Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Joseph BonneauNew York UniversityVerified email at cs.nyu.edu
- Alastair BeresfordComputer Laboratory, University of CambridgeVerified email at cam.ac.uk
- Dorothea KüblerWZB Social Science Center Berlin and TU BerlinVerified email at wzb.eu
- Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
- Kat KrolGoogle UKVerified email at google.com
- Jose SuchProfessor of Computer Science, King's College London & VRAIN-UPVVerified email at kcl.ac.uk
- Miguel MalheirosUniversity College LondonVerified email at cs.ucl.ac.uk
- M. Angela Sasse ML, FREngProfessor of Human-Centred Security, Ruhr University Bochum & Prof. Human-Centred Technology, UCLVerified email at ruhr-uni-bochum.de
- Gunes AcarRadboud UniversityVerified email at cs.ru.nl
- Seda GursesAssociate Professor TPM, TU Delft, Affiliate COSIC/KU Leuven,Verified email at tudelft.nl
- Adam JoinsonProfessor of Information Systems, University of Bath, UKVerified email at bath.ac.uk
- Daniel J. LieblingGoogleVerified email at liebling.org
- Florian KammüllerAssociate Professor, Middlesex University London and Privatdozent TU BerlinVerified email at mdx.ac.uk
- Chetan BansalMicrosoftVerified email at microsoft.com
- Ioannis KrontirisHuawei TechnologiesVerified email at huawei.com
- Ian BrownResearch ICT AfricaVerified email at researchictafrica.net
- Katie ShiltonProfessor, College of Information, University of Maryland College ParkVerified email at umd.edu
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
- Jan BlomSnr. User Experience Researcher, GoogleVerified email at google.com