Crea il mio profilo
Accesso pubblico
Visualizza tutto6 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Joseph BonneauNew York UniversityEmail verificata su cs.nyu.edu
- Alastair BeresfordComputer Laboratory, University of CambridgeEmail verificata su cam.ac.uk
- Dorothea KüblerWZB Social Science Center Berlin and TU BerlinEmail verificata su wzb.eu
- Ross AndersonUniversity of CambridgeEmail verificata su cl.cam.ac.uk
- Kat KrolGoogle UKEmail verificata su google.com
- Seda GursesAssociate Professor TPM, TU Delft, Affiliate COSIC/KU Leuven,Email verificata su tudelft.nl
- Jose SuchProfessor of Computer Science, King's College London & VRAIN-UPVEmail verificata su kcl.ac.uk
- Miguel MalheirosUniversity College LondonEmail verificata su cs.ucl.ac.uk
- M. Angela Sasse ML, FREngProfessor of Human-Centred Security, Ruhr University Bochum & Prof. Human-Centred Technology, UCLEmail verificata su ruhr-uni-bochum.de
- Gunes AcarRadboud UniversityEmail verificata su cs.ru.nl
- Adam JoinsonProfessor of Information Systems, University of Bath, UKEmail verificata su bath.ac.uk
- Florian KammüllerAssociate Professor, Middlesex University London and Privatdozent TU BerlinEmail verificata su mdx.ac.uk
- Daniel J. LieblingGoogleEmail verificata su liebling.org
- Chetan BansalMicrosoftEmail verificata su microsoft.com
- Ioannis KrontirisHuawei TechnologiesEmail verificata su huawei.com
- Ian BrownResearch ICT AfricaEmail verificata su researchictafrica.net
- Katie ShiltonAssociate Professor, Information Studies, University of Maryland College ParkEmail verificata su umd.edu
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaEmail verificata su utulsa.edu
- Jan BlomSnr. User Experience Researcher, GoogleEmail verificata su google.com