Get my own profile
Public access
View all13 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Trajce DimkovPhD Researcher, University of TwenteVerified email at utwente.nl
Pieter HartelProfessor Emeritus Cyber securityVerified email at tudelft.nl
Roel WieringaUniversity of TwenteVerified email at utwente.nl
Lorena MontoyaUniversity of TwenteVerified email at utwente.nl
Christian W ProbstUnitec Institute of TechnologyVerified email at unitec.ac.nz
Jan van den BergDelft University of Technology, Leiden UniversityVerified email at tudelft.nl
André TeixeiraAssociate Professor at Division of Systems and Control, Uppsala UniversityVerified email at it.uu.se
Clara MaathuisAssistant Professor in AI & Cyber Security, Open University, Delft University of TechnologyVerified email at tudelft.nl
Sabarathinam ChockalingamResearch Scientist I, Institute for Energy TechnologyVerified email at ife.no
Marianne JungerChair of Cyber Security and Business ContinuityVerified email at utwente.nl
Jan-Willem H. BulleePhDVerified email at utwente.nl
F DechesneTU Delft NLVerified email at tudelft.nl
Hugo JonkerOpen UniversiteitVerified email at ou.nl
Bart JacobsProfessor of Software Security and Correctness, Radboud University NijmegenVerified email at cs.ru.nl
Katsiaryna (Kate) LabunetsUtrecht UniversityVerified email at uu.nl
Martijn WarnierProfessor of Complex Systems Design, Delft University of TechnologyVerified email at tudelft.nl
Michel van EetenProfessor, Governance of Cybersecurity, TU DelftVerified email at tudelft.nl
Nima KhakzadToronto Metropolitan University (Ryerson University)Verified email at ryerson.ca
Cormac HerleyMicrosoft ResearchVerified email at microsoft.com
David R InsuaICMAT-CSICVerified email at icmat.es
Follow
Wolter Pieters
Professor of Work, Organisations and Digital Technology, Radboud University Nijmegen
Verified email at ru.nl - Homepage