Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resilience of the Domain Name System: A case study of the .nl-domain., , and . Comput. Networks, (2018)Enhanced reduced pin-count test for full-scan design., , , and . ITC, page 738-747. IEEE Computer Society, (2001)TriMedia CPU64 Architecture., , , , , , , , , and . ICCD, page 586-592. IEEE Computer Society, (1999)Enhanced Reduced Pin-Count Test for Full-Scan Design., , , and . J. Electron. Test., 18 (2): 129-143 (2002)What You Enter Is What You Sign: Input Integrity in an Online Banking Environment., , and . STAST, page 40-47. IEEE Computer Society, (2014)Design-For-Debug in Hardware/Software Co-Design., , and . CODES, page 35-39. IEEE Computer Society, (1997)Experiences with a synchronous virtual classroom in distance education., and . ITiCSE, page 194-198. ACM, (2008)Discovering software vulnerabilities using data-flow analysis and machine learning., , and . ARES, page 6:1-6:10. ACM, (2018)IC Design Validation Using Message Sequence Charts., , , and . EUROMICRO, page 1122-. IEEE Computer Society, (2000)Counter botnet activities in the Netherlands a study on organisation and effectiveness., and . ICITST, page 437-442. IEEE, (2013)