Safety-Security-Interaction Group, Carl von Ossietzky Universität Oldenburg, GermanyVerified email at uol.de
Svetla Petkova-NikovaKU LeuvenVerified email at esat.kuleuven.be
Luan IbraimiRoyal Dutch ShellVerified email at shell.com
R.N.J. VeldhuisFull professor, University of TwenteVerified email at utwente.nlileana buhanRadboud UniversityVerified email at ru.nl
Ricardo CorinFaMAFVerified email at famaf.unc.edu.arWolter PietersProfessor of Work, Organisations and Digital Technology, Radboud University NijmegenVerified email at ru.nl
Paul Havingaprofessor of Computer Science, University of Twente / TNOVerified email at utwente.nl
Christoph BöschBosch ResearchVerified email at alumni.uni-ulm.deHugh GlaserSeme4 Ltd.Verified email at seme4.com
Jan-Willem H. BulleePhDVerified email at utwente.nl
Arjan JeckmansPhD Student, University of TwenteVerified email at utwente.nlDamiano BolzoniUniversity of TwenteVerified email at utwente.nl