1. A Time-dependent SIS-model for Long-term Computer Worm Evolution

    Märtens, M., Asghari, H., van Eeten, M. & Van Mieghem, P., 2016, IEEE Conference on Communications and Network Security 2016. Piscataway, NJ: IEEE, p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  2. A Typology of Strategic Behaviour in PPPs for Expressways: Lessons from China and Implications for Europe

    Mu, R., de Jong, WM. & ten Heuvelhof, EF., 2010, In : European Journal of Transport and Infrastructure Research (Print). 10, March 2010, p. 42-62 21 p.

    Research output: Contribution to journalArticleScientificpeer-review

  3. A West German school system for the new Länder: the reform of the educational system in the former GDR after the German reunification

    den Hertog, F. & de Jong, WM., 2002, The Theory and Practice of Institutional Transplantation: Experiences with the Transfer of Policy Institutions. WM Jong, D., KD Lalenis & V Mamadouh (eds.). Kluwer Academic Publishers, p. 119-134

    Research output: Chapter in Book/Report/Conference proceedingChapterScientific

  4. A brief methodology for researching and evaluating serious games and game- based learning

    Mayer, IS., Bekebrede, G., Warmelink, HJG. & Zhou, Q., 2014, Psychology, pedagogy, and assessment in serious games. Connolly, TM., Hainey, T., Boyle, E., Baxter, G. & Moreno-Ger, P. (eds.). Hershey: IGI Global, p. 357-393 522 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterScientific

  5. A building block approach to simulation: An evaluation using CONTAINERS ADRIFT

    Mayer, IS., Bockstael-Blok, W. & Valentin, EC., 2004, In : Simulation & Gaming: an international journal of theory, design and research. 35, 1, p. 29-52 24 p.

    Research output: Contribution to journalArticleScientific

  6. A co-evolutionary Approach to Duch Mainport Development: On the Edge of Change and Continuity

    Edelenbos, J., Gerrits, L., van Gils, M. & Huys, MG., 2005, Proceedings of Complexity, Sceince and Society Conference 2005. s.n. (ed.). Liverpool: s.n., p. -

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  7. A computational ontology for cyber operations

    Maathuis, C., Pieters, W. & Van Den Berg, J., 1 Jan 2018, Proceedings of the 17th European Conference on Cyber Warfare and Security, ECCWS 2018. Josang, A. (ed.). IARIA / Curran Associates INc., Vol. 2018-June. p. 278-287 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  8. A coordination challenge among multiple regulatory objectives

    Steenhuisen, BM., 2010, In : Network Industries Quarterly. 12, 2, p. 3-6 4 p.

    Research output: Contribution to journalArticleProfessional

  9. A frame-reflective discourse analysis of serious games

    Mayer, I., Warmelink, HJG. & Zhou, Q., 2015, In : British Journal of Educational Technology. 47, 2, p. 342-357 16 p.

    Research output: Contribution to journalArticleScientificpeer-review

  10. A framework for batch-operation analysis within the contact of disturbance management

    Schumacher, GM., 2000, In : Computers & Chemical Engineering. 24, supp, p. 1175-1180 6 p.

    Research output: Contribution to journalArticleScientific

Previous 1 2 3 4 5 6 7 8 ...215 Next

ID: 24673