Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Willem JonkerProfessor Database Technology, University of Twente, the NetherlandsVerified email at utwente.nl
Jeroen DoumenSandGrain B.V.Verified email at doumen.nl
Sandro EtalleTU Eindhoven and University of TwenteVerified email at tue.nl
Marianne JungerChair of Cyber Security and Business ContinuityVerified email at utwente.nl
Yee Wei LawSenior Lecturer, University of South AustraliaVerified email at unisa.edu.au
Tang QiangLuxembourg institute of Science and TechnologyVerified email at list.lu
Lorena MontoyaUniversity of TwenteVerified email at utwente.nl
Andreas PeterProfessor, Safety-Security-Interaction Group, University of Oldenburg, GermanyVerified email at uol.de
Svetla Petkova-NikovaKU LeuvenVerified email at esat.kuleuven.be
Luan IbraimiRoyal Dutch ShellVerified email at shell.com
R.N.J. VeldhuisFull professor, University of TwenteVerified email at utwente.nl
Paul Havingaprofessor of Computer Science, University of Twente / TNOVerified email at utwente.nl
ileana buhanRadboud UniversityVerified email at ru.nl
Wolter PietersProfessor of Work, Organisations and Digital Technology, Radboud University NijmegenVerified email at ru.nl
Ricardo CorinFaMAFVerified email at famaf.unc.edu.ar
Damiano BolzoniUniversity of TwenteVerified email at utwente.nl
Hugh GlaserSeme4 Ltd.Verified email at seme4.com
Christoph BöschIndependent ResearcherVerified email at alumni.uni-ulm.de
Arjan JeckmansPhD Student, University of TwenteVerified email at utwente.nl
Willem (Wim) G. VreeProfessor of Information and Communication Technology, Delft University of TechnologyVerified email at tudelft.nl