Get my own profile
Public access
View all26 articles
1 article
available
not available
Based on funding mandates
Co-authors
Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
Andrew SimpsonUniversity Lecturer in Software Engineering, Department of Computer Science, University of OxfordVerified email at cs.ox.ac.uk
Maximilian HilsUniversity of InnsbruckVerified email at uibk.ac.at
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
Josephine WolffTufts University, Rochester Institute of Technology, Massachusetts Institute of TechnologyVerified email at Tufts.edu
Jason R.C. NurseReader in Cyber Security, University of KentVerified email at kent.ac.uk
Sadie CreeseProfessor of CybersecurityVerified email at cs.ox.ac.uk
Daniel SchwarczFredrikson & Byron Professor of Law, University of Minnesota Law SchoolVerified email at umn.edu
Jessica WeinkleUniversity of North Carolina WilmingtonVerified email at uncw.edu
Temima HrleUniversity of EdinburghVerified email at ed.ac.uk
Kami VanieaUniversity of Waterloo, ECEVerified email at uwaterloo.ca
Jonathan M. SpringCybersecurity and Infrastructure Security AgencyVerified email at cisa.dhs.gov
Dr. Annika SelzerFraunhofer SITVerified email at sit.fraunhofer.de
Aaron CerossMinistry of Justice, United KingdomVerified email at justice.gov.uk
Adam JenkinsKing's College LondonVerified email at kcl.ac.uk
Jingjie LiUniversity of EdinburghVerified email at ed.ac.uk
Daniel ArceAshbel Smith Professor of Economics, University of Texas at DallasVerified email at utdallas.edu
Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk