Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Cybersecurity Focus Area Maturity (CYSFAM) Model., , and . J. Cybersecur. Priv., 1 (1): 119-139 (February 2021)Exploring the Utility of Dutch Question Answering Datasets for Human Resource Contact Centres., , , , and . Inf., 13 (11): 513 (2022)The CRISP-DCW Method for Distributed Computing Workflows., and . RIIFORUM, page 325-341. Springer, (2019)Applied Data Science in Financial Industry - Natural Language Processing Techniques for Bank Policies., and . RIIFORUM, page 351-367. Springer, (2019)Consumer Engagement Characteristics in Mobile Advertising., and . KDIR, page 206-214. SciTePress, (2017)Using Cluster Ensembles to Identify Psychiatric Patient Subgroups., , , and . AIME, volume 11526 of Lecture Notes in Computer Science, page 252-262. Springer, (2019)Addressing SME Characteristics for Designing Information Security Maturity Models., and . HAISA, volume 593 of IFIP Advances in Information and Communication Technology, page 161-174. Springer, (2020)ChiSCor: A Corpus of Freely-Told Fantasy Stories by Dutch Children for Computational Linguistics and Cognitive Science., , , and . CoNLL, page 352-363. Association for Computational Linguistics, (2023)Exploring the potential of federated learning in mental health research: a systematic literature review., , and . Appl. Intell., 54 (2): 1619-1636 (2024)VAST: a practical validation framework for e-assessment solutions., , , and . Inf. Syst. E Bus. Manag., 21 (3): 603-627 (September 2023)